WO1998052178A1 - Security label and method of use - Google Patents

Security label and method of use Download PDF

Info

Publication number
WO1998052178A1
WO1998052178A1 PCT/US1997/008024 US9708024W WO9852178A1 WO 1998052178 A1 WO1998052178 A1 WO 1998052178A1 US 9708024 W US9708024 W US 9708024W WO 9852178 A1 WO9852178 A1 WO 9852178A1
Authority
WO
WIPO (PCT)
Prior art keywords
label
piggy
security
liner
package
Prior art date
Application number
PCT/US1997/008024
Other languages
French (fr)
Inventor
Glenn P. Wood
Original Assignee
Optical Security Group, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Optical Security Group, Inc. filed Critical Optical Security Group, Inc.
Priority to AU30645/97A priority Critical patent/AU3064597A/en
Priority to US09/423,777 priority patent/US6533180B1/en
Priority to PCT/US1997/008024 priority patent/WO1998052178A1/en
Publication of WO1998052178A1 publication Critical patent/WO1998052178A1/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0291Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time
    • G09F3/0292Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time tamper indicating labels

Definitions

  • This invention relates to a security label, an associated package and associated methods, and more particularly, to a security label that is useful in (i) providing documentary evidence that an authentic product was used and (ii) providing a visually obvious method to determine if a product contained in a package is authentic.
  • counterfeit or non-genuine products is, unfortunately, a serious problem in many situations.
  • the use of counterfeit automobile or aircraft parts not only constitutes a fraud on the purchaser but also may lead to serious safety problems.
  • non-authentic or generic pharmaceutical products when the authentic pharmaceutical product is thought to be used can cause serious health consequences for the patient and can lead to malpractice claims against physicians and hospitals.
  • the security label of the invention comprises a label liner including a first adhesive layer and a piggy-back label removably secured to the label liner.
  • An associated package having the security label placed thereon is also disclosed.
  • the package is adapted to contain replacement parts, such as aircraft and automobile parts, and pharmaceutical products .
  • the invention also provides a method of providing documentary evidence of the use of an authentic product.
  • the method comprises providing a package containing an authentic product and placing thereon a security label having a structure that was described above.
  • the piggy-back label of the security label is then removed from the label liner of the security label and placed on a document. In this way, the document indicates that the authentic product has been used.
  • the removal of the piggy-back label also prevents re-use of the package for non-authentic products.
  • the invention also provides a method of visually verifying the authenticity of a product contained in a package.
  • the method comprises placing on the package a security label having a structure that was described above.
  • the method then comprises observing the security label on the package to determine the presence or absence of the piggy-back label on the label backing. The absence of the piggy-back label indicates to the user that a non-authentic product may be contained in the package.
  • Figure 1 is a sectional view of the security label of the invention.
  • Figure 2 is a sectional view of another embodiment of the security label of the invention.
  • Figure 3 is a sectional view of yet another embodiment of the security label of the invention.
  • Figure 4 is a side elevational view of a package having placed thereon a security label.
  • Figure 5 is a plan view of a document having the piggy-back label of the invention placed thereon.
  • Figure 6 is a sectional view of still another embodiment of the security label of the invention.
  • Figure 7A is a sectional view showing the piggy-back label of the security label of the security label shown in Figure 6 as applied to a document when an attempt is made to remove the piggy-pack label from the document.
  • Figure 7B is a top plan view showing the piggy-back label applied to the document.
  • Figure 7C is a top plan view similar to Figure 7B only showing the result of attempting the removal of the piggy-back label from the document.
  • Figure 8 is a sectional view of the multipart piggy-back label embodiment of the invention.
  • Figure 9 is a top plan view of the label shown in Figure 8.
  • the security label 10 consists of several different layers, the bottom of which is a release liner layer 12 that is used for shipping or transporting the security label 10 to its ultimate destination where it is placed on a package.
  • the release liner layer 12 is preferably made of plastic or paper and is adapted to be peeled from the remainder of the security label 10 when it is desired to expose the adhesive layer 14 of the security label.
  • a suitable release liner layer 12 is one made by the 3M Company of St. Paul, Minnesota.
  • the release liner layer 12 is preferably about 0.0005 to 0.0050 inches thick with 0.0015 to 0.0025 inches being preferred.
  • a first adhesive layer 14 is provided on the release liner layer 12.
  • the first adhesive layer 14 is pre-coated onto the label liner 16.
  • a suitable adhesive material is one made by the 3M Company of St. Paul, Minnesota.
  • the adhesive layer 14 is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred.
  • the label liner 16 is similar to release liner layer 12 only the label liner 16 includes the adhesive layer 14.
  • the dimensions and composition of the label liner 16 are preferably similar ( al though this is not necessary) to the dimensions and composition of release liner layer 12.
  • the piggy-back label 30 of the invention is disposed on top of the label liner 16.
  • the piggy-back label 30, in the embodiment shown in Figure 1, consists of a second adhesive layer 32 disposed on a label layer 34 having printed thereon indicia 36. Again, the label layer 34 is preferably pre-coated with the second adhesive layer 32.
  • the piggy-back label 30 is removably secured to the liner 16 for transfer to a document, for example, as will be explained further below.
  • the second adhesive layer 32 is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred.
  • a suitable adhesive material is one made by the 3M Company of St. Paul, Minnesota.
  • the label layer 34 is disposed on top of the adhesive layer 32 and is removed along with the adhesive layer 32 from the liner 16 in accordance with the method of the invention which will be discussed below.
  • the label layer 34 shown in Figure 1 is made of polyester and can range from about 0.0005 to 0.0050 inches thick with 0.0015 to 0.0025 inches being preferred.
  • a suitable label layer 34 is one made by Vacumet Corporation of Wayne, New Jersey under the tradename designation of Barrier-MetTM . It will be appreciated that the label layer 34 and adhesive 32 can be provided as an integral unit.
  • the indicia 36 on the label layer 34 may be applied by human or mechanical means and can include words, symbols or numbers, colors or other information containing means.
  • One embodiment can be a printed indicia, such as barcode. It will be appreciated, however, that indicia 36 need not be used as layer 34 itself can impart the necessary information without the need for indicia 36 by, for example, being a specific color or containing a pattern.
  • Figure 2 shows an alternate type of label layer from the label layer 34 shown in Figure 1.
  • the security label 50 shown in Figure 2 includes a release layer 52, a first adhesive layer 54, a liner 56 and a second adhesive layer 58, similar to those described above with respect to Figure 1.
  • the label layer of Figure 2 is a diffractive label layer 60 that includes a micro-embossed relieved surface 62.
  • the indicia 64 can be printed on the relieved surface 62.
  • the term "diffractive label layer” means a label layer which exhibits an optical diffractive effect when exposed to light.
  • the relieved surface 62 of the diffractive label layer 60 creates an optically diffractive effect when exposed to light.
  • An alternate method of creating an optically diffractive effect is by providing a diffractive label layer having diffraction gratings.
  • the diffractive label layer resists unauthorized photocopy duplication of the security label, either initially or when placed on a document as will be explained below, thus providing an extra measure of security.
  • Security label 70 also includes a release layer 72, a first adhesive layer 74, a liner 76 and a second adhesive layer 78, similar to those described above with respect to Figure 1.
  • the label layer of Figure 2 is a holographic label layer 80.
  • the indicia 82 can be printed on the holographic label layer 80.
  • the holographic label layer 80 as with the diffractive label layer 60, resists unauthorized photocopy duplication of the security label, either initially or when placed on a document as will be explained below, thus providing an extra measure of security.
  • the security label 10 is placed on a package, such as package 150 shown in Figure 4.
  • the bottom release liner layer 12 is removed, thus exposing the adhesive layer 14.
  • the adhesive layer 14 is then press-applied to a surface 152 of the package 150 with the indicia 36 being exposed. It will be appreciated that the thickness of the security label 10 as shown in Figure 4 is greatly exaggerated for purposes of illustration only.
  • the package 150 is adapted to contain authentic products.
  • authentic products include, but are not limited to, replacement parts for automobiles and aircraft as well as pharmaceuticals.
  • any product whose authenticity it is desired to ensure can be protected by the security label 10 and the method of the invention. Referring now to both Figures 4 and 5, the methods of the invention will be discussed.
  • an authorized user either before or after removing the product from the package 150 ) removes the piggy-back label 30 from the liner 16 as shown in Figure 4 and places the piggy-back label 30, using the adhesive layer 32, on a separate document, such as document 160 shown in Figure 5.
