Security system with Anti-tampering sensors and cybersecurity

A technology of sensors and sensor signals, applied in anti-theft alarms, non-mechanical transmission-operated locks, instruments, etc.

Active Publication Date: 2018-08-03
4 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

This cost is in turn passe...
View more

Method used

[0085] In FIG. 8, process 800 illustrates a process performed in eLockBox 600 for monitoring container security. In step 801 , an electrical signal is applied to a loop including the electrical protective wallpaper 300 . In step 802, the electrical signal coming out of the loop is detected, amplified and digitized. In step 803, the signature of the loop is obtained. In step 804, the obtained signature is compared with the signature obtained when the container was first closed and stored in the event logger. In step 805, based on the comparison, it is determined whether the signals are different or the same. If the signature comparison between the two measurements is the same, the lo...
View more


The disclosed embodiments include a method for tamper-proof protection of containers used for shipment of goods. The system contains a lock with electronic and mechanical components and a controller.A sensor is connected to a lock so that if forms a closed loop. The sensor can be an optical fiber or a distributed arrangement with an optical or an electrical shield. The electronics in the lock provide real time monitoring of the status of the lock. The lock cannot be opened or reproduced due to the signature of the closed loop which is stored in a remote server. Intrusions detected are relayedto an authorized recipient via a variety of communication channels. The data and control of the entire system is protected with several programs targeted to provide cybersecurity.

Application Domain

Vehicle locksNon-mechanical controls +4

Technology Topic

Embedded systemTrunking +8


  • Security system with Anti-tampering sensors and cybersecurity
  • Security system with Anti-tampering sensors and cybersecurity
  • Security system with Anti-tampering sensors and cybersecurity


  • Experimental program(1)

Example Embodiment

[0057] As will be set forth in further detail below, one aspect relates to safety systems and sensor arrangements. Part of the security system may include a lock with electronic, wireless and mechanical features, sometimes referred to herein as an "eLockBox". A sensor may be a loop of electrical conductors, or a loop of optical waveguides such as fiber optic cables. Such sensors may be physically attached to the eLockBox, or positioned remotely from the eLockBox and linked together via wireless connections using various bands of the electromagnetic spectrum. In some embodiments, the sensor coupled to the eLockBox may be an arrangement of electrical conductors covering six sides (sides, sides, sides) of the interior of the container, the six sides including the bottom, top, two sides and end wall. This configuration may be referred to herein as an "electrical shield". In other embodiments, the sensor may be an arrangement of optical waveguides, such as fiber optic cables, covering six sides of the interior of the container, including the bottom, top, two sides, and end walls, and in this context such an arrangement May be referred to as "optical guards". The statements in this disclosure regarding electrical shields also apply to optical shields. The electrical shield may be embedded in a medium such as nonwoven, paper, cardboard, wood, plastic sheet or plastic foam, or other conformable flexible medium. The electrical/optical shield may be formed as a loop of electrical conductors or a loop of fiber optic cable connected to electronic hardware for detecting loop interruptions. The resulting combination of continuous substrates of electrical or optical or wireless shields together with a suitable medium can cover all of the container interior walls. This technical arrangement results in so-called electrical protective wallpapers, or optical protective wallpapers on the other hand, or wireless protective wallpapers on the other hand. In some embodiments, the security system has a physical structure similar to a padlock, the body of which houses the electronic hardware and a shackle that includes a sensor.
[0058] The purpose of the technology is to provide a security system to prevent tampering with any type of container, such as shipping boxes, shipping cabinets, and shipping containers, trucks, trains, storage devices and perimeter security systems. The security system includes an electronic lock eLockBox along with various sensors for detecting intrusions or potential intrusions, and in turn notifies the user of status via various wired and wireless communication systems. Additionally, the technology includes a suite of software embedded in the eLockBox and a suite of software resident in a cloud computing server. The software of the entire system is equipped with programs to protect data with a set of network security programming measures for preventing malicious intrusion through Bluetooth, Wi-Fi, cellular communication, general wireless communication, wired communication, computer network, cloud server and the Internet. The server houses a database that includes tracking information about status, GPS location, history, containers, and other sensor readings of the system. The security system is equipped with sensors that provide information to the eLockBox. The primary sensor of the technology includes a sensor loop connected to the eLockBox. This sensor can be a fiber optic loop or an electrical loop around the container we are trying to secure and/or routed through a hasp-and-ring type latch on the bin or container that needs to be protected from unauthorized access The fiber optic loop or the electrical loop of the lock ring of the lock (hasp and staple latch). The electronics in the eLockBox monitor the sensors to ensure that it is locked and that unauthorized intrusions cannot occur. The eLockBox will notify the server if an unauthorized intrusion occurs or if the loop in the sensor is broken. The server will in turn send any suitable alert or warning to the container owner via mobile phone or email or other notification mechanism. One particular sensor exploits the properties of an electrical guard, which is a distributed arrangement of conductors arranged on the vessel wall. In resistance measurement, the sensor provides a characteristic resistance unique to the physical arrangement of the specific container and guard. This characteristic profile describes the total resistance value of the guard. For example, guards can be made by placing conductive ink on a material such as fabric or paper. Strips of conductive ink are placed on the material such that the gaps between the strips are narrow enough to prevent intrusion into the container without damaging the guard or the resistance of the strips changing instantaneously. The entire guard covering the container is connected such that it forms a six-sided box-type guard with a starting end and an ending end. The box guard may be monitored continuously or substantially continuously. It should be noted that any other characteristic response properties of the electrical shield may be used to meet the objectives of the techniques described herein. For example, capacitance can be utilized in conjunction with guards or wallpaper inside the container. In this method, one plate of the capacitor is formed in a wallpaper arrangement covering the interior of the box or container, and the second plate of the capacitor may be part of the wall of the container. A change in one or both plates of the capacitor caused by an intruder opening the box will result in a change in capacitance which can be detected and used as a means of sensing tampering. Additionally, as described in copending US Patent Application Serial No. 15/252,045, the optical loop can be used as a sensor.
[0059] Signal processing in the eLockBox can measure electrical parameter properties such as total resistance in a predetermined or random manner, mathematical algorithms can be implemented to transform the measured properties, and then the information is encoded for security purposes. In this document, the encoded information produced by a mathematical algorithm may be referred to as an identification code. The identification code may be based, at least in part, on characteristics of the guard. For example, a hash of the measurements can be used. The identification code can be encrypted.
[0060] The identification code, together with the part number, date of manufacture, serial number, place of origin, part name, batch number, production line, test station, environmental conditions and physical characteristics, constitutes so-called pedigree information. This set of data is securely stored in a cloud-based database, making counterfeiting nearly impossible for the eLockBox itself. Each time the eLockBox checks in (check in, check in, check in) in the cloud-based database, it must identify itself. If any of the parameters differ due to a malicious attack on the eLockBox or an attempt to replicate the eLockBox by counterfeit means, the identification comparator in the cloud-based database will detect the difference. The cloud-based database responds by sending tamper alerts to designated personnel.
[0061] The sensors connected to the eLockBox use different parameter measurements that affect the electrical transmission properties of the electrical guard. For example, if a sensor or electrical shield is intentionally ruptured in a different area, the rupture will result in an increase in electrical resistance to create the necessary parameters to obtain a unique electrical signature. One or more transfer characteristics from the electrical signature of the wallpaper can be selected by a proprietary digital signal processing program to generate an identification code. Following the initial generation of the identification code, the identification code is embedded in the pedigree and then sent to the server and/or embedded in the RFID tag before the container is shipped. Any tampering with the package or damage to the container walls will affect the identification code, and when a measurement is taken, the system can compare the received identification code with the measured identification code and any difference above a given threshold will reveal An intrusion has occurred, thus making the load suspicious. Whether monitored in real-time or on an event-driven basis, electro-protective wallpaper installed on the container walls will detect damage and can immediately send notification of container damage to designated recipients. Immediate notification of a container breach enables a prompt response by the appropriate authorized person who may be able to prevent or interrupt an unauthorized intrusion.
[0062] Accordingly, in one aspect of the technology, a method for product protection and detection of counterfeit products involves parametric measurements of electrical shields embedded in the package or surrounding the product or covering the interior walls of any container. Measurements are made sometime prior to shipment, such as at the product manufacturing facility, and identification codes are obtained. The identification code can be encrypted and embedded in the pedigree. The pedigree is sent through a communication channel to a customer-specified location in the supply chain. The receiver of the shipment makes similar measurements and verifies that the identification codes are the same, which provides confidence that no tampering has occurred.
[0063]The electrical protective wallpaper in the described technology takes advantage of the different types of responsive properties of electrical protective elements. Depending on what type of electronic material is used for the wallpaper covering the container, such as conductive ink, conductive paint, or other materials can be used, each material has a different level of resistance, making a difference when measuring the total resistance. Another characteristic is the capacitance from the guard to the container itself, which will vary depending on the type of guard material installed and used. It should be noted that any other characteristic response properties of the electrical shield can be used to meet the purpose of the described technique.
[0064] In another aspect, an article of manufacture for protecting a product from counterfeiting is disclosed. Hereinafter this will be referred to as an article. The article may include electrical shields embedded as a continuous substrate or strip or other physical arrangement in a medium such as nonwoven, paper, cardboard, wood, plastic sheet or foam, or other suitable flexible medium. Herein, the resulting combination may be referred to as an electroprotective wallpaper. Electric protective wallpaper is used to line (line, frame, frame, lining) the walls of a container or package to cover all six sides. The beginning and end of the continuous electrical loop are connected to an intelligent, autonomous detection unit called the eLockBox.
[0065] The eLockBox includes the hardware and software required to monitor and report on sensor status. Some of the functional elements in the eLockBox may include, but are not limited to: GPS; RFID; humidity and temperature sensors; motion detectors; cameras; batteries; electrical measurement transceivers; communication channels for Internet, satellite, Bluetooth, and mobile; Software, algorithms, and firmware that handle and communicate encryption.
[0066] Herein, the word "exemplary" is used only to mean "serving as an example, instance, or illustration." Embodiments described herein as "exemplary" are not necessarily to be construed as preferred or advantageous over other embodiments.
[0067] In some embodiments, tamper-proof secure handling of the shipping container is provided. Packages with electrical guards and processing including test systems and digital signal processing software allow the shipping container to be protected on all sides. Although the illustrations and discussions are directed to shipping containers, a similar approach will apply to other containers, such as two-wheeled semi-trailers, stationary storage containers, railroad cars, secure warehouses or that need to be protected from unauthorized access or Other types of containers or storage devices that have been tampered with.
[0068] figure 1 A typical shipping container 100 is shown, showing six sides in need of protection, any of which is susceptible to unwanted intrusion. Containers as described herein can be of any size or shape and can be handled by any typical shipping method in use today, be it air, ground or sea.
[0069] figure 2 All sides of shipping container 200 are shown exploded. These sides are top side 201 , bottom side 203 , left side 202 , right side 205 , back side 204 and front side 207 . Overlapping flaps 206 are shown within which additional electrical or optical protective wallpaper (or guards) are placed to protect the access to the container.
[0070] exist image 3 , an electrical protective wallpaper 300 for protecting a container is shown. The electrical protective wallpaper 300 includes a flexible and conformable medium 305 upon which suitable electrical protective elements 302 may be applied or embedded and secured in place. The material can be paper, plastic, textile, nonwoven, wood, or any other suitable material that can accept an electrical shield. The electrical shield can be affixed to the backing material, or embedded in the material as it is manufactured. Alternatively, the conductive material can be placed between two layers of backing material, as in a sandwich arrangement. The electrical shield 302 is routed in a manner to form a strip or grid, which may be linear or randomly arranged in any manner such that it does not allow penetration by a person, hand or arm or tool, or in Remove the cargo from the container without disrupting the arrangement of the electrical guards. exist image 3 , it shows one possible arrangement for an electrical shield, where the strips are placed in a horizontal pattern. One side of the guard is shorted and connected to the input electrical connector 301 and the opposite side of the guard is also shorted and connected to the output electrical connector 304 . The electrical connectors can meet different standards, such as COAX, typical wire or SMA, or some other configuration or standard, or can be custom connectors. The electrical protective wallpaper 300 may contain an adhesive layer to facilitate bonding the electrical protective wallpaper 300 to the face of the container.
[0071] exist Figure 4 , one face of the container is shown. Electrical protective wallpaper 300 may be applied to one of the six sides of the container to form a panel. In this case, we show an example of how to apply electrical protective wallpaper to the left side 202 of the container. The electro-protective wallpaper 300 is applied to the wall like standard wallpaper by applying the electro-protective wallpaper 300 to the wall of the container using attachment pins or by using an adhesive. The electrically protective wallpaper can be protected by an additional protective layer on material 403 made of wood, plastic, metal or some other protective material and attached to the side wall 202 of the container. Various other configurations of the electrical protective wallpaper, how it is applied to the side walls of the container, the density of the mesh, and other arrangements can be utilized in order to implement the described techniques. Connectors 301 and 304 are capable of connecting panels with electrical protective wallpaper 300 to further panels to provide complete wall coverage of all six sides of the container.
[0072] exist Figure 5 In, an arrangement for protecting the sides 202, 204, 205 and 206 of the container 500, the ceiling 201 and the floor 203 from tampering is shown. Portions of the ceiling 201 and floor 203 are shown with their electrical protective wallpaper 300 and their respective protective layers or materials 403 for illustrative purposes. Several panels with electrical protective wallpaper 300 are shown attached to the faces 202 , 204 , 205 and 206 of the container 500 . In this case, there are six panels comprising electrical protective wallpaper 300. Using connectors 301 on one side of the guard and connectors 304 on the opposite side of the guard, corresponding to each electrical protective wallpaper 300, the electrical in each panel is connected as shown at connection point 501. Protective wallpaper 300 is attached to adjacent panels. As shown, the electrical protective wallpaper 300 in the panel forms a continuous circuit so that electrical or optical signals sent into the connectors 301 of a given panel will pass through the panel's conductive strips , and the output signal will be output from the connector 304 . In the same way, using connectors 301 and 304, panels can be connected to the ceiling 201 and floor 203 of the container 500. Thus, this arrangement will form a complete continuous loop of electrical protective wallpaper 300 in an arrangement covering the six interior walls of the container. The electrical protective wallpaper panels may overlap so that there are no gaps in the coverage of the face of the container 500 . The electrical protective wallpaper 300 on the facade 206 shows the added protective layer 403 . In this case, the electrical protective wallpaper 300 may be adhered to the protective layer 403 . The entire loop of electrical material for the conductive ink covering all six sides terminates in two connectors attached to the eLockBox 600 described in detail below. Once the eLockBox 600 is connected to the connectors 301, 304 for the start and end of the guard loop, respectively, the door of the container 500 can be closed and the container 500 will be protected. Although the eLockBox 600 is shown in Figure 5 However, the eLockBox 600 may be placed outside the container 500, for example on the latch of a door of the container 500.
[0073] exist Image 6 In , the eLockBox 600 is shown with one type of sensor, and in this case the sensor is the electro-protective wallpaper 300. However, this sensor or another sensor can be placed on the latch of the door (as will be described later) so that the door of the container can be monitored. In some embodiments, two types of sensors may be employed, with one type of sensor (eg, electrical protective wallpaper 300) placed around the container and the other sensor placed on the door.
[0074] Electrically protective wallpaper 300 can be used to protect containers from tampering and to notify shippers and cargo owners of potential intrusions. in this case, Figure 5 A top view of the face of container 500 is shown. However, depending on the implementation, the electrical protective wallpaper 300 may be placed in all sides of the container 500 . Note that in this illustration, eLockBox 600 is not drawn to scale relative to the face of the container that includes electroprotective wallpaper 300 . This is to show the details and functionality of the eLockBox 600.
[0075] The eLockBox 600 may include a housing that houses electronic hardware and software for detecting intrusion into the container and also for notifying the owner or operator of the container of the intrusion. This can be done in real time, meaning that measurements and/or notifications can be made continuously or periodically during container transport. Additionally, the eLockBox 600 can monitor environmental conditions as needed to protect the integrity of the material in the container. exist Image 6 In the eLockBox 600 includes: a transmitter 602 for an electrical sensor loop or an optical sensor loop; an RFID tag 603; a GPS locator 604; a microcontroller or MCU 605; an event recorder 606; Can be used to identify intruders and physical location; pressure, temperature and humidity sensors 615, which can be used to monitor environmental conditions and can be used to protect the integrity of products within shipping containers; motion detectors 614, such as accelerometers or inertial measurements Unit (IMU), used as the eLockBox 600's on and off device, or to wake the system from battery saver mode, or to analyze the motion spectrum, this motion detector can be used to determine the vibration of the material inside the container or the Movement of fixed positions, or attempts to break or damage the eLockBox, or detection of shocks caused by attempts to break the container; battery module 607; battery charger 611; set of communication interface hardware 608; digital signal processor (DSP) 609; for a receiver module 610 for an electrical sensor loop or an optical sensor loop; and an input/output (I/O) interface 616 for communicating and charging the eLockBox 600 .
[0076] I/O interface 616 may be USB standard I/O or another computer type I/O. Communication interface 612 may be one of the communication interfaces used in the industry, such as, but not limited to, Wi-Fi, mobile cellular, Bluetooth, Ethernet, radio, ZigBee, or other communication standards. There may be additional external devices connected to the eLockBox 600 as will be described later. One or more external sensors 618 may be connected to eLockBox 600 . These sensors can be optical sensors, acoustic sensors, infrared sensors or other types of light sensors. These sensors can be connected using a sensor interface 617, which can be wireless or wired. Sensor 618 may be attached to other containers or to other parts of the same container as eLockBox 600 .
[0077]The eLockBox 600 can be connected using a transmission line 619 to one or more external antennas, which can be placed inside or outside the container protected by the eLockBox 600 . The eLockBox 600 is connected to the electrical protective wallpaper 300 surrounding the container at a location 601 where a transmitter 602 in the eLockBox 600 generates an electrical signal that is injected into the electrical protective wallpaper 300 . The electrical signals in transmitter 602 may be from a DC voltage source, an AC voltage source pulse generator, or other suitable electrical stimulation generator. In embodiments using optical protective wallpaper, the transmitter generates an optical signal from a laser, LED or other type of optical signal generator. In this case, the electrical signal circulates in the loop of the electrical protective wallpaper 300 and is received at the connector 611 and detected by the receiver 610 . Receiver 610 may include the necessary detection and measurement circuitry to determine any tampering in real time. Any attempted tampering or intrusion into the container will be sensed through changes in properties such as, but not limited to, resistance or capacitance.
[0078] Suitable conductive inks are commercially available, such as those manufactured by Dupont Corporation. exist image 3 , the resistance of each strip will be in parallel with the resistance of the other strips in the panel. For example, if in image 3 In the particular panel shown in , if each strip is 1 kiloohm, since there are 12 strips, the total resistance will be 1/12 or 83 ohms. The resistance of a series of six faces can be in the order of hundreds to thousands of ohms, depending on the conductivity and stripe pattern of the conductive ink. This quantity can be measured by a typical ohmmeter or by changes caused by intrusion. An ohmmeter may be incorporated into receiver 610 . For example, the receiver input may be fed to the input of a current-to-voltage converter to measure the current generated by the known amplitude voltage signal output by the transmitter 602 .
[0079] eLockBox 600 may include an RFID tag 603 and a GPS locator 604 . The microcontroller or processor MCU 605 includes embedded software that manages operations, hosts a control system that controls components inside the eLockBox 600, and provides the eLockBox 600 with protection against network intrusions.
[0080] The event recorder 606 may be arranged to monitor the electro-protective wallpaper 300 to ensure that the loop is not affected by damage or by changing its signature characteristics. The event recorder 606 may also be arranged to monitor the electrical protective wallpaper 300 periodically, or to record events as they occur (in real time). The event recorder 606 is used to store the monitoring history of the information generated by the eLockBox 600, its general operation, and any access to the container within a given time period.
[0081] The battery module 607 can power the eLockBox 600 during the time period the container is protected. Typically, this period of time can be extended by providing a sufficient amount of stored battery power. eLockBox 600 also includes a battery charger 611 for regulating power from an external power source such as I/O interface 616, which may conform to standard USB protocols with the ability to deliver power to battery-operated hardware such as eLockBox 600.
[0082] The digital signal processor 609 is used to perform operations involving generating electronic signatures for the electroprotective wallpaper 300 and executing mathematical and statistical models. The digital signal processor 609 may also be implemented in software executed in the MCU 605 .
[0083] Another module in eLockBox 600 is communication interface hardware 608 , which supports communication interface 612 . This is used to communicate the state of the container to users in close or remote locations. Some of the communication interfaces 612 may be via short-range wireless to mobile phones, land lines to cellular towers or to RF reception towers, satellite, fiber optic cables, and other types of communication channels. In the described techniques, several methods are used to prevent the intentional isolation of containers in order not to notify the user that tampering is taking place. In some implementations, the user system in the remote server may periodically query eLockBox 600 to detect the status. In some other embodiments, a non-metallic window, such as glass, in a given area of ​​the container can be used to place a satellite dish inside the container to broadcast any tampering that occurs in real-time or in an event-driven mode. Non-metallic windows can be protected from the panels of the electrical protective wallpaper 300, in which case the panels are made of a material that does not block RF frequencies emanating from the antenna. Therefore, the antenna is not blocked from transmitting at any time. Both methods can be used simultaneously for better communication and security assurance.
[0084] exist Figure 7 , the process 700 performed in the eLockBox 600 is used to obtain a signature for the electro-protective wallpaper 300 . In a first step 701, a signal is applied to the electrical loop in the electrical protective wallpaper 300. In a second step 702, the electrical carrier frequency (or wavelength) signal in the electrical domain is modulated and a modulated signal envelope for modulating the electrical carrier is applied. The modulation envelope can apply AM, FM or any other type of modulation. The carrier can also be modulated by changing the frequency (wavelength) of the power source. Both time and frequency modulation can be done in the electrical domain, and one at a time in the electrical domain, or by synchronized time and frequency modulation. In step 703, the electrical signal is detected after it propagates through the loop. Electrical signals can be digitized. In step 704, a digital signal processing algorithm is performed to extract the signature. This can be achieved by detecting characteristics such as resistance, or capacitance, reflection or other electrical effect characteristics of the guard part being used. Other relevant information generated by the various elements of eLockBox 600 is collected in step 705, such as GPS location, RFID information, event recorder information, and the like. In this step, all required sensor information is displayed, but not limited to Figure 7 information in . For example, to determine whether the packaged goods in the container have been damaged during shipping, a digital signal processing (DSP) algorithm may be implemented to determine the frequency spectrum of the signal sensed by the motion detector 614 . The Fast Fourier Transform (FFT) can provide some of this information. Motion detector information can be used to wake the processor in eLockBox 600 from a power saving mode of operation to conserve battery power, or to predict if an intruder is attempting to tamper with the lock. The information is then encrypted and sent to a secure server over a secure communication channel in step 706 . In addition, various electrical modules can be used to insert electrical attenuation and distortion, and can be used arbitrarily by placing them between connection points 501 to further randomize the signature to make it robust against counterfeit signals Impact. In step 707, the same information sent to the security server is stored in the event recorder. In step 708, the door of the container may be closed. In step 709, the system enters a mode in which the loop is operated and monitored continuously or periodically, or using event-driven monitoring, or a combination of one or more of these.
[0085] exist Figure 8 , process 800 illustrates a process performed in eLockBox 600 for monitoring container security. In step 801, an electrical signal is applied to the loop including the electrical protective wallpaper 300. In step 802, the electrical signal from the loop is detected, amplified and digitized. In step 803, the signature of the loop is obtained. In step 804, the obtained signature is compared to the signature obtained when the container was first shut down and stored in the event logger. In step 805, based on the comparison, it is determined whether the signals are different or the same. If the signature comparison between the two measurements is the same, the loop is reinitialized to continue monitoring mode. If the comparison is different, an alert is sent to the server in step 806 using one of the available communication channels. Note that in the described techniques, more than one communication channel may be used to notify the server about tampering to provide redundancy and prevent an intruder from cutting off real-time communication with the server. Additionally, the continuous monitoring loop can be adjusted to execute at programmable intervals to conserve battery power. Another way to conserve battery power is to monitor and notify based on events such as intrusions, container repositioning, or unauthorized opening of container doors.
[0086] exist Figure 9 , system 900 includes an embodiment of a tamper-resistant system using eLockBox 600 along with a sensor including optical waveguide loop 901 . The optical waveguide loop 901 may have a tubular structure, the interior of which is hollow so that it can accommodate the waveguide 902 . In this case, the waveguide loop 901 can be flexible and can protect the handle of the door in which the eLockBox 600 is seated in a manner similar to a padlock. The waveguide 902 can be made of optical fiber, and it can be used to prevent cutting of the optical waveguide loop 901 . In the simplest case, cleavage of loop 901 can be detected by sensing the absence of the signal at the receiver. Furthermore, the arrangement in this embodiment allows the system to obtain the signature from the waveguide 902 . If the waveguide is made of optical fiber, the system 900 can obtain the signature of the combination of the waveguide 902, the transmitter 602, and the receiver 610. The signature may include one of many optical properties such as those discussed in U.S. 9,329,098 B2, the entire contents of which are incorporated herein by reference. A counterfeiter would not be able to cut or replace the waveguide 902 because the signature cannot be copied from one fiber to another due to the unique signature of each fiber optic cable. The eLockBox 600 monitors the optical loop 902 for interruptions or cuts and communicates the intrusion or tampering to the server.
[0087] exist Figure 10 In the system 1000 of the present invention, the sensor connected to the eLockBox 600 includes a conductor 1002 , such as an insulated wire embedded inside the metal loop 1001 . Metal loop 1001 can be made of hard grade steel to prevent cutting. In this case, the eLockBox 600 monitors the conduction of current to determine any permanent or temporary interruption of the current flowing through the sensor loop. The sensor loop may be implemented by other methods, such as using acoustic waves propagating around loop 901 or an RF signal loop propagating around loop 901 .
[0088] Figure 11 A protection system including sensors and eLockBox 600 is shown. The system includes a loop sensor 1101 configured as a shackle of a padlock, wherein the eLockBox 600 is similar to the body of the padlock. Also similar to a padlock, and as described in detail below, one end of the loop sensor 1101 can be removed from the eLockBox 600, the loop sensor 1101 can be passed through the opening of the lock ring of a hasp-and-ring type latch, and then Reinserted and secured in the eLockBox in a manner similar to a regular padlock. The length of the loop sensor may be less than 30 centimeters, less than 20 centimeters, or in some implementations less than 10 centimeters. Subsequently, during transport, the eLockBox can check the continuity of the wire or fiber optic connection being maintained from the transmitter 602 to the receiver 610. If tampering or removal is detected due to loss of signal at the receiver, a notification may be sent to the system user as previously described.
[0089] Figure 11 The illustrated embodiment of the eLockBox 600 includes a front cover 1201 to which a 4-digit combination lock 1106 is mounted. The number of digits used for combination can be greater or less than 4. As will be explained further below, when the correct combination is entered, the lock 1106 can be rotated by hand to move the latch inside the eLockBox, releasing one side of the loop sensor 1101 in order to move the loop sensor 1101 out of the latch so that the door can be opened. Combination locks of this type are available, for example, from FJM Security Products of Lynnwood Washington as their Combi-Cam product line. Furthermore, the combination lock can be replaced by any known security system, such as a fingerprint scanner, a security eye scanner, and the like.
[0090] Figure 12 shows the internal components of one embodiment of the eLockBox, as in Figure 11Remove the back cover as seen from the back. In this embodiment, the system includes a sensor loop 1101 forming a shackle with an inner fiber optic cable 1102 and a lock body implemented as an eLockBox 600 . The shackle 1101 may be for Figure 9 the loop 901 or Figure 10 The loop 1001 describes the tubular loop. eLockBox 600 may include: two shackle holes 1103 and 1113 with opposite ends of the shackle attached to shackle holes 1103 and 1113; inner segment 1104 of fiber optic cable; latch mechanism 1105; combination lock 1106; optical Receiver sensor 1107; driver printed circuit assembly (PCA) 1108; LED cable 1110; transmitter 1111; and latch 1112.
[0091] The holes 1103 and 1113 may include a fixing hole 1103 and a latch hole 1113 . The distance between the centers of the two holes 1103 and 1113 may be less than 20 cm or less than 10 cm to enable the device to be held by one hand. The shackle 1101 can be substantially securely and permanently installed into the securing hole 1103 . Fiber optic cables 1104 extend from fittings 1120 mounted into fixing holes 1103 . The ends of the shackles 1101 inserted into the fixing holes 1103 cannot be removed from the fixing holes 1103 during normal use. The other end of the shackle 1101 including the fitting 1124 is inserted into the latch hole 1113 . Fitting 1124 includes groove 1112 that engages slide 1130 when eLockBox 600 is locked. When the user enters the correct combination in combination lock 1106, latch 1112 unlocks shackle 1101. The shackle 1101 can then be removed from the latch hole 1113. When the shackle 1101 is removed from the latch hole 1101 , in some implementations, the shackle 1101 can rotate about an axis parallel to the two long ends of the shackle 1101 .
[0092] Combination lock 1106 may be a 4 digit combination lock that provides 10,000 different combinations. However, embodiments are not so limited and may include more numbers (eg, 5 digits, which provide 100,000 combinations) or fewer numbers (eg, 3 digits, which provide 1,000 combinations). The number of digits can vary depending on user preference. In some embodiments, the combination input may be sent electronically to a server within the eLockBox or a remote server for comparison with the correct combination.
[0093] When the correct combination is entered and the front knob is rotated, the arm 1105, which also engages the slider 1130, rotates to move the slider 1112 out of the groove 1112 to unlock the fitting 1124 and thus the shackle 1101. The fitting 1124 can then be pulled away from the launcher 1111 and out of the hole 1113.
[0094] Driver PCA 1108 may include hardware and software components for operating eLockBox 600 . For example, eLockBox 600 may include various components required to operate: RFID 603, GPS 604, MCU 605, event recorder 606, motion detector 614, sensors 615, DSP 609, communication interface hardware 608, battery module 607, battery Charger 611 , camera module and light sensor 613 , and I/O interface 616 .
[0095] Driver PCA 1108 may also include an LED driver (not shown) that transmits transmission signals to fiber optic transmitter 1111 via cable 1110 . When the transmission signal is received by the fiber optic transmitter 1111, a sensor signal (eg, light pulse, electrical signal, etc.) suitable for transmission through the fiber optic cable 1102 may be transmitted from the fiber optic transmitter 1111. During normal operation, the sensor signal is transmitted through one end of the fiber optic cable 1102 and the shackle 1101 and is finally received at the other end of the shackle 1101 inserted into the fixing hole 1103 . The sensor signal is then transmitted through fiber optic cable 1104, which is electrically or optically connected to shackle 1101. The sensor signal is then transmitted through fiber optic cable 1104 and received by optical receiver sensor 1107 . Once the signal is received by the receiver 1107, the signal is analyzed by the driver PCA 1108 to detect any tampering.
[0096] Although primarily described above with optical signals, if sensor 1102 includes a signal such as Figure 10 metal conductors 1002 in the eLockBox 600, some components in the eLockBox 600 will be electrical components rather than optical components. For example, cable 1110 may be a metal conductor capable of conducting electrical signals, transmitter 1111 may be an electrical signal generator, cable 1104 may be a metal cable, and receiver sensor 1107 may be an electrical signal receiver.
[0097] If eLockBox 600 is tampered with, the signal received by receiver sensor 1107 will not match the stored optical or electrical signature. In this case, a signal is sent to the server so that the owner or operator of the eLockBox 600 can be notified of the tampering.
[0098] Optical or electrical signals transmitted through the loop may be transmitted at regular intervals, eg, every 5 seconds, every 10 seconds, every 1 minute, and the like. In this way, the owner or operator of the eLockBox 600 can be notified in real time when someone attempts to tamper with the contents of the container.
[0099] The order of steps and components shown in the figures above are not limiting. The methods and components are susceptible to modification by omitting or reordering illustrated steps and components without departing from the scope of the disclosed embodiments.
[0100] Through these descriptions, a novel way of protecting a shipping container with a product inside has been described. The described types of power sources that can be employed, the packaging techniques commonly used to incorporate electrical protective wallpaper loops, and the algorithms used to test electrical characteristics can use a variety of different techniques and techniques.
[0101] The various illustrative logical measurement techniques and processes for generating pedigrees can be implemented in a variety of combinations. The details of the apparatus used to test the electrical response used to generate the electrical signature information may vary depending on the specific implementation of the described techniques. Functionality is described differently for each particular application of different types of parts, systems, instruments, and other shipping products, but such implementation should not be construed as causing a departure from the scope of the present invention.
[0102] The change in the properties of the conductive ink can depend on the temperature at the measurement location, the package and the deformation of the container. The operator can adjust the resistance of the capacitive characteristic measurement threshold to account for these effects.
[0103] The steps of a method or algorithm described in connection with the embodiments disclosed herein may be implemented directly in hardware, as a software module executed by a processor, or as a combination of both.
[0104] The opening of the container can be further secured with an external electric lock protecting the container door to provide a physical security barrier that mechanically prevents unauthorized opening of the container.
[0105] The previous description of the embodiments of the present disclosure is provided to enable the use of the present technology. Various modifications to these embodiments, and the generic principles defined herein, may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.


Length<= 30.0cm

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products