US20100033330A1 - Auditable security for cargo containers and other repositories - Google Patents

Auditable security for cargo containers and other repositories Download PDF

Info

Publication number
US20100033330A1
US20100033330A1 US11/053,307 US5330705A US2010033330A1 US 20100033330 A1 US20100033330 A1 US 20100033330A1 US 5330705 A US5330705 A US 5330705A US 2010033330 A1 US2010033330 A1 US 2010033330A1
Authority
US
United States
Prior art keywords
event
tag
repository
data storage
operable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/053,307
Inventor
Paul Waterhouse
Jason August
John K. Stevens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visible Assets Inc
Original Assignee
Visible Assets Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/820,366 external-priority patent/US7049963B2/en
Application filed by Visible Assets Inc filed Critical Visible Assets Inc
Priority to US11/053,307 priority Critical patent/US20100033330A1/en
Assigned to VISIBLE ASSETS, INC. reassignment VISIBLE ASSETS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STEVENS, JOHN K, AUGUST, JASON, WATERHOUSE, PAUL
Priority to US11/275,029 priority patent/US7646301B2/en
Publication of US20100033330A1 publication Critical patent/US20100033330A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/1895Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using light change detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting

Definitions

  • This invention relates to a method and system for authenticating the histories of events experienced by objects held in a repository (e.g. shipping container, fixed warehouse or a movable vehicle), and detecting the time and date of an unauthorized intrusion, which may entail potential theft therefrom of objects such as pharmaceutical products, autoparts, computer parts, laptop computers, etc. during storage in the repository. Moreover, such unauthorized intrusion may involve clandestine insertion of weapons, explosives, or other dangerous materials into the shipping container to enable such dangerous materials to be dazzling into a target location for disastrous effect.
  • a repository e.g. shipping container, fixed warehouse or a movable vehicle
  • the system is capable of providing an independent audit trial that goods were untouched within the container.
  • an audit trail is very valuable. for example, the exact time of an intrusion is important in assigning liability for insurance claims based upon theft and in determining reponsibility therefor.
  • This invention is related to to the system described in previous provisional U.S. application 60/515,074, filed Oct. 28, 2003, for authenticating temperature histories of objects such as pharmaceuticals.
  • the present invention is implemented by real-time tracking and auditable logging of events (such as light levels, via a small photo detector) within repositories such as shipping containers, warehouses, as well as trucks, on a routine basis and for virtually every object contained in the repository to detect and unalterably record unauthorized intrusions into the shipping container or other repository.
  • An important object of such unalterable recording is to authenticate the history of events within a cargo container or other receptacle and to immediately notify security personnel or government authorities (for example, by wireless transmission to satellites, whereby worldwide tracking of detected unauthorized intrusions can be achieved).
  • transmitting step (c) is carried out by transmitting the aforesaid event signals to the data storage apparatus immediately upon recording thereof (i.e. in real time) in accordance with step (b).
  • the tag is attached to an outer surface of said cargo container, and wherein said event sensor comprises a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals, describing a change in light (visible or infrared) levels within said cargo container based upon an unauthorized intrusion, to the aforesaid data storage device.
  • said event sensor comprises a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals, describing a change in light (visible or infrared) levels within said cargo container based upon an unauthorized intrusion, to the aforesaid data storage device.
  • a plurality of the aforesaid tags may be disposed in different areas of the aforesaid cargo container to sense different events (e.g. different light levels) experienced in such different areas.
  • a tag carried by a the aforesaid repository such tag comprising an event sensor operable to record an event signal for describing an aforesaid event occurring within the repository, a data storage device operable to store data comprising identification data for identifying the tag, a tag transmitter operable to transmit data signals comprising the aforesaid event signal and an identification signal based upon such identification data, and an energy source for activating the event sensor and the tag transmitter and the data storage device;
  • the aforesaid system comprising a pair of checking devices for utilizing a selected algorithm to calculate a corresponding pair of checksums based on a selected sequence of event signals, the pair of checksums having a selected relationship (e.g. being identical) in the event of data integrity, one of said checking devices being disposed at said repository (e.g. at said tag), the other checking device being disposed at said data storage apparatus.
  • a geographic position sensing (GPS) detector operable to record a location signal defining a geographic position of the aforesaid movable repository (e.g. vehicle), the aforesaid data storage apparatus being in operative communication with the aforesaid reader and the aforesaid GPS detector, such data storage apparatus being operable to store a temporally ordered sequence of the aforesaid event signals and corresponding location signals upon a medium which cannot be readily altered without detection.
  • GPS geographic position sensing
  • the aforesaid repository may comprise a cargo container disposed on a movable vehicle (e.g. shipping vessel, railway carriage), such movable vehicle further comprising a central data processor in operative communication with the aforesaid field antenna, the aforesaid tag further comprising a tag receiver operable to receive an RF interrogation signal from the aforesaid field antenna, such RF interrogation signal being operable to cause said tag to emit an event signal.
  • a movable vehicle e.g. shipping vessel, railway carriage
  • the aforesaid tag further comprising a tag receiver operable to receive an RF interrogation signal from the aforesaid field antenna, such RF interrogation signal being operable to cause said tag to emit an event signal.
  • the aforesaid tag may further comprise a display (e.g. LCD) operable to display visible data relating to the event sensor of said tag.
  • a display e.g. LCD
  • visible data can, of course, comprise one of the aforesaid checksums.
  • the aforesaid system comprises a plurality of said low frequency (e.g. not exceeding 300 khz) RF tags and a plurality of low frequency field antennas disposed in different areas of said movable repository and operable to enable discrimination of event signals received from RF tags disposed in different areas.
  • said low frequency e.g. not exceeding 300 khz
  • the invention also provides a tag for use in preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, said repository being exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin), said events comprising changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate a said unauthorized intrusion, said tag being adapted for association with (e.g.
  • said tag comprising an event sensor operable to record an event signal representative of a said event occurring within said repository, a write-once-only data storage device (e.g. PROM) operable to store, in an unalterable manner, data comprising said event signal, a tag transmitter operable to transmit data signals comprising said event signal, and an energy source for activating said event sensor and said write-once-only data storage device.
  • a write-once-only data storage device e.g. PROM
  • the repository comprising a cargo container, said write-once-only data storage device being operable to store identification data for identifying said tag, said tag being adapted for attachment to an outer surface of said cargo container, said event sensor comprising a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals describing a change in light levels within said cargo container, based upon an unauthorized intrusion, to said data storage device.
  • FIG. 1 shows schematic front and side views of a temperature logging tag that may be used in accordance with the present invention.
  • FIG. 2 shows a tag attached to an outer surface of a wall of a cargo container, with holes provided in the wall for communication with a photodetector exposed to the interior of the cargo container.
  • the photodetector is securely affixed to the tag with at least one connecting member through an aperture in a wall of the cargo container, the connecting member being removable only upon access thereto from within the cargo container.
  • FIG. 4 schematically illustrates how individual tags may be attached directly to individual items of freight contained within the cargo container or other repository.
  • the tags may carry data such as the manifest and destination and shipping data, as well as photodetector for sensing light levels within the repository (cargo container) within which the items are to be shipped.
  • FIG. 5 shows aschematic front view of a security tag with its main components displayed, in accordance with the present invention, that transmits event data wirelessly.
  • FIG. 6 is a schematic view of a warehouse, port, or ship authenticated by use of a plurality of wireless tags that may be attached to cargo containers (or indirectly by affixing the tags to shipped objects), a loop antenna, a base station and a server that transmits event data for secure recording on a local data storage system (within the server) that uses CD-R discs.
  • FIG. 7 is a schematic view of a vehicle (e.g. truck, shipping vessel, or railway car or cargo container) authenticated by use of a plurality of wireless tags, a loop antenna, a base station and a server that transmits event data and GPS location and time data for secure recording on a distant data storage system that uses CD-R discs.
  • a vehicle e.g. truck, shipping vessel, or railway car or cargo container
  • FIG. 8 is a schematic view of a tag that records event (e.g. visible or infrared light data) at the shipping package within a repository (e.g. cargo container), and of a remotely located ASP and unalterable data storage apparatus using write-once-only CD-R discs to record, in real time, the temporally ordered series of light levels and corresponding GPS locations, dates, and times of the light level events experienced at the tag.
  • event e.g. visible or infrared light data
  • FIG. 9 is a schematic view of two arrangements for collecting auditable, authenticated event data (e.g. light levels, pressure changes, temperatures) in accordance with the invention.
  • event data are logged together with an algorithm-generated checksum while a checksum is calculated with the same algorithm by the ASP server on data received in real time from the RF tags.
  • the data log and checksum are calculated by a PC from RF tags in the repository, while a corresponding check sum is calculated remotely at the ASP server, where the data is received from the RF tags and stored on an unalterable CD-R disc.
  • FIG. 10 is a schematic view of an Option 1 in which event data from tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and connected by cabling to a network device that receives time and/or position signals (e.g. from NIST or GPS) are stored together as a temporally ordered series on a local unalterable CD-R disc drive to which the network device is cabled within the repository.
  • time and/or position signals e.g. from NIST or GPS
  • FIG. 11 is a schematic view of an Option 2 in which event data from tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and connected by cabling to a network device that receives time and/or position signals (e.g. GPS) are transmitted together wirelessly as a temporally ordered series to a remote ASP that receives NIST time data and records event and corresponding time data on an unalterable CD-R disc drive located at the remote ASP server.
  • time and/or position signals e.g. GPS
  • FIG. 12 is a schematic view of an Option 3 in which event data from RF tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and communicating by wireless RF to a network device that receives time and/or position signals (e.g. GPS) are transmitted together wirelessly as a temporally ordered series to a remote ASP that receives NIST time data and records event and corresponding time data on an unalterable CD-R disc drive located at the remote ASP server.
  • time and/or position signals e.g. GPS
  • a preferred embodiment of the present invention provides a system that comprises a small low cost radio frequency (RF) tag as shown in FIGS. 1-5 , that contains its own memory, a light sensor (e.g. a photodetector), an optional display and optional light emitting diodes.
  • RF radio frequency
  • these tags may be placed directly on the side of the box of shipped items (e.g. autoparts) or pallet and will continuously record data including the time and light levels within a cargo container or other repository, and write this log to the internal memory of the tag.
  • the tags may be interrogated by a radiofrequency transmitter contained in the warehouse of FIG. 6 or the truck of FIG. 7 .
  • This radiofrequency system may be based on low-frequency (e.g. 300 khz) induction and may require large (e.g. 5′ to 50′ radius) loop field antennas placed in the ceiling or the floor of the truck. These loop antennas may also be used to segregate different regions of the truck or other repository to improve detection of light level changes caused by an unauthorized intrusion into the cargo container (by contrast with another, non-intruded, area of the cargo container.
  • low-frequency e.g. 300 khz
  • loop antennas may also be used to segregate different regions of the truck or other repository to improve detection of light level changes caused by an unauthorized intrusion into the cargo container (by contrast with another, non-intruded, area of the cargo container.
  • each truck or ship may be equipped with a small computer and a global positioning system (GPS) receiver.
  • GPS global positioning system
  • the computer may interrogate, periodically, the tags in the back of the vehicle, as indicated in FIG. 6 .
  • the tags may read the current light levels and other events once a minute, once in 10 minutes, once every three hours etc. and this data may be transmitted via satellite or via cell phone periodically to a centrally located Application Services Provider (ASP).
  • ASP Application Services Provider
  • the data may be displayed (see lower part of FIG. 8 ) on a web-enabled report in real-time with location of the truck, as determined by a GPS device carried by the truck.
  • the ASP may write the data log directly to a CD in real-time. This CD can be a write only device so the log is prominent, cannot be tampered with and has been recorded away from the truck by an independent auditor in real-time.
  • the tag may use an algorithm to calculate and display a checksum based on the light levels (e.g. visible or infrared) experienced at the tag.
  • the ASP can independently calculate a checksum using the same algorithm based on its permanent record of the data stored at the ASP. In the simplest form of the system, these checksums will simply be compared upon delivery to confirm that the no unauthorized intrusions into the repository have occurred.
  • this data may be stored permanently on a write-once-only CD-R disk at the ASP's data storage apparatus and even archived by an independent auditor (e.g. KPMG) who would have exclusive access to the CD-R disc.
  • KPMG independent auditor
  • An alternative method may be to remove the tags from the freight, harvest the log contained in each tag by way of a PC it the delivery site.
  • the PC may, of course, be connected to the ASP server via the Internet where the PC cannot, in real-time, readily compare the tag log as well as the ASP.
  • a report that has been independently audited can be printed on the site to confirm that the shipment is acceptable (no unauthorized intrusions or openings caused by theft or terrorism) within a few minutes after arrival.
  • FIG. 11 shows light level event data collected from an array of light sensors on security tags, attached directly to cargo containers held in a ship, warehouse, or other higher level repository, which are connected by cabling to a transceiver which receives GPS data and transmits wirelessly (e.g. via satellite) to a remote ASP for unalterable recording on a write-once-only CD on a “real time” basis.
  • a transceiver which receives GPS data and transmits wirelessly (e.g. via satellite) to a remote ASP for unalterable recording on a write-once-only CD on a “real time” basis.
  • FIG. 12 shows light level event data collected from an array of light sensors on security tags, attached directly to cargo containers held in a ship, warehouse, or other higher level repository, which are connected by wireless transmission to a field antenna connected to a transceiver which receives GPS data and transmits wirelessly (e.g. via satellite) to a remote ASP for unalterable recording on a write-once-only CD on a “real time” basis.

Abstract

This invention relates to a method and system for authenticating and for preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, where the repository is exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin). The events include changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate an unauthorized intrusion.

Description

    CROSS REFERENCES TO RELATED APPLICATIONS
  • This application claims priority from U.S. Provisional Application No. US/60/542,952, entitled “Auditable Security For Cargo Containers And Other Repositories”, filed Feb. 9, 2004; U.S. Provisional Application No. 60/627,984, entitled “Auditable Authentication Of Event histories For Shipped And Stored Objects”, filed on Nov. 15, 2004; U.S. Provisional Application No. 60/613,767, entitled “RF Tags For Tracking And Locating Travel Bags”, filed Sep. 28, 2004; 60/461,562 (Formal Ser. No. 10/820,366) filed Apr. 8, 2004, entitled “Networked RF Tag for Tracking Freight”; U.S. Pending Provisional 60/______, entitled “RF Tags With Nested Hierarchical Data”, filed Apr. 12, 2004; and U.S. Provisional Application No. 60/589,524 filed on Jul. 20, 2004 “entitled RF-Enablement Of Auditable Storage For Hazardous Materials”.
  • FIELD OF THE INVENTION
  • This invention relates to a method and system for authenticating the histories of events experienced by objects held in a repository (e.g. shipping container, fixed warehouse or a movable vehicle), and detecting the time and date of an unauthorized intrusion, which may entail potential theft therefrom of objects such as pharmaceutical products, autoparts, computer parts, laptop computers, etc. during storage in the repository. Moreover, such unauthorized intrusion may involve clandestine insertion of weapons, explosives, or other dangerous materials into the shipping container to enable such dangerous materials to be spirited into a target location for disastrous effect.
  • BACKGROUND OF THE INVENTION
  • Most shipments contained in trucks and shipping containers are locked via doors at the rear of the vehicle or shipping container. Typically, such shipping/cargo containers are assembled out of corrugated steel and are 8 feet wide, 8′6″ high, and 20′ long, although some are as long as 40′ or 45′. Often special locking devices are attached (See U.S. Pat. No. 6,364,584) and several commercially available units (e.g. the Omni SeaLock System from Omni Security Consultants, Inc. of Miami, Fla., USA) are available to attach to the two locking rods so the doors cannot be opened. In most cases, however, a simple seal with a fixed stamped number located on the front is used. These seals and numbers may be inspected by the consignee as well as customs authorities and others along the shipping route to insure that the freight is intact and has not been touched since it was shipped.
  • These systems however do not prevent the removal of freight by cutting a hole in the side or rear of a container to gain access. In many cases this hole can be sealed and painted over, and then it appears as if it were a simple authorized repair. Selected objects may be removed from the container with the seal and lock still intact. It is estimated that over $50 billion worth of freight is stolen each year and most of his occurs with security seals intact. In addition security issues associated with 9/11 attacks have created concerns that dangerous materials (e.g. explosives, biological contaminants) useful to terrorists may be placed inside a truck or container and smuggled undetected into a target location.
  • It is an object of the present invention to provide a system that dramatically reduces costs and makes possible real-time tracking of events, with the ability to log and detect openings and closings of repositories such as containers or trucks in near real-time, thus providing records and proof that a container or truck has been sealed since it was shipped. In addition the system is capable of providing an independent audit trial that goods were untouched within the container. As will be understood, such an audit trail is very valuable. for example, the exact time of an intrusion is important in assigning liability for insurance claims based upon theft and in determining reponsibility therefor.
  • This invention is related to to the system described in previous provisional U.S. application 60/515,074, filed Oct. 28, 2003, for authenticating temperature histories of objects such as pharmaceuticals. However, as will be understood based upon the present application, the present invention is implemented by real-time tracking and auditable logging of events (such as light levels, via a small photo detector) within repositories such as shipping containers, warehouses, as well as trucks, on a routine basis and for virtually every object contained in the repository to detect and unalterably record unauthorized intrusions into the shipping container or other repository. An important object of such unalterable recording is to authenticate the history of events within a cargo container or other receptacle and to immediately notify security personnel or government authorities (for example, by wireless transmission to satellites, whereby worldwide tracking of detected unauthorized intrusions can be achieved).
  • SUMMARY OF THE INVENTION
  • The present invention broadly provides a method for preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, the aforesaid repository being exposed to an unauthorized intrusion therewithin (and potential theft of the objects therefrom and potential insertion of dangerous items therewithin), the aforesaid events comprising changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate an the aforesaid unauthorized intrusion, the the aforesaid method comprising:
  • a) sensing an the aforesaid event occurring within said repository;
  • b) recording an event signal that defines the sensed event;
  • c) transmitting a temporally ordered series of the aforesaid event signals to a data storage apparatus, said data storage apparatus being operable to store the aforesaid temporally ordered series of the aforesaid event signals; and
  • d) safeguarding the aforesaid data storage apparatus against alteration of the aforesaid stored series of event signals.
  • According to a preferred embodiment of the invention, safeguarding step (d) is carried out by selecting a data storage apparatus which is operable to store the aforesaid series of event signals upon a medium that cannot be readily altered without detection. Preferably, the repository is a cargo container on vehicle such as a truck, ship, or rail car, and the medium is a write-once-only CD-Recordable (CD-R) disc.
  • Advantageously, safeguarding step (d) may be carried out by disposing said data storage apparatus at a secure location (e.g. KPMG or other auditor's offices) distant from the cargo container or other repository.
  • According to an embodiment of the invention, safeguarding step (d) utilizes a selected algorithm to calculate a pair of checksums based on a selected sequence of event signals, the aforesaid pair of checksums having a selected relationship (e.g. being identical) in the event of data integrity, one of the aforesaid checksums being calculated from event signals generated at the repository (e.g. at a cargo container or at a sea vessel carrying many cargo containers ), the other checksum being calculated from event signals transmitted to said data storage apparatus.
  • Preferably, transmitting step (c) is carried out by transmitting the aforesaid event signals to the data storage apparatus immediately upon recording thereof (i.e. in real time) in accordance with step (b).
  • Desirably, safeguarding step (d) may also comprise storage of corresponding temporal (e.g. date/time) data together with each said event signal, said temporal data being obtained from an independent source (e.g. National Institute of Standards and Technology (NIST) or a global positioning system (GPS) satellite). Of course, location data from the GPS satellite may also be included to help track the position of the cargo container.
  • Preferably, the aforesaid sensing step (a) and recording step (b) are carried out by associating (e.g. attaching to) a tag with a repository, the aforesaid tag comprising an event sensor operable to record an event signal for describing an event (e.g. change in light or infrared level) occurring within a repository (e.g. cargo container), a data storage device operable to store data comprising identification data for identifying the aforesaid radio frequency tag, the tag being operable to provide data signals comprising the aforesaid event signal and an identification signal based upon the aforesaid identification data, and an energy source for activating said event sensor and said data storage device.
  • Preferably, sensing step (a) and recording step (b) are carried out by associating (e.g. attaching to) a tag with the cargo container, the aforesaid tag comprising an event sensor operable to record an event signal for describing a said event occurring within said cargo container, a data storage device operable to store data comprising identification data for identifying the aforesaid radio frequency tag, the aforesaid tag comprising a transmitter operable to transmit data signals comprising the aforesaid event signal and an identification signal based upon the aforesaid identification data to the aforesaid data storage apparatus, and an energy source for activating the event sensor, transmitter and data storage device.
  • Advantageously, the tag is attached to an outer surface of said cargo container, and wherein said event sensor comprises a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals, describing a change in light (visible or infrared) levels within said cargo container based upon an unauthorized intrusion, to the aforesaid data storage device.
  • Moreover, a plurality of the aforesaid tags may be disposed in different areas of the aforesaid cargo container to sense different events (e.g. different light levels) experienced in such different areas.
  • Advantageously, a plurality of series of such data signals (comprising event signals and identification signals) from a corresponding plurality of cargo containers may be transmitted wirelessly to the aforesaid data storage apparatus via a communication network (which may include communication satellites or cellular ground stations), the aforesaid data storage apparatus being operable to store the aforesaid series of event signals upon a medium (e.g. write-once-only CD Recordable (CD-R) disc) that cannot be readily altered without detection.
  • For this purpose, the aforesaid tag may a radio frequency (RF) tag, said RF tag comprising a tag transmitter and a tag antenna operable at a radio frequency (preferably less than 1 megaherz, for example 300 khz)
  • The invention further broadly provides a system for preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, the aforesaid repository being exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin), the aforesaid events comprising changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate an unauthorized intrusion, the aforesaid system comprising:
  • a) a tag carried by a the aforesaid repository, such tag comprising an event sensor operable to record an event signal for describing an aforesaid event occurring within the repository, a data storage device operable to store data comprising identification data for identifying the tag, a tag transmitter operable to transmit data signals comprising the aforesaid event signal and an identification signal based upon such identification data, and an energy source for activating the event sensor and the tag transmitter and the data storage device; and
  • b) a data storage apparatus in operative communication with the tag, such data storage apparatus being operable to store a temporally ordered sequence of the aforesaid event signals upon a medium which cannot be readily altered without detection.
  • Preferably, the system comprises a central data processor, each tag being connected by cable to such central data processor.
  • Alternatively, the aforesaid tag comprises a radio frequency (RF) tag attached to the repository, the aforesaid system further comprising:
  • c) at least one field antenna disposed at an orientation and within a distance from the repository that permit effective communication with said RF tag at said radio frequency; and
  • d) a reader in operative communication with the aforesaid field antenna, such reader being operable to receive data signals from the aforesaid RF tag.
  • Preferably, the aforesaid data storage apparatus is disposed at a secure location distant from said object, said system further comprising:
  • e) a field transmitter disposed at the repository and operable to transmit the aforesaid event signals to such data storage apparatus.
  • The aforesaid system comprising a pair of checking devices for utilizing a selected algorithm to calculate a corresponding pair of checksums based on a selected sequence of event signals, the pair of checksums having a selected relationship (e.g. being identical) in the event of data integrity, one of said checking devices being disposed at said repository (e.g. at said tag), the other checking device being disposed at said data storage apparatus.
  • Preferably, the aforesaid system further comprises:
  • d) a geographic position sensing (GPS) detector operable to record a location signal defining a geographic position of the aforesaid movable repository (e.g. vehicle), the aforesaid data storage apparatus being in operative communication with the aforesaid reader and the aforesaid GPS detector, such data storage apparatus being operable to store a temporally ordered sequence of the aforesaid event signals and corresponding location signals upon a medium which cannot be readily altered without detection.