  • the term "document" includes any information bearing item, for example, a work order or a page in a log book.
  • the presence of the piggy-back label 30 on the document 160 indicates to the observer of the document 160 that an authentic product has been used.
  • an auto or aircraft mechanic can place the piggy-back label 30 of the invention on a work order to prove that an authentic replacement part has been used.
  • a health-care worker can place the piggy-back label 30 on a patient's records to show that the proper drug has been administered to the patient. It will be appreciated that the method of verification provided by the invention will clearly reduce the incidences of using a non-authentic product.
  • the package 150 itself, with the piggy-back label 30 removed can now not be re-used to contain a non-authentic part.
  • security label 50 or security label 70 can be used. It will be appreciated that once the piggy-back labels of security label 50 or security label 70 are placed on the document 160, the document 160 is photocopy resistant because of the diffractive label layer 60 or holographic label layer 80, respectively. This provides an extra measure of security for the document 160.
  • Another method of the invention involves verifying the authenticity of a product contained in the package before use of the product.
  • This method involves placing a security label on a package as was described above. The method then involves observing the security label to determine the presence or absence of the piggy-back label on the backing label. If the piggy-back label is not on the backing label, this is an indication that the product contained in the package is not genuine.
  • a further embodiment of the invention shown in Figures 6 and 7A-7C, includes a tamper evident feature.
  • This security label 200 also includes a release layer 202, a first adhesive layer 204 and a liner 206 similar to those shown in Figure 1.
  • the piggy-back label 220 consists of a second adhesive layer 222 which is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred, made of rubber or acrylic based pressure sensitive adhesive made by the 3M Company of St. Paul, Minnesota; a metallic layer 224 which is preferably about 30 Angstroms (A) to 2000 A inches thick with 200 A to 500 A inches being preferred, made of aluminum.
  • the piggy-back label 220 further consists of patterned release layer 226 an a support layer 228 which is sold as a unit by Flexcon of Spencer, Massachusetts under the tradename of TAMPERMARK IM with, optionally, indicia 230 printed thereon.
  • the piggy-back label 220 can be removed from the liner 206 and placed on a document, such as document 260 in Figure 7, without damaging the piggy-back label 220.
  • a document such as document 260 in Figure 7, without damaging the piggy-back label 220.
  • any attempt to remove the label therefrom will result in portions 224a and 224b ( Figure 7A) of the metallic layer 224 being pulled off of the document 260. As can be seen in Figure 7C, this provides a clear, visual indication of tampering.
  • Figures 7A and 7C show that the adhesive layer 222 remains on the document, however, a portion of the adhesive layer 222 can also be pulled off the document, along with portions 224a and 224b ( Figure 7A) . This depends on how strongly the label 220 is bound to the document. The key result, however, is the destruction of the metallic layer 224, which provides the visual indication of tampering.
  • the multi-piggy-back label security label 300 consists of a release layer 302, a first adhesive layer 304 and a liner 306 similar to those shown in Figure 1.
  • three separate piggy-back labels 310, 312 and 314 are provided on a single label backing 320.
  • the piggy-back labels 310, 312 and 314 each include (i) a second adhesive layer 320, 322 and 324; (ii) a label layer 330, 332 and 334; and (iii) separate indicia, in this case, barcodes 340, 342 and 344.
  • the barcode indicia 340, 342 and 344 are identical.
  • the piggy-back labels 310, 312 and 314 are separated by slits 350 and 352 which penetrate the label layers 330, 332 and 334 and second adhesive layers 320, 322 and 324 so that each piggy-back label 310, 312 and 314 can be separately removed from the common label backing 320.
  • each piggy-back label 310, 312 and 314 can be removed from the liner 306 and placed on separate documents.
  • piggy-back label 310 can be removed from liner 306 and placed on a work order
  • piggy-back label 312 can be placed on a service record
  • piggy-back label 314 can be placed in a log book. In this way, one unitary security label can provide proof on multiple documents and records that a genuine part has been used.
  • any desired number of piggy-back labels can be provided on a single, unitary security label.
  • the embodiment shown in Figures 8 and 9 can include the diffraction label layer shown in Figure 2 or the holographic label layer shown in Figure 3 and/or the tamper evident label layer shown in Figures 6 and 7A-7C.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)

Abstract

A security label (10) including a label liner (12) having a first adhesive layer (14) and a piggy-back label (30) removably secured to the liner (12) by a second adhesive layer (32). An associated package (150) having the security label (10) placed thereon, as well as associated methods are also disclosed.

Description

SECURITY LABEL AND METHOD OF USE
BACKGROUND OF THE INVENTION
This invention relates to a security label, an associated package and associated methods, and more particularly, to a security label that is useful in (i) providing documentary evidence that an authentic product was used and (ii) providing a visually obvious method to determine if a product contained in a package is authentic.
The use of counterfeit or non-genuine products is, unfortunately, a serious problem in many situations. For example, the use of counterfeit automobile or aircraft parts not only constitutes a fraud on the purchaser but also may lead to serious safety problems. Even more seriously, the use of non-authentic or generic pharmaceutical products when the authentic pharmaceutical product is thought to be used can cause serious health consequences for the patient and can lead to malpractice claims against physicians and hospitals.
What is needed, therefore, is a security label that can be used to determine the authenticity of the product contained in a package and that can also be used to provide documentary evidence that an authentic product was used in repairing a car or aircraft or that the proper drug is used in patient care.
SUMMARY OF THE INVENTION
The invention has met or exceeded the above-mentioned needs, as well as others. The security label of the invention comprises a label liner including a first adhesive layer and a piggy-back label removably secured to the label liner. An associated package having the security label placed thereon is also disclosed. The package is adapted to contain replacement parts, such as aircraft and automobile parts, and pharmaceutical products .
The invention also provides a method of providing documentary evidence of the use of an authentic product. The method comprises providing a package containing an authentic product and placing thereon a security label having a structure that was described above. The piggy-back label of the security label is then removed from the label liner of the security label and placed on a document. In this way, the document indicates that the authentic product has been used. The removal of the piggy-back label also prevents re-use of the package for non-authentic products.
Finally, the invention also provides a method of visually verifying the authenticity of a product contained in a package. The method comprises placing on the package a security label having a structure that was described above. The method then comprises observing the security label on the package to determine the presence or absence of the piggy-back label on the label backing. The absence of the piggy-back label indicates to the user that a non-authentic product may be contained in the package.
BRIEF DESCRIPTION OF THE DRAWINGS
A full understanding of the invention can be gained from the following description of the preferred embodiment when read in conjunction with the accompanying drawings in which:
Figure 1 is a sectional view of the security label of the invention. Figure 2 is a sectional view of another embodiment of the security label of the invention.
Figure 3 is a sectional view of yet another embodiment of the security label of the invention. Figure 4 is a side elevational view of a package having placed thereon a security label.
Figure 5 is a plan view of a document having the piggy-back label of the invention placed thereon.
Figure 6 is a sectional view of still another embodiment of the security label of the invention.
Figure 7A is a sectional view showing the piggy-back label of the security label of the security label shown in Figure 6 as applied to a document when an attempt is made to remove the piggy-pack label from the document.
Figure 7B is a top plan view showing the piggy-back label applied to the document.
Figure 7C is a top plan view similar to Figure 7B only showing the result of attempting the removal of the piggy-back label from the document.
Figure 8 is a sectional view of the multipart piggy-back label embodiment of the invention.
Figure 9 is a top plan view of the label shown in Figure 8.
DETAILED DESCRIPTION
Referring now to Figure 1, a cross-sectional view of an embodiment of the security label 10 of the invention is shown. The security label 10 consists of several different layers, the bottom of which is a release liner layer 12 that is used for shipping or transporting the security label 10 to its ultimate destination where it is placed on a package. The release liner layer 12 is preferably made of plastic or paper and is adapted to be peeled from the remainder of the security label 10 when it is desired to expose the adhesive layer 14 of the security label. A suitable release liner layer 12 is one made by the 3M Company of St. Paul, Minnesota. The release liner layer 12 is preferably about 0.0005 to 0.0050 inches thick with 0.0015 to 0.0025 inches being preferred.
A first adhesive layer 14 is provided on the release liner layer 12. Preferably, the first adhesive layer 14 is pre-coated onto the label liner 16. A suitable adhesive material is one made by the 3M Company of St. Paul, Minnesota. The adhesive layer 14 is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred.
The label liner 16 is similar to release liner layer 12 only the label liner 16 includes the adhesive layer 14. The dimensions and composition of the label liner 16 are preferably similar ( al though this is not necessary) to the dimensions and composition of release liner layer 12. The piggy-back label 30 of the invention is disposed on top of the label liner 16. The piggy-back label 30, in the embodiment shown in Figure 1, consists of a second adhesive layer 32 disposed on a label layer 34 having printed thereon indicia 36. Again, the label layer 34 is preferably pre-coated with the second adhesive layer 32. The piggy-back label 30 is removably secured to the liner 16 for transfer to a document, for example, as will be explained further below. The second adhesive layer 32 is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred. A suitable adhesive material is one made by the 3M Company of St. Paul, Minnesota.
The label layer 34 is disposed on top of the adhesive layer 32 and is removed along with the adhesive layer 32 from the liner 16 in accordance with the method of the invention which will be discussed below. The label layer 34 shown in Figure 1 is made of polyester and can range from about 0.0005 to 0.0050 inches thick with 0.0015 to 0.0025 inches being preferred. A suitable label layer 34 is one made by Vacumet Corporation of Wayne, New Jersey under the tradename designation of Barrier-Met™ . It will be appreciated that the label layer 34 and adhesive 32 can be provided as an integral unit.
The indicia 36 on the label layer 34 may be applied by human or mechanical means and can include words, symbols or numbers, colors or other information containing means. One embodiment can be a printed indicia, such as barcode. It will be appreciated, however, that indicia 36 need not be used as layer 34 itself can impart the necessary information without the need for indicia 36 by, for example, being a specific color or containing a pattern.
Figure 2 shows an alternate type of label layer from the label layer 34 shown in Figure 1. The security label 50 shown in Figure 2 includes a release layer 52, a first adhesive layer 54, a liner 56 and a second adhesive layer 58, similar to those described above with respect to Figure 1. The label layer of Figure 2, however, is a diffractive label layer 60 that includes a micro-embossed relieved surface 62. The indicia 64 can be printed on the relieved surface 62. As used herein, the term "diffractive label layer" means a label layer which exhibits an optical diffractive effect when exposed to light. As shown in Figure 2, the relieved surface 62 of the diffractive label layer 60 creates an optically diffractive effect when exposed to light. An alternate method of creating an optically diffractive effect is by providing a diffractive label layer having diffraction gratings. The diffractive label layer resists unauthorized photocopy duplication of the security label, either initially or when placed on a document as will be explained below, thus providing an extra measure of security.
Referring now to Figure 3, another embodiment of the security label is shown. Security label 70 also includes a release layer 72, a first adhesive layer 74, a liner 76 and a second adhesive layer 78, similar to those described above with respect to Figure 1. The label layer of Figure 2, however, is a holographic label layer 80. The indicia 82 can be printed on the holographic label layer 80. The holographic label layer 80, as with the diffractive label layer 60, resists unauthorized photocopy duplication of the security label, either initially or when placed on a document as will be explained below, thus providing an extra measure of security.
It will be appreciated that in both embodiments shown in Figures 2 and 3, that the indicia 64 and 82 (as with indicia 36 of Figure 1 ) need not be provided.
In use, the security label 10 is placed on a package, such as package 150 shown in Figure 4. In order to place the security label 10 on the package 150, the bottom release liner layer 12 is removed, thus exposing the adhesive layer 14. The adhesive layer 14 is then press-applied to a surface 152 of the package 150 with the indicia 36 being exposed. It will be appreciated that the thickness of the security label 10 as shown in Figure 4 is greatly exaggerated for purposes of illustration only.
The package 150 is adapted to contain authentic products. Such authentic products include, but are not limited to, replacement parts for automobiles and aircraft as well as pharmaceuticals. In fact, any product whose authenticity it is desired to ensure can be protected by the security label 10 and the method of the invention. Referring now to both Figures 4 and 5, the methods of the invention will be discussed. When it is desired to use the authentic product contained in the package 150, an authorized user (either before or after removing the product from the package 150 ) removes the piggy-back label 30 from the liner 16 as shown in Figure 4 and places the piggy-back label 30, using the adhesive layer 32, on a separate document, such as document 160 shown in Figure 5. As used herein the term "document" includes any information bearing item, for example, a work order or a page in a log book. The presence of the piggy-back label 30 on the document 160 indicates to the observer of the document 160 that an authentic product has been used. For example, an auto or aircraft mechanic can place the piggy-back label 30 of the invention on a work order to prove that an authentic replacement part has been used. In another embodiment, a health-care worker can place the piggy-back label 30 on a patient's records to show that the proper drug has been administered to the patient. It will be appreciated that the method of verification provided by the invention will clearly reduce the incidences of using a non-authentic product. In addition, the package 150 itself, with the piggy-back label 30 removed, can now not be re-used to contain a non-authentic part.
In lieu of security label 10, security label 50 or security label 70 can be used. It will be appreciated that once the piggy-back labels of security label 50 or security label 70 are placed on the document 160, the document 160 is photocopy resistant because of the diffractive label layer 60 or holographic label layer 80, respectively. This provides an extra measure of security for the document 160.
Another method of the invention involves verifying the authenticity of a product contained in the package before use of the product. This method involves placing a security label on a package as was described above. The method then involves observing the security label to determine the presence or absence of the piggy-back label on the backing label. If the piggy-back label is not on the backing label, this is an indication that the product contained in the package is not genuine. A further embodiment of the invention, shown in Figures 6 and 7A-7C, includes a tamper evident feature. This security label 200 also includes a release layer 202, a first adhesive layer 204 and a liner 206 similar to those shown in Figure 1. The piggy-back label 220, however, consists of a second adhesive layer 222 which is preferably about 0.0002 to 0.0040 inches thick with 0.0005 to 0.0010 inches being preferred, made of rubber or acrylic based pressure sensitive adhesive made by the 3M Company of St. Paul, Minnesota; a metallic layer 224 which is preferably about 30 Angstroms (A) to 2000 A inches thick with 200 A to 500 A inches being preferred, made of aluminum. The piggy-back label 220 further consists of patterned release layer 226 an a support layer 228 which is sold as a unit by Flexcon of Spencer, Massachusetts under the tradename of TAMPERMARKIM with, optionally, indicia 230 printed thereon. The patterned release layer 226, usually consisting of a wax, is coated in intermittent fashion, such as by dots or checkerboard pattern, onto the metallic layer 224. In this embodiment, the piggy-back label 220 can be removed from the liner 206 and placed on a document, such as document 260 in Figure 7, without damaging the piggy-back label 220. Once the piggy-back label 220 is placed on the document 260 (as shown in Figures 7A-7C) , any attempt to remove the label therefrom will result in portions 224a and 224b (Figure 7A) of the metallic layer 224 being pulled off of the document 260. As can be seen in Figure 7C, this provides a clear, visual indication of tampering. It will be appreciated that Figures 7A and 7C show that the adhesive layer 222 remains on the document, however, a portion of the adhesive layer 222 can also be pulled off the document, along with portions 224a and 224b (Figure 7A) . This depends on how strongly the label 220 is bound to the document. The key result, however, is the destruction of the metallic layer 224, which provides the visual indication of tampering.
It will be appreciated that the diffractive label layer and holographic layer label described in Figures 2 and 3 can be combined with the tamper evident feature discussed above in Figures 6 and 7.
Referring now to Figures 8 and 9, a multi-piggy-back label security label 300 is shown. The multi-piggy-back label security label 300 consists of a release layer 302, a first adhesive layer 304 and a liner 306 similar to those shown in Figure 1. In this embodiment, however, three separate piggy-back labels 310, 312 and 314 are provided on a single label backing 320. The piggy-back labels 310, 312 and 314 each include (i) a second adhesive layer 320, 322 and 324; (ii) a label layer 330, 332 and 334; and (iii) separate indicia, in this case, barcodes 340, 342 and 344. As can be seen in Figure 9, in a preferred embodiment the barcode indicia 340, 342 and 344 are identical. The piggy-back labels 310, 312 and 314 are separated by slits 350 and 352 which penetrate the label layers 330, 332 and 334 and second adhesive layers 320, 322 and 324 so that each piggy-back label 310, 312 and 314 can be separately removed from the common label backing 320.
This embodiment in Figures 8 and 9 is useful when multiple documents need to have proof that a genuine part has been used. For example, once the security label 300 is affixed to a package (not shown ) , and the part contained in that package is used, each piggy-back label 310, 312 and 314 can be removed from the liner 306 and placed on separate documents. For example, piggy-back label 310 can be removed from liner 306 and placed on a work order, piggy-back label 312 can be placed on a service record and piggy-back label 314 can be placed in a log book. In this way, one unitary security label can provide proof on multiple documents and records that a genuine part has been used. It will be appreciated that although three piggy-back labels are shown in Figures 8 and 9, any desired number of piggy-back labels can be provided on a single, unitary security label. As mentioned above, the embodiment shown in Figures 8 and 9 can include the diffraction label layer shown in Figure 2 or the holographic label layer shown in Figure 3 and/or the tamper evident label layer shown in Figures 6 and 7A-7C.
It will be appreciated that a security label, an associated package and associated methods have been disclosed which are useful in not only verifying the authenticity of a product but also providing documentary evidence that an authentic product has been used.
While specific embodiments of the invention have been disclosed, it will be appreciated by those skilled in the art that various modifications and alterations to those details could be developed in light of the overall teachings of the disclosure. Accordingly, the particular arrangements disclosed are meant to be illustrative only and not limiting as to the scope of the invention which is to be given the full breadth of the appended claims and any and all equivalents thereof.

Claims

WHAT IS CLAIMED IS:
1. A security label comprising: a label liner including a first adhesive layer; and a piggy-back label removably secured to said label liner.
2. The security label of Claim 1, wherein said piggy-back label includes a second adhesive layer such that said piggy-back label can be adhered to a document after being removed from said label liner.
3. The security label of Claim 1, wherein said piggy-back label is a diffractive label.
4. The security label of Claim 3, wherein said diffractive label includes a diffractive label layer having a relieved surface.
5. The security label of Claim 1, wherein said piggy-back label is a holographic label.
6. The security label of Claim 1, wherein said piggy-back label includes indicia.
7. The security label of Claim 6, wherein said indicia is a barcode.
8. The security label of Claim 1, wherein said piggy-back label is a tamper evident label .
9. The security label of Claim 8, wherein said piggy-back label includes (i) a second adhesive layer; (ii) a metallic layer disposed on said second adhesive layer; (iii) a support layer; and (iv) a release layer interposed between said support layer and said metallic layer.
10. The security label of Claim 9, wherein said release layer is disposed in a pattern.
11. The security label of Claim 10, wherein said pattern is a checkerboard pattern.
12. The security label of Claim 1, including a plurality of piggy-back labels removably secured to said label liner.
13. The security label of Claim 12, wherein each of said piggy-back labels contains identical indicia.
14. The security label of Claim 1, including a release layer underlying said first adhesive layer.
15. A package having secured thereto a security label, said security label comprising (i) a label liner including a first adhesive layer and (ii) a piggy-back label removably secured to said label liner.
16. The package of Claim 15, wherein said package is adapted to contain pharmaceuticals.
17. The package of Claim 15, wherein said package is adapted to contain replacement parts.
18. The package of Claim 17, wherein said replacement parts are selected from the group consisting of aircraft parts and automobile parts.
19. The security label of Claim 15, wherein said piggy-back label includes a second adhesive layer such that said piggy-back label can be adhered to a document after being removed from said label liner.
20. The security label of Claim 15, wherein said piggy-back label is a diffractive label.
21. The security label of Claim 20, wherein said diffractive label includes a diffractive label layer having a relieved surface.
22. The security label of Claim 15, wherein said piggy-back label is a holographic label.
23. The security label of Claim 15, wherein said piggy-back label includes indicia.
24. The security label of Claim 23, wherein said indicia is a barcode.
25. The security label of Claim 15, wherein said piggy-back label is a tamper evident label .
26. The security label of Claim 15, including a plurality of piggy-back labels removably secured to said label liner.
27. The security label of Claim 26, wherein each of said piggy-back labels contains identical indicia.
28. The security label of Claim 15, including a release layer underlying said first adhesive layer.
29. A method of providing documentary evidence of the use of an authentic product, said method comprising: providing a package containing said authentic product; placing on said package a security label including (i) a label liner having a first adhesive layer and (ii) a piggy-back label removably secured to said label liner; and removing said piggy-back label from said label liner and placing said piggy-back label on a document, whereby said document indicates that said authentic product has been used.
30. The method of Claim 29, including employing as said piggy-back label a diffractive label so that said document is photocopy resistant.
31. The method of Claim 29, including employing as said piggy-back label a holographic label so that said document is photocopy resistant.
32. The method of Claim 29, including employing as said piggy-back label a tamper evident label so that visual evidence of tampering with said piggy-back label on said document is provided.
33. The method of Claim 29, including employing a plurality of piggy-back labels removably secured to said label liner.
34. The method of Claim 33, including placing a first piggy-back label on a first document; and placing a second piggy-back label on a second document.
35. The method of Claim 29, including said authentic product is a pharmaceutical product ,
36. The method of Claim 29, including said authentic product is a replacement part.
37. The method of Claim 36, including said replacement part is selected from the group consisting of aircraft parts and automobile parts.
38. A method of visually verifying the authenticity of a product contained in a package, said method comprising: placing on said package a security label including (i) a label liner having a first adhesive layer and (ii) a piggy-back label removably secured to said label liner; and observing said security label on said package to determine the presence or absence of said piggy-back label on said label liner.
39. The method of Claim 38, including said authentic product is a pharmaceutical product.
40. The method of Claim 38, including said authentic product is a replacement part.
41. The method of Claim 40, including said replacement part is selected from the group consisting of aircraft parts and automobile parts.
PCT/US1997/008024 1997-05-13 1997-05-13 Security label and method of use WO1998052178A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU30645/97A AU3064597A (en) 1997-05-13 1997-05-13 Security label and method of use
US09/423,777 US6533180B1 (en) 1997-05-13 1997-05-13 Security label and method of use
PCT/US1997/008024 WO1998052178A1 (en) 1997-05-13 1997-05-13 Security label and method of use

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1997/008024 WO1998052178A1 (en) 1997-05-13 1997-05-13 Security label and method of use

Publications (1)

Publication Number Publication Date
WO1998052178A1 true WO1998052178A1 (en) 1998-11-19

Family

ID=22260881

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/008024 WO1998052178A1 (en) 1997-05-13 1997-05-13 Security label and method of use

Country Status (2)

Country Link
AU (1) AU3064597A (en)
WO (1) WO1998052178A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1278173A2 (en) * 2001-07-18 2003-01-22 Fabrica Nacional De Moneda Y Timbre Removable security identification label
EP1466707A2 (en) * 2003-04-09 2004-10-13 Endicott Interconnect Technologies, Inc. A method of removing selected portions of material from a base material
WO2005073883A2 (en) * 2004-02-02 2005-08-11 Rudolf Benecke Modular information system
CN100449581C (en) * 2004-02-02 2009-01-07 鲁道夫·贝内克 Modular information system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4269473A (en) * 1978-03-23 1981-05-26 Siemens Aktiengesellschaft Identification card with a hologram and a process for the production thereof
US4824144A (en) * 1987-04-10 1989-04-25 Tasma Gerald W Color identification system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4269473A (en) * 1978-03-23 1981-05-26 Siemens Aktiengesellschaft Identification card with a hologram and a process for the production thereof
US4824144A (en) * 1987-04-10 1989-04-25 Tasma Gerald W Color identification system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1278173A2 (en) * 2001-07-18 2003-01-22 Fabrica Nacional De Moneda Y Timbre Removable security identification label
EP1278173A3 (en) * 2001-07-18 2003-12-17 Fabrica Nacional De Moneda Y Timbre Removable security identification label
ES2197761A1 (en) * 2001-07-18 2004-01-01 Fab Nac Moneda Y Timbre Es Removable security identification label
EP1466707A2 (en) * 2003-04-09 2004-10-13 Endicott Interconnect Technologies, Inc. A method of removing selected portions of material from a base material
EP1466707A3 (en) * 2003-04-09 2005-03-23 Endicott Interconnect Technologies, Inc. A method of removing selected portions of material from a base material
US6958106B2 (en) 2003-04-09 2005-10-25 Endicott International Technologies, Inc. Material separation to form segmented product
WO2005073883A2 (en) * 2004-02-02 2005-08-11 Rudolf Benecke Modular information system
WO2005073883A3 (en) * 2004-02-02 2006-02-02 Rudolf Benecke Modular information system
CN100449581C (en) * 2004-02-02 2009-01-07 鲁道夫·贝内克 Modular information system

Also Published As

Publication number Publication date
AU3064597A (en) 1998-12-08

Similar Documents

Publication Publication Date Title
US6533180B1 (en) Security label and method of use
US5346259A (en) Anti-theft label construction
US5869160A (en) Release coated liners and security labels containing such release coated liners
KR100344086B1 (en) Durable security laminate with hologram
US6752430B2 (en) Time dependent color-changing security indicator
US6659507B2 (en) Enhanced security for tamper-apparent labels, seals or tags
HU223693B1 (en) Tamper-evident form for securely carrying information
EP0756738A1 (en) Security label
US5948555A (en) Tamper resistant vehicular validation tab having differential adhesive properties
RU2417900C2 (en) Protective layer material
GB2452066A (en) Holograms to provide security for documents
KR20060036390A (en) Two-part security sticker and document system therefor
US5763052A (en) Informational article and an associated method
WO1998052178A1 (en) Security label and method of use
NO326025B1 (en) Integrity violation revealing form and method for specifying separation of a first and a second laminate
US20080078492A1 (en) Tamper evident and resisting informational article and method of producing same
US7204909B1 (en) Informational article and an associated method
EP1278173B1 (en) Removable security identification label
JP2004004252A (en) Medium for confirming authenticity
JP2004258583A (en) Information recording medium and authenticity judgement method using this
JP7214307B2 (en) Fraud Detection Sticker and Fraud Detection Sticker Set
CA2226760C (en) An informational article and an associated method
WO1999052714A1 (en) Security feature for retroreflective sticker
JP4319730B2 (en) Optical diffraction element seal
JPH0736784Y2 (en) Film for concealing deposit certificates

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN YU

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH KE LS MW SD SZ UG AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 09423777

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998549171

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA