The invention relates to technologies for shipment of cargo, and more particularly to technologies for maintaining the security of cargo during shipment.
The need to protect cargo while in transit has existed since ancient times, but recent changes in the manner in which cargo is shipped, as well as a huge increase in the sheer volume of cargo which is shipped, has given rise to new and special challenges with regard to tracking and protecting such cargo.
In particular, cargo is often shipped in standardized “containers,” which can be loaded at a point of origin, and then shipped to a destination via a combination of mobile entities including truck, rail, and sea transportation among others. Note that the term “mobile entity” is used herein to denote any and all transportable entities, including self-powered vehicles such as autos and trucks as well as entities which are transported by auxiliary means and/or methods such as transporting trailers, cargo containers, cartons, skids, pallets, and such like. The entire journey can include as many as five or more transfers between carriers, as well as temporary storage at consolidation and/or distribution centers, before the container finally arrives at the destination.
Other present-day methods of shipping cargo include shipment by semi-trailer, enclosed truck, enclosed rail car; transportable tanker, and such like. It is common for a trailer or other container to be transferred between different carriers while en route. For example, a trailer may be pulled by more than one tractor, or may be carried during portions of its journey on a rail car, barge, or ship so as to achieve maximum transport efficiency and economy. Problems which can occur en route include theft of the entire container, a container break-in and theft of some or all of its contents, and containers getting lost, delayed, or diverted erroneously or intentionally.
A tracking system is sometimes used to keep track of a shipment while it is en route to its destination. One approach to tracking such shipments is to provide each container, truck, etc. with a unique, identifying number or code, which can be displayed on a printed tag for reading or scanning while en route. RFID tags can also be used for this purpose. As an alternative, an electronic tracking device can be included with the shipment, whereby the tracking device uses wireless communication to report its location, both to monitoring stations and/or while in route using cell phone or similar technology.
While these present-day shipping methods can be very efficient, they present special challenges regarding how to maintain the security of cargo during transit and protect it against tampering, theft, and such like. High-value cargo presents special security challenges while en route, since it is likely to be singled out and targeted by thieves, vandals, and/or other persons wishing to interfere with the cargo's delivery, and/or to steal it.
The traditional approach to protecting high-value cargo is to provide special encasement, surveillance, and even guards. An example would be an armored car transporting cash between banks. However, while these approaches can provide additional protection against thieves, vandals, terrorists, and such like, they also tend to be very expensive. And unless the level of protection is very strong, these high security approaches can actually do more harm than good, since they serve to draw attention to the high-value cargo, and provide a very recognizable target for thieves, vandals, and other potential threats.
On the other hand, if high-value cargo is shipped without special protection, it can be highly vulnerable to tampering and theft. In particular, if a shipment tracking system is included, as is often the case for high-value cargo so as to mitigate the risk of loss due to accidental misdirection, the tracking system can actually serve to increase the danger that the high-value cargo will be singled out and stolen, vandalized, or otherwise hindered or tampered with. In particular, someone with access to shipping paperwork may accept a bribe from a thief to provide a tracking number for an especially valuable shipment, and may even cooperate further by accessing the tracking system and providing location information to the thief. Or a sophisticated thief may find a way to gain unauthorized access to a tracking system, for example by intercepting wireless communications between monitoring stations and the shipment, and then use the information to track and locate the high-value shipment for the purpose of intercepting it.
What is needed, therefore, is a system for increasing the security of high value cargo while en route, without providing a mechanism for a potential threat to identify, locate, track and/or intercept the cargo.
A system is provided for protecting a shipment of high-value cargo while en route without providing a mechanism for malevolent entities to single out, identify, track, or locate the shipment. An internal locking system or “ILM” is configured to securely lock the container, and an onboard identity module, or “OBIM,” is cooperative with the ILM and able to secure the ILM so that it cannot be unlocked until it is released by the OBIM, thereby preventing unauthorized access to the cargo. Both the ILM and the OBIM are externally imperceptible when the container is closed.
The OBIM is configured for wireless communication, and will only release the ILM when it receives a properly encoded unlocking signal from a “Security Management System” or “SMS”. A standard door-opening mechanism is installed on the exterior of the container, so as to further secure the container and so as to render the container indistinguishable from similar containers (typically hundreds of thousands of similar containers) carrying lower-value cargo for which the present invention has not been implemented. The result is heightened security for the high-value cargo without sacrificing the protection which naturally arises due to the shipment being perceived as only one of a very large number of unremarkable and nearly identical shipments of lower-value cargo.
A unique Master Number or “MN” is assigned to each OBIM, either temporarily or permanently, and is stored electronically by the OBIM. In various embodiments the MN is also visibly indicated on a Module Body Tag “MBT” which is permanently attached to the OBIM housing. In some embodiments, the MN is used to associate the OBIM with the shipping papers (which are stored at the point of origin and/or forwarded separately to the destination) and/or with shipping information stored by the SMS. In certain embodiments, the shipping information includes container, cargo, and/or routing information. In some embodiments a removable External Encoded Tag or “EET” is also provided, which includes a visible indication of the MN, and which is initially present with the OBIM but can be removed and associated with the shipping papers held by the original shipper before the cargo is shipped.
In some embodiments, the MN serves as the unlocking signal for the OBIM. In certain embodiments, a Composite On-Board identity or “COBI” is provided to the OBIM as the unlocking code, either as the MN or as a separate unlocking code, whereby the COBI includes a plurality of species of wireless signal, all of which must be transmitted to the OBIM before the OBIM will release the ILM and allow access to the cargo. The species of wireless signal included in the COBI can include any combination of various radio and RF frequencies, including signals encoded by AM and/or by FM means, as well as acoustic signals. In various embodiments the signals must be transmitted all at once, or in a specified sequence separated by specified time intervals.
In some embodiments, the OBIM also enables remote tracking of the container during shipment. While en route, the OBIM wirelessly communicates with the SMS via monitoring stations and/or directly via cell phone or similar means.
In some embodiments, before the high-value cargo is shipped, the SMS assigns a “random number” or “RN” to the shipment, and communicates the RN to the OBIM, after which the RN is used in place of the MN as the primary identifying feature of the shipment. The RN is not necessarily random, but is at least selected or generated by the SMS in such a way that it cannot be associated with the MN, or otherwise with the shipment, except through access to information stored by the SMS. In embodiments, the RN is assigned to the cargo and transmitted to the OBIM only after the cargo has been loaded and the container has been sealed. In some of these embodiments, this is performed at a departure location which is physically separate from a loading location, and/or it is performed by personnel who are distinct from the personnel who loaded the cargo. In various embodiments, neither the driver nor any other personnel are aware of the association between the RN and the MN, which can be obtained only from the SMS by authorized personnel.
In various embodiments, once the RN has been communicated to the OBIM, it is the RN which is used to track the shipment. The MN is not used again until the shipment has reached its destination. Since access to the information stored in the SMS is restricted and controlled according to methods well known in the art, this ensures that only a very few, highly trusted, authorized individuals who are associated with the shipping activity will be able to associate the RN with the MN.
In some embodiments, once the RN has been transmitted to the OBIM, the OBIM will refuse to transmit the MN until a pre-defined, encoded authorization signal is sent to the OBIM by the SMS. This ensures that the MN cannot be solicited or detected en route if the OBIM information somehow falls into the hands of unauthorized individuals. In some of these embodiments the authorization signal is composed of more than one signal type consistent with the OBIM wireless capabilities, such as a combination of RF signals carrying encrypted patterns of various types, transmitted on different frequencies, modulated between multiple frequencies, and such like.
In certain embodiments, a multi-component COBI MN and/or RN includes one component which is used for tracking and another component which is used for identity verification, non-tampering indications, and/or OBIM functions related to unlocking the OBIM and/or the container at the delivery point.
In some embodiments, routing instructions are transmitted by the SMS to various monitoring locations and/or carriers as the shipment progresses, thereby ensuring that even the routing and the eventual destination cannot be used to surmise the contents of the container.
In certain embodiments, since the SMS assigns an RN to the OBIM, the SMS is solely responsible for monitoring the movement and/or any tampering attempts via the RN. In various embodiments the SMS can change the RN which is assigned to the OBIM while the container is en route, so as to further inhibit any attempts by unauthorized persons to track a particular container.
