CN101813703A - Utilize the method and system of multiple sensors for monitoring container security, content and state - Google Patents

Utilize the method and system of multiple sensors for monitoring container security, content and state Download PDF

Info

Publication number
CN101813703A
CN101813703A CN201010128012A CN201010128012A CN101813703A CN 101813703 A CN101813703 A CN 101813703A CN 201010128012 A CN201010128012 A CN 201010128012A CN 201010128012 A CN201010128012 A CN 201010128012A CN 101813703 A CN101813703 A CN 101813703A
Authority
CN
China
Prior art keywords
container
sensor
equipment
door
card reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010128012A
Other languages
Chinese (zh)
Inventor
G·R·莫顿森
汉斯·波曼
卡尔·博曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CommerceGuard AB
Original Assignee
All Set Marine Security AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/667,282 external-priority patent/US20040100379A1/en
Application filed by All Set Marine Security AB filed Critical All Set Marine Security AB
Publication of CN101813703A publication Critical patent/CN101813703A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/0092Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture

Abstract

Container and content surveillance comprise: equipment, card reader, server, software backbone and hold the container of a plurality of sensors.Described equipment is communicated by letter with card reader with a plurality of sensors so that determine the state of container and its content.Described card reader slave unit is to Server Transport information.Described equipment is determined the state of container based at least one sensor on the container or in the container.

Description

Utilize the method and system of multiple sensors for monitoring container security, content and state
The application is the application number submitted on May 17th, 2004 the dividing an application for the application for a patent for invention of " utilizing the method and system of multiple sensors for monitoring container security, content and state " that be 200480020206.5 (PCT/US2004/015403), denomination of invention.
The cross reference of related application
The application requires the right of priority of following application, and its disclosed content is hereby incorporated by: the unsettled temporary patent application No.60/470 of application on May 15th, 2003,435, the unsettled temporary patent application No.60/556 of application on March 24th, 2004,106, and the unsettled U.S. Patent application No.10/667 of application on September 17th, 2003,282, it has required the temporary patent application No.60/411 of application on September 17th, 2002,042 right of priority.
Technical field
The present invention relates to utilize the method and system of state of the internal environment of multiple sensors for monitoring container.Especially, but be not limited to, utilize multi-sensor surveillance to run through the method and system of state of the internal environment of the combined transportation cargo container in the supply chain.
Background technology
Most shipping of goods all over the world are all by being called the thing shipping of combined transportation cargo container.Used here term " container " comprises any to the opaque container of radio frequency signals (no matter whether having added wheel), including, but not limited to the combined transportation cargo container.Prevailing combined transportation cargo container is considered to the dry intermodal container of International Organization for Standardization, the meaning be they meet special size, machinery and other standard by ISO issue, the development of the long-distance transport equipment of the container by encouraging compatibility standard, treatment facility, foreign-going ship, railway equipment and all modes that are used for the transmission of goods water route all over the world and make and be used for promoting global trade.Have at present more than 1,200 ten thousand such containers and many more professional containers, the frozen products insulated container that for example carries perishable commodity circulates in the whole world.Annual about 6,000,000 containers of having freighted, 17000 of similar every days, half of the total value of approaching annual all goods that receive of receiving separately of the U.S..
Because nearly 90% all transmitting in container of all goods of shipping in the world, encased conveying has become the spine of world economy.
It is unpractical that the absolute magnitude of the container of whole world transportation will be implemented actual inspection one by one, in fact enter only have in the container of the U.S. 2% to 3% by actual inspection.The risk that terrorist's biology, radiation or volatile equipment is introduced by cargo container is very high, considers the importance of container in world commerce, and the consequence that such incident causes international economy may be catastrophic.
Even sufficient resources is put in the actual inspection work of implementing all containers and goes, such task still can cause serious economic consequences.
For example only the time of delay just can cause closure of a factory and the delay of unnecessary and high cost in the process that conveys goods to client.
Present container designs fails to provide suitable mechanism to set up and the security of monitoring container or their content.Typical container comprises one or more hasp mechanism, and the indication " strip of paper used for sealing " of its permission insertion plastics or metal or the tradition " strip of paper used for sealing " of bolt fence are protected the door of container.The door hasp mechanism that tradition is used is easy to destroyed, for example, and by on the attachment bolt that is installed on hasp outdoors, holing.By the replacement of using common cutting tool and very simply duplicating strip of paper used for sealing, the traditional strip of paper used for sealing that uses also is easy to destroyed at present.
The more senior solution that proposes is e-seals (" e-seal ") recently.Though these e-seal are equivalent to traditional door envelope and by unstable identical hasp mechanism, as the accessory application of container in container, but these e-seal also comprise the electronic equipment that can transmit the e-seal sequence number such as radio or radio reflections equipment etc., and the signal that is cut or damages after the e-seal installation.Yet described e-seal can not communicate by letter with the inside or the content of container, can not will be referred to the inside of container or the information of content and be sent to miscellaneous equipment.
Described e-seal typically adopts low power radio transceivers or utilizes the radio frequency backscatter technique, information from the e-seal tag transmits on the card reader that is installed on the end-gate for example.The radio frequency backscattering relates to relatively costly arrowband high power radiotelegraphy and the radio broadcasting technology based on unit radar.The radio backscatter technique need card reader transmission have the higher transmit acc power (just, radio signal 0.5-3W), the signal with modulated or coded data from e-seal be reflected or backward scattering get back to card reader.
In addition, that the application of current e-seal is used is wide-open, unencrypted and unsafe air interface and agreement, allows relatively easy plagiarization and the forgery of e-seal.Present e-seal also only works on the frequency bandwidth of this locality mandate that is lower than 1GHz, owing to its radio regulation(s) in present many countries does not in the world allow their use, makes to be difficult in when global trade relates to intermodal container and realizes.
In addition, it is invalid that e-seal comes the security aspect of monitoring container from the angle of the replaceable form of invasion or the angle that relates to container contents, because container can pass through the destroyed or harm of various methodologies, and the method for tradition visit internal container only is the door by container.For example, biopreparate can be inserted in the container by the standard air vents of container, or the sidewall of container can be pierced path is provided.Although traditional strip of paper used for sealing and e-seal provide a kind of form of door of security monitoring container, the both can be damaged.Traditional strip of paper used for sealing and e-seal mostly just are suspended on the door hasp of container, and when container was handled for example steamer loading and unloading, they all were exposed under the physical hazard.In addition, the content that traditional strip of paper used for sealing and e-seal can not monitoring containers.
Utilize multisensor to come the inner thing of monitoring container to cover multiple possible problem and/or prestige danger state is necessary.For example, container can be used to material ship dangerous, radiation, such as bomb.In such scheme, in order to detect the existence of serious like this prestige danger, wireless senser will need.Unfortunately, the terrorist menaces single kind that is not limited to threaten.Chemistry and biological weapons both are used in a large number and the public are produced serious threat.Therefore, two types detecting device may all need, and particular case, radiation, gas and biology sensor can be considered to suitable.A problem of the use of this sensor is that when sensor placed the inside of container, how on earth the data of this detection were transferred to the external world.Because the intermodal container of standard is to adopt for the opaque steel of radio signal to make, in fact can not has a reliable system unless data transmission is addressed and be used for from placing the sensor transmissions data of such container fully.If data can be transmitted effectively from the sensor that is deployed in fully the intermodal container, for example the state and/or the security parameter of temperature, light, inflammable gas, protein (biometric sensor) motion, radio activity, biology and other state can be monitored.In addition, the integrality of the installation of such sensor is crucial and need protects the more ripe surveillance of door hasp mechanism of container door than the tradition " strip of paper used for sealing " that the indication " strip of paper used for sealing " of plastics or metal or bolt fence are inserted in the above-mentioned permission of mentioning.
Except that above-mentioned, the supervision of the integrality of container may relative complex by the door motion.Although very heavy load is reasonably constructed and carried to container structure, comprise single container and rely on container stacked mutually, each container also is designed to regulate horizontal load and regulates the intrinsic dynamic stress of (especially) ocean transmission and mobile, and this stress usually runs into moving in the shipping of container.The iso standard that is used for typical container at present can allow because lateral load mostly is 40 millimeters most with respect to the motion on the Z-axis of other container.Therefore, the safety method based on the close relation that keeps the physical interface between two container doors generally is unpractiaca.
Therefore, provide a kind of cost, permanent feasible and reliable mode to come the monitoring container door to have superiority with respect to the method and system of the motion of container structure with economy.Equally, provide a kind of data routing or gateway, it is used to be placed in the container, and a plurality of sensors detect the alternative or the dangerous existence or the illegal contents thing of invasion and are sent to outside receiver.
Summary of the invention
Above-mentioned these and other shortcoming is overcome by concrete scheme of the present invention, the invention provides to utilize effectively and the reliably method and system of monitoring container and content thereof of a plurality of sensors.Especially, one aspect of the present invention comprise can hold a plurality of sensors and with the equipment of a plurality of sensor communications, these sensors are used for the internal state of monitoring container.This equipment comprises the container that holds a plurality of sensors, and these sensors are fit to detect the state of at least a container, and the device that is used for the relevant information transmission of sensor is arrived the container external position.Can comprise data that relate to the motion that detected, radiation, chemicals, biopreparate, heat, gas or the like or the alarm of satisfying or surpassed the threshold value of predetermined one or more conditions from the communication of sensor.
On the other hand, the present invention relates to the equipment with the state of a plurality of sensor monitoring containers, the container of the type has at least one door pivotally mounted thereto.This equipment comprises the device of the motion that is used for the detected set loading door, be used to transmit the device of the motion related information of detected container door, be used to hold the container of the use of a plurality of sensors, and communicating devices between the device that is used to keep the internal container container of adjacent doors and detect motion.The device that is used to transmit is deployed in associated container and transmits the door of detection and move to the container outside.
On the other hand, the present invention relates to method with the state of a plurality of sensor containers and content thereof.This method may further comprise the steps: the container that is installed in the container is provided; this container is fit to holding of sensor and protects; place a plurality of sensors in this receptacle; connect sensor; by placing the data cell monitoring sensor of internal container; variation based on the detected numerical value of sensor determines by data cell whether state changes; result according to determining step; by data cell and antenna communication; but the relevant position that is connected to data cell to this antenna mutual operation and is positioned at container is used to transmit data to the container external position, and by the information of antenna transmission about the communication step-length.
On the other hand, the present invention relates to be used to hold the sensor container of at least one sensor unit.This sensor container comprises at least one excrescence that extend from sensor container and vertical beam adjacency container, is used to hold the pipeline of at least one sensor unit, is used to connect at least one connector of at least one sensor unit.Be closed the pressure that is produced by at least one protective device with by the door against the container of vertical beam, this at least one excrescence has been protected sensor container.
On the other hand, the present invention relates to be used for the system of a plurality of states of monitoring container.This system comprises that at least one is used for the sensor of monitoring container state, is used for from the sensor container that detects the radio frequency ID card reader of information and be used to hold at least one sensor with the label of the special partial association of goods.
The accompanying drawing summary
Will be in conjunction with the following drawings and realize to the more complete understanding of the specific embodiment of the present invention with reference to subsequently embodiment, wherein:
Figure 1A is the chart of diagram according to the communication between the system element of the embodiment of the invention;
Figure 1B is the chart of a typical supply chain of diagram;
Fig. 2 A is the synoptic diagram in conjunction with the equipment of embodiment of the invention use;
Fig. 2 B is the vertical view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 C is the side view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 D is the first excision skeleton view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 E is the second excision skeleton view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 F is the front view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 G is the rear view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 H is the upward view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 I is the vertical view in conjunction with the equipment of embodiment of the invention use;
Fig. 2 J is the front view that is contained in the equipment of Fig. 2 F on the container;
Fig. 2 K is the skeleton view according to the sensor container of the embodiment of the invention;
Fig. 2 L is the side view of the sensor container of Fig. 2 K;
Fig. 2 M is the top plan view of the sensor container of Fig. 2 K;
Fig. 2 N is the skeleton view according to the sensor of the embodiment of the invention;
Fig. 2 P is the side view of the sensor of Fig. 2 N;
Fig. 2 Q is the top plan view of the sensor of Fig. 2 N;
Fig. 2 R is the block diagram of Fig. 2 N to the sensor of 2Q;
Fig. 2 S is the schematic chart of describing according to the installation of the sensor container of the embodiment of the invention and sensor;
Fig. 2 T is mounted in the skeleton view of the equipment of Fig. 2 F on the container;
Fig. 3 A is the synoptic diagram in conjunction with the card reader of embodiment of the invention use;
Fig. 3 B is the card reader figure that uses in conjunction with the embodiment of the invention;
Fig. 4 is first application scheme according to the system of Figure 1A of the embodiment of the invention;
Fig. 5 is second application scheme according to the system of Figure 1A of the embodiment of the invention;
Fig. 6 is the 3rd application scheme according to the system of Figure 1A of the embodiment of the invention;
Fig. 7 is the 4th application scheme according to the system of Figure 1A of the embodiment of the invention;
Fig. 8 is the chart of diagram in conjunction with the container defence program of embodiment of the invention use;
Fig. 9 is the chart of diagram in conjunction with the container-security-check of embodiment of the invention use;
Figure 10 A is the process flow diagram of diagram in conjunction with the door-sensor calibration process of embodiment of the invention use;
So Figure 10 B process flow diagram of estimating disturbed condition;
Figure 11 is the process flow diagram of diagram according to the sensor scrutiny program of the embodiment of the invention;
Figure 12 is the process flow diagram that illustrates sensor scrutiny program according to another embodiment of the invention;
Figure 13 is the process flow diagram that illustrates sensor scrutiny program according to another embodiment of the invention.
Embodiment
Have been found that the container security device of this type of following elaboration, demonstration and description, can be positioned in the container and be reliably, to be used for effective detection its integrality, state and content to container.Will describe in detail as following, equipment is positioned in the predetermined structure division of container in accordance with the principles of the present invention, to be used to show minimum structural moving.Described move results from this container owing to conventionally load, handle and by the extension along interface between traditional container framework and the door.Elastic washer is usually placed and is extended by interface area around described door, with guarantee this container be waterproof and also the weatherproof of protection commodity.This equipment is suitable for: (a) simply do not have instrument and install; (b) the intermittent signal transmission of self-powered; (c) sensing is with respect to the pressure of flexible door seal, is used to indicate the deviation that moves of container door with transmission, comprising invasion.
Figure 1A illustrates the chart of the communication between the system element in accordance with the principles of the present invention.This system comprises equipment 12, at least a card reader 16, server 15 and software backbone 17.Equipment 12 guarantees that this container is not destroyed after container 10 is protected.Container 10 is by card reader 16 protections and tracking.Each card reader 16 can comprise and be used for the hardware or the software of communicating by letter with server 15, for example be used for the modulator-demodular unit by transmission data such as GSM, CDMA or be used for the cable of data download to PC, this PC by transmitted data on network to server 15.Variously be used for from card reader 16 to server that 15 apparatus for transmitting data can be applied to card reader 16 or become an independent equipment.This card reader 16 can be configured to a handheld reader 16 (A), mobile card reader 16 (B) or fixed reader 16 (C).Handheld reader 16 (A) is combined with mobile telephone, personal digital assistant or portable computer for example.Mobile card reader 16 (B) is a fixed reader that has the GPS interface basically, typically uses in mobile device (for example use existing GPS, AIS or similarly truck, train or the steamer of positioning system) to protect, follow the tracks of in the mode that is similar to handheld reader 16 (A) and the integrality of definite container.In stationary installation, for example at the harbour or the shipping harbour, fixed reader 16 (C) typically is installed on crane or the door.This card reader 16 is mainly as the relay station service between equipment 12 and the server 15.The record of server 15 storage security item details, for example door incident (for example security destruction, container security inspection, protection container and unload containers), position and any additional peripheral sensor information of wanting (for example temperature, mobile, radiation).This server 15 is accessible in conjunction with software backbone 17 to authorized user, so as to determine container 10 Last Known Location, the container of any amount is made the integrality inquiry or is carried out other bookkeeping.
Equipment 12 is communicated by letter with card reader 16 by the short-range wireless interface of the wave point of use such as direct sequence spread spectrum principle.This wave point for example can use bluetooth or any other short distance, lower powered system, and this system operates in the industry that need not to register, science and medical science (ISM) frequency band, is for example operating in general 2.4GHz.Depend on the needs to special solution, corresponding radio range is provided, for example greater than the radio range of 100m.
Card reader 16 can be communicated by letter with server 15 by the network 13 that for example uses TCP/IP, by any suitable technique, for example Universal Mobile Telecommunications System (UMTS), global system for mobile communications (GSM), CDMA (CDMA), time division multiple access (TDMA) (TDMA), Local Area Network, satellite communication system, automatic recognition system (AIS) or Mobitex.Server 15 can be communicated by letter with software backbone 17 by any suitable wired or wireless technology.This software backbone 17 is suitable for supporting real-time monitor service, for example follows the tracks of and protection container 10 by server 15, card reader 16 and equipment 12.Server 15 and/or software backbone 17 are suitable for canned data, for example identifying information, trace information, door incident and other is by the data of equipment 12 with the additional peripheral sensor transmissions that links to each other with equipment 12 co-operate.It is that authorized user is visited canned data that this software backbone also allows by user interface, and this interface can pass through for example access to netwoks.
With reference now to Figure 1B,, shows from the flow process 2 of a typical supply chain of node (A) to (I).Reference mode (A) at first, container 10 waits the goods of having packed into by consignor.At node (B), load good container and transport to the harbour by highway or transportation by railroad.At node (C), this container enter the GATT at loading harbour (gate in) such as the shipping harbour.
At node (D), container loading is to the steamer by forwarding agent's operation.At node (E), container betransported the harbour that the merchant is transported to unloading.At node (F), container trailing wheel discharge afloat.After node (F) unloading, node (G) container by the truck of freighting on and go out to close (gateout) from the harbour of unloading.At node (H), container is to arrive the expectation place with the similar mode of this node (B) by land transport.At node (I), on the basis that arrives the expectation place, container is unloaded by the consignee.
It is evident that for those skilled in the art, lack detection visible or that other is traditional, having many times at the intranodal of flow process 2, the security of container may be endangered.In addition, the state of the content of container all is unknown fully for relating in the flow process 2 anyone, up to node (H) when the content of container unloaded.
Fig. 2 A is the block diagram of equipment 12.Described equipment 12 comprises antenna 20, RF/ Base Band Unit 21, microprocessor (MCU) 22, storer 24 and door sensor 29.This equipment 12 can also comprise interface 28, is used for the various internal states of the connection of additional sensor with monitoring container, and for example temperature, vibration, radiation, poison gas detect and moves.This equipment 12 can also comprise optional power supply 26 (for example battery); Yet other detachable and remote power supply also can be used by equipment 12.When power supply 26 comprises battery (as shown in the figure), the inclusion of the power supply 26 in equipment 12 can help extending battery life, can allow power supply 26 be in less temperature fluctuation because power supply is in the inside of container 10.Power supply is present in damage or the damage capability that helps in the container reducing to power supply 26.This equipment 12 also optionally comprises and being used for directly and the connector of card reader 16 interfaces.For example, connector can be positioned at the outer wall of container 10, is used for the visit of card reader 16.This card reader 16 can be connected to the information that slave unit 12 is downloaded by cable or other direct interface then.
Microprocessor 22 (being equipped with internal storage) comprises from door sensor 29 recognitiion gate incidents, for example, and container security request, container unload request and container security inspection.The door incident that is identified comprises that also the security of the content that may endanger container 10 destroys, such as open door again after container 10 cuts out.This incident can be stabbed and be stored in and is used to be transferred to card reader 16 in the storer 24 joining day.This incident can be immediately or cyclical transmission, or response is transmitted from the inquiry of card reader 16.Here the door sensor of Xian Shiing belongs to pressure sensor types, but it also can be, for example, and interchangeable feeler, proximity transducer or detect the sensor of any other adequate types of the relative motion on two surfaces.The term of the pressure transducer of using here is including, but not limited to these other sensor types.
Antenna 20 is used for carrying out exchanges data with card reader 16.Particularly various information, for example state and control data can exchange.Microprocessor 22 can be programmed by the coding of unique identification container 10.This coding can be, for example, and International Organization for Standardization container identification code.Described microprocessor 22 can also be stored other logical data, such as invoice of withdrawals (B/L), mechanical seal number, have the reader identification of timestamp etc.Can generate a special journal file, make historical record and door incident to recover.This coding also can be transferred to card reader 16 for the purpose slave unit of discerning 12.This RF/ Base Band Unit 21 to the RF signal, is used to be transferred to card reader 16 from baseband signal upconverts microprocessor signal.
Equipment 12 can be by the integrity inquiry of antenna 20 receptions from card reader 16.Respond this integrity inquiry, microprocessor 22 can extract by reference-to storage then, and for example, door incident, temperature read, security destruction, sensor are reported to the police or other canned data, so that transmit the information extracted to card reader 16.Card reader 16 also can send a security or equipment 12 is asked in releasing.After container 10 was by card reader 16 protection, when sensor 29 detected physical change on the pressure of container after protected, the MCU22 of equipment 12 can be programmed for and send one and can hear the alarm that maybe can see.Equipment 12 can also be corrupted in the storer 24 by record security, is used to be transferred to card reader 16.If card reader 16 sends one and removes request to equipment 12, this microprocessor 22 can be programmed for from the door incident of record and separate, or separates from door sensor 29 or other and sensor received signal that equipment 12 interactivity are connected.
Microprocessor 22 can also be programmed for the realization power control techniques, is used to make power supply 26 to avoid unnecessary power consumption.Especially, optionally be that one or more time windows are designated by antenna 20, the activation that is used for equipment 12 elements is with swap data.Outside the time window of definition, equipment 12 can be set to enter sleep pattern and run off to avoid unnecessary power.Such sleep pattern can draw the live part of apparatus operating time, so this equipment 12 can be operated and needs to change battery for many years and not.
Especially, according to the present invention, equipment 12 utilizes " sleep " pattern to reach the economic utilization of power supply 26.In sleep pattern, the circuit part of equipment 12 is closed.For example, remove sensor 29 and be used to measure cycle length of one's sleep t SleepTime measuring unit (for example counter in the microprocessor 22) outside all circuit all close.In a typical embodiment, detect a door incident when having passed through the cycle length of one's sleep or having worked as door sensor, the stick holding circuit power supply of equipment 12.
When the signal that equipment 12 receives from card reader 16, this equipment 12 keeps activating so that communicate by letter with card reader 16 under requested situation.If equipment 12 does not have to receive the request from card reader 16, this equipment 12 will only guarantee be referred to as wireless signal time cycle or breathing (sniff) " cycle " (" t at needs Sniff") time cycle in do not have signal to deposit under the situation to keep activating.
At t SniffDuring arrival, equipment 12 cuts off the power supply once more, unless time measuring unit and door sensor 29, activated equipment 12 once more after a door incident taking place or experienced another cycle length of one's sleep.
In a typical embodiment, the card reader signal time cycle is significantly shorter than (for example on some orders of magnitude less than) cycle length of one's sleep, so that the life-span of equipment obtains prolonging (for example on some orders of magnitude) with respect to " continuing to start " scheme accordingly.
The cycle length of one's sleep and card reader time cycle (cycling time) sum obtain a temporal lower bound, and equipment 12 and card reader 16 must arrive this restriction and know existing of equipment 12 to guarantee card reader 16.The related time cycle will be called as elapsed time (" t Pass").
Yet elapsed time (" t Pass") controlled by particular case.This elapsed time in some cases can be very long (for example the equipment on freight container 12 communicating by letter with the card reader 16 on truck front portion of transporting container 10 or chassis several hours), or in other cases can be very short (for example when the equipment on container 10 12 at a high speed through several seconds zero point of fixed reader 16 (C)).Typically for all application, each equipment 12 will be in its life-span, and some situation has the bigger elapsed time and some situation has the less elapsed time.
Therefore the described cycle length of one's sleep is selected usually like this, this cycle length of one's sleep and the shortest possibility consistent (" t of elapsed time Pass, min").That is relational expression,
T sleep≤t pass,min-t sniff
Can realize according to the various modes of operation of equipment.The cycle length of one's sleep is distributed to equipment (for example, in life cycle) with the dynamical fashion of the particular case that depends on equipment.
When card reader 16 was communicated by letter with equipment 12, this card reader 16 was come reprogramming, the cycle length of one's sleep of change equipment 12 according to the position and the function of card reader 16 from data or other retrievable information in card reader 16 of equipment 12.For example, be loaded into surely on truck or other the suitable vehicles by crane or trailer if the container 10 of equipment 12 is housed, these suitable vehicles are equipped with card reader 16, and truck and trailer do not assemble any card reader 16.The expectation truck travels through being positioned at the fixed reader 16 (C) of harbour outlet or container discharge point with high relatively speed.Therefore, the card reader on the vehicles 16 (C) needs programming device 12 to be the short cycle length of one's sleep (for example~0.5 second).
A branch of above-described overall thought can be, according to circumstances, card reader 16 can program sequences of sleep periods in equipment 12.For example, when container 10 is loaded on the steamer, when travelling, per hour wake up once just enough at sea for equipment 12.Yet,, may just require short sleep cycle can connect with equipment 12 with the card reader 16 on the crane that guarantees unload containers 10 in case estimate will be near the purpose harbour for steamer.Card reader 16 on the crane that is used for loading container 10 on the steamer is programming device 12 like this: at first, per hour woke up once, woke up once in per then 10 seconds in lasting 3 days.
In another scheme, card reader 16 moves on to equipment 12 and can revise the cycle length of one's sleep according to physical location.For example, can hypothesis set equipment 12 in the vanning 10 can be with the card reader 16 of the truck that is used for drawing container 10 mutual continual communication of the process of drawing container.As long as far away enough from the destination of container 10, card reader 16 can be slept in the time interval (for example one hour) that prolongs by programming device 12.When card reader 16 was equipped with GPS (GPS) receiver or other positioning equipment, this card reader just can determine when this container 10 is near its destination.In case container is near its destination, card reader 16 can be waken up by programming device 12 more frequent (for example per seconds).
Above-described method for managing power supply is explained with reference to the equipment 12 in the traffic condition of the freight container by means of transportation such as sea-freight, highway, railway or aviations or other goods, those skilled in that art are appreciated that method for managing power supply described above, also can be applied to for example animal transport, highway toll machine motor vehicle identification and antitheft, and stock management and supply chain management.
With reference now to Fig. 2 B,, shows first skeleton view of equipment 12.This equipment 12 comprises: the sway brace 102 that comprises the shell 25 of data cell 100 (not shown), extends from shell, and an angular relationship is arranged from the outward extending antenna arm 104 of sway brace.As described below, the length of the size of shell 25, sway brace 102 and the configuration of antenna arm 104 are carefully chosen out and the universal container compatibility.Shell 25, sway brace 102 and antenna arm 104 typically are moulded in polyurethane material 23 or the analog to protect it not affected by environment.
Still with reference to figure 2B, the part of the material 23 of sway brace 102 is cut at least one magnet 27 wherein to be shown and the layout of at least one door sensor 29 on it.Magnet 27 allows the stability of the enhancing of equipment 12 in the following container that will describe, and door sensor 29 detections simultaneously are along the variation of the pressure of the packing washer of the following container that will describe.
Second skeleton view of equipment 12 further shows the layout of the magnet 27 in the sway brace 102 shown in Fig. 2 C.Magnet 27 is located in the sway brace 102 among the corresponding hole 27A that forms, and the mode that is beneficial to the installation of equipment 12 pastes on it.
With reference now to Fig. 2 D,, the vertical view of equipment 12 was illustrated before any molding material 23 is employed.In this way, the position display of power supply 26, data cell 100, antenna 20 gets clearer.Equipment 12 comprises data cell 100 and power supply 26, microprocessor 22 (not shown), storer 24 (not shown) and optional interface 28 (not shown).Sway brace 102 extends out and comprises that hole 27A holds at least one magnet 27 and stayed surface from data cell 100, and door sensor 29 is attached on this surface.What extend from sway brace 102 is antenna arm 104, is used for supporting antenna 20.
With reference now to Fig. 2 E,, the side view of equipment 12 was illustrated before any molding material 23 is employed.As shown in the figure, sway brace 102 from data cell 100 upwards and stretch out.This sway brace 102 be relative thin and also be complete level, although other configuration also is feasible.As illustrating more clearly among Fig. 2 E, antenna 104 is from sway brace 102 angled extending out.
With reference now to Fig. 2 F,, the side view of equipment 12 is illustrated after molding material 23 is used.This equipment 12 is illustrated with the molding material 23 of the shell 25 that forms sealed in unit 12.This molding material 23 passes sway brace 102 and extends along data cell 100 from antenna arm 104.Here special shape that illustrates and configuration are embodiment of equipment 12 but are not limited to the accurate shape of the equipment 12 of suggestion here.
With reference now to Fig. 2 G,, shows rear view according to the equipment 12 of Figure 1A.The angle configurations of antenna arm 104 illustrates with simpler form equally, and for illustrated purpose in Fig. 2 H and 2I, this two width of cloth figure has presented looking up and vertical view of equipment 12.
Fig. 2 J shows the front view of the equipment 12 that is installed on the container 10.This container 10 shows the door 202 of the container 10 of open position, with the orientation of more detailed display device 12.This equipment 12 is installed in door 202 adjacent areas with container 10.This equipment 12 can connect by magnetic on (as previously mentioned), glue connection and other suitable vertical beam that is connected to container 10 204.Shown in Fig. 2 J, when equipment 12 was installed like this and closed with box lunch door 202, antenna arm 104 was positioned at the inside of container 10, and it is directly adjacent with door 202 that door sensor 29 is arranged in sway brace 102, and data cell 100 is positioned at the inside of container 10.Equipment 12 can be by the departing from of door sensor 29 detected pressures, to determine whether to occur a door incident (for example relative or absolute pressure changes).This equipment 12 can be by antenna 20 transmission corresponding to the data of the state of door 202 to previously described server 15.In addition, interface 28 can be connected to any amount of sensor unit 208 with the information of seizure corresponding to the internal environment of container 10, and the information that obtains by sensor unit 208 is transferred to server 15.
Still Fig. 2 J, equipment 12 are oriented in the container 10 so that data cell 100 is placed in the groove or passage 206 that is generally the C shape.This sway brace 102 comprises door sensor 29, extends through a part that is positioned at its middle vertical beam 204 and door 202.When door 202 was closed, pressure remained on door sensor 29.When door 202 was opened, pressure was released, thereby 22 incidents of warning microprocessor have taken place.The electronic security key that is stored in the storer 24 will be wiped free of or change to represent " destruction " strip of paper used for sealing or to distort incident.For example, when sensor 29 or any inside or external sensor that other is connected to container security device 12 detect a numerical value outside predetermined threshold value, then the electronic security(ELSEC) key may be wiped free of and this key can not be rebuilt.In this case, when card reader sends a request to container security device 12, this container security device 12 can not be with correct electronic security(ELSEC) key response, reports to the police or alarm condition thereby notice card reader and authorities' container of being fit to are in.
Fig. 2 K-2M shows the various views of the sensor container 220 that is used to hold external sensor unit 208.This container 220 comprises at least one, is two in the present embodiment, and projection 222a, 222b are used for the protection to the vertical beam (not shown) of container.This projection 222a and 222b can be being similar to the method protection of sensor safe equipment 12 above-mentioned, such as by magnet and securing member.Thereby projection 222a and 222b also can provide extra protection by the pressure that is pressed onto on the vertical beam that is pressed onto container on protruding 222a and the 222b when door is in closed condition.This sensor container 220 comprises the conduit 224 that is used to hold sensor unit 208.Conduit 224 is directed like this, and this conduit 224 is in the C-passage (not shown) of container.This sensor unit 208 does not have further protective device at the original place hasp, and in interchangeable embodiment of the present invention, sensor 208 can be protected by additional protection means then.The length of sensor container 220 can different sensor unit 208 to hold varying number and type.For example, the length of some sensor container 220 can allow to place two sensor units 208 and the length of other sensor container 220 for example can allow to place five or multisensor unit 208 more.Although a particular length has been shown in the preferred embodiment, can uses all size and do not break away from embodiments of the invention above-mentioned.
Sensor container 220 also comprises along a plurality of connectors 230 of the back passage 226 of conduit 224 and interface 228, is used for being connected and interface with the interface 28 of container security device 12.Connector 230 connects sensor units 208 to the universal serial bus (not shown), such as based on I 2The bus of C and/or RS485 standard.The information between this connector 230, universal serial bus and interface 28,228 permission any additional sensor unit 208 and the container security device 12 and/or the exchange of electric weight.For example, additional sensor unit 208 such as radiation sensor units, can detect the radiation rank that is delivered to container security device 12 by connector 230 and interface 28,228.Container security device 12 transmission radiation ranks or relative data are to card reader.Interchangeable or additional, the radiation rank can receive then that equipment 12 determines whether that the radiation rank exceeds the predetermined safe scope by container security device 12.If then container security device 12 can be except sending radiation rank data, or alternative radiation rank data, also sends a warning.In interchangeable embodiment, sensor unit 208 can be that wireless device (for example utilizing RFID/ bluetooth/Zigbee/ ultra broadband) activates the internal wireless sensor network of use container security device 12 as access gateway.
In alternative embodiment of the present invention, sensor container 220 can comprise that at least one additional port extends the container outside, is used for the employee and inserts sensor, data download, inspection warning, reset threshold etc.This additional port can connect outside the interface 228 of container security device 12, or replaces interface 228, is used.
Fig. 2 N-2Q shows the various views of the additional sensor unit 208 that is used for being placed in sensor container 220.In the illustrated embodiment, each sensor unit 208 is rectangular with the recess 252 that is positioned at sensor 208 upper ends basically.Recess 252 allows the simple mobile and placement of sensor unit 208 in sensor container 220.Be generally rectangle although sensor unit 208 is depicted as, the sensor of other shape may be used among the present invention equally.For example, some sensor unit 208 can be foursquare or can not have recess 252 in the upper end.And, sensor unit 208 can be the hourglass shape with the placement that allows sensor unit 208 and move, in this case, recess 252 can be unnecessary.
Sensor unit 208 can also comprise the groove 254 along its rear side 256.Groove 254 can off center to prevent the installation of sensor unit 208 mistakes.In groove 254 interface 258, such as the D-sub connector.Interface 258 is coupled to the connector 230 of sensor container 220.This groove also guiding sensor unit 208 to suitable position and the connector 230 of alignment interface 258 and sensor container.
With reference now to Fig. 2 R,, shows the block diagram of a typical sensor unit 208.Each sensor unit 208 comprises sensor 270, microprocessor 272, storer 274, communication protocol unit 276, interface 258 and optional power supply 278.As previously mentioned, sensor 270 can detect any amount of feature, such as radiation, humidity, bump, vibration, temperature, light, ammonia, inflammable gas etc.Little processing 272 and storer 274 work of mutually combining are determined acceptable threshold value and are determined when sensor 270 detects the feature that exceeds acceptable threshold value.This storer can also be stored various from sensor 270 read or out of Memory.Communication protocol unit 276 allows sensor unit 208 to communicate by letter on the universal serial bus of sensor container 220 by interface 258.
Sensor unit 208 can provide the many data about the content of aforesaid container or state.Various sensors can be discerned by color, international symbol and/or other recognition device, install with various types of employees in the convenient various environment.In addition, one of them sensor unit 208 can constitute the balancing cell group, is used to provide power supply to one or more additional sensors unit 208 and/or container security device 12.Interchangeable, an internal cell that provides as optional power supply 278 can be provided each sensor 208.One of them sensor unit 208 can also be radio-frequency (RF) identification (RFID) card reader or RFID card reader gateway.This RFID card reader can detect the RFID label on the goods, this goods be from each container loading or unloading and no matter whether container encapsulates or seals off.The RFID label can be placed on above independent article clauses and subclauses, the tray etc.In this way, cargo loading and transporting can be detected to determine which goods is placed into or removes container.Further, one or more sensor units 208 can fitted to be the radio communication that is used for internal container, by bluetooth, infrared or other wireless communication technology.In this way, sensor unit 208 can be installed on the inwall of container or the interior top away from container security device 12 and sensor container 220.Long-range then sensor unit 208 can transmit data to the sensor unit 208 in the sensor container 220.Can be delivered to container security device 12 and/or card reader subsequently such as the warning of any generation and/or the information of detected data itself.For example, sensor unit 208 can detect a feature (for example light, gas, radiation etc.) and exceeds predetermined threshold value.Sensor unit 208 can send warning or report to the police then, and this warning or warning are transmitted by container security device 12 in the container outside.This container can be labeled and be used for checking or isolating then.Be similar to container security device 12, in certain embodiments, sensor unit 208 can also use a unique safe key, when exceeding this key of predetermined threshold value, detected feature wipes (back will describe in further detail with reference to figure 10B, and it uses different sensors as step 1054,1070 and 1084 input) from the storer 24 of container security device 12.
Fig. 2 S shows a plurality of square frames, sensor installation container 220 and additional sensor unit 208 in the C-passage 206 that is used to illustrate at container.Container the door 202 be open so that vertical beam 204 and the C-passage 206 that is positioned at internal container to be shown.As previously mentioned, container security device 12 can be placed to a part in C-passage 206 and another part passes vertical beam 204.The sensor container 220 that has conduit 224 also is placed in C-passage 206 and projection 222a, the 222b passes vertical beam 204.Sensor unit 208 can be placed in the conduit 224 and be connected to interface 228, is used for transmission information to container security device 12.This container security device 12 can receive from the information of sensor unit 208 and transmission information and give card reader.
Fig. 2 T is mounted in the skeleton view of the equipment 12 of Fig. 2 D above the container 10.This equipment 12 has illustrated attached on the vertical beam 204, the vertical beam 204 and then just of door sensor 29 (not shown) in the sway brace 102 like this, and antenna arm 104 is positioned at hinge channel (hinge channel) inside of container 10.Data cell 100 is positioned at C-passage 206 inside of container 10.Here clearer demonstrating, antenna arm 104 stretches out the zone of coming basically near the hinge fraction of container 10 from sway brace 102, and it also is retained in the outside of container 10 when door 202 is closed like this.
By placing data cell 100 to container 10 inside, the chance of destruction and/or damage equipment 12 has just reduced.Because data cell 100 is placed in the C-passage 206, although the content of container 10 can rise during the transmission, this content unlikely impacts or damage equipment 12.
Although top embodiment illustrates, as the individual unit that comprises at least one sensor and antenna 20 that is used for communicating by letter with card reader 16, the present invention also may be embodied as a plurality of unit.For example, light, temperature, radiation etc. can be placed on any position of container 10 inside.Sensor is read its reading and is transferred to antenna element by bluetooth or any short range communication systems, and this this reading of antenna element relaying or out of Memory are to card reader 16.This sensor can be long-range and be independent of antenna element.In addition, above embodiment shows equipment 12 and comprises and be used to determine whether that security destroys the door sensor 29 that exists.But the sensor of unrestricted kind can be used to replacement or determine safe conditions with door sensor 29.For example, light sensor can detected set the fluctuation of light in the vanning 10.If light exceeds or is lower than predetermined threshold value, then determine to exist security to destroy.Temperature sensor, radiation sensor, inflammable gas sensor etc. can be employed in an identical manner.
Equipment 12 can also trigger the physics locking of container 10.For example, when card reader 16 is used to protect the content of shipping container 10 by a security request, microprocessor 22 can start the locking of container 10 by active electron door lock or other such physics locking mechanism.In case container is protected by security request, this container is just locked to prevent stolen or to destroy by physics.
As shown in Figure 3A, card reader 16 comprises short range antenna 30, microprocessor 36, storer 38 and power supply 40.Wireless short-distance, the low power communication of the equipment 12 that short range antenna 30 realizations and earlier in respect of figures 2A describe.This card reader 16 can comprise or be connected to separately the equipment of long-range container monitoring system (for example according to GSM, CDMA, PDC or DAMP wireless communication standard or use wired lan or WLAN (wireless local area network) WLAN, Mobitex, GPRS, UMTS).It will be understood to those of skill in the art that any such standard is unconfined to the present invention, and the wireless communication standard of additional available also can be applied to the long distance wireless communication of card reader 16.Its example comprises the satellite data communication standard, such as Inmarsat, Iridium, Project 21, Odyssey, Globalstar, ECCO, Ellipso, Tritium, Teledesic, Spaceway, Orbcom, Obsidian, ACeS, Thuraya or Aries, under the disabled situation of land mobile communication system, use.
Card reader 16 can comprise or append to the satnav unit 34 of the vehicles that are used to locate loading container 10.For example, card reader 16 can be the mobile card reader 16 (B) that appends on truck, steamer or the rolling stock.Providing of positioning unit 34 is optionally, and can ignore under the situation that does not need to follow the tracks of with location set vanning 10.For example, the position of fixed reader 16 (C) can be known; Therefore, satnav information is unwanted.A kind of method of location can be to use global position system (for example GPS, GNSS and GLONASS).Another kind method is to utilize the location of the card reader 16 of mobile communication system.Here, some location technologies can be fully based on mobile communications network (for example EOTD) and other depend on the location technology (for example assistant GPS) based on the combination of satellite and mobile communications network.
Microprocessor 36 in the card reader 16 and storer 38 allow the exchanges data control between card reader 16 and equipment 12 and the above-described long distance control system, also allow these exchange messages of storage.The necessary power supply that is used for the element operation of card reader 16 provides by power supply 40.
Fig. 3 B is the block diagram according to the handheld reader 16 (A) of principle of the present invention.Handheld reader 16 (A) is shown from mobile phone 16 (A1) and separates.This handheld reader 16 (A) is by communicate by letter with equipment 12 such as short distance direct sequence spread spectrum wave point (as previously mentioned).(for example<100m), this equipment 12 just can intercom mutually with handheld reader 16 (A) in very near mutually scope in case card reader 16 (A) is with equipment 12.This handheld reader 16 (A) can be by being used for Electronic Protection or unload containers with communicating by letter of equipment 12.This handheld reader 16 (A) can also be used for slave unit 12 and obtain additional information, for example from the information of the additional sensor in the container 10 or from the reading of door sensor 29.
Handheld reader 16 (A) shown in Fig. 3 B is fit to join with mobile phone or the PDA shown in 16 (A1).But it will be appreciated by persons skilled in the art that card reader 16 (A) can be unit or also can be fit to and join such as personal digital assistant or hand-held or kneetop computer independently.Card reader 16 is drawn from the power supply of mobile phone and is utilized bluetooth or other similar interface and mobile phone communications.
The additional application scheme of equipment 12 and card reader 16 will be described with reference to figure 4-8.As for card reader 16 (B) with respect to different transportations with betransported the installation and removal of unit, any available installation covers well all in the present invention that (for example magnet is fixed, with the physical fixation of installing by screw, cross bar, hook, sphere, hasp, further comprise the attainable installation of electronics of any kind, electromagnet for example, or further be reversible chemical fixtures, such as adhesive tape, adhesive tape, glue, paste band).
Fig. 4 has showed first application scheme of equipment 12 and card reader 16.As shown in Figure 4, a selection that relates to transport by road is card reader 16 to be fixed to door go up or shipping warehouse or any place in supply chain.Under such situation, when container 10 withdrawed from the shipping zone by truck traction, card reader 16 can be at an easy rate communicates with the equipment 12 of container 10.Another selection is that card reader 16 is supplied as above-mentioned handheld reader 16 (A), is not that scanning device 12 carries handheld reader 16 (A) exactly when truck leaves this zone in the monitoring process of container 10 in the truck cabin.
Fig. 5 has showed that equipment 12 and card reader 16 relate to second application scheme of transportation by railroad.Fig. 5 has showed first example, and wherein card reader 16 is depended on fixingly along railway line, is used for and arrives those containers that card reader 16 can reach in the scope and carry out short-distance wireless communication.Card reader 16 can realize carrying out short-distance wireless communication with the equipment 12 of any or all container that transports 10 on railway.
Identical principle is applied to the 3rd application scheme of container monitor portion, as shown in Figure 6.Herein, for each container that in the sea transport process, is identified, follows the tracks of or monitor, all must in the reached scope of equipment 12, be put into card reader 16 in the container 10.First selection will be to revise loading scheme according to the attachment schemes of wireless communication unit.In other words, the distribution of card reader 16 on the container cabin determined according to loading scheme, and loading scheme is to be determined by other restriction and parameter.In addition, be used for depending on flexibly and separating the tax revenue that to avoid any capital assets to bring of card reader 16 that container monitors to the operator.In other words, in case the supervision of container no longer needs, card reader 16 can be at an easy rate separated from the cabin of the cabin of container and the different container that is used or any other transmission equipment.Card reader 16 also can be connected to AIS, and this AIS communicates by letter based on VHF, or international maritime satellite, and the two usually is used to the vehicles of transporting by sea.
The above-mentioned monitor portion of the present invention that relates to the whole world, zone or the local transportation of long distance is described, according to Fig. 7, will set forth below about the application of restricted area.
In fact, be applied to all vehicles and have localized area, for example equipment 12 of the manipulating containers 10 of container terminal, container hargour or any manufacturing location the separating of radio communication about the short distance of restricted area and long distance.The zone of these qualifications comprise the input gate of this terminal and out gate, any kind of handling machine, for example top layer shovel loader, side loading machine, extend piler, transtainer, trailer, crane, standdle carrier or the like.
Special container is not only to refer to typically use single card reader 16 to search for; But each container 10 passes through, and for example, when crane and piler were handled, a plurality of card reader 16 spread all over terminal and accepting state and control information.In other words, when container process card reader 16, this incident is used to upgrade relevant state and control information.
Fig. 8 has set forth the process flow diagram according to the concrete protection process of implementing of the present invention.At first, in step 800, equipment 12 is by card reader 16 request marks.In step 802, equipment 102 transmission is shown and is known card reader 16, and in step 804, card reader 16 selects containers 10 to protect.In step 806, a request is sent to server 15 from card reader 16.In step 808, server 15 produces safe key and encrypts to safe key with scrambled.In step 810, the safe key of encryption is sent to equipment 12 by card reader 16 and is used to protect container 10.In step 812, safe key is decrypted and be stored in the equipment 12.A similar process can be activated and be used to remove container 10.When container 10 passed through the scope of card reader 16, it can be protected automatically, or each user can protect or remove selected special container 10.
Fig. 9 has set forth the concrete safety inspection process of implementing according to the present invention.In step 900, card reader 16 sends an inquiry to container 10.In step 902, the equipment 12 of container 10 utilizes safe key and scrambled to produce one and replys.In step 904, reply slave unit 12 and be sent to card reader 16.In step 906, card reader 16 also sends an inquiry to server 15.In fact inquiry to server 15 and equipment 12 can alternately be transmitted simultaneously or in time.In step 908 and 910, server 15 utilizes safe key and scrambled to produce and send respectively and replys to card reader 16.In step 912, whether card reader 16 definite responses equate.
If reply equally, container 10 is still protected safely so.In other words, if reply unequally, the security breach of container 10 (just, door incident) takes place.Similar with protection and releasing process, when container 10 passed through the scope of card reader 16, safety inspection can be automatically performed, or the user can start safety inspection in any time of transportation.
Figure 10 is in order to the calibration of explanation door sensor 29 and the process flow diagram 1000 of filtering.In step 1002, door sensor 29 is activated every 0.5 second and detects current force value, although increment also can be realized At All Other Times.In step 1004, current force value is read from door sensor 29.In step 1006, get time interval 30 microseconds of each reading, a plurality of readings (X) are accumulated to be used for calculating average pressure value in step 1008.In step 1010, whether door is opened and is determined.If mean value exceeds the unlatching threshold value that iterative step 1022 to 1024 formerly calculates, then door is considered to open.If door has been opened, flow process forwards step 1012 to so, and in this step, without any need for attached pressure (upper limit reference), average pressure value is added to the value that slow low-pass filter (slow low pass filter) obtains sensor.If determine that in step 1010 door is closed, flow process forwards step 1014 to so, determines equipment 12 current whether being ready (just, whether container 10 is protected) in this step.If equipment 12 is not awaited orders, the door state is updated to step 1016 so.If equipment 12 is being awaited orders, determine in step 1018 whether equipment 12 before awaited orders so.If equipment 12 was not before awaited orders, so in step 1020, the limited reference of awaiting orders is set to the current average pressure value in the step 1008.In step 1022, open, close with intervention threshold and be to use from upper limit reference in the step 1012 with from the awaiting orders restriction reference calculation in the step 1020.Open, close with intervention threshold and be used to determine in step 1010 and 1026 whether door is unlocked or closes.In step 1026, determine whether the current pressure value surpasses unlatching or intervene restriction.In some concrete enforcement, intervene to assess to relate to and open or the intervention restriction definite whether having surpassed from the average in the step 1008.Open or the intervention restriction if average surpasses, when security breach takes place, intervene alarm and can give system and/or User Alarms so.Open or the intervention restriction if average surpasses, do not have the alarm meeting to produce so.
Figure 10 B sets forth the process flow diagram of intervening assessment subroutine 1050, and this subroutine can be used as the intervention assessment of the step 1026 of Figure 10 A and uses.In subroutine 1050, use three pairs of grades and time restriction.Yet, any other suitable grade and the time to also being used.Intervening the assessment subroutine is activated in step 1052.In step 1054, the sw value of decision door, or whether any other value of sensor is greater than first value.If, in step 1054, determine that the sw value of door is not more than first value, carry out forwarding step 1056 to so.In step 1056, counter 1, counter 2 sum counters 3 all are cleared.In step 1058, the sw value of new door is added in the wave filter as the restriction reference value of awaiting orders.In step 1060, carry out and finish.
If, in step 1054, determine door sw value greater than first value, execution forwarding step 1062 to.In step 1062, counter 1 is increased.In step 1064, determine that whether counter 1 is greater than the time 1.If it is determined in step 1064, carry out forwarding step 1066 to.In step 1066, it determines that incident is the intervention incident.In step 1068, carry out and finish.
If, in step 1064, fail to determine counter 1 greater than the time 1, execution forwarding step 1070 to.In step 1070, determine that whether door sw value is greater than second value.In step 1070, if it determines that execution turning to step 1072.In step 1072, counter 2 is increased.In step 1074, determine that whether counter 2 is greater than the time 2.If it is determined, carry out and turn to step 1076, determine that in this step incident is the intervention incident.In step 1078, carry out and finish.
If in step 1070, door sw value is found and is not more than second value, carries out turning to step 1080.In step 1080, counter 2 sum counters 3 all are cleared.In step 1082, carry out and finish.
If in step 1074, uncertain counter 2 carries out turning to step 1084 greater than the time 2.In step 1084, determine that whether door sw value is greater than the 3rd value.If it is determined, carry out turning to step 1086.In step 1086, counter 3 is increased.In step 1088, determine that whether counter 3 is greater than the time 3.If it is determined, carry out and turn to step 1090, determine that in this step incident is the intervention incident.In step 1092, carry out and finish.If, determine that counter 3 is not more than the time 3, carries out so in step 1094 and finishes in step 1088.
If, in step 1084, determine that a door sw value is not more than the 3rd value, counter 3 is cleared in step 1096 so.In step 1098, carry out and finish.
Figure 11 has set forth the process flow diagram that is used for from sensor unit 208 request msgs.In step 1100, program from, for example, card reader begins.In step 1102, the order of " obtaining data from sensor " is sent to container security device 12, and this orders sensor 270 this device forwards.In step 1104, container security device 12 is waited for replying of " obtaining data from sensor ".This replys raw data or other relevant information that can comprise from sensor 270, time stamp for example, threshold value or the like.In step 1106, determine whether stop flag is received.If stop flag is not received, program is from step 1102 so.If stop flag is received, program finishes in step 1108 so.
Figure 12 has set forth the process flow diagram that is used to send data to sensor unit 208.For example, data can be sent to sensor unit 208 and are used for sensors configured unit 208 or produce order giving sensor unit 208.Sensor unit 208 can be configured, and for example, the data of acceptable detection is had the threshold value of special permission.In step 1200, program begins in the mode among similar Figure 11.In step 1202, the order of " sending data to sensor " is sent to container security device 12.In step 1204, container security device 12 is waited for replying of " sending data to sensor ".Replying can be an affirmation, confirms that threshold value correctly is provided with or produces replying based on other type of the data type that sends to sensor unit 208.In step 1206, determine whether stop flag is sent out.If stop flag is not sent out, program is from step 1202 so.If stop flag is received, program finishes in step 1208 so.
Figure 13 has set forth the process flow diagram of sensor 270 being carried out wake up procedure.In step 1300, program is from for example, and card reader or user use beginning.In step 1302, " sensor wake command " is sent to sensor 270.In step 1304, the order of " obtaining data from sensor " is sent to sensor and receives from the data of sensor 270 to be similar to mode Figure 11 and 12.In step 1306, whether definite response is received from sensor 270.Be not received if reply, program is from step 1302.Be received if reply, so in step 1308, data are sent to container security device 12 from sensor 270.In step 1310, EOP (end of program).
Although concrete enforcement of the present invention is elaborated in the detailed description of accompanying drawing and front, it should be noted that the present invention is not limited to the concrete enforcement of the disclosure, comprise that also defined disengaging of following claim of the present inventionly variously reconfigures, revises and substitute.

Claims (16)

1. device that is used to protect container comprises:
The data cell that has shell;
The sway brace that extends out and link to each other from data cell with data cell, wherein sway brace is configured to be fixed on the vertical beam of the container between the hinge fraction of the vertical beam of container and door; With
Link to each other with sway brace and with an angular relationship from the outward extending antenna arm of sway brace,
Wherein, antenna arm is configured to be positioned at the outside of container, and it is adjacent with the door section of container that sway brace is configured to, and data cell is configured to be positioned at the inside of container when door is opened.
2. device according to claim 1, wherein sway brace has a stayed surface, and this surface comprises that one is configured to hold the hole of magnet.
3. device according to claim 2, wherein said magnet is positioned at described hole.
4. device according to claim 1 also comprises:
Be positioned at the processor of the shell of data cell.
5. device according to claim 4 also comprises:
Be positioned at the stayed surface of sway brace and the pressure transducer that links to each other with processor.
6. device according to claim 4 also comprises:
Be positioned on the antenna arm and the antenna that links to each other with processor.
7. device according to claim 4 also comprises:
Be positioned at the shell of data cell and the interface that links to each other with processor,
Wherein, this interface is configured to link to each other with the external sensor unit, and this external sensor is configured to catch the information relevant with the interior condition of container.
8. device according to claim 7, wherein said external sensor unit are at least one in optical sensor, motion sensor, radiation sensor, temperature sensor, proximity sensor, biometric sensor, ammoniacal sensor, shock transducer, vibration transducer, carbon dioxide sensor, smoke sensor, sensor noise, humidity sensor, imageing sensor and the inflammable gas sensor.
9. device according to claim 1 also comprises:
Encapsulate the molding material of described device.
10. device according to claim 6, wherein processor is configured to by the state relevant data of alignment remote server transmission in sky with door.
11. a device that is used to protect container comprises:
The data cell that has shell;
The sway brace that extends out and link to each other from data cell with data cell, wherein sway brace is configured to be fixed on the vertical beam of the container between the hinge fraction of the vertical beam of container and door; With
The magnet that combines with sway brace;
Be positioned at the processor of the shell of data cell;
The pressure transducer that links to each other and link to each other with the stayed surface of sway brace with processor;
Link to each other with sway brace and with an angular relationship from the outward extending antenna arm of sway brace; With
Be positioned on the antenna arm and the antenna that links to each other with processor.
12. device according to claim 11, wherein the stayed surface of sway brace comprises that one is configured to hold the hole of magnet.
13. device according to claim 12 also comprises:
Encapsulate the molding material of described device.
14. device according to claim 11 also comprises:
Be positioned at the shell of data cell and the interface that links to each other with processor,
Wherein, this interface is configured to link to each other with the external sensor unit, and this external sensor is configured to catch the information relevant with the interior condition of container.
15. device according to claim 14, wherein the external sensor unit is at least one in optical sensor, motion sensor, radiation sensor, temperature sensor, proximity sensor, biometric sensor, ammoniacal sensor, shock transducer, vibration transducer, carbon dioxide sensor, smoke sensor, sensor noise, humidity sensor, imageing sensor and the inflammable gas sensor.
16. device according to claim 11, wherein, antenna arm is configured to be positioned at the outside of container, and it is adjacent with door section that sway brace is configured to, and data cell is configured to be positioned at the inside of container when door is opened.
CN201010128012A 2003-05-15 2004-05-17 Utilize the method and system of multiple sensors for monitoring container security, content and state Pending CN101813703A (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US47043503P 2003-05-15 2003-05-15
US60/470,435 2003-05-15
US10/667,282 2003-09-17
US10/667,282 US20040100379A1 (en) 2002-09-17 2003-09-17 Method and system for monitoring containers to maintain the security thereof
US55610604P 2004-03-24 2004-03-24
US60/556,106 2004-03-24

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN 200480020206 Division CN1823493A (en) 2003-05-15 2004-05-17 Method and system for monitoring containers to maintain the security thereof

Publications (1)

Publication Number Publication Date
CN101813703A true CN101813703A (en) 2010-08-25

Family

ID=33479706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010128012A Pending CN101813703A (en) 2003-05-15 2004-05-17 Utilize the method and system of multiple sensors for monitoring container security, content and state

Country Status (3)

Country Link
EP (1) EP1623526A4 (en)
CN (1) CN101813703A (en)
WO (1) WO2004104768A2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104443110A (en) * 2014-10-20 2015-03-25 浙江理工大学 Electronic material vehicle
CN105308657A (en) * 2013-04-23 2016-02-03 卡纳里连接公司 Security and/or monitoring devices and systems
TWI596567B (en) * 2016-09-09 2017-08-21 樹德科技大學 A logistics system and the methods
CN107428462A (en) * 2015-02-18 2017-12-01 开利公司 For monitoring the apparatus and method of state of goods
CN107767093A (en) * 2016-08-19 2018-03-06 王安松 Cargo monitoring system and method, terminal device and safe box
CN110844377A (en) * 2019-11-13 2020-02-28 万昇国际贸易有限公司 Intelligent container with content real-time monitoring mechanism
CN112332936A (en) * 2020-10-09 2021-02-05 广州市物联万方电子科技有限公司 Container communication method and device and monitoring terminal
CN113247476A (en) * 2020-02-11 2021-08-13 公众科技解决方案有限公司 Intelligent conveying container door

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7411495B2 (en) 2002-08-27 2008-08-12 Hi-G-Tek Ltd. Smart container monitoring system
ES2353498B1 (en) * 2009-03-20 2012-01-10 FERROVIAL, S.A. (Titular al 70%) OPTIMIZATION SYSTEM FOR THE USE OF WASTE CONTAINERS.
DE102012013929B4 (en) * 2012-07-16 2017-05-11 Identec Solutions Ag Method and device for monitoring refrigerated containers in terminals and the like
EP3859624A4 (en) * 2018-09-26 2022-04-13 Medipal Holdings Corporation Received order management system, received order management method, and program
WO2021035467A1 (en) * 2019-08-26 2021-03-04 唐山哈船科技有限公司 Port cargo anti-lost system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU4223399A (en) * 1998-06-01 1999-12-20 Robert Jeff Scaman Secure, vehicle mounted, incident recording system
US20020133293A1 (en) * 2001-03-16 2002-09-19 Howard Goldman, Inc Concealable portable GPS communication system
EP1246094A1 (en) * 2001-03-27 2002-10-02 TELEFONAKTIEBOLAGET L M ERICSSON (publ) Container surveillance system and related method
GB0110759D0 (en) * 2001-05-02 2001-06-27 Marks Roger J Antenna clamp

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105308657A (en) * 2013-04-23 2016-02-03 卡纳里连接公司 Security and/or monitoring devices and systems
US10304319B2 (en) 2013-04-23 2019-05-28 Canary Connect, Inc. Monitoring and security devices comprising multiple sensors
US10083599B2 (en) 2013-04-23 2018-09-25 Canary Connect, Inc. Remote user interface and display for events for a monitored location
CN104443110A (en) * 2014-10-20 2015-03-25 浙江理工大学 Electronic material vehicle
US10214346B2 (en) 2015-02-18 2019-02-26 Carrier Corporation Apparatus and method for monitoring cargo conditions
CN107428462B (en) * 2015-02-18 2020-06-23 开利公司 Apparatus and method for monitoring cargo condition
CN107428462A (en) * 2015-02-18 2017-12-01 开利公司 For monitoring the apparatus and method of state of goods
TWI642003B (en) * 2016-08-19 2018-11-21 王安松 System and method for monitoring cargos,terminal device and save-deposit box
CN107767093A (en) * 2016-08-19 2018-03-06 王安松 Cargo monitoring system and method, terminal device and safe box
TWI596567B (en) * 2016-09-09 2017-08-21 樹德科技大學 A logistics system and the methods
CN110844377A (en) * 2019-11-13 2020-02-28 万昇国际贸易有限公司 Intelligent container with content real-time monitoring mechanism
CN113247476A (en) * 2020-02-11 2021-08-13 公众科技解决方案有限公司 Intelligent conveying container door
CN112332936A (en) * 2020-10-09 2021-02-05 广州市物联万方电子科技有限公司 Container communication method and device and monitoring terminal

Also Published As

Publication number Publication date
WO2004104768A2 (en) 2004-12-02
EP1623526A4 (en) 2010-07-21
WO2004104768A3 (en) 2005-11-10
EP1623526A2 (en) 2006-02-08

Similar Documents

Publication Publication Date Title
CN100573609C (en) Be used for monitoring containers to guarantee the method and system of its security
US7479877B2 (en) Method and system for utilizing multiple sensors for monitoring container security, contents and condition
KR101012977B1 (en) Method and System For Monitoring Containers To Maintain the Security Thereof
CN1906643B (en) Method and system for monitoring containers to maintain the security thereof
US10679173B2 (en) End to end logistic chain tracking and control of shipping containers
US8058985B2 (en) Locking apparatus for shipping containers
EP1676248B1 (en) Global intelligent remote detection system
US20040215532A1 (en) Method and system for monitoring relative movement of maritime containers and other cargo
US20080231454A1 (en) Cargo Container Monitoring Device
US20070273484A1 (en) Method of and reader for automatic synchronization of reader wakeup signals to radio tags
MX2012001372A (en) Shipping container having integral geolock system.
CN101813703A (en) Utilize the method and system of multiple sensors for monitoring container security, content and state
CN1701348A (en) Method and system for monitoring containers to maintain the security thereof
CN1823493A (en) Method and system for monitoring containers to maintain the security thereof
KR20210155069A (en) Method and System For Monitoring Containers To Maintainthe Security Thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100825