  • The aforesaid system may further comprise a clock operable to generate time signals for transmittal to the aforesaid data storage apparatus and for storage thereat in correspondence with the aforesaid event signals.
  • Advantageously, the aforesaid repository may comprise a cargo container disposed on a movable vehicle (e.g. shipping vessel, railway carriage), such movable vehicle further comprising a central data processor in operative communication with the aforesaid field antenna, the aforesaid tag further comprising a tag receiver operable to receive an RF interrogation signal from the aforesaid field antenna, such RF interrogation signal being operable to cause said tag to emit an event signal.
  • According to a preferred embodiment, the aforesaid identification data comprises an internet protocol (IP) address, and the aforesaid central data processor is operable for communication with an internet router.
  • The aforesaid tag may further comprise a display (e.g. LCD) operable to display visible data relating to the event sensor of said tag. Such visible data can, of course, comprise one of the aforesaid checksums.
  • According to a preferred embodiment, the aforesaid system comprises a plurality of said low frequency (e.g. not exceeding 300 khz) RF tags and a plurality of low frequency field antennas disposed in different areas of said movable repository and operable to enable discrimination of event signals received from RF tags disposed in different areas.
  • The invention also provides a method for preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, said repository being exposed to an unauthorized intrusion therewithin (and potential theft of the objects therefrom and potential insertion of dangerous items therewithin), the aforesaid events comprising changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate an unauthorized intrusion, said method comprising:
  • a) sensing an event occurring within the aforesaid repository upon a tag attached thereto;
  • b) unalterably recording an event signal that defines the sensed event upon a write-once-only data storage device (e.g. PROM) comprised by such tag;
  • c) transmitting a temporally ordered series of the aforesaid event signals to a data storage apparatus. the aforesaid data storage apparatus being operable to store such temporally ordered series of said event signals; and
  • d) safeguarding the aforesaid data storage apparatus against alteration of such stored series of event signals.
  • The invention also provides a tag for use in preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. autoparts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, said repository being exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin), said events comprising changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate a said unauthorized intrusion, said tag being adapted for association with (e.g. attachment to) said repository, said tag comprising an event sensor operable to record an event signal representative of a said event occurring within said repository, a write-once-only data storage device (e.g. PROM) operable to store, in an unalterable manner, data comprising said event signal, a tag transmitter operable to transmit data signals comprising said event signal, and an energy source for activating said event sensor and said write-once-only data storage device.
  • Preferably, the repository comprising a cargo container, said write-once-only data storage device being operable to store identification data for identifying said tag, said tag being adapted for attachment to an outer surface of said cargo container, said event sensor comprising a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals describing a change in light levels within said cargo container, based upon an unauthorized intrusion, to said data storage device.
  • According to a preferred embodiment, the aforesaid photodetector is securely affixed to the tag with a connecting member through an aperture in a wall of said cargo container, such connecting member being removable only upon access thereto from within the aforesaid cargo container.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows schematic front and side views of a temperature logging tag that may be used in accordance with the present invention.
  • FIG. 2 shows a tag attached to an outer surface of a wall of a cargo container, with holes provided in the wall for communication with a photodetector exposed to the interior of the cargo container. The photodetector is securely affixed to the tag with at least one connecting member through an aperture in a wall of the cargo container, the connecting member being removable only upon access thereto from within the cargo container.
  • FIG. 3 shows a similar arrangement to FIG. 2, except that the tags may be attached to the wall with an adhesive, and event data signals may be transmitted through the steel wall by low frequency inductive communication.
  • FIG. 4 schematically illustrates how individual tags may be attached directly to individual items of freight contained within the cargo container or other repository. In this case, the tags may carry data such as the manifest and destination and shipping data, as well as photodetector for sensing light levels within the repository (cargo container) within which the items are to be shipped.
  • FIG. 5 shows aschematic front view of a security tag with its main components displayed, in accordance with the present invention, that transmits event data wirelessly.
  • FIG. 6 is a schematic view of a warehouse, port, or ship authenticated by use of a plurality of wireless tags that may be attached to cargo containers (or indirectly by affixing the tags to shipped objects), a loop antenna, a base station and a server that transmits event data for secure recording on a local data storage system (within the server) that uses CD-R discs.
  • FIG. 7 is a schematic view of a vehicle (e.g. truck, shipping vessel, or railway car or cargo container) authenticated by use of a plurality of wireless tags, a loop antenna, a base station and a server that transmits event data and GPS location and time data for secure recording on a distant data storage system that uses CD-R discs.
  • FIG. 8 is a schematic view of a tag that records event (e.g. visible or infrared light data) at the shipping package within a repository (e.g. cargo container), and of a remotely located ASP and unalterable data storage apparatus using write-once-only CD-R discs to record, in real time, the temporally ordered series of light levels and corresponding GPS locations, dates, and times of the light level events experienced at the tag.
  • FIG. 9 is a schematic view of two arrangements for collecting auditable, authenticated event data (e.g. light levels, pressure changes, temperatures) in accordance with the invention. In the upper arrangement, event data are logged together with an algorithm-generated checksum while a checksum is calculated with the same algorithm by the ASP server on data received in real time from the RF tags. In the lower arrangement, the data log and checksum are calculated by a PC from RF tags in the repository, while a corresponding check sum is calculated remotely at the ASP server, where the data is received from the RF tags and stored on an unalterable CD-R disc.
  • FIG. 10 is a schematic view of an Option 1 in which event data from tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and connected by cabling to a network device that receives time and/or position signals (e.g. from NIST or GPS) are stored together as a temporally ordered series on a local unalterable CD-R disc drive to which the network device is cabled within the repository.
  • FIG. 11 is a schematic view of an Option 2 in which event data from tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and connected by cabling to a network device that receives time and/or position signals (e.g. GPS) are transmitted together wirelessly as a temporally ordered series to a remote ASP that receives NIST time data and records event and corresponding time data on an unalterable CD-R disc drive located at the remote ASP server.
  • FIG. 12 is a schematic view of an Option 3 in which event data from RF tags attached to cargo containers or directly attached to objects disposed within a warehouse or ship and communicating by wireless RF to a network device that receives time and/or position signals (e.g. GPS) are transmitted together wirelessly as a temporally ordered series to a remote ASP that receives NIST time data and records event and corresponding time data on an unalterable CD-R disc drive located at the remote ASP server.
  • DESCRIPTION OF PREFERRED EMBODIMENTS
  • A preferred embodiment of the present invention provides a system that comprises a small low cost radio frequency (RF) tag as shown in FIGS. 1-5, that contains its own memory, a light sensor (e.g. a photodetector), an optional display and optional light emitting diodes.
  • As shown in FIG. 4, these tags may be placed directly on the side of the box of shipped items (e.g. autoparts) or pallet and will continuously record data including the time and light levels within a cargo container or other repository, and write this log to the internal memory of the tag. In addition, the tags may be interrogated by a radiofrequency transmitter contained in the warehouse of FIG. 6 or the truck of FIG. 7.
  • This radiofrequency system may be based on low-frequency (e.g. 300 khz) induction and may require large (e.g. 5′ to 50′ radius) loop field antennas placed in the ceiling or the floor of the truck. These loop antennas may also be used to segregate different regions of the truck or other repository to improve detection of light level changes caused by an unauthorized intrusion into the cargo container (by contrast with another, non-intruded, area of the cargo container.
  • In addition each truck or ship may be equipped with a small computer and a global positioning system (GPS) receiver. As the truck drives along the highway, the computer may interrogate, periodically, the tags in the back of the vehicle, as indicated in FIG. 6. The tags may read the current light levels and other events once a minute, once in 10 minutes, once every three hours etc. and this data may be transmitted via satellite or via cell phone periodically to a centrally located Application Services Provider (ASP). As the data are acquired at the ASP it may be displayed (see lower part of FIG. 8) on a web-enabled report in real-time with location of the truck, as determined by a GPS device carried by the truck. In addition the ASP may write the data log directly to a CD in real-time. This CD can be a write only device so the log is prominent, cannot be tampered with and has been recorded away from the truck by an independent auditor in real-time.
  • As shown in FIG. 9, at the end of the run the tag may use an algorithm to calculate and display a checksum based on the light levels (e.g. visible or infrared) experienced at the tag. The ASP can independently calculate a checksum using the same algorithm based on its permanent record of the data stored at the ASP. In the simplest form of the system, these checksums will simply be compared upon delivery to confirm that the no unauthorized intrusions into the repository have occurred. As will be understood, this data may be stored permanently on a write-once-only CD-R disk at the ASP's data storage apparatus and even archived by an independent auditor (e.g. KPMG) who would have exclusive access to the CD-R disc.
  • An alternative method (lower half of FIG. 9) may be to remove the tags from the freight, harvest the log contained in each tag by way of a PC it the delivery site. The PC may, of course, be connected to the ASP server via the Internet where the PC cannot, in real-time, readily compare the tag log as well as the ASP. Moreover, a report that has been independently audited can be printed on the site to confirm that the shipment is acceptable (no unauthorized intrusions or openings caused by theft or terrorism) within a few minutes after arrival.
  • It is also possible to record the data log of light level event data in a data storage apparatus located on the truck if a write-once-only CD-R disc is used to prevent alteration by improperly motivated individuals (see FIG. 10). In that case, care must be taken to prevent any compromise of the audit trail since the computer in the truck may be exposed to tampering before the data is recorded on the CD-R disc (e.g. by the driver or other individuals who own the shipment).
  • FIG. 11 shows light level event data collected from an array of light sensors on security tags, attached directly to cargo containers held in a ship, warehouse, or other higher level repository, which are connected by cabling to a transceiver which receives GPS data and transmits wirelessly (e.g. via satellite) to a remote ASP for unalterable recording on a write-once-only CD on a “real time” basis.
  • FIG. 12 shows light level event data collected from an array of light sensors on security tags, attached directly to cargo containers held in a ship, warehouse, or other higher level repository, which are connected by wireless transmission to a field antenna connected to a transceiver which receives GPS data and transmits wirelessly (e.g. via satellite) to a remote ASP for unalterable recording on a write-once-only CD on a “real time” basis.
  • While the present invention has been described with reference to preferred embodiments thereof, numerous obvious changes and variations may readily be made by persons skilled in the field of shipping and storage. Accordingly, the invention should be understood to include all such variations to the full extent embraced by the claims.

Claims (29)

1. A method for preventing alteration of histories of events occurring within at least one repository for objects held for a period of time, said repository being exposed to an unauthorized intrusion therewithin, said events comprising changes in environmental conditions which indicate a said unauthorized intrusion, said method comprising:
a) sensing a said event occurring within said repository;
b) recording an event signal that defines the sensed event;
c) transmitting a temporally ordered series of said event signals to a data storage apparatus, said data storage apparatus being operable to store said temporally ordered series of said event signals; and
d) safeguarding said data storage apparatus against alteration of said stored series of event signals.
2. A method as set forth in claim 1, wherein safeguarding step (d) is carried out by selecting a data storage apparatus which is operable to store said series of event signals upon a medium that cannot be readily altered without detection.
3. A method as set forth in claim 2, wherein said repository is a vehicle operable for delivery of said objects, and wherein said medium is a write-once-only CD-Recordable (CD-R) disc.
4. A method as set forth in claim 1, wherein safeguarding step (d) is carried out by disposing said data storage apparatus at a secure location distant from said repository.
5. A method as set forth in claim 4, wherein said safeguarding step (d) utilizes a selected algorithm to calculate a pair of checksums based on a selected sequence of event signals, said pair of checksums having a selected relationship in the event of data integrity, one of said checksums being calculated from event signals generated at said repository, the other checksum being calculated from event signals transmitted to said data storage apparatus.
6. A method as set forth in claim 4, wherein transmitting step (c) is carried out by transmitting said event signals to said data storage apparatus immediately upon recording thereof in accordance with step (b).
7. A method as set forth in claim 1, wherein safeguarding step (d) comprises storage of corresponding temporal data together with each said event signal, said temporal data being obtained from an independent source.
8. A method as set forth in claim 7, wherein said repository is a cargo container operable for delivery of said objects, wherein said medium is a write-once-only CD-Recordable (CD-R) disc, and wherein said independent source is a global positioning system (GPS) satellite.
9. A method as set forth in claim 1, wherein said sensing step (a) and recording step (b) are carried out by associating a tag with a said repository, said tag comprising an event sensor operable to record an event signal for describing an event occurring within a repository, a data storage device operable to store data comprising identification data for identifying said radio frequency tag, said tag being operable to provide data signals comprising said event signal and an identification signal based upon said identification data, and an energy source for activating said event sensor and said data storage device.
10. A method as set forth in claim 8, wherein said sensing step (a) and recording step (b) are carried out by associating a tag with a said cargo container, said tag comprising an event sensor operable to record an event signal for describing a said event occurring within said cargo container, a data storage device operable to store data comprising identification data for identifying said radio frequency tag, said tag comprising a transmitter operable to transmit data signals comprising said event signal and an identification signal based upon said identification data to said data storage apparatus, and an energy source for activating said event sensor, said transmitter and said data storage device.
11. A method as set forth in claim 10, wherein said tag is attached to an outer surface of said cargo container, and wherein said event sensor comprises a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals, describing a change in light levels within said cargo container based upon an unauthorized intrusion, to said data storage device.
12. A method as set forth in claim 10, a plurality of said tags being disposed in different areas of said cargo container to sense different events experienced in said different areas.
13. A method as set forth in claim 10, wherein a plurality of series of said data signals (comprising event signals and identification signals) from a corresponding plurality of cargo containers are transmitted wirelessly to said data storage apparatus via a communication network, said data storage apparatus being operable to store said series of event signals upon a medium that cannot be readily altered without detection.
14. A method as set forth in claim 10, said tag being a radio frequency (RF) tag, said RF tag comprising a tag transmitter and a tag antenna operable at a radio frequency of less than 1 megahertz.
15. A system for preventing alteration of histories of events occurring within at least one repository for objects held for a period of time, said repository being exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin), said events comprising changes in environmental conditions which indicate a said unauthorized intrusion, said system comprising:
a) a tag carried by a said repository, said tag comprising an event sensor operable to record an event signal for describing a said event occurring within said repository, a data storage device operable to store data comprising identification data for identifying said tag, a tag transmitter operable to transmit data signals comprising said event signal and an identification signal based upon said identification data, and an energy source for activating said event sensor and said tag transmitter and said data storage device; and
b) a data storage apparatus in operative communication with said tag, said data storage apparatus being operable to store a temporally ordered sequence of said event signals upon a medium which cannot be readily altered without detection.
16. A system as set forth in claim 15, and further comprising a central data processor, each tag being connected by cable to said central data processor.
17. A system as set forth in claim 15, said tag comprising a radio frequency (RF) tag attached to said repository, said system further comprising:
c) at least one field antenna disposed at an orientation and within a distance from said repository that permit effective communication with said RF tag at said radio frequency of less than 1 megahertz; and
d) a reader in operative communication with said field antenna, said reader being operable to receive data signals from said RF tag.
18. A system as set forth in claim 17, said data storage apparatus being disposed at a secure location distant from said object, said system further comprising:
e) a field transmitter disposed at said repository and operable to transmit said event signals to said data storage apparatus.
19. A system as set forth in claim 17, said system comprising a pair of checking devices for utilizing a selected algorithm to calculate a corresponding pair of checksums based on a selected sequence of event signals, the pair of checksums having a selected relationship in the event of data integrity, one of said checking devices being disposed at said repository, the other checking device being disposed at said data storage apparatus.
20. A system as set forth in claim 17, said system further comprising:
d) a geographic position sensing (GPS) detector operable to record a location signal defining a geographic position of said movable repository, said data storage apparatus being in operative communication with said reader and said GPS detector, said data storage apparatus being operable to store a temporally ordered sequence of said event signals and corresponding location signals upon a medium which cannot be readily altered without detection.
21. A system as set forth in claim 20, said data storage apparatus being disposed at a secure location distant from said object, said system further comprising:
e) a field transmitter disposed at said movable repository and operable to transmit said event signals and corresponding location signals to said data storage apparatus.
22. A system as set forth in claim 21, said system further comprising a clock operable to generate time signals for transmittal to said data storage apparatus and for storage thereat in correspondence with said event signals.
23. A system as set forth in claim 20, said repository comprising a cargo container disposed on a movable vehicle, said movable vehicle further comprising a central data processor in operative communication with said field antenna, said tag further comprising a tag receiver operable to receive an RF interrogation signal at a RF frequency of less than 1 megahertz from said field antenna, said RF interrogation signal being operable to cause said tag to emit an event signal.
24. A system as set forth in claim 23, wherein said identification data comprises an internet protocol (IP) address, and wherein said central data processor is operable for communication with an internet router.
25. A system as set forth in claim 15, said system comprising a plurality of said low frequency RF tags and a plurality of low frequency field antennas disposed in different areas of said movable repository and operable to enable discrimination of event signals received from RF tags disposed in different areas.
26. A system as set forth in claim 17, said data storage apparatus comprising a write-only-once device to assure integrity of data relating to events occurring within said repository.
27. A method for preventing alteration of histories of events occurring within at least one repository for objects held therein for a period of time, said repository being exposed to an unauthorized intrusion therewithin, said events comprising changes in environmental conditions which indicate a said unauthorized intrusion, said method comprising:
a) sensing an event occurring within said repository upon a tag attached thereto;
b) unalterably recording an event signal that defines the sensed event upon a write-once-only data storage device comprised by said tag;
c) transmitting a temporally ordered series of said event signals to a data storage apparatus said data storage apparatus being operable to store said temporally ordered series of said event signals; and
d) safeguarding said data storage apparatus against alteration of said stored series of event signals.
28. A tag for use in preventing alteration of histories of events occurring within at least one repository for objects held for a period of time, said repository being exposed to an unauthorized intrusion therewithin, said events comprising changes in environmental conditions which indicate a said unauthorized intrusion, said tag being adapted for association with said repository, said tag comprising an event sensor operable to record an event signal representative of a said event occurring within said repository, a write-once-only data storage device operable to store, in an unalterable manner, data representing said event signal, a tag transmitter operable to transmit data signals representing said event signal, and an energy source for activating said event sensor and said write-once-only data storage device.
29. A tag as set forth in claim 28, said repository comprising a cargo container, said write-once-only data storage device being operable to store identification data for identifying said tag, said tag being adapted for attachment to an outer surface of said cargo container, said event sensor comprising a photodetector disposed within said cargo container, said photodetector being operable to transmit event signals describing a change in light levels within said cargo container, based upon an unauthorized intrusion, to said write-once-only data storage device.
US11/053,307 2003-04-09 2005-02-08 Auditable security for cargo containers and other repositories Abandoned US20100033330A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/053,307 US20100033330A1 (en) 2003-04-09 2005-02-08 Auditable security for cargo containers and other repositories
US11/275,029 US7646301B2 (en) 2003-04-09 2005-12-03 Auditable security for cargo containers and other repositories

