WO2008148795A1 - A method for verifying the integrity of a container - Google Patents

A method for verifying the integrity of a container Download PDF

Info

Publication number
WO2008148795A1
WO2008148795A1 PCT/EP2008/056907 EP2008056907W WO2008148795A1 WO 2008148795 A1 WO2008148795 A1 WO 2008148795A1 EP 2008056907 W EP2008056907 W EP 2008056907W WO 2008148795 A1 WO2008148795 A1 WO 2008148795A1
Authority
WO
WIPO (PCT)
Prior art keywords
container
sensor
breach
change
measurement values
Prior art date
Application number
PCT/EP2008/056907
Other languages
French (fr)
Inventor
Lionel Garin
Terry Smith
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/760,533 external-priority patent/US20080303663A1/en
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Priority to EP08760488A priority Critical patent/EP2165282A1/en
Priority to CN200880019172A priority patent/CN101790734A/en
Priority to JP2010510781A priority patent/JP2011502086A/en
Publication of WO2008148795A1 publication Critical patent/WO2008148795A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/22Multipath-related issues
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C5/00Measuring height; Measuring distances transverse to line of sight; Levelling between separated points; Surveyors' levels
    • G01C5/005Measuring height; Measuring distances transverse to line of sight; Levelling between separated points; Surveyors' levels altimeters for aircraft
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01LMEASURING FORCE, STRESS, TORQUE, WORK, MECHANICAL POWER, MECHANICAL EFFICIENCY, OR FLUID PRESSURE
    • G01L19/00Details of, or accessories for, apparatus for measuring steady or quasi-steady pressure of a fluent medium insofar as such details or accessories are not special to particular types of pressure gauges
    • G01L19/08Means for indicating or recording, e.g. for remote indication
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • G01S19/39Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/42Determining position
    • G01S19/45Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/20Actuation by change of fluid pressure
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/20Calibration, including self-calibrating arrangements
    • G08B29/24Self-calibration, e.g. compensating for environmental drift or ageing of components

