Embodiments of the invention relate to security and inspection of shipped container or boxes, and particularly, to capturing images of a content of a container at various points on a shipping route, and comparing such images.
The security and integrity of shipped containers is drawing increased attention as a source of smuggling opportunities for contraband or taxed materials, and as an opportunity to bring dangerous materials into a populated area. There is a need to quickly and effectively check the integrity of a container such as a closed container to determine if the contents have been tampered with or altered, or if unauthorized materials have been put into the container at one or more points along a shipping route.
Some embodiments of the invention may include a system having a first imager in a first location to capture an image of an item in a closed container from outside of the container, a second imager in a second location to capture an image of the item in the closed container, and a processor to compare the image of the item in the container in the first location to the image of the item in the container in the second location. In some embodiments the imager may be or include an X-ray emitter. In some embodiments, the container may include a unique identifier that appears in one or more of the images. In some embodiments the container contains many items and the processor determines if one or more of the items appears in the second image and does not appear in the first image. In some embodiments the image captured in the first location is communicated to the second location over a network. In some embodiments, the first image includes a unique identifier of the first location. In some embodiments the processor detects from the first image a pattern of some or all of the items in the container, and compares the pattern to a pattern in the second image. In some embodiments, the processor adjusts the second image to account for movement within the container of items between the first location and the second location.
Some embodiments of the invention may include a method of capturing with an imager located outside a closed container in a first location, a first image of an items in the container, capturing with an imager located outside a closed container in a second location, a second image of the items in the container, comparing the first image to the second image; and determining if items appearing in the second image were in the container in the first location. In some embodiments, the method may include collecting an X-ray image of the container. In some embodiments, the method may include associating in a data base, the first image with the container, and making the image accessible to an operator at the second or other location.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with features and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanied drawings in which:
In the following description, various embodiments of the invention will be described. For purposes of explanation, specific examples are set forth in order to provide a thorough understanding of at least one embodiment of the invention. However, it will also be apparent to one skilled in the art that other embodiments of the invention are not limited to the examples described herein. Furthermore, well-known features may be omitted or simplified in order not to obscure embodiments of the invention described herein.
Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification, discussions utilizing terms such as “selecting,” “evaluating,” “processing,” “computing,” “calculating,” “associating,” “determining,” “designating,” “allocating” or the like, refer to the actions and/or processes of a computer, computer processor or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
The processes and functions presented herein are not inherently related to any particular computer, network or other apparatus. Embodiments of the invention described herein are not described with reference to any particular programming language, machine code, etc. It will be appreciated that a variety of programming languages, network systems, protocols or hardware configurations may be used to implement the teachings of the embodiments of the invention as described herein. In some embodiments, one or more of the functions described in for example a method of the invention may be contained in a single device, while in other embodiments, one or more of such components may be stored or executed from more than one device.
Reference is made to
In some embodiments, a container 104 to be imaged may be or include a standard-sized metallic shipping container of for example 20 feet or 40 feet, such as those that are used in overseas or overland shipping. In some embodiments, a container 104 may be or include a single box made of cardboard, wood or other material, or a palette of boxes or other packages that are wrapped or otherwise bundled together. In some embodiments, one or more of the items, boxes or packages in the container 104 may be identical, while in some embodiments, one or more of the contained items may be unique.
In some embodiments, a container 104 may include a unique identifier 108 that may be visible or discernible in the captured image. For example, (i) a wall or marking of a container 104 may include a unique number, letter or shape combination, (ii) a sheet, or sticker of metallic or magnetic material may be affixed to the container 104 inside or outside of the container 104, or (iii) a shape or configuration of the container 104 may be identified and used as a unique identifier 108 of the container 104 in the image.
In some embodiments, a unique identifier of a place or location 110 of the container 104 as it is imaged by an imager 102 may also appear in the captured image. For example, an imager 102 at a particular port, packing area or loading area may be positioned to capture an identifying mark, symbol or shape in the image of the container 1-4 that is captured.
In operation, a closed container 104 may pass near an imager 102 in a first location. The imager 102 may capture an image of the container 104, and the image may include an outline or discernible patterns or shapes of the items or objects in the container 104. In some embodiments, the image may also include one or more unique identifiers 108 of the container 104 and/or of the location 110 wherein the image was captured.
In some embodiments, the captured image may be transmitted for example to a computer 112 and/or loaded into a memory 114 that may be connected to or accessible by a network 116, where such image is associated with the imaged container 104. In some embodiments, one or more of the captured images may be associated with a bar code, RFID or other identifying number or symbol of the container 104. In some embodiments, image data may be encrypted with the one or more unique identification numbers of the container 104. In some embodiments video data, or other identifying data of the process of capturing the image may also be linked to the captured image of the contents of container 104.
Upon arrival of the container 104 at a second location 118, another or second image of the container 104 may be captured with a second imager 120. The second image may be compared with the first image in order to confirm that the contents of the container 104 have not changed or been tampered with. In some embodiments, the unique identifier of the container 104 and/or of the first location 110 may be confirmed in the image to prevent fraud and ensure the integrity of the imaging and imaging comparison process.
In some embodiments, coordinates of some, most or all of the contents of the container 104 in the first image may be compared to corresponding coordinates of the container in the second image. In some embodiments, an image may be rotated by a processor 122 to account for changes in an orientation of an imager between a first and a second location. In some embodiments, identified coordinates of items in a container 104 may be mapped against other coordinates of items to account for shifting or movement of items in the container 104. In some embodiments where a container 104 has numerous packages of the same or similar items, a pattern of the items may be discerned or isolated, and confirmation of the contents of the container 104 may achieved by tracking the pattern throughout the container 104.
In some embodiments, a first image as may be captured with a first imager 102 may be obtained at a location of a trusted shipper, or at another known location where the security and/or integrity of the imaging process may be confirmed. An image captured at such first location 110 may be uploaded onto for example secure network 116 or the Internet, and/or may be included in the shipping documents that accompany the container 104. In one or more subsequent locations through which the container 104 passes, additional images may be captured, and coordinates of items in the container 104 may be compared with those in one or more of the previous images. Similarly, identifying characteristics of the container 104 or location 110 of the imager 102 may be checked to confirm the integrity of the prior images. For example, a shipper or consolidator of a shipping container 104 may capture a first image, and load it onto the network 116. A dock may capture a second image, compare it to the first image to confirm the contents of the container 104, and load the second image onto the network 116. The receiving port or customs official may capture another image and compare it to one or more of the previous images to confirm the contents of the container 104 upon its arrival in a populated area.
The comparison application described may be more than just a local comparison application between two or more outputs of imagers. In some embodiments that comparison application may include a management application that can be connected from two or more imagers. In the case of managing multiple imagers, the management application may monitor multiple global shipment paths giving alarms or notifications for problematic shipments globally. It may include statistic features for grading the security level of the paths, alert on change in path's security level and generate global alerts or warnings when multiple events suggest an ‘attack’ that can be considered as a decoy.
Reference is made to
If a container 104 contains many units of a single product, an image of the unit could be uploaded and the software or its user could determine that the entire container 104 has only the designated unit and no other items. In some embodiments, orientation of the units could be compared to determine if the units had been unpacked and repacked. In some embodiments an X-ray of a single plane or selected plane of a container could be sufficient to determine if the contents match a prior X-ray of the container 104. In some embodiments an X-ray could be used to determine where and under whose control damage or loss occurred to contents of a container 104.
In some embodiments, a method of comparison of images from two containers may normalize correlation to compare to the images. This may compensate for intensity changes that may result from different machines used to capture the different images. Such approaches may require alignment of the two images. Image alignment may be pursued according to methods described in Hierarchical Model-Based Motion Estimation, Bergen J. R., Anandan, P., Hanna, K. J. and Hingorani, R., ECCV92; 1992; pages 237-252,
In some embodiments, imagers may generate a 3D output. In that case 3D registration may be pursued using one or more of the processes described in the Frameless registration of MR and CT 3D volumetric data sets (1994) Rakesh Kumar, Kristin Dana, P. Anandan, Nell Okamoto, Jim Bergen, Paul. In addition or alternatively methods may be used as are described in Yaron Caspi and Michal Irani, “Spatio-Temporal Alignment of Sequences”, in IEEE Trans. on Pattern Analysis and Machine Intelligence (PAMI), Vol(24) pp. 1409-1424, November 2002. A method that detects changes in object position within a container may be based on a description in Similarity by Composition, O. Boiman and M. Irani, Neural Information Processing Systems (NIPS), Vancouver, December 2006. Other methods for comparing and aligning images may be used
Reference is made to
In block 302, a second image of items in the container may be captured in a second location.
In block 304, all or a part of the items in the image of the container as was captured in the first location are compared to all or part of the items in the image of the container as was captured in the second location. A change in the items or a significant change in the location of the items in the container may be indicative of an unauthorized tampering with the contents on the container or an unauthorized addition to the contents of the container.
It will be appreciated by persons skilled in the art that embodiments of the invention are not limited by what has been particularly shown and described hereinabove. Rather the scope of at least one embodiment of the invention is defined by the claims below.
This application claims the benefit of U.S. Provisional Patent Application 60/808,159, filed on May 25, 2006 entitled Security Through Image Comparison, a copy of which is hereby incorporated herein in its entirety by reference.
Number | Date | Country | |
---|---|---|---|
60808159 | May 2006 | US |