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US46156203P 2003-04-09 2003-04-09
US54295204P 2004-02-09 2004-02-09
US10/820,366 US7049963B2 (en) 2003-04-09 2004-04-08 Networked RF tag for tracking freight
US58952404P 2004-07-20 2004-07-20
US61376704P 2004-09-28 2004-09-28
US62798404P 2004-11-15 2004-11-15
US11/053,307 US20100033330A1 (en) 2003-04-09 2005-02-08 Auditable security for cargo containers and other repositories

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/820,366 Continuation-In-Part US7049963B2 (en) 2003-04-09 2004-04-08 Networked RF tag for tracking freight

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/275,029 Continuation US7646301B2 (en) 2003-04-09 2005-12-03 Auditable security for cargo containers and other repositories

Publications (1)

Publication Number Publication Date
US20100033330A1 true US20100033330A1 (en) 2010-02-11

Family

ID=41652394

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/053,307 Abandoned US20100033330A1 (en) 2003-04-09 2005-02-08 Auditable security for cargo containers and other repositories
US11/275,029 Active 2026-07-10 US7646301B2 (en) 2003-04-09 2005-12-03 Auditable security for cargo containers and other repositories

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/275,029 Active 2026-07-10 US7646301B2 (en) 2003-04-09 2005-12-03 Auditable security for cargo containers and other repositories

Country Status (1)

Country Link
US (2) US20100033330A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120306646A1 (en) * 2011-06-01 2012-12-06 Timothy Alan Walker Embedded security system for environment-controlled transportation containers and method for detecting a security risk for environment-controlled transportation containers
US11507919B1 (en) * 2020-02-11 2022-11-22 Amazon Technologies, Inc. Smart container

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8144671B2 (en) 2005-07-01 2012-03-27 Twitchell Jr Robert W Communicating via nondeterministic and deterministic network routing
US8315563B2 (en) 2000-12-22 2012-11-20 Google Inc. Wireless reader tags (WRTs) with sensor components in asset monitoring and tracking systems
US7391321B2 (en) * 2005-01-10 2008-06-24 Terahop Networks, Inc. Keyhole communication device for tracking and monitoring shipping container and contents thereof
US20080303897A1 (en) 2000-12-22 2008-12-11 Terahop Networks, Inc. Visually capturing and monitoring contents and events of cargo container
US7733818B2 (en) 2000-12-22 2010-06-08 Terahop Networks, Inc. Intelligent node communication using network formation messages in a mobile Ad hoc network
US7783246B2 (en) 2005-06-16 2010-08-24 Terahop Networks, Inc. Tactical GPS denial and denial detection system
US7742772B2 (en) 2005-10-31 2010-06-22 Terahop Networks, Inc. Determining relative elevation using GPS and ranging
US7583769B2 (en) 2005-06-16 2009-09-01 Terahop Netowrks, Inc. Operating GPS receivers in GPS-adverse environment
US8280345B2 (en) 2000-12-22 2012-10-02 Google Inc. LPRF device wake up using wireless tag
US20050149226A1 (en) * 2002-04-09 2005-07-07 Ebox, Inc. Warehousing system and method
US20030114206A1 (en) * 2001-08-24 2003-06-19 United Parcel Service Of America, Inc. Portable data acquisition and management system and associated device and method
US20050043886A1 (en) * 2002-06-06 2005-02-24 John Stevens Delivery system and method for low visibilty conditions
US8378841B2 (en) 2003-04-09 2013-02-19 Visible Assets, Inc Tracking of oil drilling pipes and other objects
US7864053B2 (en) * 2006-04-12 2011-01-04 Visible Assets, Inc. Visibility radio cap and network
US8026819B2 (en) 2005-10-02 2011-09-27 Visible Assets, Inc. Radio tag and system
US20070115132A1 (en) * 2005-06-10 2007-05-24 Visible Assets, Inc. Tagging and communication system and methods for use therewith
US20100033330A1 (en) * 2003-04-09 2010-02-11 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US8681000B2 (en) 2003-04-09 2014-03-25 Visible Assets, Inc. Low frequency inductive tagging for lifecycle management
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method
US20060055564A1 (en) 2004-01-09 2006-03-16 United Parcel Service Of America, Inc. System, method, and apparatus for capturing telematics data with an active RFID tag
US20050248463A1 (en) * 2004-04-21 2005-11-10 Williams Wayne D System and method for monitoring timed and temperature sensitive assets during transportation
US7142107B2 (en) 2004-05-27 2006-11-28 Lawrence Kates Wireless sensor unit
US7623035B2 (en) * 2004-07-20 2009-11-24 Visible Assets, Inc RF-enablement of products and receptacles therefor
EP1844455A4 (en) * 2004-09-28 2009-02-11 Visible Assets Inc Rf tags for tracking and locating travel bags
US7456418B1 (en) * 2004-11-15 2008-11-25 Visible Assets, Inc RF-enablement of auditable storage for hazardous materials
CA2587553A1 (en) * 2004-11-15 2006-05-18 Visible Assets, Inc. Auditable authentication of event histories for shipped and stored objects
US7385499B2 (en) * 2004-12-17 2008-06-10 United Parcel Service Of America, Inc. Item-based monitoring systems and methods
EP1839286A2 (en) * 2005-01-10 2007-10-03 Terahop Networks, Inc. Keyhole communication device for tracking and monitoring shipping container and contents thereof
US8643503B2 (en) 2005-01-28 2014-02-04 Kirill Mostov Transportation security system and associated methods
US7990270B2 (en) 2005-01-28 2011-08-02 Kirsen Technologies Corporation Inc. Transportation security system and associated methods
WO2006107895A2 (en) * 2005-04-01 2006-10-12 Baytsp, Inc. System and method for distributing and tracking media
US7321290B2 (en) * 2005-10-02 2008-01-22 Visible Assets, Inc. Radio tag and system
US7828342B2 (en) * 2005-07-29 2010-11-09 Terahop Networks, Inc. Reusable locking body, of bolt-type seal lock, having open-ended passageway and U-shaped bolt
US7438334B2 (en) * 2005-07-29 2008-10-21 Terry Daniel J Bolt-type seal lock
US20080001716A1 (en) * 2006-07-03 2008-01-03 Stevens John K Method and Apparatus for Dynamically-Tuned Communication with One Among Myriad Tags
US9069933B1 (en) 2005-09-28 2015-06-30 Visible Assets, Inc. Secure, networked portable storage device
US20090129306A1 (en) 2007-02-21 2009-05-21 Terahop Networks, Inc. Wake-up broadcast including network information in common designation ad hoc wireless networking
EP1972159A1 (en) * 2006-01-01 2008-09-24 Terahop Networks, Inc. Determining presence of radio frequency communication device
WO2007144859A2 (en) * 2006-06-16 2007-12-21 Visible Assets, Inc. Dot-tag visibility network architecture
US7554440B2 (en) * 2006-07-25 2009-06-30 United Parcel Service Of America, Inc. Systems and methods for monitoring travel conditions
US7538681B1 (en) * 2006-09-19 2009-05-26 Onasset Intelligence, Inc. Method and apparatus for monitoring containerized ID tagged assets
US7667606B2 (en) * 2006-10-30 2010-02-23 Visible Assets, Inc RF enabled surgical cart and use of same in operating room environment
WO2008070788A2 (en) * 2006-12-06 2008-06-12 Kirsen Technologies Corporation System and method for detecting dangerous objects and substances
US8223680B2 (en) 2007-02-21 2012-07-17 Google Inc. Mesh network control using common designation wake-up
US7840340B2 (en) * 2007-04-13 2010-11-23 United Parcel Service Of America, Inc. Systems, methods, and computer program products for generating reference geocodes for point addresses
US7864066B2 (en) * 2007-06-29 2011-01-04 Caterpillar Inc Automated lost load response system
US8115472B2 (en) 2007-10-24 2012-02-14 Kirsen Technologies Corporation Inc. System and method for space control and remote monitoring
WO2009067627A1 (en) 2007-11-20 2009-05-28 Kirsen Technologies Corporation Apparatus for remote detection and monitoring of concealed objects
US8462662B2 (en) 2008-05-16 2013-06-11 Google Inc. Updating node presence based on communication pathway
WO2009151877A2 (en) 2008-05-16 2009-12-17 Terahop Networks, Inc. Systems and apparatus for securing a container
US8207848B2 (en) * 2008-05-16 2012-06-26 Google Inc. Locking system for shipping container including bolt seal and electronic device with arms for receiving bolt seal
US20090298491A1 (en) * 2008-06-03 2009-12-03 United Parcel Service Of America, Inc. Contract Acceptance Systems and Methods
US11482058B2 (en) 2008-09-09 2022-10-25 United Parcel Service Of America, Inc. Systems and methods for utilizing telematics data to improve fleet management operations
CN102203810A (en) 2008-09-09 2011-09-28 美国联合包裹服务公司 Systems and methods of utilizing telematics data to improve fleet management operations
US8391435B2 (en) 2008-12-25 2013-03-05 Google Inc. Receiver state estimation in a duty cycled radio
US8300551B2 (en) 2009-01-28 2012-10-30 Google Inc. Ascertaining presence in wireless networks
US8705523B2 (en) 2009-02-05 2014-04-22 Google Inc. Conjoined class-based networking
WO2010133980A1 (en) * 2009-05-21 2010-11-25 Loginno Logistic Innovations Ltd. Shipping container vent cover for theft detection, theft prevention and logistics management and method for securing a shipping container
US8456302B2 (en) 2009-07-14 2013-06-04 Savi Technology, Inc. Wireless tracking and monitoring electronic seal
BR112012003727A2 (en) * 2009-08-17 2017-05-23 Deal Magic Inc contextually aware asset monitoring
US20110082812A1 (en) * 2009-10-01 2011-04-07 Abdul Hamid Salemizadeh Package transport monitoring and analysis
US9953468B2 (en) 2011-03-31 2018-04-24 United Parcel Service Of America, Inc. Segmenting operational data
US9208626B2 (en) 2011-03-31 2015-12-08 United Parcel Service Of America, Inc. Systems and methods for segmenting operational data
US10339426B2 (en) * 2011-07-05 2019-07-02 Bernard Fryshman Induction system for crowd monitoring
US10229348B2 (en) * 2011-07-05 2019-03-12 Bernard Fryshman Induction detector systems
US20130086933A1 (en) * 2011-10-07 2013-04-11 Colleen M. Holtkamp Controller for a medical products storage system
US20140111334A1 (en) * 2012-10-18 2014-04-24 Hutchison International Ports Enterprises Limited Sensor pod
US9112790B2 (en) 2013-06-25 2015-08-18 Google Inc. Fabric network
US10417601B2 (en) 2013-06-28 2019-09-17 United Parcel Service Of America, Inc. Confidence ratings for delivery of items
US20150077256A1 (en) * 2013-09-19 2015-03-19 Dubois Limited Retail security tag
US9805521B1 (en) 2013-12-03 2017-10-31 United Parcel Service Of America, Inc. Systems and methods for assessing turns made by a vehicle
US10309788B2 (en) 2015-05-11 2019-06-04 United Parcel Service Of America, Inc. Determining street segment headings

Citations (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4792796A (en) * 1986-11-20 1988-12-20 R.J.S. Security & Tracking Systems Corporation Electronic alarm apparatus
US4821291A (en) * 1986-09-22 1989-04-11 Stevens John K Improvements in or relating to signal communication systems
US4879756A (en) * 1986-09-22 1989-11-07 Stevens John K Radio broadcast communication systems
US4937586A (en) * 1986-09-22 1990-06-26 Stevens John K Radio broadcast communication systems with multiple loop antennas
US5177432A (en) * 1991-05-31 1993-01-05 Ppg Industries, Inc. Wireless velocity detector for a bicycle having a rotating AC magnetic field and receiver coils
US5245534A (en) * 1991-09-10 1993-09-14 Ers Associates Limited Partnership Electronic tag location systems
US5260694A (en) * 1992-01-10 1993-11-09 Ndc Automation, Inc. Automatic article tracking system for manually operated delivery system
US5374815A (en) * 1993-03-15 1994-12-20 Electronic Retailing Systems Int'l Inc. Technique for locating electronic labels in an electronic price display system
US5532465A (en) * 1993-03-15 1996-07-02 Electronic Retailing Systems International, Inc. Technique for locating electronic labels in an electronic price display system
US5774876A (en) * 1996-06-26 1998-06-30 Par Government Systems Corporation Managing assets with active electronic tags
US5861817A (en) * 1997-07-02 1999-01-19 Douglas A. Palmer System for, and method of, displaying prices on tags in supermarkets
US6127917A (en) * 1997-02-27 2000-10-03 Micron Technology, Inc. System and method for locating individuals and equipment, airline reservation system, communication system
US20020057191A1 (en) * 1998-05-14 2002-05-16 Benjamin G. Bates Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator
US6552663B2 (en) * 2000-02-16 2003-04-22 Display Edge Technology, Ltd. Product information display system with expanded retail display functions
US20040053641A1 (en) * 2002-03-12 2004-03-18 Ebox, Inc. System and method for delivery to multiple units
US20040069849A1 (en) * 2002-04-30 2004-04-15 Ebox Inc. System and method for handling packages
US6745027B2 (en) * 2000-12-22 2004-06-01 Seekernet Incorporated Class switched networks for tracking articles
US20040145474A1 (en) * 2002-11-15 2004-07-29 Schmidtberg Rupert A. RF identification reader for communicating condition information associated with the reader
US20040149822A1 (en) * 2002-05-03 2004-08-05 John Stevens Delivery system and method using an electronic tag
US20040205350A1 (en) * 2000-08-28 2004-10-14 Paul Waterhouse Low cost secure ID card and system
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method
US20050043850A1 (en) * 2001-04-09 2005-02-24 John Stevens Tote-based warehousing system and method
US20050043886A1 (en) * 2002-06-06 2005-02-24 John Stevens Delivery system and method for low visibilty conditions
US20050083213A1 (en) * 2001-05-08 2005-04-21 John Stevens System and method for minimizing package delivery time
US20050086983A1 (en) * 2002-09-05 2005-04-28 Ebox. Inc. Locking device and electric lock, lock assembly, drop-box and delivery system and method including same
US20050122221A1 (en) * 2003-12-09 2005-06-09 Hsiang-Kai Chuang Visible electronic tag and system
US20050134461A1 (en) * 2003-09-03 2005-06-23 Alexander Gelbman Electronically updateable label and display
US20050149226A1 (en) * 2002-04-09 2005-07-07 Ebox, Inc. Warehousing system and method
US6924781B1 (en) * 1998-09-11 2005-08-02 Visible Tech-Knowledgy, Inc. Smart electronic label employing electronic ink
US20050205670A1 (en) * 2004-03-18 2005-09-22 Eiji Natori Store management system and store management method
US20050205817A1 (en) * 2004-03-18 2005-09-22 Martin Marcichow System and method for improved installation and control of concealed plumbing flush valves
US20050251330A1 (en) * 2003-04-17 2005-11-10 Paul Waterhouse Internet package tracking system
US7028861B2 (en) * 2003-12-16 2006-04-18 Joseph S. Kanfer Electronically keyed dispensing systems and related methods of installation and use
US7049963B2 (en) * 2003-04-09 2006-05-23 Visible Assets, Inc. Networked RF tag for tracking freight
US20060124662A1 (en) * 2004-12-15 2006-06-15 Reynolds Aaron R Electronically keyed dispensing systems and related methods utilizing near field frequency response
US20060164232A1 (en) * 2003-04-09 2006-07-27 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US20060220857A1 (en) * 2004-09-28 2006-10-05 Visible Assets, Inc. RF Tags for Tracking and Locating Travel Bags
US20060232417A1 (en) * 2004-07-20 2006-10-19 Visible Assets, Inc. RF-Enablement of Products and Receptacles Therefor
US7152040B1 (en) * 2003-05-27 2006-12-19 Microsoft Corporation Electronic shelf label
US7173530B2 (en) * 2003-04-09 2007-02-06 Savi Technology, Inc. Nested visibility for a container hierarchy
US20070080805A1 (en) * 2005-05-20 2007-04-12 Franklin Lukass R Point of selection merchandise display system
US7283036B2 (en) * 2004-10-13 2007-10-16 Chung -Hsin Electric & Machinery Mfg. Corp. Wireless display device and radio frequency identification system using the same
US20070285238A1 (en) * 2006-06-12 2007-12-13 Intelleflex Corporation Rfid sensor tag with manual modes and functions

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4750197A (en) * 1986-11-10 1988-06-07 Denekamp Mark L Integrated cargo security system
US5447055A (en) * 1993-02-09 1995-09-05 Tracer Research Corporation Automated leak detection apparatus and method
US7161476B2 (en) * 2000-07-26 2007-01-09 Bridgestone Firestone North American Tire, Llc Electronic tire management system
US20030011474A1 (en) * 2001-07-13 2003-01-16 Ng Sing King Circuit and method for electronic security seal
US7116223B2 (en) * 2002-01-02 2006-10-03 International Business Machines Corporation Systems, methods, and apparatus for monitoring a container associated with an item
US7479877B2 (en) * 2002-09-17 2009-01-20 Commerceguard Ab Method and system for utilizing multiple sensors for monitoring container security, contents and condition
US20040113783A1 (en) * 2002-12-11 2004-06-17 Millennium Information Systems, Llc Container integrity management system
EP1584077A1 (en) * 2003-01-14 2005-10-12 United Technologies Corporation Shipping container and method of using same
US20040178880A1 (en) * 2003-03-14 2004-09-16 Michael Meyer Secure cargo transport system
US7135976B2 (en) * 2003-03-31 2006-11-14 Rftrax, Inc. Wireless monitoring device
US7098784B2 (en) * 2003-09-03 2006-08-29 System Planning Corporation System and method for providing container security
US7089099B2 (en) * 2004-07-30 2006-08-08 Automotive Technologies International, Inc. Sensor assemblies

Patent Citations (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4821291A (en) * 1986-09-22 1989-04-11 Stevens John K Improvements in or relating to signal communication systems
US4879756A (en) * 1986-09-22 1989-11-07 Stevens John K Radio broadcast communication systems
US4937586A (en) * 1986-09-22 1990-06-26 Stevens John K Radio broadcast communication systems with multiple loop antennas
US4792796A (en) * 1986-11-20 1988-12-20 R.J.S. Security & Tracking Systems Corporation Electronic alarm apparatus
US5177432A (en) * 1991-05-31 1993-01-05 Ppg Industries, Inc. Wireless velocity detector for a bicycle having a rotating AC magnetic field and receiver coils
US5245534A (en) * 1991-09-10 1993-09-14 Ers Associates Limited Partnership Electronic tag location systems
US5260694A (en) * 1992-01-10 1993-11-09 Ndc Automation, Inc. Automatic article tracking system for manually operated delivery system
US5374815A (en) * 1993-03-15 1994-12-20 Electronic Retailing Systems Int'l Inc. Technique for locating electronic labels in an electronic price display system
US5532465A (en) * 1993-03-15 1996-07-02 Electronic Retailing Systems International, Inc. Technique for locating electronic labels in an electronic price display system
US5774876A (en) * 1996-06-26 1998-06-30 Par Government Systems Corporation Managing assets with active electronic tags
US6127917A (en) * 1997-02-27 2000-10-03 Micron Technology, Inc. System and method for locating individuals and equipment, airline reservation system, communication system
US5861817A (en) * 1997-07-02 1999-01-19 Douglas A. Palmer System for, and method of, displaying prices on tags in supermarkets
US20020057191A1 (en) * 1998-05-14 2002-05-16 Benjamin G. Bates Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator
US6924781B1 (en) * 1998-09-11 2005-08-02 Visible Tech-Knowledgy, Inc. Smart electronic label employing electronic ink
US6552663B2 (en) * 2000-02-16 2003-04-22 Display Edge Technology, Ltd. Product information display system with expanded retail display functions
US20040205350A1 (en) * 2000-08-28 2004-10-14 Paul Waterhouse Low cost secure ID card and system
US6745027B2 (en) * 2000-12-22 2004-06-01 Seekernet Incorporated Class switched networks for tracking articles
US20050043850A1 (en) * 2001-04-09 2005-02-24 John Stevens Tote-based warehousing system and method
US20050083213A1 (en) * 2001-05-08 2005-04-21 John Stevens System and method for minimizing package delivery time
US20040053641A1 (en) * 2002-03-12 2004-03-18 Ebox, Inc. System and method for delivery to multiple units
US20050149226A1 (en) * 2002-04-09 2005-07-07 Ebox, Inc. Warehousing system and method
US20040069849A1 (en) * 2002-04-30 2004-04-15 Ebox Inc. System and method for handling packages
US20040149822A1 (en) * 2002-05-03 2004-08-05 John Stevens Delivery system and method using an electronic tag
US20050043886A1 (en) * 2002-06-06 2005-02-24 John Stevens Delivery system and method for low visibilty conditions
US20050086983A1 (en) * 2002-09-05 2005-04-28 Ebox. Inc. Locking device and electric lock, lock assembly, drop-box and delivery system and method including same
US20040145474A1 (en) * 2002-11-15 2004-07-29 Schmidtberg Rupert A. RF identification reader for communicating condition information associated with the reader
US7173530B2 (en) * 2003-04-09 2007-02-06 Savi Technology, Inc. Nested visibility for a container hierarchy
US20060164232A1 (en) * 2003-04-09 2006-07-27 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US20060128023A1 (en) * 2003-04-09 2006-06-15 Paul Waterhouse Networked RF tag for tracking freight
US7049963B2 (en) * 2003-04-09 2006-05-23 Visible Assets, Inc. Networked RF tag for tracking freight
US20050251330A1 (en) * 2003-04-17 2005-11-10 Paul Waterhouse Internet package tracking system
US7152040B1 (en) * 2003-05-27 2006-12-19 Microsoft Corporation Electronic shelf label
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method
US20050134461A1 (en) * 2003-09-03 2005-06-23 Alexander Gelbman Electronically updateable label and display
US20050122221A1 (en) * 2003-12-09 2005-06-09 Hsiang-Kai Chuang Visible electronic tag and system
US7028861B2 (en) * 2003-12-16 2006-04-18 Joseph S. Kanfer Electronically keyed dispensing systems and related methods of installation and use
US20050205817A1 (en) * 2004-03-18 2005-09-22 Martin Marcichow System and method for improved installation and control of concealed plumbing flush valves
US20050205670A1 (en) * 2004-03-18 2005-09-22 Eiji Natori Store management system and store management method
US20060232417A1 (en) * 2004-07-20 2006-10-19 Visible Assets, Inc. RF-Enablement of Products and Receptacles Therefor
US20060220857A1 (en) * 2004-09-28 2006-10-05 Visible Assets, Inc. RF Tags for Tracking and Locating Travel Bags
US7283036B2 (en) * 2004-10-13 2007-10-16 Chung -Hsin Electric & Machinery Mfg. Corp. Wireless display device and radio frequency identification system using the same
US20060124662A1 (en) * 2004-12-15 2006-06-15 Reynolds Aaron R Electronically keyed dispensing systems and related methods utilizing near field frequency response
US20070080805A1 (en) * 2005-05-20 2007-04-12 Franklin Lukass R Point of selection merchandise display system
US20070285238A1 (en) * 2006-06-12 2007-12-13 Intelleflex Corporation Rfid sensor tag with manual modes and functions

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120306646A1 (en) * 2011-06-01 2012-12-06 Timothy Alan Walker Embedded security system for environment-controlled transportation containers and method for detecting a security risk for environment-controlled transportation containers
US9007205B2 (en) * 2011-06-01 2015-04-14 Thermo King Corporation Embedded security system for environment-controlled transportation containers and method for detecting a security risk for environment-controlled transportation containers
US9555772B2 (en) 2011-06-01 2017-01-31 Thermo King Corporation Embedded security system for environment-controlled transportation containers and method for detecting a security risk for environment-controlled transportation containers
US11507919B1 (en) * 2020-02-11 2022-11-22 Amazon Technologies, Inc. Smart container

Also Published As

Publication number Publication date
US20060164232A1 (en) 2006-07-27
US7646301B2 (en) 2010-01-12

Similar Documents

Publication Publication Date Title
US7646301B2 (en) Auditable security for cargo containers and other repositories
US7333015B2 (en) Method and system for monitoring containers to maintain the security thereof
US7423535B2 (en) Object monitoring, locating, and tracking method employing RFID devices
US8009034B2 (en) Integrated tracking, sensing, and security system for intermodal shipping containers
US7479877B2 (en) Method and system for utilizing multiple sensors for monitoring container security, contents and condition
US7342497B2 (en) Object monitoring, locating, and tracking system employing RFID devices
US7319397B2 (en) RFID device for object monitoring, locating, and tracking
US7564350B2 (en) Method and system for monitoring containers to maintain the security thereof
US20080303663A1 (en) Method for verifying the integrity of a container
US7564353B2 (en) Auditable authentication of event histories for shipped and stored objects
US7417543B2 (en) Method and system for monitoring containers to maintain the security thereof
US7394363B1 (en) Intelligent multi purpose early warning system for shipping containers, components therefor and methods of making the same
US7158028B1 (en) Intelligent multi purpose early warning system for shipping containers, components therefor and methods of making the same
US20110018707A1 (en) Shipping container having integral geoclock system
WO2006026365A2 (en) Object monitoring, locating, and tracking method, system, and rfid device
EP1623526A2 (en) Method and system for utilizing multiple sensors for monitoring container security, contents and condition
WO2008148795A1 (en) A method for verifying the integrity of a container

Legal Events

Date Code Title Description
AS Assignment

Owner name: VISIBLE ASSETS, INC.,CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STEVENS, JOHN K;WATERHOUSE, PAUL;AUGUST, JASON;SIGNING DATES FROM 20050527 TO 20050531;REEL/FRAME:016090/0086

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION