1. Technical Field
The present invention relates to a method of and system for monitoring the security of a container and tracking its location and, more particularly, but not by way of limitation, to a method of and system for monitoring the integrity of and tracking intermodal freight containers throughout a supply chain to discourage or prevent such urgent problems as terrorism, and also illegal immigration, theft or adulteration of goods, and other irregularities.
2. History of Related Art
The vast majority of goods shipped throughout the world are shipped via what are referred to as intermodal freight containers. As used herein, the term “containers” includes any container (whether with wheels attached or not) that is not generally transparent to radio frequency signals, including, but not limited to, intermodal freight containers. However, it is contemplated that containers may, in the future, be partially constructed with polycarbonates or other advanced non-metallic materials which may be RF transparent. The most common intermodal freight containers are known as International Standards Organization (ISO) dry intermodal containers, meaning they meet certain specific dimensional, mechanical and other standards issued by the ISO to facilitate global trade by encouraging development and use of compatible standardized containers, handling equipment, ocean-going vessels, railroad equipment and over-the-road equipment throughout the world for all modes of surface transportation of goods. There are currently more than 19 million such containers in active circulation around the world as well as many more specialized containers such as refrigerated containers that carry perishable commodities. The United States alone receives approximately eight million loaded containers per year, or approximately 20,000 per day, representing nearly half of the total value of all goods received each year.
Since approximately 90% of all goods shipped internationally are moved in containers, container transport has become the backbone of the world economy. The sheer volume of containers transported worldwide renders individual physical inspection impracticable, and only approximately 2-4% of containers entering the United States are actually physically inspected. Risk of introduction of a terrorist biological, radiological or explosive device via a freight container is high, and the consequences to the international economy of such an event could be catastrophic, given the importance of containers in world commerce.
Even if sufficient resources were devoted in an effort to conduct physical inspections of all containers, such an undertaking would result in serious economic consequences. The time delay alone could, for example, cause the shut down of factories and undesirable and expensive delays in shipments of goods to customers.
Current container designs fail to provide adequate mechanisms for establishing and monitoring the security of the containers or their contents. A typical container includes one or more door hasp mechanisms that allow for the insertion of a plastic or metal indicative “seal” or bolt barrier conventional “seal” to secure the doors of the container. The door hasp mechanisms that are conventionally used are very easy to defeat, for example, by drilling an attachment bolt of the hasp out of a door to which the hasp is attached. The conventional seals themselves currently in use are also quite simple to defeat by use of a common cutting tool and replacement with a rather easily duplicated seal.
A more advanced solution proposed in recent time is an electronic seal (“e-seal”). These e-seals are equivalent to traditional door seals and are applied to the containers via the same, albeit weak, door hasp mechanism as an accessory to the container, but include an electronic device such as a radio or radio reflective device that can transmit the e-seal's serial number and a signal if the e-seal is cut or broken after it is installed. However, the e-seal is not able to communicate with the interior or contents of the container and does not transmit information related to the interior or contents of the container to another device. Since e-seals are accessory to, and not a permanent part of, the container, their overall usefulness can be easily eliminated when, for example, the e-seal is simply cut and discarded. In that event, all data is lost.
The e-seals typically employ either low power radio transceivers or use radio frequency backscatter techniques to convey information from an e-seal tag to a reader installed at, for example, a terminal gate. Radio frequency backscatter involves use of a relatively expensive, narrow band high-power radio technology based on combined radar and radio-broadcast technology. Radio backscatter technologies require that a reader send a radio signal with relatively high transmitter power (i.e., 0.5-3 W) that is reflected or scattered back to the reader with modulated or encoded data from the e-seal.
In addition, e-seal applications currently use completely open, unencrypted and insecure air interfaces and protocols allowing for relatively easy hacking and counterfeiting of e-seals. Current e-seals also operate only on locally authorized frequency bands below 1 GHz, rendering them impractical to implement in global commerce involving intermodal containers since national radio regulations around the world currently do not allow their use in many countries.
