A. Field of the Invention
This relates to security measures with regard to containers and detecting container breaches via visual cues while a container is moving. Containers are frequently used to transport large amounts of goods across great distances and it is important to determine if unauthorized access to the container has occurred.
B. Prior Art
There are other prior art references to container breach systems and a great many prior art references teach a radio frequency identification (RFID) tag, some of which are passive and some of which are active. This type of tag is placed on the container doors and will either signal when a breach has occurred (passive) or will allow constant monitoring of the condition of the container (active).
Representative examples of the prior art that teach types of tracking methods using RFID tags include Nowak, U.S. Pat. No. 7,123,149 and Hornbacker, U.S. Pat. No. 7,047,103. A system that teaches the tracking of goods through a variety of tracking stations can be found at Clift, U.S. Pat. No. 7,126,470.
There are other systems in the prior art that teach article tracking methods and systems including real time tracking of goods and examples of this type of device and method can be found at Chung, U.S. Pat. No. 7,036,729 and Li, U.S. Pat. No. 7,136,832. Both the Chung and Li patents use RFID technology.
The major drawback in those applications that employ RFID tags is the cost of the RFID tag. Consequently, this application is not an application for a RFID tag or a related system using an RFID tag but rather a method to track the security of containers by using visual cues. This is done not by RFID technology but by placing a strip of material across the back of the container once it has been sealed and monitoring the condition of the strip of material as it travels over great distances.
If the container doors are opened and the strip is ripped; it is made from material that will be very difficult and close to impossible to piece together. This device can be used on any type of container is significantly less costly than any methods that employ RFID tags.
The device that is used in this method is a strip of material, which is secured to the outside of a set of container doors once the container has been closed prior to shipment.
In most containers two container doors overlap slightly in the center and a means to secure the container doors is provided typically by using a set of rods that extend from the top to the bottom of the container door. The respective ends of the rods are placed through holes in the bottom and top of the container surfaces to secure the doors. A strip of material is affixed to the outside surface of the container doors in the area of the container door overlap once the container doors have been sealed.
The strip contains adhesive on one side which will attach to the outside of the container. On the opposite side of the adhesive side the strip of material may be equipped with a specific identifying pattern or infrared reflectors for ease of detection or to make it virtually impossible to piece together the ends of the ripped strip. The condition of the strips may be captured by cameras which have been placed along a rail line route.
As an example a container is loaded on a train car prior to shipment to a destination. In a given rail system there are designated portals through which the train must pass. These portals, which are fixed structures along the rail lines, allow periodic inspection of the condition of the containers on the train by the positioning of a series of cameras near or around the portal. Cameras are positioned in the areas of the portals to examine the condition of the container from many different angles. Multiple cameras are desirable because of the speed of the train and the multitude of cars that are towed by any given train. The cameras may be equipped with infrared capability and will operate during periods of low lighting.
When a breach or attempted entry occurs, the strip will be ripped. The material that comprises the strip is made so that it will be impossible to repair the tag to its original shape. This inability to repair the strip will make detection relatively easy. A specific pattern or particular striping may also be integrated so that it will allow quicker detection of a break in the material. The material may also contain infrared markers so that the cameras will be able to detect a break in the strip in conditions of limited lighting.
As the train passes through the portals the information that is recorded by cameras will be fed to a remote station to give a visual image of the strip material on the back door of the container. If the strip is intact no breach has occurred; if the strip is ripped or frayed, a possible breach has occurred such that corrective action should be taken.
This system is particularly important when multiple containers are being shipped, as often they are, from coast to coast on rail lines. Rail lines typically move at speeds in excess of sixty miles per hour and it is important to ensure that a breach of a container does not occur somewhere along the rail line. It is also equally important to be able to detect a breach along the path of the rail line as quickly as possible so that corrective action may be taken.
As stated before, the main drawback to the widespread implementation of RFID technology is cost, particularly when multiple containers are being shipped such as by train. This device and method addresses and solves that critical issue while still providing some level of security with regard to a given container.
This is a device and method to assist in the detection of a container breach. A container 3 is a box with a predetermined width, height, and length. Materials of all different types are placed in the container, and the container is then sealed, using a set of rear doors 6R and 6L, which usually extend from the top to the bottom of the back of the container. These doors are secured by a series of rods that extend from the top to the bottom of the container door and this type of securing means is common in the prior art. Access to and from the container is achieved through the rear doors, 6R and 6L. Often times, containers are locked or sealed as well as additional security precautions.