Another general aspect of the present invention is a system for tracking and protecting high-value cargo provides tracking of the cargo during shipment while at the same time guaranteeing the anonymity of the cargo through a “double-blind” method of tracking identification. The result is full tracking capability, without sacrificing the protection which naturally arises due to the shipment being perceived as only one of a very large number of unremarkable and nearly identical shipments.
An onboard identity module, or “OBIM,” is attached to the container in which the high-value cargo is to be shipped. While en route, the OBIM wirelessly communicates with tracking devices and/or directly with a “tracking management system” or “TMS” via cell phone or similar means. A “master number” or “MN” is permanently assigned to the OBIM, and is used to associate the OBIM with the shipping papers (which are stored at the point of origin and/or shipped separately to the destination) and with shipping information stored by the TMS. In various embodiments, the shipping information includes container, cargo, and/or routing information. The MN is also stored electronically by the OBIM, and in various embodiments it is visibly included on a Module Body Tag “MBT” which is permanently attached to the OBIM. In some embodiments a removable External Encoded Tag or “EET” is also provided, which includes a visible indication of the MN, and which is initially present with the OBIM but is removed and associated with the shipping papers before the cargo is shipped.
Before the high-value cargo is shipped, the TMS assigns a “random number” or “RN” to the shipment, and communicates the RN to the OBIM. The RN is not necessarily random, but is at least selected or generated in such a way that it cannot be associated with the MN, or otherwise with the shipment, except through access to information stored by the TMS. In embodiments, the RN is assigned to the cargo and transmitted to the OBIM only after the cargo has been loaded and the container has been sealed. In some of these embodiments, this is performed at a departure location which is physically separate from a loading location, and/or it is performed by personnel who are distinct from the personnel who loaded the cargo. In various embodiments, neither the driver nor any other personnel are aware of the association between the RN and the MN, which can be obtained only from the TMS by authorized personnel.
Once the RN has been communicated to the OBIM, it is the RN which is used to track the shipment. The MN is not used again until the shipment has reached its destination. Since access to the information stored in the TMS is restricted and controlled according to methods well known in the art, this ensures that only a very few, highly trusted, authorized individuals who are associated with the shipping activity will be able to associate the RN with the MN.
In some embodiments, routing instructions are transmitted by the TMS to various monitoring locations and/or carriers as the shipment progresses, thereby ensuring that even the routing and the eventual destination cannot be used to surmise the contents of the container.
One general aspect of the present invention is a system for enhancing the security of high value cargo during shipment within an enclosed container without enabling the container to be distinguished from similar shipments of lower value cargo. The system includes an Internal Locking Mechanism (ILM) configured to prevent opening of the container when the container is closed and the ILM is locked, the ILM being externally undetectable when the container is closed, a Base Unit (BU) cooperative with the ILM, the BU being externally undetectable when the container is closed, and an electronic OnBoard Identity Module (OBIM) which is removably enclosable within the BU, the OBIM when enclosed within the BU being able to secure and release the ILM, unlocking of the ILM being inhibited when the ILM is secured and unlocking of the ILM being enabled when the ILM is released, the OBIM being configured for wireless communication with external nodes when the OBIM is enclosed within the BU and the container is closed, the OBIM being able to wirelessly receive and electronically store a master identity code, herein referred to as the Master Number (MN). The system further includes a Module Body Tag (MBT) displaying a visible indication of the MN, the MBT being durably attached to the OBIM in a location which is not visible from outside the BU when the OBIM is enclosed within the BU, and a Security management System (SMS) configured for wireless communication with the OBIM, the SMS including a processor and software configured so as to direct the SMS to receive the MN from the OBIM, transmit a signal to the OBIM causing the OBIM to secure the ILM, and transmit a signal to the OBIM causing the OBIM to release the ILM.
In various embodiments the software is able to direct the SMS to generate a temporary tracking code, herein referred to as a “Random Number” (RN), which is at least unassociated with the MN, transmit the RN to the OBIM, store the RN, the MN, and the association therebetween, and prevent access to the association between the RN and the MN except by authorized users.
In certain embodiments, the software is further able to direct the SMS to store shipping information and to associate the shipping information with the MN, the shipping information including one or more of information pertaining to the high value cargo, information pertaining to the container, information pertaining to mobile entities scheduled to carry the container, information pertaining to locations of temporary storage for the container while en route, and information pertaining to a planned route of travel for the container.
Some embodiments further include a plurality of base units, each of the base units including an attachment configuration which is unique among the plurality of base units, the attachment configurations being configured such that for each of a plurality of container types at least one of the base units is attachable thereto, all of the plurality of base units having a common OBIM housing configuration, so that a single type of OBIM is containable by any of the base units and can therefore be used to secure an ILM in any of the types of container.
Various embodiments further include an External Encoded Tag (EET) including a visible indication of the MN, the EET being at least associated with the OBIM and being separable therefrom. And in some of these embodiments the EET is configured for association with a shipping document after separation of the EET from the OBIM.
Certain embodiments further include a detectable alarm unit which can be activated by the OBIM so as to emit an alarm indication which is at least one of audible and visible to individuals external to but proximate to the container, the detectable alarm unit being externally undetectable when the container is closed. And in some of these embodiments the detectable alarm unit can be activated by a command received wirelessly by the OBIM from an authorized node.
In various embodiments the OBIM is configured to release the ILM only upon wireless receipt by the OBIM of a specified unlocking signal. And in some of these embodiments the unlocking signal is a composite signal including at least two of an rf signal transmitted at a first frequency, an rf signal transmitted at a second frequency, an acoustic signal, a signal encoded by a first encoding method, a signal encoded by a second encoding method, a signal transmitted at a specified amplitude, and a signal transmitted at a specified time after a preceding signal.
In certain embodiments at least one digital signature is used by the OBIM to verify the identity of at least one of an external node and the SMS before responding to a wireless communication therefrom.
Various embodiments further include a tracking mechanism configured for wireless communication with the OBIM so as to at least obtain identifying information from the OBIM while the container is en route.
Some of these embodiments further include a global positioning system (GPS) which is at least cooperative with the OBIM and enables the OBIM to at least one of record and report location information while the container is en route. Other of theses embodiments further include a cellular telephone communication system which is at least cooperative with the OBIM and enables the OBIM to wirelessly communicate with an external node while the container is en route.
In still other of these embodiments the tracking mechanism includes at least one monitoring station which is located along a route of travel of the container and which is configured to at least wirelessly receive identifying information from the OBIM when the OBIM is proximate to the monitoring station. And yet other of these embodiments further include a route reporting mechanism configured to enable the OBIM to supply routing information to an operator of a mobile entity which is transporting the container, the routing information being wirelessly obtained by the OBIM from the SMS.
Another general aspect of the present invention is a method for enhancing the security of high value cargo during shipment within an enclosed container and tracking the container while en route from an origin to a destination, without enabling the container to be distinguished from similar shipments of lower value cargo. The method includes providing an Internal Locking Mechanism (ILM) configured to prevent opening of the container when the container is closed and the ILM is locked, the ILM being externally undetectable when the container is closed, a Base Unit (BU) which is cooperative with the ILM and externally undetectable when the container is closed, and an electronic OnBoard Identity Module (OBIM) which is removably enclosable within the BU, the OBIM when enclosed within the BU being able to secure and release the ILM, unlocking of the ILM being inhibited when the ILM is secured and unlocking of the ILM being enabled when the ILM is released, the OBIM being configured for wireless communication with external nodes when the OBIM is enclosed within the BU and the container is closed, the OBIM being able to wirelessly receive and electronically store a master identity code, herein referred to as the Master Number (MN), a master body tag (MBT) including a visible indication of the MN being durably attached to the OBIM in a location which is not visible when the OBIM is enclosed within the BU.
The method further includes providing a Security management System (SMS) configured for wireless communication with the OBIM, the SMS including a processor and software configured so as to direct the SMS to receive the MN from the OBIM, generate a temporary tracking code, herein referred to as a “Random Number” (RN), which is at least unassociated with the MN, transmit the RN to the OBIM, store the RN, the MN, and the association therebetween, prevent access to the association between the RN and the MN except by authorized users, transmit signals to the OBIM causing the OBIM to secure the ILM, and transmit signals to the OBIM causing the OBIM to release the ILM, and providing a tracking mechanism which is at least able to wirelessly obtain OBIM shipment identifying information from the OBIM when the container is proximal to a specified location along a planned route of travel of the container.
The method also includes enclosing the OBIM within the BU in a manner which prevents observation of the MBT, loading the cargo into the container, closing and securing the container, including locking the ILM, transmitting by the SMS of a signal to the OBIM causing the OBIM to secure the ILM, causing the SMS to wirelessly receive the MN from the OBIM, generate an RN, transmit the RN to the OBIM, and store the MN, the RN, and the relationship therebetween, while the container is en route, using the tracking system to wirelessly receive the RN from the OBIM so as to derive therefrom location information pertaining to the container, and upon arrival of the container at the destination, transmitting by the SMS of a signal to the OBIM causing the OBIM to release the ILM.
Various embodiments further include transmitting routing information to the OBIM while the container is en route, and causing the OBIM to make the routing information available to an operator of a mobile entity which is transporting the container.
Certain embodiments further include causing the SMS to transmit a signal to the OBIM instructing the OBIM to cease transmission until a specified criterion is met.
Some embodiments further include, upon detection of an abnormal indication from the OBIM, resolving by security-authorized personnel of any issues and assessing of the OBIM's security and integrity status, advising by security-authorized personnel of a shipper of any and all related details, and informing of a receiver of details when and if directed to do so by the shipper;
conducting of steps to confirm that any suspected tampering did not violate the security of the BU or functionally alter its operation, confirming proper OBIM security functionality, replacing the OBIM if necessary, and repeating any necessary programming steps, as determined by the shipper and/or the receiver to be necessary to permit in-route control and tracking to resume, and/or if so identified initially, replacing an old RN tag or label on the mobile entity's exterior with a tag or label showing a replacement RN just assigned by the SMS for visual in-route monitoring by the tracking mechanism.
The features and advantages described herein are not all-inclusive and, in particular, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings, specification, and claims. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and not to limit the scope of the inventive subject matter.
The present invention is a system for providing increased security for high-value cargo while at the same time preserving the natural protection which arises due to the shipment being indistinguishable from the large majority of similar shipments which are not carrying high value cargo.
With reference to
In embodiments, a common type of OBIM 200 can be used for protecting many different types of cargo container 104 by providing a variety of differently configured BU's 100 configured for attachment to different types of container 104, all of the BU's 100 being compatible with the same type of OBIM 200.
With reference to
A “master number” or “MN” is assigned to the OBIM 200, and is used to associate the OBIM 200 with the shipment. In some embodiments, the MN is permanently assigned to the OBIM 200. In other embodiments, the MN assigned to the OBIM 200 can be changed or cancelled, and a new MN can be assigned to the OBIM 200 during periodic OBIM inspection and maintenance activities, whenever OBIM tampering attempts are suspected, and/or in situations where the MN may have been compromised. The MN is stored electronically by the OBIM 200, and is also visibly indicated on a Module Body Tag “MBT” 204, which is permanently attached to the OBIM in a location where it cannot be seen when the OBIM 200 is enclosed within the BU 100. In addition to storing, cataloging, and locating the OBIM 200 between uses, the MBT 204 serves as a “last resort” which can be used to identify the shipment manually, in the unlikely event that the OBIM 200 electronically fails and wireless communication with the OBIM 200 is no longer possible.
In the embodiment of
Once the cargo has been loaded into the container 104 and an OBIM 200 has been installed within the BU 100, the container 104 is closed and securely locked by the ILM 106, 108 as well as by the conventional latching mechanism 103. In various embodiments, this is done in a “secured” environment, where each shipment's actual contents are known only to those filling the container 104, who might be for example bonded or security-cleared individuals.
With reference to
In various embodiments, the RN is assigned to the cargo and transmitted to the OBIM 200 only after the cargo has been loaded and the container has been sealed. In some of these embodiments, the RN is assigned and transmitted at a departure location which is physically separate from a loading location, and/or it is done by personnel who are distinct from the personnel who loaded the cargo, and who have no information regarding the cargo. In certain embodiments, neither the driver nor any other personnel are aware of the association between the RN and the MN, which can be obtained only from the SMS 700 by authorized personnel. And in some embodiments, the SMS 700 also stores other shipping information associated with the shipment, such as container, cargo, and/or routing information.
In various embodiments, the RN is a COBI which includes a plurality of identity-related components which are used for different purposes. In certain of these embodiments one component is used for tracking and other components are used for identity verification, non-tampering indications, and/or for OBIM unlock functions at the destination.
In
In
In various embodiments of the present invention the OBIM 200 is configured to enable tracking of the container 104 as it is en route. The RN is used in some of these embodiments to provide a “double-blind” identification code which cannot be linked to the shipping records and therefore cannot be used to identify the shipment as being high-value cargo.
As illustrated in
In certain embodiments, the OBIM 200, the monitoring stations 802, and/or the SMS 700 use one or more digital signatures of various types and/or other identity verification means known in the art to protect against hostile entities attempting to obtain unauthorized information or access by “spoofing” the identities of legitimate OBIM's 200, monitoring stations 802, and SMS's 700.
In various embodiments, the OBIM 200 includes a clock and/or GPS, and is able to transmit routing information to the monitoring stations so as to verify that a predetermined schedule has been maintained. In certain embodiments where routing instructions are transmitted to the mobile entity through monitoring stations 802 or other checkpoints while the shipment is en route, the monitoring stations 802 and/or checkpoints communicate with the SMS 700 so as to progressively obtain updated routing information, which is then transmitted to the OBIM 200 and can be provided to the driver, transfer terminal, and/or port facility when and as needed, so that the planned route and destination cannot be used to identify the cargo as being high-value. This feature also allows the shipment to be re-routed if necessary according to changes in delivery requirements.
In some embodiments, the SMS 700 is able to communicate with external logistical management systems and/or networks serving the needs of the shipping handlers, such as railroad and sea freight handlers, as well as the shipment's eventual recipients. Any and all system control and management aspects of the SMS 700 which are required for communicating and interfacing with such external managements systems are included within the scope of the invention.
In some embodiments, the OBIM 200 and/or the BU 100 includes cell phone capability, which allows the OBIM 200 to communicate with cell phone towers 804 while en route. This approach is used in various embodiments in addition to or in lieu of fixed monitoring stations to track the shipment during its normal transit, and/or as a mechanism to locate and track the shipment if it departs from its assigned route and/or schedule.
In certain embodiments, the OBIM 200 can be programmed and/or commanded to stop all broadcasting for one or more specified periods of time, so as to save power and also so as to minimize opportunities for a hostile agent to detect the presence of the OBIM or to attempt to communicate with the OBIM while the shipment is en route. This provides further protection against the mere presence of the OBIM being used as a means to single out the shipment as being possibly being high-value.
By providing an RN as a tracking number which cannot be associated with the shipment origin, destination, or contents in any way, embodiments of the present invention therefore provide full tracking capability without sacrificing the protection which naturally arises due to the shipment being indistinguishable from any of a very large number of unremarkable and nearly identical shipments.
In various embodiments, once the transporting vehicle 702 arrives at the destination 806, the RN is received from the OBIM 200 and transmitted to the SMS 700 to confirm the arrival of the shipment and to demonstrate that the OBIM 200 remains functional and free of tampering. The SMS responds by supplying the corresponding MN and/or any other unlocking codes and/or instructions to the receiver. The MN and/or an unlocking code is then transmitted to the OBIM 200, and serves as a virtual “key” which causes the OBIM 200 to release the ILM 106, 108 so that the container can be opened. In some embodiments, the OBIM 200 physically unlocks the ILM 106, 108, or the OBIM 200 sends a signal to the BU 100 which causes the BU 100 to unlock the ILM 106, 108. In various embodiments, the SMS 700 also transmits or allows the transmission of a manifest of the contents of the shipment to the receiver, or sends instructions to the receiver as to how such a manifest can be obtained.
In embodiments where the MN is used instead of an RN for all relevant monitoring and securing purposes, the MN is received from the OBIM 200 and transmitted to the SMS 700 to confirm the arrival of the shipment and to demonstrate that the OBIM 200 remains functional and free of tampering. The subsequent activities described in the foregoing then occur.
After the shipment is complete, depending on OBIM design and security levels or practices required, the used OBIM 200 can be:
If an attempt is made to gain unauthorized access to the OBIM 200 while en route, various embodiments respond in different ways. The ability of the OBIM 200 to release the ILM 106, 108 can be disabled, after which authorized intervention is required so as to reset and unlock the OBIM 200. Some embodiments include a detectable alarm unit, such as an audible alarm and or a visible light, which can be activated by the OBIM 200 so as to alert nearby personnel to the unauthorized attempt. In some embodiments, the detectable alarm unit can also be activated remotely so as to facilitate locating of the shipment, for example if it is located in a storage or staging facility, or stacked with a plurality of nearly identical containers on a ship.
Embodiments of the BU 100 are constructed so as to clearly indicate damage due to unauthorized tampering. In some embodiments, the OBIM 200 is able to detect opening of the BU 100, and in some of these embodiments, if the opening is unauthorized, the OBIM 200 will transmit an alert signal to the SMS 700, and/or will shut down. In various of these embodiments, when the OBIM 200 detects tampering, it will erase the RN and/or the MN from its memory and/or otherwise reset itself, so that it must be either replaced or fully reset by the SMS 700 with a new RN and/or MN after the incident has been investigated and before the transit of the cargo can resume.
In some embodiments, an alarm condition indicated by the OBIM 200 leads to any or all of the following steps:
The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of this disclosure. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.
This application is a continuation in part of U.S. application Ser. No. 12/761,879, filed on Apr. 16, 2010, which is a continuation in part of U.S. application Ser. No. 12/589,540, filed Apr. 16, 2009, which is a continuation in part of U.S. application Ser. No. 11/496,677, filed Jul. 31, 2006, which claims the benefit of U.S. Provisional Application Nos. 60/704,785, filed Aug. 2, 2005, 60/704,786, filed Aug. 2, 2005 and 60/704,787, filed Aug. 2, 2005. U.S. application Ser. No. 12/761,879 also claims the benefit of U.S. Provisional Application No. 61/220,113, filed Jun. 24, 2009. This application is also a continuation in part of U.S. application Ser. No. 12/589,540, filed Apr. 16, 2009. This application also claims the benefit of U.S. Provisional Application No. 61/220,113, filed Jun. 24, 2009. All of the above noted applications are incorporated herein by reference in their entirety for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
4990757 | Edwards et al. | Feb 1991 | A |
5392531 | Christensen et al. | Feb 1995 | A |
5751973 | Hassett | May 1998 | A |
5974368 | Schepps et al. | Oct 1999 | A |
6195602 | Hazama et al. | Feb 2001 | B1 |
6340935 | Hall | Jan 2002 | B1 |
6865539 | Pugliese, III | Mar 2005 | B1 |
6945303 | Weik, III | Sep 2005 | B2 |
6970101 | Squire et al. | Nov 2005 | B1 |
6977580 | Banerjee et al. | Dec 2005 | B2 |
7161563 | Vitale et al. | Jan 2007 | B2 |
7253715 | Bates | Aug 2007 | B2 |
7600683 | Firestone | Oct 2009 | B2 |
7714708 | Brackmann et al. | May 2010 | B2 |
8058985 | Dobson et al. | Nov 2011 | B2 |
8069693 | Powers et al. | Dec 2011 | B2 |
20030179073 | Ghazarian | Sep 2003 | A1 |
20040183673 | Nageli | Sep 2004 | A1 |
20060164239 | Loda | Jul 2006 | A1 |
20080094209 | Braun | Apr 2008 | A1 |
20090109023 | Newman | Apr 2009 | A1 |
20090134999 | Dobson et al. | May 2009 | A1 |
20090322510 | Berger et al. | Dec 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20100257904 A1 | Oct 2010 | US |
Number | Date | Country | |
---|---|---|---|
61220113 | Jun 2009 | US | |
60704785 | Aug 2005 | US | |
60704786 | Aug 2005 | US | |
60704787 | Aug 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12761879 | Apr 2010 | US |
Child | 12822907 | US | |
Parent | 12589540 | Apr 2009 | US |
Child | 12761879 | US | |
Parent | 11496677 | Jul 2006 | US |
Child | 12589540 | US |