Furthermore, the e-seals are not effective at monitoring security of the containers from the standpoint of alternative forms of intrusion or concern about the contents of a container, since a container may be breached or pose a hazard in a variety of ways since the only conventional means of accessing the inside of the container is through the doors of the container. For example, a biological agent could be implanted in the container through the container's standard air vents, or the side walls of the container could be cut through to provide access. Although conventional seals and the e-seals afford one form of security monitoring the door of the container, both are susceptible to damage. The conventional seal and e-seals typically merely hang on the door hasp of the container, where they are exposed to physical damage during container handling such as ship loading and unloading. Moreover, conventional seals and e-seals cannot monitor the contents of the container.
The utilization of multiple sensors for monitoring the interior of a container could be necessary to cover the myriad of possible problems and/or threatening conditions. For example, the container could be used to ship dangerous, radio-active materials, such as a bomb and/or components of a bomb. In that scenario, a radiation sensor or explosive sensor would be needed in order to detect the presence of such a serious threat. Unfortunately, terrorist menaces are not limited to a single category of threat. Both chemical and biological warfare have been used and pose serious threats to the public at large. For this reason, both types of detectors could be necessary, and in certain situations, radiation, gas and biological sensors could be deemed appropriate. One problem with the utilization of such sensors is, however, the transmission of such sensed data to the outside world when the sensors are placed in the interior of the container. Since standard intermodal containers are manufactured from steel that is opaque to radio signals, it is virtually impossible to have a reliable system for transmitting data from sensors placed entirely within such a container unless the data transmission is addressed. If data can be effectively transmitted from sensors disposed entirely within an intermodal container, conditions such as temperature, light, combustible gas, motion, radio activity, biological and other conditions and/or safety parameters can be monitored. These aspects are more fully set forth, shown and described in co-pending U.S. patent application Ser. No. 10/847,185 filed May 17, 2004 and incorporated herein by referenced. Moreover, the integrity of the mounting of such sensors are critical and require a more sophisticated monitoring system than the aforementioned door hasp mechanisms that allow for the insertion of an external plastic or metal indicative “seal” or bolt barrier conventional “seal” to secure the doors of the container.
In addition to the above, the monitoring of the integrity of containers via door movement can be relatively complex. Although the containers are constructed to be structurally sound and carry heavy loads, both within the individual containers as well as by virtue of containers stacked upon one another, each container is also designed to accommodate transverse loading to accommodate dynamic stresses and movement inherent in (especially) ocean transportation and which are typically encountered during shipment of the container. Current ISO standards for a typical container may allow movement between the door panels on a vertical axis due to transversal loads by as much as 40 millimeters relative to one another. Heretofore, security approaches based upon maintaining a tight interrelationship between the physical interface between two container doors were generally not practicable. Structural stresses on the container from other containers stacked above it, as well as shipping motion and the like, will cause twisting of the container and relative vertical movement between the container doors. This is called “racking.” The relative vertical movement will, however, generally not translate into appreciable horizontal separation between the doors.
It would therefore be advantageous to provide a method of and system for: (i) monitoring the movement of the doors of a container relative to another area of the container in a cost effective, always available, yet reliable fashion; (ii) providing for a data path for other security sensors placed in a container to detect alternative means of intrusion or potential presence of dangerous or illicit cargo to receivers in the outside world; and (iii) simultaneously provide a means for tracking transport movements of containers for reasons of security and logistics efficiency.
The present invention relates to a method of and system for efficiently and reliably monitoring the integrity of a container to maintain the security thereof. More particularly, one aspect of the invention includes a sensor system for monitoring the integrity of a container having at least one door, the system comprising a sensor housing secured in the container in a position to monitor the position of the at least one door, and a sensor secured in the housing for detecting proximity of the at least one door relative to another area of the container and providing sensor data. A data interpretation device is disposed inside the container in communication with the sensor for interpreting the sensor data and a transmitter is provided for communicating information relative to the sensed proximity to a location outside the container.
In another aspect, an embodiment of the above described the sensor housing is secured in the at least one door of the container. In one embodiment, the sensor housing is integrally mounted in the at least one door of the container.
In a further aspect, an embodiment of the above described system includes the container having a second door adjacent the at least one door, the sensor housing being secured in the at least one door, and the sensor secured in the housing being adapted for detecting proximity of the at least one door relative to the second door for providing the sensor data.
In yet a further aspect, an embodiment of the above described system includes the container being non-FR transparent and being constructed with an aperture adapted for receipt of a portion of the sensor housing for exposure outwardly of the container in the mounting thereof for sending and receiving radio frequency signals. The transmitter of the system is secured in the housing in position for communicating an alarm, warning and/or other information relative to the sensed proximity via the aperture to a location outside the container. The sensor housing may, in this embodiment, include a gasket extending there around for sealed engagement of the housing relative to the aperture. Further embodiments of the above described system include the sensor comprising a reed switch, a Hall effect sensor, or another type of proximity sensor. In a preferred embodiment, a Hall effect sensor incorporating a ring magnet is utilized.
Yet a further embodiment of the invention includes the sensor housing being secured in the at least one door of the container, the at least one door of the container including an aperture formed therein and adapted for receipt of a portion of the housing therethrough, the data interpretation device being disposed within the housing, and the transmitter being disposed within the housing and positioned for communicating information to a location outside the container via the aperture formed therein.
Moreover, another embodiment of the invention includes the container having a sensor plate, the sensor comprising a Hall effect sensor, the sensor housing being secured in the at least one door, and the Hall effect sensor and the sensor plate being mounted within the container for functional interaction one with the other to monitor the position of the at least one door.
In another aspect, an embodiment of the present invention includes a method of manufacturing a container of the type bearing at least one door for being capable of monitoring for a breach in the integrity thereof. The method comprises providing a sensor system with a sensor, sensor housing, data interpretation device and transmitter and structurally monitoring the sensor housing in the container in a position to monitor the position of the at the least one door. The sensor is secured in the housing for detecting proximity of the at least one door relative to another area of the container for providing sensor data, and a data interpretation device is disposed inside the container in communication with the sensor for interpreting the sensor data. Finally, a transmitter is provided in the container for communicating information relative to the sensed proximity to a location outside the container.
In another embodiment, the method further includes the use of a Hall effect sensor and the proximity detection includes the step of measuring a Hall effect between the at least one door and another area of the container. In one embodiment, the Hall effect sensor incorporates a ring magnet.
In a further embodiment, the method includes securing the sensor housing in the at least one door of the container, forming an aperture in the least one door of the container in position for receipt of a portion of the housing therethrough, securing the data interpretation device within the housing, and securing the transmitter within the housing in position for communicating information to a location outside the container via the aperture formed therein.
In yet a further embodiment, the method includes using a Hall effect sensor and securing housing in the at least one door, and securing a sensor plate within the container so that the Hall effect sensor and sensor plate functionally interact one with the other to monitor the position of the at least one door.
It has been found that a container security device of the type set forth, shown, and described below, may be mounted in and or integrally constructed with a container for effective monitoring of the integrity and condition thereof and its contents. As will be defined in more detail below, a device in accordance with principles of the present invention is constructed for positioning within a pre-defined portion of the container, such as a container door, to monitor the position of the door.
A more complete understanding of exemplary embodiments of the present invention can be achieved by reference to the following Detailed Description of Exemplary Embodiments of the Invention when taken in conjunction with the accompanying Drawings, wherein:
It has been found that a container security device of the type set forth, shown, and described below, may be constructed in and secured to a container for effective monitoring of the integrity and condition thereof and its contents. As will be defined in more detail below, a device in accordance with principles of the present invention is constructed for positioning within a pre-defined portion of the container.
The server 15 stores a record of security transaction details such as, for example, door events (e.g., security breaches, container security checks, arming and disarming the container), location, as well as any additional desired peripheral sensor information (e.g., temperature, motion, radioactivity). The server 15, in conjunction with the software backbone 17, may be accessible to authorized parties in order to determine a last known location of the container 10, make integrity inquiries for any number of containers, or perform other administrative activities.
The device 12 communicates with the readers 16 via a short-range radio interface such as, for example, a radio interface utilizing direct-sequence spread-spectrum principles. The radio interface may use, for example, BLUETOOTH or any other short-range, low-power radio system that operates in the license-free Industrial, Scientific, and Medical (ISM) band, which operates around e.g. 2.4 GHz. Depending on the needs of a specific solution, related radio ranges are provided, such as, for example, a radio range of up to 100 m.
The readers 16 may communicate via a network 13, e.g. using TCP/IP, with the server 15 via any suitable technology such as, for example, Universal Mobile Telecommunications System (UMTS), Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Pacific Digital Cellular System(PDC), Wideband Local Area Network (WLAN), Local Area Network (LAN), Satellite Communications systems, Automatic Identification Systems (AIS), or Mobitex. The server 15 may communicate with the software backbone 17 via any suitable wired or wireless technology. It should be noted that a key function of the system is to, upon a proper request from a reader, to issue encrypted arming keys, as more specifically set forth, shown and described in the above-referenced co-pending U.S. patent application Ser. No. 10/667,282 incorporated herein by reference. The software backbone 17 is adapted to support real-time surveillance services such as, for example, tracking and arming of the container 10 via the server 15, the readers 16, and the device 12. The server 15 and/or the software backbone 17 are adapted to store information such as, for example, identification information, tracking information, door events, and other data transmitted by the device 12 and by any additional peripheral sensors interoperably connected to the device 12. The software backbone 17 also allows access for authorized parties to the stored information via a user interface that may be accessed via, for example, the Internet.
Referring now to
At point (D), the container is loaded on a ship operated by a carrier. At point (E), the container is shipped by the carrier to a port of discharge. At point (F), the container is discharged from the ship. Following discharge at point (F), the container is loaded onto a truck and gated out of the port of discharge at point (G). At point (H), the container is shipped via land to a desired location in a similar fashion to point (B). At point (I), upon arrival at the desired location, the container is unloaded by a consignee.
As will be apparent to those having ordinary skill in the art, there are many times within the points of the flow 2 at which security of the container could be compromised without visual or other conventional detection. In addition, the condition of the contents of the container could be completely unknown to any of the parties involved in the flow 2 until point (H) when the contents of the container are unloaded.
Still referring to
Still referring to
The antenna 20 is provided for data exchange with the reader 16. In particular, various information, such as, for example, status and control data, may be exchanged. The microprocessor 22 may be programmed with a code that uniquely identifies the container 10. The code may be, for example, an International Standards Organization (ISO) container identification code. The microprocessor 22 may also store other logistic data, such as Bill-of-Lading (B/L), a mechanical seal number, a reader identification with a time-stamp, etc. A special log file may be generated, so that arming and tracking history together with door and other sensor events may be recovered. The code may also be transmitted from the device 12 to the reader 16 for identification purposes. The RF/baseband unit 21 upconverts microprocessor signals from baseband to RF for transmission to the reader 16.
The device 12 may, via the antenna 20, receive an integrity inquiry from the reader 16. In response to the integrity query, the microprocessor 22 may then access the memory to extract, for example, door events, temperature readings, security breaches, or other stored information in order to forward the extracted information to the reader 16. The reader 16 may also send an arming or disarming command to the device 12.
When the container 10 is secured by the reader 16, the MCU 22 of the device 12 may be programmed to emit an audible or visual alarm when the sensor 150 detects certain movement and/or other events after the container is secured. The device 12 may also log the breach of security in the memory 24 for transmission to the reader 16. If the reader 16 sends a disarming command to the device 12, the microprocessor 22 may be programmed to disengage from logging door events or receiving signals from the sensor 150 or other sensors interoperably connected to the device 12.
The microprocessor 22 may also be programmed to implement power-management techniques for the power source 26 to avoid any unnecessary power consumption. In particular, one option is that one or more time window(s) are specified via the antenna 20 for activation of the components in the device 12 to exchange data. Outside the specified time windows, the device 12 may be set into a sleep mode to avoid unnecessary power consumption. Such a sleep mode may account for a significant part of the device operation time, the device 12 may as a result be operated over several years without a need for battery replacement.
In particular, according to the present invention, the device 12 utilizes a “sleep” mode to achieve economic usage of the power source 26. In the sleep mode, a portion of the circuitry of the device 12 is switched off. For example, all circuitry may be switched off except for the sensor 150 and a time measurement unit (e.g., a counter in the microprocessor 22) that measures a sleep time period tsleep. In a typical embodiment, when the sleep time period has expired or when the sensor 150 senses a door event, the remaining circuitry of the device 12 is powered up.
When the device 12 receives a signal from the reader 16, the device 12 remains to communicate with the reader 16 as long as required. If the device 12 does not receive a signal from the reader 16, the device 12 will only stay active as long as necessary to ensure that no signal is present during a time period referred to as a radio-signal time period or sniff “period” (“tsniff”).
Upon tsniff being reached, the device 12 is powered down again, except for the time measurement unit and the sensor 150, which operate to wake the device 12 up again after either a door event has occurred or another sleep time period has expired.
In a typical embodiment, the reader-signal time period is much shorter (e.g., by several orders of magnitude less) than the sleep time period so that the lifetime of the device is prolonged accordingly (e.g., by several orders of magnitude) relative to an “always on” scenario.
The sum of the sleep time period and the reader-signal time period (cycle time”) imposes a lower limit on the time that the device 12 and the reader 16 must reach in order to ensure that the reader 16 becomes aware of the presence of the device 12. The related time period will be referred to as the passing time (“tpass”).
However, a passing time (“tpass”) is usually dictated by the particular situation. The passing time may be very long in certain situations (e.g., many hours when the device 12 on a freight container is communicating with the reader 16 on a truck head or chassis carrying the container 10) or very short in other situations (e.g., fractions of a second when the device 12 on the container 10 is passing by the fixed reader 16(C) at high speed). It is typical for all the applications that each of the devices 12 will, during its lifetime, sometimes be in situations with a greater passing time and sometimes be in situations with a lesser passing time.
The sleep time period is therefore usually selected such that the sleep time period is compatible with a shortest conceivable passing time, (“tpass,min”). In other words, the relation—
tsleep≦tpass,min−tsniff
should be fulfilled according to each operative condition of the device. Sleep time periods are assigned to the device in a dynamic matter depending on the particular situation of the device (e.g., within its life cycle).
Whenever the reader 16 communicates with the device 12, the reader 16 reprograms the sleep time period of the device 12 considering the location and function of the reader 16, data read from the device 12, or other information that is available in the reader 16.
For example, if the container 10 equipped with device 12 is located on a truck by a toplifter, straddle carrier, or other suitable vehicle, the suitable. vehicle is equipped with the reader 16, whereas the truck and trailer are not equipped with any readers 16. It is expected that the truck will drive at a relatively-high speed past the fixed reader 16(C) at an exit of a port or a container depot. Therefore, the reader 16(C) on the vehicle needs to program the device 12 with a short sleep time period (e.g., ˜0.5 seconds).
Further ramifications of the ideas outlined above could be that, depending on the situation, the reader 16 may program sequences of sleep periods into the device 12. For example, when the container 10 is loaded onboard a ship, it may be sufficient for the device 12 to wake up only once an hour while the ship is on sea. However, once the ship is expected to approach a destination port, a shorter sleep period might be required to ensure that the reader 16 on a crane unloading the container 10 will be able to establish contact with the device 12. The reader 16 on the crane loading the container 10 onboard the ship could program the device 12 as follows: first, wake up once an hour for three days, then wake up every ten seconds.
In another scenario, the reader 16 is moving together with the device 12 and could modify the sleep time period in dependence on the geographical location. For example, it may be assumed that the device 12 on the container 10 and the reader 16 of a truck towing the container 10 may constantly communicate with each other while the container 10 is being towed. As long as the container 10 is far enough away from its destination, the reader 16 could program the device 12 to be asleep for extended intervals (e.g., one hour.) When the reader 16 is equipped with a Global Positioning System (GPS) receiver or other positioning equipment, the reader may determine when the container 10 is approaching its destination. Once the container approaches the destination, the reader 16 could program the device 12 to wake up more frequently (e.g., every second).
While the above-described power-management method has been explained with respect to the device 12 in the context of trucking of freight containers or other cargo in transportation by sea, road, rail or air, it should be understood for those skilled in the art that the above-described power-management method may as well be applied to, for example, trucking of animals, identification of vehicles for road toll collection, and theft protection, as well as stock management and supply chain management.
Referring now to
Referring now to
Referring now to
Still referring to
Referring now to
Referring now to
Referring now to
Referring now to
Referring back now to
Referring now to
Referring now to
Referring now to
Still referring to
Referring now to
The flange 250 is provided to protect the housing 25 from tampering attempts with inserted objects or the like. It should further be noted that the particular mounting of the housing 25 in the door 240 of
Referring now to
Referring now to
Referring now to
Referring now to
In operation, the embodiments of the invention described above permit detection of relative horizontal or opening movement between the doors of the freight container 10. As described above, it should also be noted that the Hall effect sensor 150 is but one type of sensor for use in accordance with the principles of the present invention. For example, another analog magnetic flux vector (magnitude and direction) sensor may be incorporated. Likewise, a Reed switch and a balanced system of one internal magnet and a second magnet located in the door frame is contemplated. As shown and described above, the Hall effect sensor measures the magnetic vector field changes when there is separation between the sensor and the sensed object, such as occurs when the doors on the container are moving away from each other. This is made possible by the fact that a magnetic vector field sensor can directly detect a magnetic field, its magnitude and direction from a permanent magnet. The measured magnetic field or flux varies relative to the distance of the ferrous material, and thus the manner of mounting the Hall effect sensor 150 as described herein relative to the keeper plate 252 as above described, affords a highly reliable method of proximity measurement.
The Hall effect sensor of the present invention utilizes a ring magnet, the flux pattern of which is strong, allowing for even higher degrees of flux pattern linearity, sensitivity and reliability. In this manner, the sensor detects the combined magnetic fields from both the object and the magnet. Therein, variations in the flux patterns as a result of relative movement of separation between the doors of the container one from the other as described above result in changes in electrical current, voltage or resistance, and thus the generation of a signal indicative of movement. This separation movement occurs along a sensor axis 150A, shown in
Although the above embodiment is shown as a single unit including at least one sensor and an antenna 20 for communicating with the reader 16, the present invention may be implemented as several units. For example, a light, temperature, radioactivity, etc. sensor may be positioned anywhere inside the container 10. The sensor takes readings and transmits the readings via BLUETOOTH, or any short range communication system, to an antenna unit that relays the readings or other information to the reader 16. The sensors may be remote and separate from the antenna unit. In addition, the above embodiment illustrates a device 12 that includes a sensor 150 for determining whether a security breach has occurred. However, an unlimited variety of sensors may be employed to determine a security breach in place of, or in addition to, the sensor 150. For example, the light pipe 130 described above may sense fluctuations in light inside the container 10. If the light exceeds a predetermined threshold, then it is determined a security warning may be reported indicating that a possible breach has occurred. A temperature sensor, radioactivity sensor, combustible gas sensor, etc. may be utilized in a similar fashion.
The device 12 may also trigger the physical locking of the container 10. For instance, when a reader 16 secures, via a security command, the contents of the container 10 for shipment, the microprocessor 22 may initiate locking of the container 10 by energizing elecromagnetic door locks or other such physical locking mechanism. Once the container is secured via the security command, the container 10 is physically locked to deter theft or tampering.
As referenced above, the device 12 may also be coupled to a plurality of other sensors disposed within the container 10. The device 12 may then be utilized to receive from the sensors conditions necessitating warning and/or alarm. For example, a radioactivity sensor may be utilized to generate an alarm signal relative to the detected presence of radioactive materials placed in the container 10. Similarly, one or more light sensors may be disposed within a container 10 for detecting the presence of light, which could indicate the physical penetration of a surface of the container to allow outside light therein, indicating a security breach. These and other sensors may be utilized in conjunction with device 12 in accordance with the principles of the present invention.
Also referenced above is the fact that future containers may be fabricated from non-ferrous material whereby the containers are RF transparent. In that eventuality, a variety of other types of sensors, in addition to those described herein, may be utilized in accordance with the principles of the present invention. Likewise, a container that is made of polycarbonate material may not require the use of an aperture for placement of an antenna in a position for transmission outwardly of the container. With the walls of the container being RF transparent, an aperture would generally not be necessary. Likewise, the sensor housing could be designed in a varied configuration, wherein the transmitter section is not sized and shaped for integration with such an aperture.
As shown in
The reader 16 may include or attach to a satellite positioning unit 34 is for positioning of a vehicle on which the container 10 is loaded. For example, the reader 16 may be the mobile reader 16(B) attached to a truck, ship, or railway car. The provision of the positioning unit 34 is optional and may be omitted in case tracking and positioning of the container 10 is not necessary. For instance, the location of the fixed reader 16(C) may be known; therefore, the satellite positioning information would not be needed. One approach to positioning could be the use of satellite positioning systems (e.g., GPS, GNSS, or GLONASS). Another approach could be the positioning of the reader 16 utilizing a mobile communication network. Here, some of the positioning techniques are purely mobile communication network based (e.g., EOTD) and others rely on a combination of satellite and mobile communication network based positioning techniques (e.g., Assisted GPS).
The microprocessor 36 and the memory 38 in the reader 16 allow for control of data exchanges between the reader 16 and the device 12 as well as a remote surveillance system as explained above and also for a storage of such exchanged data. Necessary power for the operation of the components of the reader 16 is provided through a power supply 40.
The handheld reader 16(A) shown in
Additional application scenarios for the application of the device 12 and reader 16 will now be described. Insofar as the attachment and detachment of the reader 16(B) to different transporting or transported units is referred to, any resolvable attachment is well covered by the present invention (e.g., magnetic fixing, mechanic fixing by screws, rails, hooks, balls, welding, snap-on mountings, further any kind of electrically achievable attachment, e.g., electro magnets, or further reversible chemical fixtures such as adhesive tape, scotch tape, glue, pasted tape).
The same principles apply to a third application scenario for the container surveillance components, as shown in
While above the application of the inventive surveillance components has been described with respect to long range global, regional or local transportation, in the following the application within a restricted area will be explained with respect to
In particular, the splitting of the short range and long range wireless communication within a restricted area is applied to all vehicles and devices 12 handling the container 10 within the restricted area such as a container terminal, a container port, or a manufacturing site in any way. The restricted area includes in-gates and out-gates of such terminals and any kind of handling vehicles such as top-loaders, side-loaders, reach stackers, transtainers, hustlers, cranes, straddle carriers, etc.
A specific container is not typically searched for using only a single reader 16; rather, a plurality of readers 16 spread over the terminal and receive status and control information each time a container 10 is handled by, for example, a crane or a stacker. In other words, when a container passes a reader 16, the event is used to update related status and control information.
It should be noted that the original architecture of the system utilized an encryption technique that essentially required network access to fully validate a proper security status check of a CSD. The same key was used to validate that the CSD was still armed and not in an alarm state. In another embodiment, a PKI (public key infrastructure) is used. A public and a private key is therein used to validate the CSD and its status. This function is performed without reference to whether or not a network connection is available. This approach of symmetric versus asymmetric encryption is well known in the art and is presented herein for reference purposes.
Although embodiment(s) of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the present invention is not limited to the embodiment(s) disclosed, but is capable of numerous rearrangements, modifications, and substitutions without departing from the invention defined by the following claims.
This Application for Patent claims priority from, and hereby incorporates by reference for any purpose, the entire disclosure of U.S. Provisional Patent Application No. 60/520,120 filed on Nov. 13, 2003. This Application for Patent also incorporates by reference for any purpose, the entire disclosure of co-pending U.S. patent application Ser. No. 10/667,282 filed on Sept. 17, 2003 and co-pending U.S. patent application Ser. No. 10/847,185 filed on May 17, 2004.
Number | Name | Date | Kind |
---|---|---|---|
4688244 | Hannon et al. | Aug 1987 | A |
4750197 | Denekamp et al. | Jun 1988 | A |
4849927 | Vos | Jul 1989 | A |
4897642 | DiLullo et al. | Jan 1990 | A |
5097253 | Eschbach et al. | Mar 1992 | A |
5189396 | Stobbe | Feb 1993 | A |
5347274 | Hassett | Sep 1994 | A |
5355511 | Hatano et al. | Oct 1994 | A |
5448220 | Levy | Sep 1995 | A |
5475597 | Buck | Dec 1995 | A |
5565858 | Guthrie | Oct 1996 | A |
5602526 | Read | Feb 1997 | A |
5686888 | Welles, II et al. | Nov 1997 | A |
5712789 | Radican | Jan 1998 | A |
5828322 | Eberhard | Oct 1998 | A |
5831519 | Pedersen et al. | Nov 1998 | A |
5912619 | Vogt | Jun 1999 | A |
5959568 | Woolley | Sep 1999 | A |
6069563 | Kadner et al. | May 2000 | A |
6211907 | Scaman et al. | Apr 2001 | B1 |
6266008 | Huston et al. | Jul 2001 | B1 |
6400266 | Brown, Jr. | Jun 2002 | B1 |
6437702 | Ragland et al. | Aug 2002 | B1 |
6483434 | UmiKer | Nov 2002 | B1 |
6577921 | Carson | Jun 2003 | B1 |
6665585 | Kawase | Dec 2003 | B2 |
6687609 | Hsiao et al. | Feb 2004 | B2 |
6737969 | Carlson et al. | May 2004 | B2 |
6745027 | Twitchell, Jr. | Jun 2004 | B2 |
6747558 | Thorne et al. | Jun 2004 | B1 |
6753775 | Auerbach et al. | Jun 2004 | B2 |
6952165 | Kovach et al. | Oct 2005 | B2 |
7019640 | Canich et al. | Mar 2006 | B2 |
7081816 | Schebel et al. | Jul 2006 | B2 |
7098784 | Easley et al. | Aug 2006 | B2 |
20010030599 | Zimmerman et al. | Oct 2001 | A1 |
20040041705 | Auerbach et al. | Mar 2004 | A1 |
20040066328 | Galley et al. | Apr 2004 | A1 |
20040073808 | Smith et al. | Apr 2004 | A1 |
20040100379 | Boman et al. | May 2004 | A1 |
20040113783 | Yagesh | Jun 2004 | A1 |
20040189466 | Morales | Sep 2004 | A1 |
20040196152 | Tice | Oct 2004 | A1 |
20040215532 | Boman et al. | Oct 2004 | A1 |
20040227630 | Shannon et al. | Nov 2004 | A1 |
20040233041 | Bohman et al. | Nov 2004 | A1 |
20050046567 | Mortenson et al. | Mar 2005 | A1 |
20050073406 | Easley et al. | Apr 2005 | A1 |
20050110635 | Giermanski et al. | May 2005 | A1 |
20050134457 | Rajapakse et al. | Jun 2005 | A1 |
20050154527 | Ulrich | Jul 2005 | A1 |
Number | Date | Country |
---|---|---|
1012912 | May 2001 | BE |
195 04 733 | Aug 1996 | DE |
195 34 948 | Mar 1997 | DE |
197 04 210 | Aug 1998 | DE |
0 649 957 | Apr 1995 | EP |
0 704 712 | Apr 1996 | EP |
0 748 083 | Dec 1996 | EP |
1063627 | Dec 2000 | EP |
1 182 154 | Feb 2002 | EP |
1 246 094 | Oct 2002 | EP |
1 055 457 | Jan 1967 | GB |
2 254 506 | Oct 1992 | GB |
11246048 | Sep 1999 | JP |
2001261159 | Sep 2001 | JP |
2002039659 | Feb 2002 | JP |
2177647 | Dec 2001 | RU |
WO 9933040 | Jul 1999 | WO |
WO 9938136 | Jul 1999 | WO |
WO 0070579 | Nov 2000 | WO |
WO 0133247 | May 2001 | WO |
WO 0225038 | Mar 2002 | WO |
WO 02077882 | Oct 2002 | WO |
WO-02089084 | Nov 2002 | WO |
WO 03023439 | Mar 2003 | WO |
WO-2004009473 | Jan 2004 | WO |
WO-2004066236 | Aug 2004 | WO |
WO-2005008609 | Jan 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20050179545 A1 | Aug 2005 | US |
Number | Date | Country | |
---|---|---|---|
60520120 | Nov 2003 | US |