This device is a strip of material 5 which is placed across the container doors on the outside surface over the centerline of the door 6. The first side of the strip material is coated with an adhesive 5A. This strip will be affixed to the outside surface of the container doors after the container doors have been sealed over the area where the doors meet 6.
The strip 5 is applied at the departure point for the container. The second side of the strip of material may contain a reflective coating, an infrared marker or a distinctive pattern to make detection of damage to the strip easier. The strip will be made of material that will be ripped when the container doors are opened once the strip has been applied. The strip is made of material that, once broken, will not be able to be repaired to its original form thus alerting an individual that a breach may have occurred. When the strip on the container is resealed, the ends of the strip cannot be rejoined together and cannot be repaired.
During rail transport, railcars with containers move through a variety of portals 2 or fixed stations and are viewed by a series of cameras 1. The camera placement allows the viewing of the container from many different angles and the cameras are infrared sensitive 1A and can be used with low levels of lighting 1B. The images from the plurality of cameras are fed to a remote facility where it can be easily reviewed. The operator at the remote facility can view the images and easily detect any possible container breaches simply by looking at the condition of the strip of material that had been placed across the midline of the container doors prior to departure. The attendant at the remote facility or the next train stop can order corrective action in the event that there is an indication that the strip of material on the back of the container has been ripped or altered in any appreciable way.
Once the container reaches its final destination and the container doors are opened the strip of material is removed from the back of the container and disposed. A new strip can be placed on the back of the container doors prior to shipping the container to its new destination.
One of the challenges in any security system, particularly when viewing a rapidly moving object is capturing the images and integrating them into a temporal image that can be viewed and analyzed in real time. This is particularly true with a moving object such as a train, which is moving rapidly through checkpoints at speeds in excess of sixty miles per hour and particularly a train, which travels in remote locations.
The proper placement of a camera or a plurality of cameras by themselves along a route will capture the video images but will not integrate the data into a readable form at a remote facility. In the situation where the detection of container breaches is sought, it is more useful to have one image per rail car for any given train or container so as to pinpoint the location of the breach. The difficulty is that one image per rail car is not easily readable by the operator at a remote facility.
The camera images 9 from the cameras 1 at the portals 2 are integrated into software or a computer vision technique 8 like the Lucas Kanade optical flow in which a linear panorama of the moving object can be created and then forwarded to a remote facility 10. This linear panorama technique, which is found in the prior art will allow the operator to view the entire train, not just a specific car or the specific image that is captured by the camera, thus making it readable for the operator.
Once it has been determined that a breach has been identified, there is now a need to locate the exact position of the breach for law enforcement purposes.
Techniques that are used in the Lucas Kanade optical flow system can be used to identify specific locations. The information is presented for the screener at a remote facility in a readable, linear panoramic form so that the exact location can be determined and appropriate corrective action can be taken.
Additionally the images from the system including the location of any defaced or altered strip material may be archived for historical perspective or for law enforcement purposes.
Number | Name | Date | Kind |
---|---|---|---|
3463532 | Chidley et al. | Aug 1969 | A |
4234926 | Wallace et al. | Nov 1980 | A |
5217307 | McClintock | Jun 1993 | A |
5349772 | Pardue | Sep 1994 | A |
5755175 | White et al. | May 1998 | A |
6089802 | Bullock | Jul 2000 | A |
6587046 | Joao | Jul 2003 | B2 |
6832728 | Kennedy | Dec 2004 | B2 |
7002472 | Stratmoen et al. | Feb 2006 | B2 |
7036729 | Chung | May 2006 | B2 |
7047103 | Hornbacker | May 2006 | B2 |
7098784 | Easley | Aug 2006 | B2 |
7098793 | Chung | Aug 2006 | B2 |
7123149 | Nowak | Oct 2006 | B2 |
7136832 | Li | Nov 2006 | B2 |
20040118316 | Grandy | Jun 2004 | A1 |
20060257005 | Bergeron et al. | Nov 2006 | A1 |
20070211145 | Kilian et al. | Sep 2007 | A1 |
20090015400 | Breed | Jan 2009 | A1 |