Definitions

  • the embodiments of the present invention relate generally to the verification of the integrity of a container, and especially a container in transit.
  • a container in transit.
  • the increased threat of global terrorism has raised awareness that these containers are a vulnerable point in the supply chain.
  • a container security device comprises a sensor and a local memory configured to store input from the sensor, wherein the device is configured to detect a breach of a container.
  • a second embodiment of the invention relates to a method of securing a container, comprising the steps of detecting a change in a measurement value inside a container, and indicating a breach if a change in measurement value exceeds a threshold.
  • a third embodiment of the invention relates to a method of determining if a container was breached, comprising the steps of downloading a log of gathered information, and checking the gathered information for any abnormalities, wherein the gathered information includes at least one sensor measurement taken from the inside of a container.
  • a fourth embodiment of the invention relates to a device for maintaining security of a navigation receiver unit, comprising an enclosure, comprising a sensor, a processor, a local memory configured to store input from the sensor, and a navigation receiver unit, wherein the device is configured to detect a breach of the enclosure.
  • FIG. 1 illustrates a first embodiment of a container security mechanism.
  • FIG. 2 illustrates a second embodiment of a container security mechanism.
  • FIG. 3A depicts a sample pressure versus time plot depicting an embodiment of the invention.
  • FIG. 3B depicts a sample pressure versus time plot depicting an embodiment of the invention.
  • FIG. 4 illustrates a flow chart depicting an embodiment of the invention.
  • FIG. 5 illustrates a flow chart depicting an embodiment ofthe invention.
  • a preferred embodiment of the invention relates to a system and method for securing a container, in transit, through the use of a logging pressure sensor and global navigation receiver unit.
  • the global navigation receiver unit can be associated with various navigation systems, such as Global Navigation Satellite Systems (GNSS) including, for example, Global Positioning System (GPS) or Galileo, to name a few.
  • GNSS Global Navigation Satellite Systems
  • GPS Global Positioning System
  • Galileo Galileo
  • the receiver unit has the ability to log not only position but also time at the logged position of the container.
  • the above systems rely on time of reception of the received signals, and thus are applicable navigation systems for use with the invention.
  • the receiver unit minimizes power usage. Current technologies allow for the usage of such a low power receiver unit to be attached or embedded into the container for use for long time periods (i.e. a shipping cycle or more).
  • the attachment or embedding of a navigation receiver unit into the container ensures that even if a container is removed from the shipping route, the position of the container at the time of removal or change of course will be known.
  • the issue of shipped goods being removed when out of range of global wireless reader infrastructure is no longer a concern.
  • the ability to obtain the container in such a situation is highly improved.
  • the recovery of theft of containers becomes much easier.
  • the ability to track the containers with a global navigation receiver unit is highly useful.
  • the containers can be tracked and monitored to ensure on-time delivery and secure transit, even if the pre-set shipping route cannot be utilized.
  • the receiver unit can be coupled with a pressure sensor that is used in tandem to monitor the integrity and position of a container in transit to form a container security mechanism.
  • Figure 1 shows one embodiment of such a container security mechanism.
  • Data from the receiver 1100 and the pressure sensor 1200 are logged to a local memory device 1500, and can be transmitted to a server or monitoring unit at a remote site (not shown).
  • the navigation receiver unit can calculate and store time and position information 1300 in the local memory device; the pressure sensor can store thresholds for alarm detection 1400 in the local memory device 1500.
  • the alarm detection includes a processor (not shown) that can determine whether or not sensor measurements, or changes in sensor measurements, exceed the stored thresholds.
  • the navigation receiver unit is connected to an antenna 1600, and receives signals from the navigation positioning system satellites.
  • the pressure sensor may be connected to an antenna or radio transmitter 1700 that transmits internal pressure information, and optionally navigation information (position and time at position) to a remote location.
  • the security mechanism can also use this antenna 1700 to transmit logged information.
  • FIG. 2 depicts another embodiment of the container security mechanism.
  • the mechanism contains a sensor unit 2100, a pressurized container 2200, and a monitoring unit 2300.
  • the sensor unit 2100 is contained or placed in the pressurized container 2200, and optionally communicates with the monitoring unit 2300 via a radio signal relay 2400.
  • the sensor unit 2100 contains a navigation receiver unit 21 10; a pressure sensor 2120; an optional position sensor 2130; an optional radio transmitter 2140 to communicate with the monitoring unit 2300 via a radio signal relay 2400; a central processing unit 2150; and a local memory 2160.
  • the pressurized container 2200 contains a navigation system antenna connector 2210, a pressure valve 2220, an airtight lid 2230, and the sensor unit 2100.
  • the monitoring unit 2300 can be any computer or system known in the art that is able to monitor information transmitted by radio or satellite signals.
  • the optional position sensor 2130 may include lnertial Navigation Units, Dead Reckoning position calculators, or other aiding sensors, to name a few.
  • the optional position sensor 2130 is not limiting on the invention; rather it can be anyone of many such sensors known in the art. Further, more than one optional sensor may be utilized with the mechanism.
  • the mechanism is embedded into the container, with one or more antennas and/or radio signal relays affixed to the outside of the container to transmit and receive information regarding navigation and sensor measurements.
  • the mechanism is included into the container with one or more antennas attached, before sealing the container.
  • the mechanism is activated just before the container is sealed, and is then de- activated only when the container reaches its destination and is lawfully opened.
  • the activation and deactivation of the mechanism may only be done by authorized persons who pass security measures. These measures are not limiting on the invention; rather they can be any measures known in the art, such as encryption codes, biometrics, or smart cards.
  • the container security mechanism verifies the integrity of the container.
  • One method by which the integrity can be verified involves installing the mechanism in an airtight enclosure, which has been artificially pressurized or depressurized before sealing.
  • variations in pressure inside the container can be detected. Any sudden pressure variation is an intrusion detection; slow variations are due to weather effects (which still apply outside of a partially deformable enclosure), and can be compensated by long-term filtering. Methods of long-term filtering are known in the art; the usage of any of these methods is not limiting on the invention.
  • This detection system can continuously run due to the very low power consumption of current pressure sensors (power consumption is as low as 10 uA).
  • the internal pressure of the container is preferably periodically detected.
  • Thresholds can be stored in the local memory, or maintained at a remote site, to determine when a variation of internal pressure exceeds a threshold value and indicates intrusion or breach of the container. These thresholds can be set at the time of manufacture, or can be thresholds that are set when the mechanism/container is activated or shipped. If the container is airtight, it can be pressurized, positively or negatively, to increase the ability to detect even small breaches and make it harder to foil the protection. Thus, the thresholds for detection can be more discriminating.
  • Figures 3A and 3B depict sample pressure vs. time plots that detect an intrusion of the container. Even in the presence of weather or altitude changes, the rate-of-change of the barometric pressure when a container is opened is high.
  • the plots of Figures 3A and 3B show example barometric sensor responses for opening pressurized and non-pressurized containers.
  • Figure 3A shows an example breach of a non-pressurized container, where the breach occurs at 50 seconds.
  • Figure 3B shows an example breach of a pressurized container, where the breach occurs at 50 seconds.
  • the spikes in pressure change due to opening of the container are easily detectable.
  • the plots shown in Figures 3A and 3B depict simulated results.
  • the change in measurement values of the sensor is logged as a breach in the local memory and an alarm is optionally activated.
  • the navigation receiver unit optionally logs the position and time of the container at the occurrence of a breach.
  • the pressure sensor sends a signal to a remote site through the antenna. The remote site activates an alarm and takes action to retrieve the container and notify the shippers and vendors as necessary.
  • the pressure sensor continually sends signals indicating the pressure inside the container via the antenna or radio transmitter to a remote site.
  • the remote site When the remote site receives a signal that is outside of a threshold value for pressure variation or detects a change in measurement values that exceeds a threshold, the remote site activates an alarm, notifies the shipper and vendor as necessary, and takes steps to retrieve the container according to the navigation information stored in the local memory of the container.
  • the alarm when activated, acts much like a car alarm, emitting a loud noise at the site of the container.
  • the alarm acts as a signal to a remote site, indicating breach of the container.
  • the alarm emits a noise at the site as well as signals the remote site indicating a breach.
  • Pressure change is utilized to detect an opening of the container (i.e. an intrusion).
  • the opening of the container may not be detected as an intrusion.
  • Security methods may be coupled with the container security mechanism to detect lawful openings of the container. For example, a unit may be provided to enter a password to open the container. Biometrics or smart keys may also be utilized to gain access to the container. The method of added security for container access is not limiting on the invention; any methods known in the art can be utilized. Thus, if a pressure change outside of the threshold values is detected, along with an authorized security access, such as input of a password, the mechanism will not indicate a breach occurred.
  • the breach is logged and optionally transmitted as it occurs, enabling efficient handling of a breach situation.
  • the preferred embodiment provides instantaneous knowledge of a breach of the container in a manner that is very difficult to counter. Because the security mechanism is inside the sealed container, the mechanism cannot be tampered with before the breach of the container. Thus, the intrusion detection by the pressure sensor, and subsequent signalling of an intrusion to a remote site, necessarily occurs before the security mechanism can be accessed, or deactivated.
  • the local memory is also utilized to handle breach management. In one embodiment, the local memory retains a continual log of the internal pressure and the navigation information (position and time) throughout the shipping process. In another embodiment, the local memory periodically stores pressure and navigation information.
  • the local memory only stores pressure information and navigation information at times of breach.
  • the local memory provides a log by which to verify the integrity of the container and the information regarding a breach of the container, if any such breach did occur.
  • the local memory can provide an auditable log of the transit of the container, and can be utilized to create more efficient or secure shipping methods or routes.
  • Data in the local memory can be transmitted to a server at a remote site, to be accessed by either the vendor or the shipping company.
  • tracking of the container, and verification of its integrity can be continually monitored by a vendor or a shipping company.
  • the vendor or shipping company need only check the log of the position and internal pressure information to ensure that the container is in condition to be sold or utilized.
  • the log of information is encrypted as it is stored, and decrypted by the vendor or shipper once the container has reached its final destination.
  • the preferred embodiment provides a valued service to vendors and shippers concerned about the integrity of containers shipped from a start location to an end location. Once the integrity of a container is verified at the start location, as long as a breach is not recorded on the shipping route, the integrity of that container can be assumed to be intact at the end location. Thus, shippers and vendors are able to efficiently ensure that containers have not been tampered with or rendered unusable.
  • a tracking application is run on the server at the remote site, allowing shippers and/or vendors to track the position and status of the container, utilizing a tracking number assigned to their specific shipment or container.
  • the shipper or vendor enters a tracking number and a password into a web-based application to access information about the container. In another embodiment, the shipper or vendor can access information about all of the containers being shipping from a vendor or shipper tracking page.
  • the size of the container security mechanism is also conducive to shippers and vendors. Because the mechanism is small, and preferably utilizes minimal power, it can be placed in many sizes of containers, from small packages to large shipping crates. The mechanism can be located anywhere on the inside of a container, as long as an antenna connection exists to obtain navigation information and transmit internal pressure information as necessary. Thus, the size of container to be monitored provides no bar to use of the mechanism.
  • the mechanism can be customizable for each vendor or shipper.
  • the type and frequency of information reported, type of monitoring, and alarm reporting are among the features of the preferred embodiment that can be customized.
  • the quality and frequency of reporting could be set by the vendor or shipper.
  • the vendor or shipper could set the period of interval at which navigation and internal pressure information from the mechanism is transmitted to a server at a remote site for access.
  • the vendor or shipper could also set the period of interval at which pressure sensor measurements are taken in the container.
  • the vendor or shipper could also request different amounts of information. For example, the vendor or shipper may request time, position, and/or internal pressure information at each transmission period. The vendor or shipper may instead just request confirmation that a breach has not occurred at each transmission period.
  • the vendor or shipper may only monitor navigation information, thus utilizing only the navigation receiver unit and not the pressure sensor in the container security mechanism. Thus, the vendor or shipper may be notified if the container is not on the predetermined shipping route, but will not receive any information as to whether the container has been tampered with or opened.
  • the vendor or shipper may only monitor internal pressure information, thus utilizing only the pressure sensor and not the navigation receiver unit in the container security mechanism. Thus, the vendor shipper may be notified if the container has been tampered with or opened, but will not receive any information as to whether the container is on the correct shipping route, or scheduled to arrive on time with regards to its current position.
  • the vendor or shipper may set the alarm activation such that the vendor or shipper is notified of a breach and handles breach management. Otherwise, the vendor or shipper may rely on a third party to handle breach management, and may set the alarm such that the third party is notified of the breach as well. The vendor or shipper may also set the alarm to notify local authorities in the vicinity of the breach by utilizing the navigation information logged when the breach occurred.
  • sensors can be utilized as part of the container security mechanism.
  • sensors include, but are not limited to, accelerometers, temperature sensors, and other position tracking sensors such as lnertial Navigation Units, Dead Reckoning position calculators, or other aiding sensors, to name a few.
  • a sensor such as the SMD-500 manufactured BOSCHTM Sensortec is utilized with a NemeriXTM navigation receiver unit.
  • FIG. 4 depicts a flow chart of a preferred embodiment where the mechanism is activated and the container is shipped.
  • the unit is activated.
  • Step 4200 involves sealing the container.
  • the unit gathers data from either the navigation receiver unit, the sensor, or both.
  • the gathered data is logged.
  • the data is analyzed, and it is determined if a breach occurred and an alarm should be activated (step 4500).
  • the alarm may then be activated (step 4600), or it may be transmitted to a remote site (step 4700).
  • the additional step of transmitting the data to the remote site occurs after step 4400.
  • Step 4500 Data is then analyzed to determine if a breach occurred and an alarm should be activated (step 4500). If a breach is found, several options exist. In one embodiment, the alarm is activated (step 4600). In another embodiment, the alarm is transmitted to the remote site (step 4700). If this second branch is followed, regardless of whether step 4800 occurs, the alarm and/or gathered data is received at the remote site (step 4900). If the gathered data was encrypted, then the data is decrypted at step 4000.
  • FIG. 5 depicts the flow of an embodiment where the container arrives at the destination.
  • the container is opened.
  • the unit is then deactivated (step 5200).
  • the log is downloaded at step 5300, and then optionally decrypted at step 5400.
  • the transit path and integrity of the container's contents are verified (step 5500). This verification occurs by checking the log for any abnormalities. An abnormality would be any change in sensor measurement values outside a pre-set range or threshold.
  • the contents of the container can be verified if no such abnormalities exist. If there are any abnormalities, that is an indication that the container was breached in transit.
  • certain embodiments could be utilized for verifying the recorded data of a navigation receiver unit.
  • a pressure sensor could be used inside a container containing only a navigation receiver unit.
  • the processor would analyze the sensor measurements, such that changes in measurement values of the sensor that exceed a threshold would indicate a breach of the container.
  • the local memory would only log any such indicative changes. Thus, if there were any logged changes, the data recorded from the navigation receiver unit would not be verified. However, if no such changes were logged, then the data from the navigation receiver unit could be verified as authentic.
  • the local memory would log all of the sensor measurements, and the log would be an auditable record of the sensor values.
  • a third party such as a vendor or shipper, would then be able to view the log and see if there were any changes in measurement values that exceeded a threshold, thus indicating a breach of the container.
  • the container security mechanism could be utilized with military shipping equipment.
  • the container security mechanism can be placed on the inside of HAZMA T (hazardous materials) trucks used in shipping, such that the opening of the cargo doors triggers an alarm if necessary.
  • HAZMA T hazardous materials
  • the security mechanism can also be utilized for other cargo shipping, such as money transport.
  • the container security mechanism could replace existing armoured trucks, making the shipment of valuable goods such as money or gold much more easily traceable and tamper-resistant.
  • certain embodiments could be utilized for inventory management, especially with regards to perishable items.
  • a sensor other than a pressure sensor could be utilized, to best suit the inventory being monitored.
  • both or one of pressure and temperature sensors could be coupled to the navigation receiver unit.
  • the container security mechanism could be placed inside freezers containing meats or fish, that are transported from a warehouse to a grocery store. Those freezers in which pressure changed due to the opening of lid, or in which temperature changed past a predetermined threshold, would be inspected to insure quality of food products. Thus, tainted or spoiled food would not be introduced into the store for sale. Further, food inspection becomes much more efficient, because inventory managers need only inspect those boxes or containers in which a breach has occurred.
  • Another embodiment relates again to transporting goods, specifically organs and other body parts. Because of the fostering black market of organ sales and the purpose for their transport, the secure and efficient transfer of these goods must be guaranteed. These goods require the maintenance of specific conditions inside the containers in which they are transported.
  • This embodiment may also utilize a sensor other than a pressure sensor.

Abstract

A container security device comprises a sensor and a local memory configured to store input from the sensor, wherein the device is configured to detect a breach of a container. A container security method comprises the steps of detecting a change in a measurement value inside a container, and indicating a breach if a change in measurement value exceeds a threshold. A method of determining if a container was breached comprises the steps of downloading a log of gathered information, and checking the gathered information for any abnormalities, wherein the gathered information includes at least one sensor measurement taken from the inside of a container. A device for maintaining security of a navigation receiver unit comprises an enclosure, comprising a sensor, a processor, a local memory configured to store input from the sensor, and a navigation receiver unit, wherein the device is configured to detect a breach of the enclosure.

Description

A Method For Verifying The Integrity Of A Container
Cross-Reference to Related Applications
[0001] This application incorporates by reference the US provisional application entitled "GNSS Positioning Using Pressure Sensors" filed June 8, 2007, Application Serial No. 60/942,920 (Attorney Docket No. 059472-0118).
Background of the Invention
[0002] The embodiments of the present invention relate generally to the verification of the integrity of a container, and especially a container in transit. Each year, more than nine million freight containers arrive at U.S. ports, approximately 50 percent more than 2001 because of the proliferation of global trade and "just-in-time" manufacturing and retailing strategies. The increased threat of global terrorism has raised awareness that these containers are a vulnerable point in the supply chain.
[0003] Supply chain security is critically important to both vendors and customers and the wellbeing of the global economy. Assurance that the integrity of the contents of a container in transit can be verified is crucial to ensuring secure, efficient shipping. Security concerns exist concerning the inclusion of materials into cargo being shipped worldwide. Vendors and consumers also want guarantees that the containers in transit are the correct containers, and are in acceptable condition to be sold or used.
[0004] Existing container intrusion detection systems build upon mechanical devices such as locks and bolts to ensure that the contents of a container are not available. Security methods with these old-fashioned mechanical security systems are prevalent. Examples of such systems include tamper evident secure containers. These containers are encryption-enabled, such that the shipper can arm the container using a unique, encrypted code. The container is packed and sealed with a traditional bolt seal. As the container passes within range of the global wireless reader infrastructure, which is similar to common electronic toll collection systems, the container security device tells logistics and customs officials where the container is located, when it arrived, and if unauthorized personnel opened it en route.
[0005] As is evident, technologies that utilize these mechanical constraints have numerous limitations. They can be bypassed by puncturing the container, or deactivating the security device placed in or on the container. Further, since these security devices pass within range of global wireless reader infrastructure, a malignant entity need only remove the container from its route when the reader infrastructure is not able to detect the container as mentioned above. Thus, the whereabouts of that container becomes unknown, and the contents no longer remain secure. The contents of the container could be tampered with and then placed back in the shipping route. The existence and location of a breach would never be known. These existing security devices also fail to detect theft of a container. There is no indication, until a container does not arrive as scheduled within range of a global wireless reader infrastructure, that the container has been stolen or waylaid.
[0006] Another constraint placed upon such existing technologies is the inability to successfully be utilized on smaller containers. Depending upon the size of the container, the infrastructure that needs to be added to the container may make the utilization of current intrusion devices inapplicable. Placing locks or bolts on very small containers may not be physically conducive. The integrity of such mechanical constraints may also not be verifiable as failure- proof or tamper-resistant. Further, existing intrusion detection devices may not even be embeddable or attachable to smaller containers.
[0007] An integrity verification system is needed that overcomes these limitations of the existing technology.
Summary of the Invention
[0008] Certain embodiments of the present invention relate to container security mechanisms. [0009] In a first embodiment, a container security device comprises a sensor and a local memory configured to store input from the sensor, wherein the device is configured to detect a breach of a container.
[0010] A second embodiment of the invention relates to a method of securing a container, comprising the steps of detecting a change in a measurement value inside a container, and indicating a breach if a change in measurement value exceeds a threshold.
[0011] A third embodiment of the invention relates to a method of determining if a container was breached, comprising the steps of downloading a log of gathered information, and checking the gathered information for any abnormalities, wherein the gathered information includes at least one sensor measurement taken from the inside of a container.
[0012] A fourth embodiment of the invention relates to a device for maintaining security of a navigation receiver unit, comprising an enclosure, comprising a sensor, a processor, a local memory configured to store input from the sensor, and a navigation receiver unit, wherein the device is configured to detect a breach of the enclosure.
Brief Description of the Drawings
[0013] FIG. 1 illustrates a first embodiment of a container security mechanism.
[0014] FIG. 2 illustrates a second embodiment of a container security mechanism.
[0015] FIG. 3A depicts a sample pressure versus time plot depicting an embodiment of the invention.
[0016] FIG. 3B depicts a sample pressure versus time plot depicting an embodiment of the invention. [0017] FIG. 4 illustrates a flow chart depicting an embodiment of the invention.
[0018] FIG. 5 illustrates a flow chart depicting an embodiment ofthe invention.
Detailed Description of the Preferred Embodiments
[0019] A preferred embodiment of the invention relates to a system and method for securing a container, in transit, through the use of a logging pressure sensor and global navigation receiver unit.
[0020] As used herein, the global navigation receiver unit can be associated with various navigation systems, such as Global Navigation Satellite Systems (GNSS) including, for example, Global Positioning System (GPS) or Galileo, to name a few. Preferably, the receiver unit has the ability to log not only position but also time at the logged position of the container. The above systems rely on time of reception of the received signals, and thus are applicable navigation systems for use with the invention. Preferably, the receiver unit minimizes power usage. Current technologies allow for the usage of such a low power receiver unit to be attached or embedded into the container for use for long time periods (i.e. a shipping cycle or more).
[0021] The attachment or embedding of a navigation receiver unit into the container ensures that even if a container is removed from the shipping route, the position of the container at the time of removal or change of course will be known. Thus, the issue of shipped goods being removed when out of range of global wireless reader infrastructure is no longer a concern. Further, the ability to obtain the container in such a situation is highly improved. Thus, the recovery of theft of containers becomes much easier. Also, with regards to a detour in the shipping route due to natural disasters or other unforeseen circumstances, the ability to track the containers with a global navigation receiver unit is highly useful. The containers can be tracked and monitored to ensure on-time delivery and secure transit, even if the pre-set shipping route cannot be utilized.
[0022] The receiver unit can be coupled with a pressure sensor that is used in tandem to monitor the integrity and position of a container in transit to form a container security mechanism. Figure 1 shows one embodiment of such a container security mechanism. Data from the receiver 1100 and the pressure sensor 1200 are logged to a local memory device 1500, and can be transmitted to a server or monitoring unit at a remote site (not shown). The navigation receiver unit can calculate and store time and position information 1300 in the local memory device; the pressure sensor can store thresholds for alarm detection 1400 in the local memory device 1500. Preferably, the alarm detection includes a processor (not shown) that can determine whether or not sensor measurements, or changes in sensor measurements, exceed the stored thresholds. The navigation receiver unit is connected to an antenna 1600, and receives signals from the navigation positioning system satellites. The pressure sensor may be connected to an antenna or radio transmitter 1700 that transmits internal pressure information, and optionally navigation information (position and time at position) to a remote location. The security mechanism can also use this antenna 1700 to transmit logged information.
[0023] Figure 2 depicts another embodiment of the container security mechanism. The mechanism contains a sensor unit 2100, a pressurized container 2200, and a monitoring unit 2300. The sensor unit 2100 is contained or placed in the pressurized container 2200, and optionally communicates with the monitoring unit 2300 via a radio signal relay 2400. Specifically, the sensor unit 2100 contains a navigation receiver unit 21 10; a pressure sensor 2120; an optional position sensor 2130; an optional radio transmitter 2140 to communicate with the monitoring unit 2300 via a radio signal relay 2400; a central processing unit 2150; and a local memory 2160. The pressurized container 2200 contains a navigation system antenna connector 2210, a pressure valve 2220, an airtight lid 2230, and the sensor unit 2100. The monitoring unit 2300 can be any computer or system known in the art that is able to monitor information transmitted by radio or satellite signals. The optional position sensor 2130 may include lnertial Navigation Units, Dead Reckoning position calculators, or other aiding sensors, to name a few. The optional position sensor 2130 is not limiting on the invention; rather it can be anyone of many such sensors known in the art. Further, more than one optional sensor may be utilized with the mechanism.
[0024] In one embodiment, the mechanism is embedded into the container, with one or more antennas and/or radio signal relays affixed to the outside of the container to transmit and receive information regarding navigation and sensor measurements. In another embodiment, the mechanism is included into the container with one or more antennas attached, before sealing the container. In a preferred embodiment, the mechanism is activated just before the container is sealed, and is then de- activated only when the container reaches its destination and is lawfully opened. In certain embodiments, the activation and deactivation of the mechanism may only be done by authorized persons who pass security measures. These measures are not limiting on the invention; rather they can be any measures known in the art, such as encryption codes, biometrics, or smart cards.
[0025] The container security mechanism verifies the integrity of the container. One method by which the integrity can be verified involves installing the mechanism in an airtight enclosure, which has been artificially pressurized or depressurized before sealing. By placing the mechanism on the inside of the container, variations in pressure inside the container can be detected. Any sudden pressure variation is an intrusion detection; slow variations are due to weather effects (which still apply outside of a partially deformable enclosure), and can be compensated by long-term filtering. Methods of long-term filtering are known in the art; the usage of any of these methods is not limiting on the invention. This detection system can continuously run due to the very low power consumption of current pressure sensors (power consumption is as low as 10 uA). [0026] The internal pressure of the container is preferably periodically detected. Thresholds can be stored in the local memory, or maintained at a remote site, to determine when a variation of internal pressure exceeds a threshold value and indicates intrusion or breach of the container. These thresholds can be set at the time of manufacture, or can be thresholds that are set when the mechanism/container is activated or shipped. If the container is airtight, it can be pressurized, positively or negatively, to increase the ability to detect even small breaches and make it harder to foil the protection. Thus, the thresholds for detection can be more discriminating.
[0027] Figures 3A and 3B depict sample pressure vs. time plots that detect an intrusion of the container. Even in the presence of weather or altitude changes, the rate-of-change of the barometric pressure when a container is opened is high. The plots of Figures 3A and 3B show example barometric sensor responses for opening pressurized and non-pressurized containers. Figure 3A shows an example breach of a non-pressurized container, where the breach occurs at 50 seconds. Figure 3B shows an example breach of a pressurized container, where the breach occurs at 50 seconds. The spikes in pressure change due to opening of the container are easily detectable. The plots shown in Figures 3A and 3B depict simulated results.
[0028] When a variation of internal pressure of the container is detected as an intrusion by the processor, the change in measurement values of the sensor is logged as a breach in the local memory and an alarm is optionally activated. At the same time, the navigation receiver unit optionally logs the position and time of the container at the occurrence of a breach. In one embodiment, at the detection of an intrusion, the pressure sensor sends a signal to a remote site through the antenna. The remote site activates an alarm and takes action to retrieve the container and notify the shippers and vendors as necessary. In another embodiment, the pressure sensor continually sends signals indicating the pressure inside the container via the antenna or radio transmitter to a remote site. When the remote site receives a signal that is outside of a threshold value for pressure variation or detects a change in measurement values that exceeds a threshold, the remote site activates an alarm, notifies the shipper and vendor as necessary, and takes steps to retrieve the container according to the navigation information stored in the local memory of the container.
[0029] In one embodiment, the alarm, when activated, acts much like a car alarm, emitting a loud noise at the site of the container. In another embodiment, the alarm acts as a signal to a remote site, indicating breach of the container. In a further embodiment, the alarm emits a noise at the site as well as signals the remote site indicating a breach. These variations on the function of the alarm are in no way limiting to the invention. Other variations as known in the art could be utilized.
[0030] Pressure change is utilized to detect an opening of the container (i.e. an intrusion). However, in certain embodiments, the opening of the container may not be detected as an intrusion. Security methods may be coupled with the container security mechanism to detect lawful openings of the container. For example, a unit may be provided to enter a password to open the container. Biometrics or smart keys may also be utilized to gain access to the container. The method of added security for container access is not limiting on the invention; any methods known in the art can be utilized. Thus, if a pressure change outside of the threshold values is detected, along with an authorized security access, such as input of a password, the mechanism will not indicate a breach occurred.
[0031] In each of these methods, the breach is logged and optionally transmitted as it occurs, enabling efficient handling of a breach situation. The preferred embodiment provides instantaneous knowledge of a breach of the container in a manner that is very difficult to counter. Because the security mechanism is inside the sealed container, the mechanism cannot be tampered with before the breach of the container. Thus, the intrusion detection by the pressure sensor, and subsequent signalling of an intrusion to a remote site, necessarily occurs before the security mechanism can be accessed, or deactivated. [0032] The local memory is also utilized to handle breach management. In one embodiment, the local memory retains a continual log of the internal pressure and the navigation information (position and time) throughout the shipping process. In another embodiment, the local memory periodically stores pressure and navigation information. In a third embodiment, the local memory only stores pressure information and navigation information at times of breach. Thus, the local memory provides a log by which to verify the integrity of the container and the information regarding a breach of the container, if any such breach did occur. Further, the local memory can provide an auditable log of the transit of the container, and can be utilized to create more efficient or secure shipping methods or routes.
[0033] Data in the local memory can be transmitted to a server at a remote site, to be accessed by either the vendor or the shipping company. Thus, tracking of the container, and verification of its integrity, can be continually monitored by a vendor or a shipping company. Further, upon arrival of the container to a pre-determined end location, the vendor or shipping company need only check the log of the position and internal pressure information to ensure that the container is in condition to be sold or utilized. In some embodiments, the log of information is encrypted as it is stored, and decrypted by the vendor or shipper once the container has reached its final destination.
[0034] The preferred embodiment provides a valued service to vendors and shippers concerned about the integrity of containers shipped from a start location to an end location. Once the integrity of a container is verified at the start location, as long as a breach is not recorded on the shipping route, the integrity of that container can be assumed to be intact at the end location. Thus, shippers and vendors are able to efficiently ensure that containers have not been tampered with or rendered unusable. In certain embodiments, a tracking application is run on the server at the remote site, allowing shippers and/or vendors to track the position and status of the container, utilizing a tracking number assigned to their specific shipment or container. In one embodiment, the shipper or vendor enters a tracking number and a password into a web-based application to access information about the container. In another embodiment, the shipper or vendor can access information about all of the containers being shipping from a vendor or shipper tracking page.
[0035] The size of the container security mechanism is also conducive to shippers and vendors. Because the mechanism is small, and preferably utilizes minimal power, it can be placed in many sizes of containers, from small packages to large shipping crates. The mechanism can be located anywhere on the inside of a container, as long as an antenna connection exists to obtain navigation information and transmit internal pressure information as necessary. Thus, the size of container to be monitored provides no bar to use of the mechanism.
[0036] Further, the mechanism can be customizable for each vendor or shipper. The type and frequency of information reported, type of monitoring, and alarm reporting are among the features of the preferred embodiment that can be customized.
[0037] In one embodiment, the quality and frequency of reporting could be set by the vendor or shipper. The vendor or shipper could set the period of interval at which navigation and internal pressure information from the mechanism is transmitted to a server at a remote site for access. The vendor or shipper could also set the period of interval at which pressure sensor measurements are taken in the container. The vendor or shipper could also request different amounts of information. For example, the vendor or shipper may request time, position, and/or internal pressure information at each transmission period. The vendor or shipper may instead just request confirmation that a breach has not occurred at each transmission period.
[0038] In another embodiment, the vendor or shipper may only monitor navigation information, thus utilizing only the navigation receiver unit and not the pressure sensor in the container security mechanism. Thus, the vendor or shipper may be notified if the container is not on the predetermined shipping route, but will not receive any information as to whether the container has been tampered with or opened.
[0039] In a third embodiment, the vendor or shipper may only monitor internal pressure information, thus utilizing only the pressure sensor and not the navigation receiver unit in the container security mechanism. Thus, the vendor shipper may be notified if the container has been tampered with or opened, but will not receive any information as to whether the container is on the correct shipping route, or scheduled to arrive on time with regards to its current position.
[0040] In a further embodiment, the vendor or shipper may set the alarm activation such that the vendor or shipper is notified of a breach and handles breach management. Otherwise, the vendor or shipper may rely on a third party to handle breach management, and may set the alarm such that the third party is notified of the breach as well. The vendor or shipper may also set the alarm to notify local authorities in the vicinity of the breach by utilizing the navigation information logged when the breach occurred.
[0041] In another embodiment, different types of sensors, or more than one sensor, can be utilized as part of the container security mechanism. Examples of such sensors include, but are not limited to, accelerometers, temperature sensors, and other position tracking sensors such as lnertial Navigation Units, Dead Reckoning position calculators, or other aiding sensors, to name a few. In a preferred embodiment, a sensor such as the SMD-500 manufactured BOSCH™ Sensortec is utilized with a NemeriX™ navigation receiver unit.
[0042] Figure 4 depicts a flow chart of a preferred embodiment where the mechanism is activated and the container is shipped. In step 4 1 00, the unit is activated. Step 4200 involves sealing the container. In step 4300, the unit gathers data from either the navigation receiver unit, the sensor, or both. In step 4400, the gathered data is logged. In one embodiment, the data is analyzed, and it is determined if a breach occurred and an alarm should be activated (step 4500). In this embodiment, the alarm may then be activated (step 4600), or it may be transmitted to a remote site (step 4700). In another embodiment, the additional step of transmitting the data to the remote site (step 4800) occurs after step 4400. Data is then analyzed to determine if a breach occurred and an alarm should be activated (step 4500). If a breach is found, several options exist. In one embodiment, the alarm is activated (step 4600). In another embodiment, the alarm is transmitted to the remote site (step 4700). If this second branch is followed, regardless of whether step 4800 occurs, the alarm and/or gathered data is received at the remote site (step 4900). If the gathered data was encrypted, then the data is decrypted at step 4000.
[0043] Figure 5 depicts the flow of an embodiment where the container arrives at the destination. In step 5100, the container is opened. The unit is then deactivated (step 5200). The log is downloaded at step 5300, and then optionally decrypted at step 5400. Finally, the transit path and integrity of the container's contents are verified (step 5500). This verification occurs by checking the log for any abnormalities. An abnormality would be any change in sensor measurement values outside a pre-set range or threshold. The contents of the container can be verified if no such abnormalities exist. If there are any abnormalities, that is an indication that the container was breached in transit.
[0044] In another application, certain embodiments could be utilized for verifying the recorded data of a navigation receiver unit. Specifically, a pressure sensor could be used inside a container containing only a navigation receiver unit. The processor would analyze the sensor measurements, such that changes in measurement values of the sensor that exceed a threshold would indicate a breach of the container. In one embodiment, the local memory would only log any such indicative changes. Thus, if there were any logged changes, the data recorded from the navigation receiver unit would not be verified. However, if no such changes were logged, then the data from the navigation receiver unit could be verified as authentic. In another embodiment, the local memory would log all of the sensor measurements, and the log would be an auditable record of the sensor values. A third party, such as a vendor or shipper, would then be able to view the log and see if there were any changes in measurement values that exceeded a threshold, thus indicating a breach of the container.
[0045] Certain embodiments can also be utilized in other security applications, specifically those relating to shipping. For example, the container security mechanism could be utilized with military shipping equipment. In another embodiment, the container security mechanism can be placed on the inside of HAZMA T (hazardous materials) trucks used in shipping, such that the opening of the cargo doors triggers an alarm if necessary. The security mechanism can also be utilized for other cargo shipping, such as money transport. The container security mechanism could replace existing armoured trucks, making the shipment of valuable goods such as money or gold much more easily traceable and tamper-resistant.
[0046] In another application, certain embodiments could be utilized for inventory management, especially with regards to perishable items. In this embodiment, a sensor other than a pressure sensor could be utilized, to best suit the inventory being monitored. Thus, both or one of pressure and temperature sensors could be coupled to the navigation receiver unit. For example, the container security mechanism could be placed inside freezers containing meats or fish, that are transported from a warehouse to a grocery store. Those freezers in which pressure changed due to the opening of lid, or in which temperature changed past a predetermined threshold, would be inspected to insure quality of food products. Thus, tainted or spoiled food would not be introduced into the store for sale. Further, food inspection becomes much more efficient, because inventory managers need only inspect those boxes or containers in which a breach has occurred.
[0047] Another embodiment relates again to transporting goods, specifically organs and other body parts. Because of the thriving black market of organ sales and the purpose for their transport, the secure and efficient transfer of these goods must be guaranteed. These goods require the maintenance of specific conditions inside the containers in which they are transported. This embodiment may also utilize a sensor other than a pressure sensor.

Claims

Claims
1. A container security device, comprising:
a sensor; and
a local memory configured to store input from the sensor;
wherein the device is configured to detect a breach of a container.
2. A device as claimed in claim 1, further comprising a processor that is configured to detect a breach of the container when a change in measurement values from the sensor exceeds a threshold.
3. A device as claimed in claim 2, wherein the change in measurement values is stored in the local memory when the breach occurs.
4. A device as claimed in claim 2, further comprising a navigation receiver unit, wherein the local memory is configured to store input from the navigation receiver unit.
5. A device as claimed in claim 4, wherein, when a breach occurs, information regarding the time the breach occurred is stored in the local memory.
6. A device as claimed in claim 2, further comprising an alarm, wherein the alarm is configured to activate when a breach occurs.
7. A device as claimed in claim 1, wherein a change in measurement values from the sensor is sent to a remote site to determine if it exceeds a threshold.
8. A device as claimed in claim 7, wherein the remote site is configured to activate an alarm.
9. A device as claimed in claim 2, wherein a change in measurement values that exceeds a threshold is not detected as a breach if an authorized security access is made at the time of the change in measurement values.
10. A device as claimed in claim 1, wherein the sensor is a pressure sensor.
11. A device as claimed in claim 10, wherein the container is sealed such that pressure inside the container is not atmospheric pressure.
12. A device as claimed in claim 1, further comprising:
at least one more sensor.
13. A method of securing a container, comprising the steps of:
detecting a change in a measurement values inside a container; and
indicating a breach if the change in measurement values exceeds a threshold.
14. A method as claimed in claim 13, wherein the step of indicating a breach comprises storing the change in measurement values in a local memory.
15. A method as claimed in claim 13, further comprising the step of:
detecting time and position information of the container.
16. A method as claimed in claim 15, wherein the step of indicating a breach comprises storing information about the position of the container at the time of the breach, and the time of the breach, in a local memory.
17. A method as claimed in claim 13, wherein the step of indicating a breach comprises activating an alarm.
18. A method as claimed in claim 13, further comprising the step of:
sending the change in measurement values to a remote site to determine if it exceeds a threshold.
19. A method as claimed in claim 13, wherein the change in measurement values that exceeds a threshold is not detected as a breach if an authorized security access is made at the time of the change in measurement values.
20. A method as claimed in claim 13, wherein the sensor is a pressure sensor.
21. A device as claimed in claim 20, further comprising the step of:
sealing the container such that pressure inside the container is not atmospheric pressure.
22. A method of determining if a container was breached, comprising the steps of:
downloading a log of gathered information; and
checking the gathered information for any abnormalities;
wherein an abnormality is a change in measurement values taken from a sensor inside a container that exceeds a threshold.
23. The method of claim 22, wherein the measurement values are obtained from a pressure sensor.
24. The method of claim 22, wherein the gathered information was encrypted.
25. The method of claim 24, further comprising the step of:
decrypting the gathered information.
26. A device for maintaining security of a navigation receiver unit, comprising:
an enclosure, comprising:
a sensor;
a processor;
a local memory configured to store input from the sensor; and
a navigation receiver unit;
wherein the device is configured to detect a breach of the enclosure.
27. A device as claimed in claim 26, wherein the processor is configured to detect a breach of the enclosure when a change in measurement values from the sensor exceeds a threshold.
28. A device as claimed in claim 27, wherein the local memory stores the change in measurement values from the sensor.
29. A device as claimed in claim 26, wherein the sensor is a pressure sensor.
30. A device as claimed in claim 29, wherein the enclosure is sealed such that pressure inside the enclosure is not atmospheric pressure.
PCT/EP2008/056907 2007-06-08 2008-06-04 A method for verifying the integrity of a container WO2008148795A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP08760488A EP2165282A1 (en) 2007-06-08 2008-06-04 A method for verifying the integrity of a container
CN200880019172A CN101790734A (en) 2007-06-08 2008-06-04 A method for verifying the integrity of a container
JP2010510781A JP2011502086A (en) 2007-06-08 2008-06-04 How to verify container integrity

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US94292007P 2007-06-08 2007-06-08
US60/942,920 2007-06-08
US11/760,533 2007-06-08
US11/760,533 US20080303663A1 (en) 2007-06-08 2007-06-08 Method for verifying the integrity of a container

Publications (1)

Publication Number Publication Date
WO2008148795A1 true WO2008148795A1 (en) 2008-12-11

Family

ID=39745441

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/056907 WO2008148795A1 (en) 2007-06-08 2008-06-04 A method for verifying the integrity of a container

Country Status (5)

Country Link
EP (1) EP2165282A1 (en)
JP (1) JP2011502086A (en)
KR (1) KR20100019564A (en)
CN (1) CN101790734A (en)
WO (1) WO2008148795A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2514669A (en) * 2013-04-17 2014-12-03 Honeywell Int Inc A system and method for storing and monitoring events at security devices
WO2018187529A1 (en) * 2017-04-06 2018-10-11 The Charles Stark Draper Laboratory, Inc. Supply chain integrity verification system and method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107515323A (en) * 2017-08-15 2017-12-26 国家电网公司 A kind of measurement meter Intelligent seal device
US10787151B2 (en) * 2018-03-20 2020-09-29 The Boeing Company Local access indication system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5877696A (en) * 1996-04-09 1999-03-02 Powell; Roger A. Security system for warheads
US20040056767A1 (en) * 2002-08-07 2004-03-25 Dave Porter Container security system
US20050252259A1 (en) * 2004-03-24 2005-11-17 All Set Marine Security Ab Method and system for monitoring containers to maintain the security thereof
US20070013519A1 (en) * 2004-08-26 2007-01-18 Chung Kevin K Object monitoring, locating, and tracking system employing RFID devices

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11345374A (en) * 1998-06-01 1999-12-14 Itoki Crebio Corp System for locking and unlocking transportation vehicle and its method
JP2000167208A (en) * 1998-12-10 2000-06-20 Daio Denshi Kk Game place management system
JP2001014504A (en) * 1999-06-25 2001-01-19 Hitachi Maxell Ltd Management system
US7002472B2 (en) * 2002-09-04 2006-02-21 Northrop Grumman Corporation Smart and secure container
JP4498238B2 (en) * 2005-07-20 2010-07-07 株式会社日立情報制御ソリューションズ Logistics tracking system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5877696A (en) * 1996-04-09 1999-03-02 Powell; Roger A. Security system for warheads
US20040056767A1 (en) * 2002-08-07 2004-03-25 Dave Porter Container security system
US20050252259A1 (en) * 2004-03-24 2005-11-17 All Set Marine Security Ab Method and system for monitoring containers to maintain the security thereof
US20070013519A1 (en) * 2004-08-26 2007-01-18 Chung Kevin K Object monitoring, locating, and tracking system employing RFID devices

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2514669A (en) * 2013-04-17 2014-12-03 Honeywell Int Inc A system and method for storing and monitoring events at security devices
GB2514669B (en) * 2013-04-17 2018-02-14 Honeywell Int Inc System and method for storing and monitoring events at security devices
WO2018187529A1 (en) * 2017-04-06 2018-10-11 The Charles Stark Draper Laboratory, Inc. Supply chain integrity verification system and method

Also Published As

Publication number Publication date
CN101790734A (en) 2010-07-28
JP2011502086A (en) 2011-01-20
EP2165282A1 (en) 2010-03-24
KR20100019564A (en) 2010-02-18

Similar Documents

Publication Publication Date Title
US20080303663A1 (en) Method for verifying the integrity of a container
USRE41172E1 (en) System and method to enhance security of shipping containers
JP4663650B2 (en) Method and system for monitoring containers and maintaining container safety
US7135976B2 (en) Wireless monitoring device
US8058985B2 (en) Locking apparatus for shipping containers
US20100033330A1 (en) Auditable security for cargo containers and other repositories
TWI374406B (en) Method and system for monitoring containers to maintain the security thereof
US8258950B2 (en) Method and apparatus for control or monitoring of a container
US20090160646A1 (en) System and method for monitoring and tracking inventories
US7046138B2 (en) System and method for monitoring a security of an asset
US7158028B1 (en) Intelligent multi purpose early warning system for shipping containers, components therefor and methods of making the same
US20080007398A1 (en) System and method for tracking assets
US20060266007A1 (en) Life Raft Container Security System and Method
MX2012001372A (en) Shipping container having integral geolock system.
CN102054303A (en) Method and system for monitoring containers to maintain the security thereof
JP2006517497A (en) Shipping containers and how to use them
US20100289647A1 (en) Detection of Changes in Fasteners or Fastened Joints
EP1678692A1 (en) System and method for monitoring and detecting a security threat
EP2165282A1 (en) A method for verifying the integrity of a container
EP1614078A1 (en) Method and means for providing security

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200880019172.6

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08760488

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2165/MUMNP/2009

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2010510781

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008760488

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20107000412

Country of ref document: KR

Kind code of ref document: A