CN108368710A - Security system with anti-tamper sensor and network security - Google Patents

Security system with anti-tamper sensor and network security Download PDF

Info

Publication number
CN108368710A
CN108368710A CN201680072065.4A CN201680072065A CN108368710A CN 108368710 A CN108368710 A CN 108368710A CN 201680072065 A CN201680072065 A CN 201680072065A CN 108368710 A CN108368710 A CN 108368710A
Authority
CN
China
Prior art keywords
sensor
lock
container
lock body
elockbox
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201680072065.4A
Other languages
Chinese (zh)
Other versions
CN108368710B (en
Inventor
乔治·桑切斯
卡罗尔·E·富勒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
O Purdy C Lock Co
Original Assignee
O Purdy C Lock Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by O Purdy C Lock Co filed Critical O Purdy C Lock Co
Publication of CN108368710A publication Critical patent/CN108368710A/en
Application granted granted Critical
Publication of CN108368710B publication Critical patent/CN108368710B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/003Chain, wire or cable locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B39/00Locks giving indication of authorised or unauthorised unlocking
    • E05B39/005Locks with means for tracking the location of locked items, e.g. freight containers
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/005Chain-locks, cable-locks or padlocks with alarms
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/06Controlling mechanically-operated bolts by electro-magnetically-operated detents
    • E05B47/0607Controlling mechanically-operated bolts by electro-magnetically-operated detents the detent moving pivotally or rotatively
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B83/00Vehicle locks specially adapted for particular types of wing or vehicle
    • E05B83/02Locks for railway freight-cars, freight containers or the like; Locks for the cargo compartments of commercial lorries, trucks or vans
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

Disclosed embodiment includes the anti-tampering protection method of the container for transporting cargo.System includes the lock and controller for having electronic unit and mechanical part.Sensor is connected to lock so that it forms closed loop.The sensor can be optical fiber or the distributed arrangement with optical protection part or electric protector.Electronic device in lock provides the real-time monitoring to the state of lock.Due to the signature of closed loop being stored in remote server, lock can not be opened or replicate.The invasion detected is relayed to via various communication ports and authorizes recipient.The data of whole system and control are all protected by several programs for being scaled for offer network security.

Description

Security system with anti-tamper sensor and network security
It is incorporated to any priority application by reference
The equity for the U.S. Provisional Application No.62/252,555 that patent application claims were submitted on November 8th, 2015.
Background
Technical field
Embodiment of the present disclosure is related to preventing from distorting the container of product, to prevent from replacing counterfeit products in a reservoir, prevents Only theft and general unwarranted access, and prevent the imitation to device itself from replicating.
Background technology
The shipping container of sea-freight and land transportation for cargo rests on goods yard (holding yard, stop station track) such as goods It is particularly susceptible to invade when transporting agent.It, may be by when container is illegally unloaded or kidnapped from goods yard in transit Damage.The emerging problem paid particular attention to by military cargo transport people is that the cut (breach, the place of being destroyed) of container is to pass through Its wall rather than pass through container door.When wall-cut occurs, invader can restore (replace) and repair hole, so as to hold Device seems not go to pot.Detection cut becomes very problematic for the cargo transport people of cargo and consignee, they are until son It can just note abnormalities when content is looked into examining.Time between generally occurring within cut and checking may be very long, this makes can not It recovers the cargo of (recover is regained, withdrawn) loss and tracks invader.
The globalization of product manufacturing brings significant challenge to consumer, reason be many products during manufacture and it Afterwards, it can be replaced by imitation during all parts of supply chain and transport.These counterfeit products are not acted as by due mode With (perform, operation execute), heavy economic losses is thereby resulted in, threatens the national security and endangers personal health.Fake producer The usually supply chain of attack electronic component, the machine components of high price, expensive perfume and makeups product and drug etc..Some are copied Example includes:Counterfeit pharmaceuticals, such drug can be replaced by the chemicals with life threat consequence;It is all into key position Such as the imitation bolt of bridge and aircraft;Fire extinguisher is copied, such fire extinguisher includes the pressure that cannot in case of emergency work Contracting air;And the imitation electronic component in national defense system, this makes reliability and reduced performance, further causes The case where life-threatening.
Current solution includes using radio frequency identification (RFID) label.These labels are attached to product or transport is held The equipment of device.They include identification code, and include the manufacture information about part in some cases.During transportation and The different location of supply chain, RFID tag are scanned by following instruments, which, in label, and reads part by radio frequency applications Mark to determine whether label will return to correct information.If returning correct information, which is considered true Real.In order to increase the guarantee of authenticity, sealing element can be placed on container, the sealing element is to show whether it is damaged Bad such mode is designed.However, the sealing element that currently available sealing element can be copied now is replaced, make its thing It can not possibly be detected unauthorized entry into container in reality.
Transport and Logistics Service Provider can check that part is to determine RFID tag at different locations in transit Information expected from no return.
However, the use of RFID tag have the shortcomings that it is notable.When in the case or package for accommodating product in use, RFID tag can only ensure with authenticity label case or package there is no problem.The content of case or package may be imitative Make, and the content may during transportation the somewhere in supply chain, in warehouse or between supply chain position Transport during vehicle in be replaced.
If RFID tag be used to mark single item, known imitation method to be to remove label and be placed in label It copys on article, true part is then sold to another customer, this makes the profit of fake producer increase.Some companies sell " anti-tamper " label.However, fake producer can use indefatigable and careful chemical program to dissolve the adhesive on label, Mode is identical using re-posted label and the polishing process of semiconductor package part as them.Label is arranged on each individual product With the additional drawback for increasing cost.For example, if on each bolt being added in transport, tens of cents will be increased Bolt cost.RFID tag is added to to be placed in each integrated circuit in usual delivery tube be high cost and unrealistic 's.In addition, label can be interfered automatically inserts handling machine (automatic insertion for build electronic building brick process machine).In addition, label can not be added in many small electronic equipments, the small electronic equipment such as Resistor, capacitor and many ic packages more much smaller than RFID tag, smaller and smaller.For example, 01005 electricity The size for hindering device is only 0.4mm × 0.2mm;Upper arrangement label physically and economically all can not one of in such devices Row.Crucial machine components insert label in part itself.This method is also subject to label and removes or label code Hacker attack, and could only succeed using with the more complicated label for reading limitation (read block).It is last at this In the case of one kind, has significant cost and increase, and add the label in embedded part to influence its performance.
Other than above-mentioned limitation, RFID tag may can be read juxtaposition by hacker attack, wherein parts information In another new label, then the new label can be attached on counterfeit products.The price of RFID tag is from 10 cents to several Dollar differs.Some of which suitably has " reading limitation " feature that be used to prevent to distort, however, this feature requires State machine or processor function are placed in label, therefore the label of only higher cost just has this feature.The reading limits Label will be individually placed in the product of higher cost, but they still can be influenced by the problem of description before.
It includes being made of paper for sealed package, plastic wraps or comprising leading to have been carried out in the both sides of container cover The trial of the label of the molten metal equipment of line.However, these encapsulating methods only constitute imitation temporary challenge, in workshop In with enough workloads (effort) and with minimum equipment the product in container can be replaced with imitation, remake (reproduce is reformed, generated again) seals and sticks RFID tag again.If label is not write-read-write-protect in inside , then they can easily be forged.
There are the methods that the prior art uses, wherein kept with the electromagnetic signal radiation shipping container of different frequency zero Part, and signed (signature, feature, label), then by the similar measurement of the signature and the progress at reception position It is compared.Alternatively, first electromagnetic measurement feature executes and is used as the standard of authenticity by typical system.According to The signature that material in container is reflected, the authenticity about part are assessed.Electromagnetic radiation is by from ambient enviroment, fortune A large amount of reflections of part in defeated container and the influence of the physical location of test equipment.These reflections will be such that measurement is distorted, and Noise is added to the radiation of reflection, this will influence the repeatability and reliability that measure.As a result the skill of usual tested person operator Energy is horizontal and its understands the influence of the ability of test equipment result.Further drawback is that irradiation apparatus and its use are true to part Property test for be costly and time-consuming, and cannot apply irradiation may influence properties of product object on.
In the presence of use tool by light radiation to the other methods in package to be tested.This copys medicine commonly used in detection Object.When light is reflected, due to the influence of such as fluorescent characteristic, which can detect the presence of a small amount of known chemicals. If these chemicals reflect the light corresponding to such chemicals (it is different from the known chemicals contained in drug), The package is considered as copying.It is subjective to the comparison of light and assessment that are detected, reason is that testing tool is shown Color on device is not clearly best image (choice, prime), and easy reading mistake.Further drawback is drug Test chemical it is typically destructive, it means that low-volume samples may only be assessed, therefore remaining most of loading is without surveying Examination.The statistical probability that all imitation drugs in specific loading are detected by sample test is very low, this causes about any The specific integrality of loading and not knowing persistently for quality.
It is worth it is especially mentioned that pharmaceutical market, because the consequence of imitation is life-threatening and may advise greatly What mould infected.Non-prescription drugs is placed in the container with lid, the lid plastic wraps sealing for surrounding and covering tightly and tightly shrinking.This Kind lid can be remake, and the container equipped with drug may alternatively be imitation.A large amount of medicines of the bulk delivery to pharmacists Object loading can transport together with RFID tag, but can have problem described above.
It only relies upon using RFID tag as the means for preventing counterfeit component, it is meant that must be to any specific loading All components are widely checked which increase the costs of counterfeit component detection.The cost is delivered to ultimate consumer again.
Invention content
One novel aspects be related to it is a kind of for detecting the system distorted, including:There are two the sensors of opposite end for tool; And it is connected to the lock body of two opposite ends of sensor, which includes:It is configured as signal transmission passing through biography The transmitter of sensor;And it is configured as receiving the receiver of the signal from sensor.
In above system, which may be configured to receive the combination lock of the input of user, wherein combination lock Can be configured as makes an end in two opposite ends of sensor disconnect.
In above system, an end of sensor is fixed to lock body and is connected to receiver.
In above system, sensor may include optical fiber.
In above system, sensor may include electric conductor.
In above system, lock body can be coupled at least one other sensor.
In above system, which may include the electricity protection wallpaper around receptacle.
In above system, which may include the optical protection wall around receptacle Paper.
In above system, which can be wireless to lock.
The system can also include multiple other sensors, wherein each external sensor be configured to respectively via Wired or wireless communication is communicated with lock body.
In above system, lock body can also include:Latch hole, the latch hole are configured as two of receiving sensor First end in opposite end, wherein latch hole is configured as release first end;And mounting hole, the mounting hole by with The second end being set in two opposite ends of receiving sensor, wherein mounting hole is configured as not discharging the of sensor Two opposite ends.
In above system, lock body can also include the first cable, which is connected to mounting hole and receiver, And it is configured as the sensor signal received at mounting hole being transmitted to receiver.
The system can also include the second cable, which is configured as passing sensor signal from drive circuit Transport to the end inside latch hole of sensor.
In above system, first cable and the second cable may include fiber optic cable.
In above system, first cable and the second cable may include electric conductor.
The system can also include the external antenna for being configured as communicating with lock body.
In above system, lock body may include GPS receiver.
In above system, lock body may include motion detector.
In above system, lock body may include video camera.
In above system, lock body may include event recorder.
In above system, the length of sensor can be less than 30cm.
In above system, the center of latch hole and the center of mounting hole can be at a distance of less than 20cm.
In above system, the center of latch hole and the center of mounting hole can be at a distance of less than 10cm.
In above system, object can be drug.
On the other hand it is a kind of method for detecting and distorting, including:Lock shackle is attached to the latch on the door of container, the appearance Device includes object;The first sensor signal transmission is passed through into sensor associated with lock shackle, wherein sensor, which has, to be connected It is connected to two opposite ends of the ontology of lock.
The above method can also include:First signature of storage sensor;Transmit the second signature for generating sensor The second sensor signal of sensor;Compare the first signature and the second signature;And if the first signature is signed each other with second It is different, it is determined that the object has been tampered with.
The above method can also include:Combination input is received at lock, which includes combination lock;Combination is inputted into electrical transmission To the server or remote server inside lock;Combination input is compared with correct combine;And if combination input It is identical as correctly combining, then so that the lock is unlocked.
Description of the drawings
After considering detailed description below related with annexed drawings, the property of described technology, object It will be apparent with advantage, in entire annexed drawings, similar reference numeral indicates similar component.
Fig. 1 shows the typical shipping container at sea transporting cargo with land route.
Fig. 2 shows the decomposition of the different sides of the typical shipping container at sea transporting cargo with land route.
Fig. 3 shows the embodiment how electricity protection wallpaper can be constructed.
Fig. 4 is the embodiment applied in the electricity protection wallpaper on a surface of container.
Fig. 5 shows how different electricity protection wallpaper panellings is applied to all internal surfaces of container.
Fig. 6 shows how the continuous loop of electricity protection wallpaper is connected to eLockBox.
Fig. 7 is the embodiment of the process for characterizing protection of the container by the electricity protection wallpaper for using eLockBox.
Fig. 8 shows the monitor line loop process for protecting container from invasion.
Fig. 9 shows the embodiment of system, wherein eLockBox is using sensor to use fibre-optic waveguide loop to monitor The closed state of container.
Figure 10 shows the embodiment of system, wherein eLockBox is using sensor to be monitored by using electric conductor The closed state of container.
Figure 11 shows the system including sensor and eLockBox.
Figure 12 shows the detail view of the embodiment of the system.
Specific implementation mode
It elaborates as discussed further below, is related to security system and sensor arrangement on one side.Security system A part may include that there is electronics, wireless and mechanical features lock, the lock herein to be sometimes referred to as " eLockBox ".One Kind sensor can be the loop of electric conductor or the loop of optical waveguide such as fiber optic cable.This sensor can be with physics Ground is attached to eLockBox, or is disposed remotely from eLockBox and is joined via wireless connection using the various frequency bands of electromagnetic spectrum It is tied.In some embodiments, the sensor for being coupled to eLockBox can be six faces of the inside for covering container The arrangement of the electric conductor of (side, side, side, side), which includes bottom, top, two sides and end wall.Herein In, this configuration can be referred to as " electric protector (shield, shielding, protection) ".In other embodiments, sensor can be with It is the arrangement of optical waveguide such as fiber optic cable, covers six faces of the inside of container, which includes bottom, top, two Side and end wall, and this arrangement can be referred to as " optical protection part " herein.It is protected about electricity in present disclosure The narration of part is also applied for optical protection part.Electric protector can be embedded in medium such as non-woven fabrics, paper, hardboard, woodwork, In plastic plate or plastic foam or in (conformable, compliance) flexible media of other suitable types.The electrical/optical is protected Part can be formed as the electric conductor loop for being connected to the electronic hardware interrupted for detection loop or fiber optic cable loop.Gained The combination of electric protector or the continuous base material of optical protection part or wireless protector can cover all together with the medium of suitable type Container inner wall.The arrangement of the technology forms so-called electricity protection wallpaper either another aspect optical protection wallpaper or another Aspect wirelessly protects wallpaper.In some embodiments, which has the object similar to padlock (padlock, padlock) Structure is managed, the ontology of the padlock accommodates electronic hardware and the shackle (shackle, shackles) including sensor.
The purpose of the technology is to provide a kind of security system, to prevent from distorting any kind of container, such as transport case, Transport cabinet and seavan, truck, train, storage device and perimeter security system.Security system include with for detecting The electronic lock eLockBox of the various sensors of invasion or potential invasion together, and again via various wired and wireless communication systems System notice User Status.In addition, the technology include a set of software being embedded in eLockBox and reside in cloud computing clothes The a set of software being engaged in device.The software of whole system is equipped with utilizing for preventing through bluetooth, Wi-Fi, cellular communication, general Wireless communication, wire communication, computer network, Cloud Server and internet malicious intrusions one group of network safe programming measure To protect the program of data.Servers host has database, which includes about state, GPS location, historical record, appearance The tracked information of device and the other sensors reading of system.Security system is equipped with the sensing that oriented eLockBox provides information Device.The master reference of the technology includes the sensor loop for being connected to eLockBox.This sensor can surround us Just attempt the optical fiber loop of the container of protection or electric loop, and/or is by route by needing to be prevented from without awarding The optical fiber loop of the lock ring of the case of the access of power or the hasp on container-lock ring type latch (hasp and staple latch) Or electric loop.Electronics monitors sensor in eLockBox, to ensure that it is locked and will not occur without permission Invasion.In case of it is unwarranted invasion or sensor in loop interrupt, then eLockBox will notify server.Clothes Being engaged in device again will be suitably alert to container owner transmission any type via mobile phone or Email or other informing mechanisms Report or warning.The characteristic of electric protector is utilized in a kind of particular sensor, is arranged on the distribution of the conductor on chamber wall Setting.In resistance measurement, which is provided to special container and the unique characteristic resistance of protector physical layout.The characteristic Profile illustrates protector total resistance value.For example, protector can be by the way that conductive ink to be placed on material such as fabric or paper To manufacture.Conductive inked strip is placed on material so that the gap between band is sufficiently narrow, to prevent from entering container without damaging The invasion that protector or strip resistance do not change instantaneously.The entire protector of covering container is connected so that its formation carries Whole story end and the six face box protectors for terminating end.The box protector continuously or can be supervised essentially continuously It surveys.It should be noted that any other characteristic response property of electric protector is with may serve to the mesh for meeting technology of the present invention.Example Such as, capacitance can be utilized with inside container protector or wallpaper combined.In the method, a pole plate of capacitor is formed In wallpaper arrangement inside covering case or container, and the second pole plate of capacitor can be a part for chamber wall.By entering The change of one or two pole plate of capacitor caused by the person's of invading opening case will lead to the change of capacitance, and the change of this capacitance can With the means for being detected and being distorted as sensing.In addition, such as special in the U.S. of the Serial No. of co-pending 15/252,045 Described in profit application, optical loop may be used as sensor.
Signal processing in eLockBox can measure electrical parameter characteristic such as all-in resistance with predetermined or random manner, can To implement mathematical algorithm with converted measurement characteristic, and then information is encoded for security purposes.Herein, by counting Identification code can be referred to as by learning the coding information that algorithm generates.The identification code can be based at least partially on the characteristic of protector. It is, for example, possible to use the hash of measured value.Identification code can be encrypted.
Identification code and Part No., build date, sequence number, the place of production, part name, lot number, production line, testing station, environment Condition and physical characteristic form so-called pedigree (Pedigree) information together.This group of data are stored securely in based on cloud Database in so that copied for eLockBox itself is hardly possible.Each eLockBox is in database based on cloud When checking in (check in register, report for work), itself must be identified.If due to eLockBox malicious attack or attempt Cause the difference of any parameter by imitation means duplication eLockBox, then the identification comparator in database based on cloud will Detect difference.The response of database based on cloud is to send to distort alarm to designated person.
Different parameter measurements, these parameter measurements is used to influence the electricity of electric protector from the sensor of eLockBox connections Transport property.For example, if sensor or electric protector are deliberately ruptured in different zones, the rupture resistance will be caused to increase with Generate the call parameter for being used for obtaining unique electric signature.Coming from one or more of the electric signature of wallpaper transmission characteristic can To be selected by proprietary DSP program to generate identification code.Before container shipment, after initially generating identification code Later, identification code is embedded in pedigree, and is then transmitted in server and/or embedded RFID label.It is any to packet Piece installing distorts or can all influence identification code to the destruction of chamber wall, and when measuring, system can will receive Identification code be compared with the identification code of measurement, and any difference more than given threshold value all by announcement have occurred that into It invades, therefore loading is made to become suspicious.Either monitoring still monitors on the basis of event-driven in real time, and installation is on the wall Electricity protection wallpaper will all detect destructions, and notice that can be immediately by container destruction be sent to specified recipient.It is vertical I.e. the destruction of notice container enables suitable donor to respond rapidly to, which can prevent or interrupt unwarranted Invasion.
Therefore, a kind of to be related to for the protection of product and the method for detection imitation in the one side of the technology The electric protector of interior wall to embedded package or around product or any container of covering carries out parameter measurement.Measurement is to fill What some time before fortune carried out, such as at product manufacturing facility, and obtain identification code.Identification code can be encrypted and In embedded pedigree.The client designated position that pedigree is sent to by communication port in supply chain.The recipient of cargo transport into The similar measurement of row, and it is identical to verify identification code, and this is provided firmly believes without what is distorted.
The different types of response property of electric protector is utilized in electricity protection wallpaper in the technology.Hold depending on covering The wallpaper of device uses which type of electronic material, conductive ink, conductive coating or other materials can be used for example, each material With different grades of resistance so that have difference when measuring all-in resistance.Another characteristic be from protector to container in itself Capacitance, the capacitance will be according to the Change of types for the guard material installed and used.It should be noted that any other of electric protector is special Property response property may serve to the purpose for meeting the technology.
On the other hand, a kind of manufacture for protecting a product from imitation is disclosed.Hereinafter this will be referred to as Product.The product may include the electricity protection being embedded in as continuous base material or band or other physical layouts in following media The flexible media of part, the medium such as non-woven fabrics, paper, hardboard, woodwork, plastic plate or foam or other suitable types.At this The combination of Wen Zhong, gained can be referred to as electricity protection wallpaper.Electricity protection wallpaper is used for mounted (line is inlayed, mounted, mounting lining) container Or the wall of packaging, to cover all six faces.The beginning and end of continuous electricity loop are connected to the intelligence for being referred to as eLockBox Energy, autonomous detection unit.
The eLockBox includes monitoring and reports about the hardware and software needed for sensor states.One in eLockBox A little function element can include but is not limited to:GPS;RFID;Humidity and temperature sensor;Motion detector;Video camera;Battery; Electrical measurement transceiver;For internet, satellite, bluetooth and the communication port of movement;For the soft of signal processing and communication encryption Part, algorithm and firmware.
Herein, word " exemplary " is only applied to indicate " serving as example, example or illustration ".It is described herein For " exemplary " embodiment be not necessarily to be construed as it is more preferred than other embodiment or advantageous.
In some embodiments, the anti-tamper safe processing of shipping container is provided.Packaging with electric protector Part and processing including test system and digital signal processing software allow shipping container all to be protected in its all face.Although Diagram and discussion are directed to shipping container, but similar method will also apply to other containers, such as semitrailer, fixation Formula storage container, railway carriage, safe stock need to be protected with from unwarranted access or the other types distorted Container or storage device.
Fig. 1 shows typical shipping container 100, it is shown that it has need six faces to be protected, any of which one Face is all vulnerable to undesirable intrusion.Container as described herein can be any size or shape, and can be by existing Any typical transportation resources that the present uses is carried, and above-mentioned typical transportation resources is air transport, land transportation or sea-freight.
Fig. 2 shows the decomposition in 200 all faces of shipping container.These faces are top surface 201, bottom surface 203, the left side 202, the right side 205, the back side 204 and front 207.Show overlapping wing plate (flap) 206, it is additional electrically or optically to learn (or the protection of protection wallpaper Part) it is placed in the entrance to protect container in the overlapping wing plate.
In fig. 3 it is shown that the electricity protection wallpaper 300 for protecting container.Electricity protection wallpaper 300 includes flexible and suitable type Medium 305, can apply or be embedded on the medium suitable electric protector 302 and be fixed in place.Material Can be paper, plastics, textile fabric, non-woven material, woodwork or any other can receive the conformable material of electric protector.Electricity Protector can be secured on back lining materials, or be embedded into material when it is manufactured.It alternatively, can will be conductive Material is placed between two layers of back lining materials, as sandwich arrangement.The electricity protector 302 is in a manner of forming band or grid Wiring, the band or grid can be the random arrangements of straight line or any mode so that it does not allow people, hand or arm or tool Penetrate, or cargo is removed from container in the case where not destroying electric protector arrangement.In figure 3, it illustrates for A kind of possible arrangement of electric protector, wherein band are placed with horizontal pattern.The side of protector be short-circuited (short) and It is connected to input electric connector 301, and the opposite side of protector is also short-circuited and is connected to output electric connector 304.Electricity Connector can meet different standards, such as COAX, typical conducting wire or SMA or some other configurations or standard, Huo Zheke To be the connector of customization.Electricity protection wallpaper 300 can contain adhesive layer, in order to which electricity protection wallpaper 300 is attached to appearance The face of device.
In fig. 4 it is shown that a face of container.Electricity protection wallpaper 300 can be applied to one in six faces of container A face is to form panelling.In this case, we show how electricity protection wallpaper is applied to showing for the left side 202 of container Example.It is applied to wall of a container by using attachment pin or by using binder by electricity protection wallpaper 300, electricity is protected into wallpaper It is applied on wall as standard wallpaper.Electricity protection wallpaper can be protected by the additional protective layers about material 403, it should Additional protective layers are made of timber, plastics, metal or some other protection materials and are attached to the side wall 202 of container.It can profit Electricity consumption protect various other configurations of wallpaper, the side wall for how applying it to container, grid density and other arrangement, with Just described technology is realized.Panelling with electricity protection wallpaper 300 can be connected to separately by connector 301 and connector 304 Outer panelling, the entire wall to provide all six faces of container cover.
In fig. 5 it is shown that face 202,204,205 and 206, ceiling 201 and bottom plate 203 for protecting container 500 To prevent the arrangement distorted.For illustrative purposes, a part and its electricity protection 300 He of wallpaper of ceiling 201 and bottom plate 203 are shown Its respective protective layer or material 403.Show with electricity protection wallpaper 300 several panellings be attached to container 500 face 202, 204,205 and 206.In this case, there are six the panellings for including electricity protection wallpaper 300.Such as in 501 place of tie point Show, using corresponding to each electricity protection wallpaper 300 connector 301 on the side of protector and in the opposite of protector Electricity protection wallpaper 300 in each panelling is connected to adjacent panelling by the connector 304 of side.As shown, the electricity in panelling Protection wallpaper 300 forms continuous access (circuit, circuit), to the electricity being sent in the connector 301 of given panelling Signal or optical signal are by by the conductive strips of panelling, and output signal will be exported from connector 304.In the same way, Using connector 301 and connector 304, panelling can be connected on the ceiling 201 and bottom plate 203 of container 500.Therefore, this Arrangement will form the complete continuous loop of electricity protection wallpaper 300 in the arrangement of six interior walls of covering container.Electricity is anti- Retaining wall paper panel can be overlapped so that very close to each other in the covering in the face of container 500.Electricity protection wallpaper in the shop front 206 300 show the protective layer 403 of addition.In this case, electricity protection wallpaper 300 can be binded to protective layer 403.Covering institute There are six the entire loop terminations of the electric material about conductive ink in face in being attached to the eLockBox 600 being described below in detail Two connectors.Once eLockBox 600 to be respectively connected to the connector at the beginning and end for protector loop 301,304, the door of container 500 can close and container 500 will be protected.Although eLockBox 600 is shown at Fig. 5 In container 500 wall in, but the eLockBox 600 can be placed in the outside of container 500, such as be placed in container 500 On the latch of door.
In figure 6, eLockBox 600 is shown together with a type of sensor, and in this case, the biography Sensor is electricity protection wallpaper 300.However, the sensor or another sensor can be placed on the latch of door (as that will retouch later State) so that the door of container can be monitored.In some embodiments, two kinds of sensor may be used, wherein one The sensor (for example, electricity protection wallpaper 300) of type is placed in container surroundings, and another sensor is placed on door.
Electricity protection wallpaper 300 can be used to protect container from distorting, and the shipping people and goods owner is notified to close In potential invasion.In this case, Fig. 5 shows the vertical view in the face of container 500.However, embodiment is depended on, it can Electricity protection wallpaper 300 to be placed in all faces of container 500.Pay attention in this diagram, eLockBox 600 without respect to The face of container including electricity protection wallpaper 300 is drawn to scale.This is to show the details and function of eLockBox 600.
ELockBox 600 may include shell, which accommodates for detecting the invasion into container and can also incite somebody to action Invasion notice is to the owner of container or the electronic hardware of operator and software.This can be carried out in real time, it is meant that be transported in container Defeated period continuously or periodically can measure and/or notify.In addition, eLockBox 600 can monitor ring as required Border situation, to protect the integrality of material in container.In figure 6, eLockBox 600 includes:For electric transducer loop or light Learn the transmitter 602 of sensor loop;RFID tag 603;GPS locator 604;Microcontroller or MCU 605;Event recorder 606;Camara module 613, the camara module can be used for identifying invader and physical location;Pressure, temperature and humidity pass Sensor 615 can be used for monitoring of environmental situation, and can be used for protecting the integrality of product in shipping container;Movement inspection Device 614 is surveyed, such as accelerometer or Inertial Measurement Unit (IMU) are used as the opening and closing device of eLockBox 600, or System is waken up from battery saving mode, or for analyzing dynamic spectrum, which is determined for container The vibrations of interior material or container or attempt to destroy or damage eLockBox, or detection because attempting brokenly in the movement of given position Vibrations caused by the bad container;Battery module 607;Battery charger 611;One group of interface hardware 608;Digital Signal Processing Device (DSP) 609;For electric transducer loop or the receiver module 610 of optical sensor loop;And for communicating and being Input/output (I/O) interface 616 that eLockBox 600 charges.
I/O interfaces 616 can be the I/O of either another computer types of USB standard I/O.Communication interface 612 can be with It is one of the communication interface industrially used, it is such as, but not limited to Wi-Fi, mobile cellular communication, bluetooth, Ethernet, wireless Electricity, purple honeybee (ZigBee) or other communication standards.As will be described later, there may be connected to eLockBox 600 other external device (ED).One or more external sensors 618 can be connected to eLockBox 600.These sensors Can be optical sensor, acoustic sensor, infrared sensor or other kinds of optical sensor.These sensors can make It is connected with sensor interface 617, which can be wireless or use cable wire.Sensor 618 can be attached It is connected to other containers or is attached to the other parts of container identical with eLockBox 600.
ELockBox 600 can be connected to one or more external antennas using transmission line 619, outside the one or more Portion's antenna can be placed in inside or outside the container protected by eLockBox 600.ELockBox 600 is at position 601 It is connected to the electricity protection wallpaper 300 around container, the transmitter 602 being in the position in eLockBox 600 generates injection electricity Protect the electric signal in wallpaper 300.Electric signal in transmitter 602 can come from DC voltage source, AC voltage source impulse generators Or other suitable electric stimulus generators.Using optical protection wallpaper embodiment in, transmitter from laser, LED or its The optical signal generator of his type generates optical signalling.In this case, electric signal is in the loop of electricity protection wallpaper 300 (circulate, circulation) is propagated, and is received at connector 611 and is detected by receiver 610.Receiver 610 can To include necessary detection circuit and measuring circuit, to determine any distort in real time.Any attempts to tamper with or invades container all It can be sensed by the change of characteristic, the characteristic such as, but not limited to resistance or capacitance.
Suitable conductive ink is conductive ink that is commercially available, such as being manufactured by Dupont companies.In the arrangement of Fig. 3 In, the resistance of every band is all by the resistor coupled in parallel with other bands in panelling.For example, if the specific edge being shown in FIG. 3 In plate, if every band is 1 kilohm, due to there is 12 bands, then all-in resistance will be 1/12 or 83 ohm.Depending on conduction The electric conductivity and band pattern of ink, a series of resistance in six faces can be about hundreds of Dao several kilohms.This amount can lead to Typical ohmmeter is crossed to measure, can also be measured by changing caused by invasion.Ohmmeter can be incorporated to receiver 610. For example, receiver input can be fed to input of the electric current to electric pressure converter, to measure as known to exporting transmitter 602 The electric current that amplitude voltage signal generates.
ELockBox 600 may include RFID tag 603 and GPS locator 604.Microcontroller or processor MCU 605 include embedded software, which operates for managing, and trustship controls the control of the component inside eLockBox 600 System processed, and provide the protection for preventing network intrusions for eLockBox 600.
Event recorder 606 can be configured to monitor electricity protection wallpaper 300, to ensure loop not because destroying or because changing Its sign characteristic and be affected.Event recorder 606 can also be arranged to periodic monitoring electricity protection wallpaper 300, Huo Zhe Event (real-time) record event when occurring.Event recorder 606 is for storing by the monitoring of the information generated of eLockBox 600 History, its generality operate and in given time period to any access of container.
Battery module 607 can power during the container protected period for eLockBox 600.In general, can lead to It crosses and provides the energy content of battery of sufficient amount storage to extend the period.ELockBox 600 further includes battery charger 611, this is filled For the power from external power source such as I/O interfaces 616 to be adjusted, can meet has to battery operation electric appliance Hardware such as eLockBox 600 transmit power ability standard USB protocol.
Digital signal processor 609 is related to generating for electricity protection wallpaper for carrying out multiple operations, the multiple operation 300 electronic signature and execution mathematical model and statistical model.Digital signal processor 609 can also be held in MCU 605 It is realized in capable software.
Another module in eLockBox 600 is interface hardware 608, which supports communication to connect Mouth 612.This is used to the state of container being communicated to the user of short distance position or remote location.Some communication interfaces 612 can be with Be via short-distance wireless to mobile phone, to cellular tower or to RF receive the land-line of tower, satellite, fiber optic cable and Other kinds of communication port.In the technology, prevented using several methods in order not to allowing container that user is notified to send out Life is distorted and intentional spacing container.In some embodiments, the custom system in remote server can be inquired periodically ELockBox 600 is with detecting state.In some other implementations, the nonmetallic window in the given area of container is all If glass can be used for satellite antenna being placed in the inside of container, in real time or with any usurping of event-driven mode broadcast generation Change.Nonmetallic window can be protected against the interference of the panelling of electricity protection wallpaper 300, and in that case, panelling is by not It can stop that the material that RF frequency is sent out from antenna is made.Therefore, antenna can be prevented from emitting at no time.Two methods It can use simultaneously, to obtain preferably communication and safety assurance.
In the figure 7, the process 700 executed in eLockBox 600 is used to obtain the signature for electricity protection wallpaper 300. In first step 701, the electric loop in electricity protection wallpaper 300 is applied the signals to.In second step 702, in electrical domain In electric carrier frequency (or wavelength) signal be modulated, and modulated signal envelope of the application for modulating electric carrier wave.Modulation Envelope can apply AM, FM or the modulation of any other type.Carrier wave can also be modulated by changing the frequency (wavelength) of power source. Both time-modulation and frequency modulation(PFM) can be carried out in the electrical domain, and is carried out one at a time in the electrical domain, or by same The time-modulation of step and frequency modulation(PFM) carry out.In step 703, electric signal is detected after it propagates through loop.Telecommunications It number can be digitized.In step 704, digital signal processing algorithm is executed to extract signature.This can be by detecting characteristic Such as resistance or capacitance, the guard section for reflecting or being being used other electrical effect characteristics realize.It is received in step 705 Other relevant informations that collection is generated by the various elements of eLockBox 600, such as GPS location, RFID information, event recorder Information etc..In this step, it is shown that institute's sensor information in need, but it is not limited to the information in Fig. 7.For example, in order to true Whether the Bale Cargo in constant volume device has been damaged during transportation, it is possible to implement Digital Signal Processing (DSP) algorithm, with Determine the frequency spectrum of the signal sensed by motion detector 614.Fast Fourier Transform (FFT) (FFT) can provide some of which Information.Motion detector information can be used for the processor in eLockBox 600 from the operation section for saving battery capacity It can be waken up in pattern, or for predicting whether invader is attempting to tamper with lock.Then in step 706 information be encrypted and It is sent to security server by secure communication channel.In addition it is possible to use various electricity modules are to be added (insert is inserted into) electricity Decaying and distortion, and can be by the way that they are placed between tie point 501 come arbitrary use, further signature to be made to be randomized So that it is steady, the influence for copying signal is resisted.In step 707, the identical information for being sent to security server is stored in thing In part logger.In step 708, the door of container can be closed.In step 709, system enters following patterns, in the mould Formula intermediate ring road is grasped by one or more combinations continuously or regularly or using Event-driven monitor or in these Make and monitors.
In fig. 8, process 800 shows the process for monitoring vessel safety executed in eLockBox 600.In step In rapid 801, apply electrical signals in the loop including electricity protection wallpaper 300.In step 802, the telecommunications come out from loop Number be detected, amplification and digitlization.In step 803, the signature of loop is obtained.In step 804, by the signature of acquisition with It is being obtained when container is closed for the first time and be stored in the signature in event recorder and be compared.In step 805, be based on than Compared with determining that signal is different or identical.If it is identical that the signature between measuring twice, which compares, loop is by again Initialization is to continue monitoring pattern.It is different if compared, uses one kind in available communication channel in step 806 Communication port sends alarm to server.Note that in the technology, can be come using more than one communication channel about distorting It notifies server, to provide redundancy, and prevents the real-time Communication for Power of invader's cut-out and server.Furthermore it is possible to adjust continuous Loop is monitored, it is made to be executed with programmable time interval to save battery capacity.Saving the another way of battery capacity is It is monitored and is notified based on event, the event is such as invaded, container is repositioned or the unwarranted of container door is beaten It opens.
In fig.9, system 900 includes using the eLockBox 600 together with the sensor including optical waveguide loop 901 Tamper resistant systems embodiment.Optical waveguide loop 901 can have tubular structure, and internal is hollow so that it can Accommodate waveguide 902.In this case, waveguide loop 901 can be flexible, and the mode that can be similar to padlock is protected Lay the handle of the door of eLockBox600.The waveguide 902 can be made of optical fiber, and it can be used for preventing optical waveguide The cutting of loop 901.It in the simplest case, can be with detection loop 901 by the missing of the sensing signal at receiver Cutting.In addition, the arrangement in present embodiment allows the system to be signed from waveguide 902.If waveguide is made of optical fiber , then system 900 can obtain the signature of waveguide 902, the combination of transmitter 602 and receiver 610.Signature may include such as One in many optical properties discussed in U.S.9,329,098B2, entire contents are incorporated herein by reference.It copys Person will not be able to cut or replace waveguide 902, because due to the unique signature of every fiber optic cable, which can not be from one Root optical fiber copies to another optical fiber.ELockBox 600 monitors the interruption or cutting of optical loop 902, and will invade or usurp Change and is sent to server.
In the system 1000 of Figure 10, the sensor for being connected to eLockBox 600 includes conductor 1002, is such as embedded in Insulated wire inside metal loop 1001.Metal loop 1001 can be made of hard grade steel, to prevent from cutting.In such case Under, the conduction of 600 monitoring currents of eLockBox, with determine the electric current of flows through sensor loop any permanent discontinuation or temporarily It interrupts.It can implement sensor loop by other methods, such as using the sound wave propagated around loop 901 or around loop The 901 RF signal loops propagated.
Figure 11 shows the protection system including sensor and eLockBox 600.The system includes loop sensor 1101, which is configured as the shackle of padlock, and wherein eLockBox 600 is similar to the ontology of padlock.It is also similar to Padlock, and as described in detail below, one end of loop sensor 1101 can be removed from eLockBox 600, make ring Road sensor 1101 passes through the opening of the lock ring of hasp-lock ring type latch, and the then weight in a manner of similar to conventional padlock Newly it is inserted and secured in eLockBox.The length of loop sensor can be less than 30 centimetres, be less than 20 centimetres, or certain It is less than 10 centimetres in implementation.Then, during transportation, eLockBox, which can be checked, is kept from transmitter 602 to receiver 610 Line or optical fiber connection continuity.It, can be with if detecting destruction or removal because of dropout at receiver It sends and notifies to system user as previously described.
The embodiment of eLockBox 600 shown in Figure 11 includes installing the protecgulum 1201 of 4 bit digital combination locks 1106. Digit for combination can be more than or less than 4.As explained further below, when correct combination is defeated Fashionable, lock 1106 can rotate by hand to move the latch inside eLockBox, discharge the side of loop sensor 1101, so as to Loop sensor 1101 is removed from latch, so as to open door.Such combination lock can be from for example The FJM Security Products as its Combi-Cam product line of Lynnwood Washington are bought.In addition, group Closing lock can be substituted by any of security system, fingerprint scanner, safe eye scanner etc..
Figure 12 shows the internal part of an embodiment of eLockBox, such as removes rear cover in fig. 11 in terms of the back side As arriving.In this embodiment, which includes forming the sensor ring of shackle together with internal fiber optic cable 1102 Road 1101 and the lock body for being implemented as eLockBox 600.The shackle 1101 can be the loop 901 or Figure 10 for Fig. 9 Tubular loop described in loop 1001.ELockBox 600 may include:Two bail holes 1103 and 1113, wherein shackle Two opposite ends are attached to bail hole 1103 and 1113;The inner section 1104 of fiber optic cable;Latch mechanism 1105;Combination lock 1106;Optical receiver sensor 1107;Driver printed circuit assembly (PCA) 1108;LED line cable 1110;Transmitter 1111; And latch 1112.
Hole 1103 and 1113 may include mounting hole 1103 and latch hole 1113.Between two holes 1103 and 1113 center Distance can be less than 20cm or be less than 10cm, to enable devices to be held by a hand.Shackle 1101 can be substantially firm Admittedly and be permanently mounted in mounting hole 1103.Fiber optic cable 1104 is from installation to the assembly parts 1120 in mounting hole 1103 Extend.The end for the shackle 1101 being inserted into mounting hole 1103 cannot be removed in normal use from mounting hole 1103.Hook The other end including assembly parts 1124 of ring 1101 is inserted into latch hole 1113.Assembly parts 1124 include groove 1112, should Groove is engaged when eLockBox 600 is locked with sliding part 1130.When user inputs correct combination in combination lock 1106 When, latch 1112 solves lock shackle 1101.It is then possible to which shackle 1101 is taken out from latch hole 1113.When by shackle 1101 from When being removed in latch hole 1101, in some implementations, shackle 1101 can be surrounded holds capable axis level with both hands with the two long of shackle 1101 Rotation.
Combination lock 1106 can be the combination lock of 4 bit digitals, which provides 10,000 kind of different combination.However, Embodiment is without being limited thereto and may include more multiple digital (for example, 5 bit digitals, provide 100,000 kind of combination) or less Number (for example, 3 bit digitals, providing 1,000 kind of combination).The digit of number can change depending on user preference. In some embodiments, combination input can be sent electronically to the server inside eLockBox or remote server, with For compared with correct combination.
Before input is correctly combined and rotated when knob, the arm 1105 also engaged with sliding part 1130 is rotated will slide Moving part 1112 is removed from groove 1112, to make assembly parts 1124 unlock, and thereby shackle 1101 is made to unlock.Then it can incite somebody to action Assembly parts 1124 are pulled open from transmitter 1111 and pull-out-hole 1113.
Driver PCA 1108 may include the hardware and software component for operating eLockBox 600.For example, ELockBox 600 may include required various parts to operate:RFID 603, GPS 604, MCU 605, event recorder 606, motion detector 614, sensor 615, DSP 609, interface hardware 608, battery module 607, battery charger 611, camara module and optical sensor 613 and I/O interfaces 616.
Driver PCA 1108 can also include that will transmit signal transmission to fiber optic emitter 1111 via cable 1110 LED driver (not shown).When transmission signal is received by fiber optic emitter 1111, can be transmitted from fiber optic emitter 1111 It is suitble to sensor signal (for example, light pulse, electric signal etc.) of the transmission by fiber optic cable 1102.In the normal operation period, it passes The one end and shackle 1101 of sensor signal transmission by fiber optic cable 1102, and finally in the insertion mounting hole of shackle 1101 It is received at 1103 other end.Then, sensor signal transports through fiber optic cable 1104, fiber optic cable electrical connection or light Be connected to shackle 1101.Then, sensor signal transmission passes through fiber optic cable 1104, and by optical receiver sensor 1107 receive.Once receiving signal by receiver 1107, then signal is analyzed by driver PCA 1108, is appointed with detection What is distorted.
Although mainly describing optical signalling above, but if sensor 1102 includes such as the metallic conductor in Figure 10 1002, then some components in eLockBox 600 will be electrical components rather than optical component.For example, cable 1110 can be The metallic conductor of electric signal can be conducted, transmitter 1111 can be electric signal generator, and cable 1104 can be wire rope, And receiver sensor 1107 can be electric signal receiver.
If eLockBox 600 is tampered, 1107 received signal of receiver sensor is by the optical signature with storage Or electric signature mismatches.In this case, signal is sent to server so that can will distort notice to eLockBox 600 The owner or operator.
By loop transmit optical signalling or electric signal can transmit at regular intervals, for example, every five seconds for example, it is 10 seconds every, Every 1 minute etc..It in this way, can be with real-time informing eLockBox 600 when attempting to distort the cargo inside container The owner or operator.
The sequence of the step of being shown in attached drawing above and component is not limiting.Disclosed embodiment is not being departed from Range in the case of, this method and component are easy to by omitting or resequencing shown step and component is modified.
Pass through these descriptions, it has been described that a kind of novel side for protecting in the internal shipping container equipped with product Formula.Described adoptable power sources types protect the encapsulation technology of wallpaper loop and for surveying commonly used in combination electricity The algorithm of examination electrical characteristics can use a variety of different technologies and skill and technique.
Various illustrative logical measuring techniques and process for generating pedigree can be realized in multiple combinations method.With Details to test the equipment of the electroresponse for generating electric signature information can change according to the specific implementation of the technology. For each specific application representation function in different method of different types of part, system, instrument and other transport products, But such realization should not be interpreted as causing a departure from the scope of the present invention.
The variation of conductive ink characteristic can depend on measuring the temperature at position, package and container deformation.Operator Capacitance characteristic can be adjusted and measure the resistance of threshold value to consider these influences.
It can be embodied directly as hardware, by handling in conjunction with the step of method or algorithm that embodiments disclosed herein describes The combination of the software module that device executes or both.
The external electric lock of protection container door can be used further to protect the opening of container, with offer mechanically prevent without Authorize the physical security barrier for opening container.
The previous description for providing embodiment of the present disclosure enables to use this technology.Do not departing from the present invention's In the case of spirit or scope, various modifications to these embodiments and the General Principle limited herein can be applied to it His embodiment.Therefore, the present invention is not intended to be limited to embodiment shown in this article, but be endowed meet it is disclosed herein The widest range of principle and new feature.

Claims (27)

1. a kind of be used to detect the system distorted, including:
Sensor, there are two opposite ends for the sensor tool;And
Lock body, the lock body are connected to described two opposite ends of the sensor, and the lock body includes:
Transmitter, the transmitter are configured as signal transmission passing through the sensor;And
Receiver, the receiver are configured as receiving the signal from the sensor.
2. system according to claim 1, wherein the lock body includes the combination for being configured as receiving the input of user Lock, and wherein, the combination lock is configured as making an end in described two opposite ends of the sensor to disconnect Connection.
3. system according to any one of claim 1 to 2, wherein an end of the sensor is fixed to described Lock body and it is connected to the receiver.
4. system according to any one of claim 1 to 3, wherein the sensor includes optical fiber.
5. system according to any one of claim 1 to 3, wherein the sensor includes electric conductor.
6. system according to any one of claim 1 to 5, wherein the lock body is coupled at least one other Sensor.
7. the system according to any one of claim 6, wherein at least one other sensor includes around appearance The electricity protection wallpaper of device arrangement.
8. the system according to any one of claim 6, wherein at least one other sensor includes around appearance The optical protection wallpaper of device arrangement.
9. the system according to any one of claim 6 to 8, wherein at least one other sensor wireless connects It is connected to the lock.
10. the system according to any one of claim 6 to 9, wherein at least one other sensor includes more A other sensor, and wherein, each other sensor is configured to respectively via wire communication or channel radio Letter is communicated with the lock body.
11. system according to any one of claim 1 to 10, wherein the lock body further includes:
Latch hole, the latch hole are configured as receiving the first end in described two opposite ends of the sensor, In, the latch hole is configured as discharging the first end;And
Mounting hole, the mounting hole are configured as receiving the second end in described two opposite ends of the sensor, In, the mounting hole is configured as not discharging the second opposite end of the sensor.
12. system according to any one of claim 1 to 11, wherein the lock body further includes the first cable, described First cable is connected to the mounting hole and the receiver, and is configured as the sensor that will be received at the mounting hole Signal transmission is to the receiver.
13. system according to any one of claim 1 to 12 further includes the second cable, second cable is configured For sensor signal to be transmitted to the end inside the latch hole of the sensor from drive circuit.
14. system according to any one of claim 1 to 13, wherein first cable and the second cable include light Fine cable.
15. system according to any one of claim 1 to 13, wherein first cable and the second cable include electricity Conductor.
16. the system according to any one of claim 1 to 21, wherein the center of the latch hole and the mounting hole Center at a distance of be less than 20cm.
17. the system according to any one of claim 1 to 21, wherein the center of the latch hole and the mounting hole Center at a distance of be less than 10cm.
18. the system according to any one of claim 1 to 17, further include be configured as communicating with the lock body it is outer Portion's antenna.
19. the system according to any one of claim 1 to 18, wherein the lock body includes GPS receiver.
20. the system according to any one of claim 1 to 19, wherein the lock body includes motion detector.
21. the system according to any one of claim 1 to 20, wherein the lock body includes video camera.
22. the system according to any one of claim 1 to 21, wherein the lock body includes event recorder.
23. the system according to any one of claim 1 to 22, wherein the length of the sensor is less than 30cm.
24. the system according to any one of claim 1 to 23, wherein object is drug.
25. a kind of be used to detect the method distorted, including:
Lock shackle is attached to the latch on the door of container, the container includes object;
The first sensor signal transmission is passed through into sensor associated with the lock shackle, wherein the sensor, which has, to be connected It is connected to two opposite ends of the ontology of lock.
26. the method according to claim 11, including:
Store the first signature of the sensor;
Transmit the second sensor signal of the second signature sensor for generating the sensor;
Compare first signature and the second signature;And
If first signature and the second signature are different from each other, it is determined that the object has been tampered with.
27. according to the method for claim 26, further including:
Combination input is received at the lock, the lock includes combination lock;
Server or remote server inside the lock are transported into combination input fax;
Combination input is compared with correct combine;And
If combination input is correctly combined identical with described, make the lock unlock.
CN201680072065.4A 2015-11-08 2016-11-07 Security system with tamper-resistant sensor and network security Active CN108368710B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562252555P 2015-11-08 2015-11-08
US62/252,555 2015-11-08
PCT/US2016/060828 WO2017079743A1 (en) 2015-11-08 2016-11-07 Security system with anti-tampering sensors and cybersecurity

Publications (2)

Publication Number Publication Date
CN108368710A true CN108368710A (en) 2018-08-03
CN108368710B CN108368710B (en) 2020-10-30

Family

ID=58663128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680072065.4A Active CN108368710B (en) 2015-11-08 2016-11-07 Security system with tamper-resistant sensor and network security

Country Status (4)

Country Link
EP (1) EP3371395A4 (en)
KR (1) KR102055589B1 (en)
CN (1) CN108368710B (en)
WO (1) WO2017079743A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113173338A (en) * 2020-09-08 2021-07-27 拍拍看(海南)人工智能有限公司 Intelligent induction anti-punching safety package

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201700084928A1 (en) * 2017-07-25 2019-01-25 Guala Closures Spa Electronic closing and / or locking device.
GB201719396D0 (en) * 2017-11-22 2018-01-03 Walsh Timothy Neville Tamper detection system
DE102018111301A1 (en) 2018-05-11 2019-11-14 ABUS August Bremicker Söhne KG Mobile castle
EP3833214A4 (en) 2018-08-08 2022-05-11 Tracking Packing, Inc. Shipping package tracking or monitoring system and method
KR102159463B1 (en) * 2020-01-16 2020-09-25 유니셈(주) Electronic sealing device
AT525182A1 (en) * 2021-06-21 2023-01-15 Rep Ip Ag Method and device for tracking and verifying the integrity of consignments of goods

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926414A (en) * 2004-01-09 2007-03-07 吉尔伯特·D·贝恩霍克 Tamper-proof container
CN101375322A (en) * 2005-11-15 2009-02-25 E.J.布鲁克斯公司 Electronic tamper evident seal

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2557543B1 (en) 1983-12-29 1986-04-11 Commissariat Energie Atomique OPTICAL DEVICE FOR SEALING A CONTAINER FOR DETECTING AN ATTRACTIVE ATTEMPT
GB9125447D0 (en) * 1991-11-29 1992-01-29 Walker Graham D Alarm system
USRE37011E1 (en) * 1993-10-20 2001-01-09 Mas-Hamilton Group, Inc. Electronic combination lock utilizing a one time use combination
KR960706007A (en) * 1993-10-29 1996-11-08 제리 에이. 모건 ELECTRONIC COMBINATION LOCK
GB9914711D0 (en) * 1999-06-23 1999-08-25 Leck Michael J Electronic seal,methods and security system
US20030151492A1 (en) * 2002-02-11 2003-08-14 Jason Renfroe Interactive tamper-resistant lock, light, and associated methods
US7411495B2 (en) * 2002-08-27 2008-08-12 Hi-G-Tek Ltd. Smart container monitoring system
US7482924B1 (en) * 2004-11-05 2009-01-27 Tamper Proof Container Licensing Corp. Cargo container security system communications
US7608812B2 (en) * 2004-11-05 2009-10-27 Tamperproof Container Licensing Corp. Tamper detection system
US8154397B2 (en) 2005-05-04 2012-04-10 Astrin Arthur W Locking mechanism, systems and methods for cargo container transport security
US20060288744A1 (en) * 2005-06-28 2006-12-28 William Smith Alarm lock
KR200413868Y1 (en) * 2006-01-27 2006-04-11 김철순 Portable lock with alarm
WO2009019694A2 (en) * 2007-08-09 2009-02-12 Hi-G-Tek Inc. Monitorable sealing cable lock
KR20100042737A (en) * 2008-10-17 2010-04-27 서성일 The sensor that sense the wall to break by intruders
WO2011149424A1 (en) * 2010-05-25 2011-12-01 Jsb Tech Private Limited An electronic combination lock
KR101349951B1 (en) * 2013-08-07 2014-01-13 권유신 Warning locker for bicycle
FR3011025A3 (en) * 2013-09-25 2015-03-27 Axible Technologies INTELLIGENT PADLOCK-INTELLIGENT ELECTRONIC PADLOCK PROCESS
KR20150123469A (en) * 2014-04-25 2015-11-04 정명서 Bicycle lock that used NFC
KR101564716B1 (en) * 2015-04-16 2015-11-02 주식회사 브릴링스 Apparatus for managing open and shut in enclosure box

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926414A (en) * 2004-01-09 2007-03-07 吉尔伯特·D·贝恩霍克 Tamper-proof container
CN101375322A (en) * 2005-11-15 2009-02-25 E.J.布鲁克斯公司 Electronic tamper evident seal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113173338A (en) * 2020-09-08 2021-07-27 拍拍看(海南)人工智能有限公司 Intelligent induction anti-punching safety package
CN113173338B (en) * 2020-09-08 2022-11-15 拍拍看(海南)人工智能有限公司 Intelligent induction anti-punching safety package

Also Published As

Publication number Publication date
EP3371395A4 (en) 2019-07-03
EP3371395A1 (en) 2018-09-12
KR102055589B1 (en) 2019-12-13
KR20180084829A (en) 2018-07-25
WO2017079743A1 (en) 2017-05-11
CN108368710B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
US10107014B2 (en) Security system with anti-tampering sensors and cybersecurity
CN108368710A (en) Security system with anti-tamper sensor and network security
US7471203B2 (en) Tamper monitoring system and method
US7936266B2 (en) Shipping container seal monitoring device, system and method
US7170409B2 (en) Tamper evident packaging
US7646292B2 (en) Methods and systems for verifying the position and status of hierarchically arranged objects
US7772974B2 (en) Tamper evident seal system and method
US7015814B2 (en) Security tag
US20080073422A1 (en) Method and system for tracking and managing cargo containers
US10388129B1 (en) Container tamper-proof protection by use of printed fiber optics manufacturing and integrated sensors
CN108369769B (en) By using the container anti-tampering protection of printing fiber manufacturing and integrated sensor
TW200417848A (en) Method and system for monitoring containers to maintain the security thereof
WO2006056887A2 (en) Systems and apparatus for secure shipping
CN203094754U (en) Anti-tamper package
JP2006161302A (en) Electric sealing managing tag, rfid card, sealing method by electronic sealing managing tag, method of recording information in rfid card, program for sealing by electronic sealing managing tag, program for recording information in rfid card, transportation managing system utilzing electronic sealing managing tag, and transportation managing system utilizing rfid card
CN103971140A (en) Package integrity monitoring system and package integrity monitoring method
WO2002045042A1 (en) Security tag
CN108346263A (en) Container ship hazardous materials transportation warning system based on sound wave identification technology and method
JP2008140146A (en) Opening detection system
EP1544386A1 (en) Method to attest an occurred tampering of a container and electronic lock that carries out this method
Johnston et al. How to be a Better Seal User

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant