US20110128120A1 - Systems and methods for determining authenticity of substances - Google Patents
Systems and methods for determining authenticity of substances Download PDFInfo
- Publication number
- US20110128120A1 US20110128120A1 US11/775,587 US77558707A US2011128120A1 US 20110128120 A1 US20110128120 A1 US 20110128120A1 US 77558707 A US77558707 A US 77558707A US 2011128120 A1 US2011128120 A1 US 2011128120A1
- Authority
- US
- United States
- Prior art keywords
- substance
- response
- sequences
- interrogation signals
- sensors
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
- G01S7/41—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00 using analysis of echo signal for target characterisation; Target signature; Target cross-section
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N24/00—Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects
- G01N24/08—Investigating or analyzing materials by the use of nuclear magnetic resonance, electron paramagnetic resonance or other spin effects by using nuclear magnetic resonance
- G01N24/084—Detection of potentially hazardous samples, e.g. toxic samples, explosives, drugs, firearms, weapons
Abstract
Description
- The present invention relates generally to detections systems, and more particularly to systems and methods for determining authenticity of substances.
- The development of security systems is becoming more of an important issue with regard to the safety and security of people. As an example, with the increased need for security in large public venues such as airports and stadiums, the implementation of security systems is becoming more prevalent. A number of security systems exist for the detection of contraband on a person, such as walk-through metal detectors and wands. However, such systems are typically limited in that they are capable only of detecting metal, and often only certain types of metals. Furthermore, it is net necessarily just people that need to be monitored for security purposes, but also the personal belongings of people. For example, people often bring carry-on items onto an airplane when they fly. While it is important to screen such carry-on items, such screening must be weighed against a competing concern with efficiency of security monitoring and the impingement of personal freedoms.
- There are a variety of security measures in place to screen personal items. Some of them are large, complicated, and expensive, such as conveyor-belt fed X-ray machines that are typically employed in airports. Some measures are very simple, such as security personnel searching personal bags upon entering stadiums and festivals. However, all such systems can be easily spoofed by hiding contraband items in locations that appear to be obvious as something else, particularly in light of efficient security monitoring. For example, security personnel are unlikely to search what appears to be a typical twenty-ounce plastic bottle of soda because it would be inefficient and because people would be unhappy to have their drink poured out. However, a clever criminal could have hidden drugs, ammunition, or explosives in a recess behind the label, with real soda above and below the recess so as to make it look like a full bottle of soda. As another example, the bottle may appear to contain soda, whereas the liquid inside may not actually be soda, or may be soda that includes alcohol, such that it is smuggled into an area where alcohol is prohibited. Therefore, existing security screening measures may be insufficient to provide adequate public safety.
- One embodiment of the present invention includes a system for determining authenticity of substances. The system comprises a plurality of RF sensors distributed in a predefined location pattern relative to a location for placing a substance under analysis. Each of the RF sensors is configured to transmit a response to an interrogation signal with a unique identifier. The system also comprises an RF transmitter that transmits sequences of interrogation signals over different frequency bands at one or more power levels and an RF receiver that receives responses to the sequences of interrogation signals transmitted from the RF sensors. The system further comprises a response pattern analyzer that determines response patterns for the RF sensors to the interrogation sequences and transmits a difference indicator if at least one of the determined response patterns varies from a predetermined signature of an authentic substance.
- Another embodiment of the present invention includes a system for determining authenticity of substances. The system comprises a plurality of means for responding to an interrogation signal with a wireless unique identifier. The plurality of means for responding is arranged in a predefined location pattern relative to a location for placing the substance under analysis. The system also comprises means for transmitting sequences of interrogation signals at a plurality of power levels and means for receiving the wireless unique identifier of the plurality of means for responding for the sequences of the interrogation signals. The system also comprises means for housing the plurality of means for responding such that a given wireless unique identifier does not interfere with another wireless unique identifier. The system also comprises means for determining response patterns for the plurality of RF sensors to the interrogation sequences. The system further comprises means for determining if response patterns vary outside a predetermined signature of an authentic substance, and means for providing an indication if the response patterns vary outside the predetermined signature of an authentic substance.
- Another embodiment of the present invention includes a method thr determining authenticity of a substance. The method comprises transmitting sequences of interrogation signals in proximity of a known authentic substance over a plurality of different frequency bands at one or more power levels to a plurality of RF sensors distributed in a predefined location pattern. Each RF sensor is configured to respond to an interrogation signal with a unique identifier. The method also includes registering a plurality of response pattern signatures for the known authentic substance based on first response patterns of the plurality of RF sensors to the sequence of interrogation signals. The method also includes transmitting the sequences of interrogation signals in proximity of a substance under analysis that is purported to be the same as the known authentic substance over the plurality of different frequency bands at the one or more power levels to the plurality of RF sensors. The method also includes analyzing second response patterns for each of the plurality of RF sensors to the sequence of interrogation signals. The second response patterns are associated with the substance under analysis. The method further includes transmitting a difference indicator if at least one of the second response patterns varies from a predetermined threshold associated with the plurality of registered response pattern signatures.
-
FIG. 1 illustrates an example of a diagram of a system for determining authenticity of substances in accordance with an aspect of the present invention. -
FIG. 2 illustrates an example of a system for determining authenticity of substances in accordance with an aspect of the present invention. -
FIG. 3 illustrates an example of a diagram of an RF transmitter/receiver device in accordance with an aspect of the present invention. -
FIG. 4 illustrates an example of a diagram of an RF sensor in accordance with an aspect of the present invention. -
FIG. 5 illustrates an example of a diagram of a response pattern analyzer in accordance with an aspect of the present invention. -
FIG. 6 illustrates an example of a method for determining authenticity of substances in accordance with an aspect of the present invention. -
FIG. 7 illustrates an embodiment of a computer system that can be configured to implement a system for determining authenticity of substances in accordance with an aspect of the invention. - The present invention relates to systems and methods for determining authenticity of substances. The systems and methods employ radio frequency (RF) sensor responses to interrogation signals of an RF transmitter to determine response patterns associated with a plurality of RF sensors that are arranged in a predefined location pattern relative to a substance to be analyzed. The response patients can be compared with registered response pattern signatures associated with a corresponding known authentic substance. Even slight changes in these response patterns can signify a difference between the substance under analysis and the known authentic substance. The RF transmitter can be configured to hop between a plurality of frequency bands and a plurality of different power levels in obtaining the response patterns of both the known authentic substance and the substance under analysis. As such, upon the RF sensor responses being received by an RF receiver, a response pattern analyzer can ascertain differences in the frequency bands and the power levels of the responses for a given series of interrogation signals to determine if the substance under analysis is authentic.
- The present invention can employ RF commercial off the shelf (COTS) technology, and therefore can be implemented at relatively low costs. Each RF sensor is in a unique position in space with respect to the transmitter and the substance under analysis, and can thus provide unique responses to the series of interrogation signals. The RF sensors can be arranged in the predefined location pattern within a semi-enclosed housing, such that the responses to the series of interrogation signals do not interfere with each other. Thus, the responses for a known authentic substance can be very accurate, such that the response pattern signature for the known authentic substance can include a set of response tolerances that is substantially precise. As a result, when comparing responses for a substance under analysis, slight deviation from the response tolerances for is given frequency band and/or a given power level can result in an indicated difference between the substance under analysis and the known authentic substance.
- The present invention can be employed in any of a variety of different applications. For example, the present invention can be employed as part of a security system, such as at an airport or in a large public venue (e.g., stadium or festival). Thus, pre-approved categories of substances can be analyzed to determine, their authenticity to prevent the smuggling of drugs, alcohol, explosives, and/or weapons into the prohibitive public setting. As another example, the present invention can be used for quality control in the food and beverage industry, such that a given item of food or beverage can be analyzed to determine purity or quality. As yet another example, the present invention can be implemented in an anti-counterfeiting role, such that money, precious coins, and/or rare materials can be analyzed to determine if they are authentic or if they are counterfeit. As such, the present invention can be implemented in any of a variety of ways.
-
FIG. 1 illustrates an example of asystem 10 for determining authenticity of substances in accordance with an aspect of the present invention. Thesystem 10 can be implemented in any of a variety of environments, such as an airport security checkpoint. Thesystem 10 includes a plurality of radio frequency (RF)sensors 12 that can be arranged in a predefined location pattern, in the example ofFIG. 1 , theRF sensors 12 are demonstrated as being mounted within ahousing 14. Thehousing 14 can be semi-enclosed, such that dashedlines housing 14. As an example, thehousing 14 can be a substantially conical aluminum housing with theopenings housing 14. Also in the example ofFIG. 1 , a substance underanalysis 20 is demonstrated at theopening 18 just outside thehousing 14. As described herein, the substance underanalysis 20 can be any of a variety of substances and/or materials for which authenticity is in question. Thus, thesystem 10 is configured to determine the authenticity of the substance underanalysis 20. - The
system 10 includes anRF transmitter device 22 and anRF receiver device 24 that are each coupled to acontroller 26. TheRF transmitter device 22 is configured to transmit sequences of interrogation signals through the substance underanalysis 20 and through thehousing 14. TheRF transmitter device 22 can transmit the interrogation signals over a set of frequency bands at one or more power levels for each given interrogation sequence. As an example, theRF transmitter device 22 transmits the interrogation signals employing spread spectrum frequency hopping that generates pseudo-random frequency bands over different interrogation sequences. A given interrogation sequence can include, for example, 50 interrogation signals at different frequency bands at a given power level, and can repeat the generation of 50 interrogation signals at each of a plurality of different power levels. - The interrogation signals are received by each of the
RF sensors 12, such that each of theRF sensors 12 is configured to generate a signal in response to the interrogation signal. The response signal from each of theRF sensors 12 can incorporate an identifier that is unique to thespecific RF sensor 12. TheRF receiver device 24 receives the response signals that are transmitted from each of the plurality ofRF sensors 12. TheRF receiver device 24 provides the response signals received from theRF sensors 12 to thecontroller 26. - The
controller 26 includes aresponse pattern analyzer 28 that is configured to provide commands to theRF transmitter device 22 and receive the response signals from theRF receiver device 24. For example, theresponse pattern analyzer 28 can be configured to step through the sequences of interrogation signals, such that theresponse pattern analyzer 28 initiates theRF transmitter device 22 to generate each sentience of the interrogation signals for a given frequency and power level. Thus, theresponse pattern analyzer 28 can be set to expect responses that correspond to the sequence of the interrogation signals that is transmitted by theRF transmitter device 22. Upon receiving the response signals, theresponse pattern analyzer 28 determines response patterns for each of theRF sensors 12 and compares the response patterns of the associatedRF sensors 12 to one or more predetermined expected response thresholds. Each of theRF sensors 12 can have its own unique set of threshold values. - At certain power levels and frequency hands, a given
RF sensor 12 may not respond, or may not respond with enough power for theRF receiver device 24 to have a valid read for thatrespective RF sensor 12. Additionally, theRF receiver device 24 may receive a response signal from a given one of the RF sensors 13 that deviates from the expected response thresholds. These failures and/or deviations may be due to the chemical and/or material composition of the substance underanalysis 20. The combination of valid reads and failed or invalid reads over an interrogation sequence provide a response pattern for a givenRF sensor 12. The response pattern can be represented as a binary sequence with valid reads being represented with a logic “1” and invalid reads being represented as a logic “0” for each power level interrogation sequence integrate over all frequency bands. Thus, a difference in the binary sequence between a sequence of interrogation signals for the substance underanalysis 20 and the expected response thresholds can indicate a difference between the substance underanalysis 20 and a known authentic substance from which the expected response thresholds were generated. - For example, the predetermined expected response thresholds can be determined by initiating a plurality of sequences of interrogation signals for a known authentic substance that corresponds to the substance under
analysis 20. It is to be understood that, as described herein, the known authentic substance is a substance that is known to be authentic, such that the known authentic substance can be registered as a calibration agent for the substance underanalysis 20. As an example, thesystem 10 can register the known authentic substance by performing the sequences of interrogation signals on the known authentic substance to generate a plurality of response pattern signatures that correspond to the predetermined expected response thresholds. The response pattern signatures for the known authentic substance are stored by theresponse pattern analyzer 28 in asubstance signature database 30 during a registration process. Thesystem 10 can thus register any number of any of a variety of substances and store the respective response pattern signatures in thesubstance signature database 30. - Upon analyzing the substance under
analysis 20, an operator of thesystem 10, automated or otherwise, can indicate to thecontroller 26 if the substance underanalysis 20 is what it is purported to be. The response pattern analyzer 2 can thus access the response pattern signatures for the purported substance from thesubstance signature database 30, such that the response patterns for the substance underanalysis 20 can be compared with the response pattern signatures. As an example, in an airport security environment, upon security personnel seeing a label on a bottle of cola, the brand of cola can be entered into the controller by the security personnel. Therefore, the security personnel can implement thesystem 10 to determine if the liquid in the bottle of cola is actually the cola that it is purported to be, or is not contaminated with any additional chemicals and/or materials. - Upon accessing the response pattern signatures from the
substance signature database 30, thesystem 10 can begin obtaining the response patterns for the substance underanalysis 20. If the response patterns for the substance underanalysis 20 are substantially the same as the response pattern signatures, or sufficiently within predetermined difference thresholds associated with the response pattern signatures, then the substance underanalysis 20 is authentic. However, if there are one or more differences between the response patterns for the substance underanalysis 20 and the response pattern signatures, or one or more of the response patterns are outside of the predetermined difference thresholds associated whit the response pattern signatures, then the substance underanalysis 20 is nut authentic. Theresponse pattern analyzer 28 thus provides a difference indicator signal to asubstance difference indicator 32 to indicate to an operator of thesystem 10 that the substance underanalysis 20 is not authentic. Thesubstance difference indicator 32 can be any of a variety of indications, such as a flashing light, a message on a computer screen, and/or an audible indication. -
FIG. 2 illustrates an example of asystem 50 for determining authenticity of substances in accordance with an aspect of the present invention. Thesystem 50 can be substantially similar to thesystem 10 in the block diagram example ofFIG. 1 . Therefore, like reference numbers are to be used and reference is to be made to the example ofFIG. 1 in the discussion ofFIG. 2 . - The
RF sensors 12 are demonstrated in the example ofFIG. 2 as being arranged in a predefined location pattern within thesemi-enclosed housing 14. In the example ofFIG. 2 , thehousing 14 is demonstrated as substantially conical, with thesmall opening 16 at the top of thehousing 14 and thelarge opening 18 at the bottom of thehousing 14. It is to be understood that theRF sensors 12 that are demonstrated with dashed lines are intended to represent those that are configured on the insides of the far surface of thehousing 14. Therefore, the predefined location of theRF sensors 12 can encompass the entire circumferential surface of the inside of thehousing 14. - The
system 50 includes theRF transmitter device 22 configured in abase structure 52. TheRF transmitter device 22 can thus be configured to transmit the sequences of interrogation signals upward through the substance underanalysis 20 and into thehousing 14 to be received by theRF sensors 12. TheRF receiver device 24 is located at the top of thehousing 14 at thesmall opening 16. In the example ofFIG. 2 thehousing 14 can have a shape and determinative dimensions that are functional with regard to the RF sensor responses transmitted to theRF receiver device 24 in response to the interrogation signals transmitted from theRF transmitter device 22. Specifically, the substantially conical shape of thehousing 14 can be such that the RF sensor responses do not interfere with each other, as received by theRF receiver device 24. Therefore, the RF sensor responses can more accurately indicate very slight differences between response patterns of the substance underanalysis 20 and the response pattern signatures of the known authentic substance. It is to be understood that the example ofFIG. 2 is not limited to a substantially conical shape of thehousing 14, hut that any of a variety of shapes and dimensions can be implemented to provide for non-interference of the RF sensor responses from theRF sensors 12 to theRF receiver device 24. - In the example of
FIG. 2 , thecontroller 26 is demonstrated as coupled to both theRF transmitter device 22 and theRF receiver device 24. As described in the example ofFIG. 1 , thecontroller 26 can include theresponse pattern analyzer 28, thesubstance signature database 30, and thesubstance difference indicator 32. In addition, in the example ofFIG. 2 , thecontroller 26 includes a user interface 54. The user interlace 54 can be configured to allow a user of thesystem 50 to interact with thecontroller 26, such as to enter a substance that the substance underanalysis 20 purports to be, or to allow the user to receive visual and/or audible indications of the authenticity of the substance underanalysis 20. The user interface 54 can be any of a variety of interfaces, such as a touchscreen, a keyboard and monitor, etc. - Although the
controller 26 is demonstrated in the example ofFIG. 2 as external to the base structure and theRF transmitter device 22 andRF receiver device 24, it is to be understood that all of or portions of all of thecontroller 26 can be configured internal to one or more of thebase structure 52, theRF transmitter device 22, and theRF receiver device 24. Therefore, one or more of the components of thecontroller 26 can be configured separate from thesystem 50. As an example, thesystem 50 can interact with a separate computer system (not shown) that includes one or more of theresponse pattern analyzer 28, thesubstance signature database 30, thesubstance difference indicator 32, and the user interface 54. As another example, the separate computer system can interact with a plurality ofsystems 50 concurrently, such that one or more of the components of thecontroller 26 can be shared amongst the separate plurality ofsystems 50. - The
RF transmitter device 22, theRF receiver device 24, and theRF sensors 12 can be implemented as RF commercial off the shelf (COTS) technology, and therefore can be small and can be implemented at relatively low costs. As a result, thesystem 50 can be configured as a portable or semi-portable substance analysis device. As an example, thebase structure 52 can include wheels, or thesystem 50 can be configured as a collapsible system, such that it can be easily disassembled and carried to and from separate locations. For example, the RF and electronic components of thesystem 50 can be battery operated, such that thesystem 50 can interface with a laptop computer and be field operated. As an example, thesystem 50 can be implemented to analyze water samples in an environment where electricity is not readily available. Alternatively, thesystem 50 or portions of thesystem 50, such as thebase structure 52, can be fixed, such that thebase structure 52 can incorporate a conveyor system to rapidly feed substances underanalysis 20 through thesystem 50, such as in an airport security setting. Therefore, thesystem 50 can be implemented in any of a variety of ways. -
FIG. 3 illustrates an example of a diagram of an RF transmitter/receiver device 100 in accordance with an aspect of the present invention. The RF transmitter/receiver device 100 can be substantially similar to theRF transmitter device 22 and/or theRF receiver device 24 in the block diagram example ofFIGS. 1 and 2 . Specifically, the RF transmitter/receiver device 100 can be a COTS RF component, such that it can be implemented and programmed to function as either theRF transmitter device 22 or theRF receiver device 24. Therefore, like reference numbers are to be used and reference is to be made to the example ofFIGS. 1 and 2 in the discussion ofFIG. 3 . However, it is to be understood that thesystems FIGS. 1 and 2 , respectively, are not intended to be limited to the same type of device for use as both theRF transmitter 22 andRF receiver 24, but that separate types of devices (e.g., manufacturers and/or brands) can likewise be implemented for both theRF transmitter 22 andRF receiver 24. - The RF transmitter/
receiver device 100 is contained within ahousing 102 and includes anRF transceiver 104. In the implementation of the RF transmitter/receiver device 100 as theRF transmitter device 22, theRF transceiver 104 can be operable to broadcast the sequences of the interrogation signals to theRF sensors 12 via anantenna 106. TheRF transceiver 104 can also be operable to receive RF responses from one or more of theRF sensors 12. Aprocessor 108 can be configured to frequency hop through a plurality of frequency bands and can be programmed to exercise a plurality of different power levels to establish the sequences of interrogation signals. As an example, theprocessor 108 can issue commands received from thecontroller 26 via an input/output (I/O)port 110 that correspond to a sequence of the transmission frequencies and/or power levels for the interrogation signals. - In the implementation of the RF transmitter/
receiver device 100 as theRF receiver device 24, theRF transceiver 104 can be operable to receive RF responses from one or more of theRF sensors 12 via the antenna 406. Theprocessor 108 can be configured to determine and/or transmit responses for a given interrogation sequence for each of theRF sensors 12 to the I/O port 110 for processing by an external device. As an example, the received transmissions can be provided to thecontroller 26 via the I/O port 110, such that thecontroller 26 can track a number of the RF responses relative to the number of interrogation signals. - Me
antenna 106 can be configured internal or external to thehousing 102. The RF transmitter/receiver device 100 can include amemory 112. Thememory 112 can be internal or external to theprocessor 108, and can be implemented for any of a variety of functions, such as to implement some of the features that can be performed by thecontroller 26. Thememory 112 can be preprogrammed, or can be programmed via the I/O port 110. The RF transmitter/receiver device 100 can also include apower supply 114 to provide operating, power. Thepower supply 114 can be a battery or a power supply powered by, for example, a standard wall plug. -
FIG. 4 illustrates an example of a diagram of anRF sensor 200 in accordance with an aspect of the present invention. TheRF sensor 200 can be substantially similar to any of theRF sensors 12 in the block diagram example ofFIGS. 1 and 2 . Therefore, like reference numbers are to be used and reference is to be made to the example ofFIGS. 1 and 2 in the discussion ofFIG. 4 . - The
RF sensor 200 is maintained within ashousing 202, and includes aprocessor 204 or controller which can be programmed to respond to an interrogation signal of theRF transmitter device 22 with a unique identifier associated with theRF sensor 200. TheRF sensor 200 can be configured as active or passive. As an example, an active sensor emits signals at regular preset intervals, while a passive sensor is powered by a received interrogation signal. Amemory 206 is included in theRF sensor 200 for storing, among other things, program code executed by theprocessor 204. Thememory 206 can also serve as a storage medium for storing a unique identification code used to designate and distinguish theRF sensor 200 from theother RF sensors 12 within thehousing 14. Thememory 206 can be external or internal to theprocessor 204. TheRF sensor 200 includes anRF section 208 interconnected between theprocessor 204 and anantenna 210 that can be configured external or internal to thehousing 202. TheRF section 208 includes anRF receiver 212 which receives the RF interrogation signals from theRF transmitter device 22 via theantenna 210. TheRF section 208 also includes anRF transmitter 214 operable to transmit RF response signals to theRF receiver device 24 that include the unique identifier via theantenna 210. Apower supply 216 may be included, such as in an active RF sensor configuration, to provide operating power to theRF sensor 200. -
FIG. 5 illustrates a block diagram of aresponse pattern analyzer 250 in accordance with an aspect of the present invention. Theresponse pattern analyzer 250 can be substantially similar to theresponse pattern analyzer 28 in the block diagram example ofFIG. 1 . Therefore, like reference numbers are to be used and reference is to be made to the example ofFIG. 1 in the discussion ofFIG. 5 . - The
response pattern analyzer 250 is configured to receive a plurality of RF sensor responses from the plurality ofRF sensors 12 over one or more sequences of interrogation signals of the substance underanalysis 20, and to store the RF sensor response patterns associated with each RF sensor for a given sequence of interrogation signals in an RF sensorresponse pattern storage 252. Theresponse pattern analyzer 250 includes an RFsensor pattern comparator 254 that compares the stored sensor response patterns in the RF sensorresponse pattern storage 252 with a plurality of response pattern signatures in a responsepattern signature storage 256. - The response pattern signatures can be pre-stored based on registering response patterns for a known authentic substance that corresponds to what the substance under analysis is purported to be. As an example, the response
pattern signature storage 256 can be loaded with the response pattern signatures from thesubstance signature database 30 based on input horn a user or through an automated loading process. In addition, the response pattern signatures can include difference thresholds that define a range of acceptable tolerances for the response patterns of the substance underanalysis 20. The RF sensorresponse pattern comparator 254 is configured to transmit a difference indicator signal, such as to thesubstance difference indicator 32, in response to a determination that one or more of the response patterns of the substance underanalysis 20 deviate from the response pattern signatures in the responsepattern signature storage 256. As an example, one or more of the response patterns may be outside the range of acceptable tolerances of the difference thresholds defined in the responsepattern signature storage 256. As a result, the difference indicator can provide indication to an operator or to a user interface, such as the user interface 54 in the example ofFIG. 2 , that the substance underanalysis 20 is not authentic. - In view of the romping structural and functional features described above, a method will be better appreciated with reference to
FIG. 6 . It is to be understood and appreciated that the illustrated actions, in other embodiments, may occur in different orders and/or concurrently with other actions. Moreover, not all illustrated features may be required to implement a method. It is to be further understood that the following methodologies can be implemented in hardware (e.g., a computer or a computer network as one or more integrated circuits or circuit boards containing one or more microprocessors), software (e.g., as executable instructions running on one or more processors of a computer system), or any combination thereof. -
FIG. 6 illustrates an example of amethod 300 for determining authenticity of substances in accordance with an aspect of the present invention. The methodology begins at 302, in which a plurality of RF sirs are arranged in a predefined location pattern relative to an analysis location. The plurality of RF sensors can be COTS components that each have a unique RF identifier, and the predefined location pattern can be within a semi-enclosed housing that allows each of the RF sensors to transmit its unique RF identifier in a manner that does not interfere with the other RF sensors. At 304, sequences of interrogation signals are transmitted for a known authentic substance to the RF sensors. The sequences of interrogation, signals can incorporate transmissions at different frequency bands and at different power levels. - At 306, a plurality of response pattern signatures are registered for the known authentic substance based on the responses of the RF sensors to the sequences of interrogation signals. The response pattern signatures can include predefined difference thresholds that define an acceptable range of tolerances of response patterns. At 308, sequences of interrogation signals are transmitted for a substance under analysis to the RF sensors. The substance under analysis can be an unknown substance for which the authenticity is in question, and can be purported to correspond to the known authentic substance. The sequences of interrogation signals can be the same sequences as those that were transmitted to the known authentic substance, such that they can incorporate transmissions at different frequency bands and at different power levels.
- At 310, the response patterns for the RF sensor responses to the sequences of interrogation signals for the substance under analysis are compared with the registered response pattern signatures. At 312, the method determines if the response patterns are within the difference thresholds defined by die registered response pattern signatures. If YES, that the response patterns are within the difference thresholds defined by the registered response pattern signatures, the method proceeds to 314. At 314, the substance under analysis is indicated as authentic, such that it is what it purports to be (i.e., corresponds to the known authentic substance). If NO, that the response patterns are not within the difference thresholds defined by the registered response pattern signatures, then the method proceeds to 316. At 316, a difference indicator signal is transmitted, such that the substance under analysis is not authentic.
-
FIG. 7 illustrates acomputer system 350 that can be employed to implement at least portions of the systems and methods described herein, such as based on computer executable instructions running on the computer system. Thecomputer system 350 can be implemented on one or more general purpose networked computer systems, embedded computer systems, routers, switches, server devices, client devices, various intermediate devices/nodes and/or stand alone computer systems. Additionally, thecomputer system 350 can be implemented as part of the computer-aided engineering (CAE) tool running computer executable instructions to perform a method as described herein. - The
computer system 350 includes aprocessor 352 and asystem memory 354. Asystem bus 356 couples various system components, including thesystem memory 354 to theprocessor 352. Dual microprocessors and other multi-processor architectures can also be utilized as theprocessor 352. Thesystem bus 356 can be implemented as any of several types of bus structures, including a memory but or memory controller, a peripheral bus, and a local bus using any of as variety of bus architectures. Thesystem memory 354 includes read only memory (ROM) 358 and random access memory (RAM) 360. A basic input/output system (BIOS) 362 can reside in theROM 358, generally containing the basic routines that help to transfer information between elements within thecomputer system 350, such as a reset or power-up. - The
computer system 350 can include ahard disk drive 364, amagnetic disk drive 366, e.g., to read from or write to aremovable disk 368, and anoptical disk drive 370, e.g., for reading a CD-ROM orDVD disk 372 or to read from or write to other optical media. Thehard disk drive 364,magnetic disk drive 366, andoptical disk drive 370 are connected to thesystem bus 356 by a harddisk drive interface 374, a magneticdisk drive interface 376, and anoptical drive interface 378, respectively. The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, and computer-executable instructions for thecomputer system 350. Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and a CD, other types of media which are readable by a computer, may also be used. For example, computer executable instructions for implementing systems and methods described herein may also be stored in magnetic cassettes, flash memory cards, digital video disks and the like. - A number of program modules may also be stored in one or more of the drives as well as in the
RAM 360, including anoperating system 380, one ormore application programs 382,other program modules 384, andprogram data 386. The uric or more application programs can include the systems and methods for determining authenticity of substances as previously described inFIGS. 1-6 . - A user may enter commands and information into the
computer system 350 throughuser input device 390, such as a keyboard, a pointing device (e.g., a mouse). Other input devices may include a microphone, a joystick, a game pad, a scanner, a touch screen, or the like. These and other input devices are often connected to theprocessor 352 through a corresponding interlace orbus 392 that is coupled to thesystem bus 356. Such input devices can alternatively be connected to the system has 356 by other interfaces, such as a parallel port, a serial port or a universal serial bus (USB). One or more output device(s) 394, such as a visual display device or printer, can also be connected to thesystem bus 356 via an interface oradapter 396. - The
computer system 350 may operate in a networked environment usinglogical connections 398 to one or moreremote computers 400. Theremote computer 400 may be a workstation, a computer system, a router, a peer device or other common network node, and typically includes many or all of the elements described relative to thecomputer system 350. Thelogical connections 398 can include a local area network (LAN) and a wide area network (WAN). - When used in a LAN networking environment, the
computer system 350 can be connected, to a local network through anetwork interface 402. When used in a WAN networking environment, thecomputer system 350 can include a modem (not shown), or can be connected to a communications server via a LAN. In a networked environment,application programs 382 andprogram data 386 depicted relative to thecomputer system 350, or portions thereof, may be stored inmemory 404 of theremote computer 400. - What have been described above are examples of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art will recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/775,587 US7965183B1 (en) | 2007-07-10 | 2007-07-10 | Systems and methods for determining authenticity of substances |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/775,587 US7965183B1 (en) | 2007-07-10 | 2007-07-10 | Systems and methods for determining authenticity of substances |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110128120A1 true US20110128120A1 (en) | 2011-06-02 |
US7965183B1 US7965183B1 (en) | 2011-06-21 |
Family
ID=44068431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/775,587 Expired - Fee Related US7965183B1 (en) | 2007-07-10 | 2007-07-10 | Systems and methods for determining authenticity of substances |
Country Status (1)
Country | Link |
---|---|
US (1) | US7965183B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012037683A1 (en) * | 2010-09-21 | 2012-03-29 | Nimtech Inc. | Method and system for product supply chain assurance |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6610977B2 (en) * | 2001-10-01 | 2003-08-26 | Lockheed Martin Corporation | Security system for NBC-safe building |
US7180418B1 (en) * | 2004-12-27 | 2007-02-20 | Erudite Holding Llc | Active threat detection and elimination while in transit |
US7403113B2 (en) * | 2004-05-17 | 2008-07-22 | California Institute Of Technology | GaN-based sensor nodes for in situ detection of gases |
US7411489B1 (en) * | 1999-12-29 | 2008-08-12 | Cooper Wiring Devices, Inc. | Self-adjusting dual technology occupancy sensor system and method |
US7436991B2 (en) * | 2003-08-29 | 2008-10-14 | Agilent Technologies, Inc. | Image buffers and access schedules for image reconstruction systems |
US7486193B2 (en) * | 2006-02-06 | 2009-02-03 | Cooper Technologies Company | Occupancy sensor network |
US20090112101A1 (en) * | 2006-07-31 | 2009-04-30 | Furness Iii Thomas A | Method, apparatus, and article to facilitate evaluation of objects using electromagnetic energy |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6393294B1 (en) | 1998-09-22 | 2002-05-21 | Polaris Wireless, Inc. | Location determination using RF fingerprinting |
-
2007
- 2007-07-10 US US11/775,587 patent/US7965183B1/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7411489B1 (en) * | 1999-12-29 | 2008-08-12 | Cooper Wiring Devices, Inc. | Self-adjusting dual technology occupancy sensor system and method |
US6610977B2 (en) * | 2001-10-01 | 2003-08-26 | Lockheed Martin Corporation | Security system for NBC-safe building |
US7436991B2 (en) * | 2003-08-29 | 2008-10-14 | Agilent Technologies, Inc. | Image buffers and access schedules for image reconstruction systems |
US7403113B2 (en) * | 2004-05-17 | 2008-07-22 | California Institute Of Technology | GaN-based sensor nodes for in situ detection of gases |
US7180418B1 (en) * | 2004-12-27 | 2007-02-20 | Erudite Holding Llc | Active threat detection and elimination while in transit |
US7486193B2 (en) * | 2006-02-06 | 2009-02-03 | Cooper Technologies Company | Occupancy sensor network |
US20090112101A1 (en) * | 2006-07-31 | 2009-04-30 | Furness Iii Thomas A | Method, apparatus, and article to facilitate evaluation of objects using electromagnetic energy |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012037683A1 (en) * | 2010-09-21 | 2012-03-29 | Nimtech Inc. | Method and system for product supply chain assurance |
US9267922B2 (en) | 2010-09-21 | 2016-02-23 | Miroslaw Wrobel | Method and system for product supply chain assurance |
Also Published As
Publication number | Publication date |
---|---|
US7965183B1 (en) | 2011-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Werb et al. | Designing a positioning system for finding things and people indoors | |
US20080129545A1 (en) | System and method for determining the entry or exit lane of vehicles passing into or from a vehicle lot using tag interrogator and rssi | |
US8217793B2 (en) | Rogue RFID detector | |
US6307471B1 (en) | Radio based proximity token with multiple antennas | |
US9443117B2 (en) | Self-optimizing method of and system for efficiently deploying radio frequency identification (RFID) tag readers in a controlled area containing RFID-tagged items to be monitored | |
US20060136997A1 (en) | Authentication system and method | |
US20070109099A1 (en) | Method and system for distance determination of rf tags | |
JPWO2007110964A1 (en) | Position detection program and position detection system | |
US20070252728A1 (en) | System and method for sensing and controlling the entry or exit of vehicles into or from a vehicle lot | |
CN102859560B (en) | Reduce the method and system of interference effect in integrated metal detection/electronic article monitoring system | |
CN101208729A (en) | Multiple frequency detection system | |
US20200250958A1 (en) | Apparatus and method of controlling a security system | |
US11704986B2 (en) | System and method for foil detection using millimeter wave for retail applications | |
US20060255127A1 (en) | System, method, and computer program product for biometric radiofrequency id | |
JP2004000429A (en) | Chemicals storage system | |
US11270244B2 (en) | Monitoring device and system | |
US7965183B1 (en) | Systems and methods for determining authenticity of substances | |
US20220262185A1 (en) | Identity Determination Using Biometric Data | |
Alawami et al. | Locid: A secure and usable location-based smartphone unlocking scheme using wi-fi signals and light intensity | |
US20150185068A1 (en) | Inventory control systems and methods | |
KR100948104B1 (en) | Explosives and combustibles prober | |
CN218825577U (en) | Material management system | |
RU2781768C1 (en) | Method, system and device for detection of people for inspection during passage of metal detector | |
US11822036B2 (en) | Passive spychip detection through time series monitoring of induced magnetic field and electromagnetic interference | |
EP4210014A1 (en) | Presence detection using rfid tags and readers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NORTHROP GRUMMAN SPACE AND MISSION SYSTEMS CORPORA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIBBY, VIBEKE;REEL/FRAME:019538/0276 Effective date: 20070703 |
|
AS | Assignment |
Owner name: NORTHROP GRUMMAN SPACE & MISSION SYSTEMS CORP., CA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTHROP GRUMMAN CORPORTION;REEL/FRAME:023699/0551 Effective date: 20091125 |
|
AS | Assignment |
Owner name: NORTHROP GRUMMAN SYSTEMS CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTHROP GRUMMAN SPACE & MISSION SYSTEMS CORP.;REEL/FRAME:023915/0446 Effective date: 20091210 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230621 |