1242173 玖、發明說明: 【發明戶斤屬之技術領域3 發明領域 本發明大致係有關於保全技術,特別是用以偵測未經 5 授權而入侵一容器的技術。1242173 发明 Description of the invention: [Technical field of the inventor households 3 Field of the invention The present invention is generally related to security technology, especially the technology used to detect intrusion into a container without authorization.
L· J 發明背景 金屬貨物容器具有固定入門之機制以防止容器在運輸 當中遭文未經授權的入侵。一種習知的作法是以傳統鎖具 10固定門把或門閂。另一種作法是以裝有無法移動扣件的鋼 製螺栓固疋門把或門閂。該螺栓必須以螺栓切割器切割以 釋放該門把或門閂好讓門可以打開。 還有一種作法是提供一種包含與一射頻識別(RFID)標 籤共同使用之鋼製螺栓及無法移動扣件的裝置。一旦該扣 15件被_合至朗栓,該腿城籤會監視該扣件及該螺栓, 而如果發現任何異狀,該標籤會傳送一無線電訊號給一做 為閱讀器使用之遠端接受器,以便此一警告狀態可以獲得 操作人員以及/或者保全人㈣注意,使他們處理容器的被 入侵行為。 20」縱使使用上述類型之安全措施,仍有可能在沒有直接 破=上述類型之安全措施的情況下將容器的門打開。舉例 來也午可以切斷門把或門問。類似地,當門把被固定 式^連接至-可旋轉連線且該可旋轉連線之兩端各自駐紫 一又佔據容器箱體中所設之―處凹槽的狗時,也許可以剪 1242173 斷連線使該連線之兩端旋轉以將狗從該凹槽釋放,進而將 m丁開。其他辦法包括鑽除門把接縫、移除門较鏈針、或 在板金牆壁或屋頂抑或是木質地板上鑽孔。可以可靠方= 有效谓測這些人㈣態之任—種且可避免錯誤警報的技: 另一考量是,有些情形下需要思及運輸時的容器移動 效果舉例來§兒,當容器從地面被抬高並放置於—運輸工 具如卡車或輪船時,容器中之貨物的位置可能改變。選擇 性地’容器被裝載至運輪工具上之後,正常之運輸工具移 10動可能使貨物在容器中移動位置。移動之貨物不應被保全 系統誤判為人為移動,否則保全系統可能會造成人為入侵 之錯誤指示。 15 另一範例是,典型的貨物容器通常是以鋼做成,除了 地板-般會以木頭做成外。如果監視系統依靠某種電磁場 幵1來彳貞縣經她之人為人侵,容器之移動可能影響電 磁舉例來說,電磁場之能量無法輕易穿過鋼製牆壁, 但牙過木質地板就容易多了。當容器㈣在地面上時,地 面可能影響比錢任何穿過木質地板之電磁場的強度。 ^果容ϋ從地面被抬高,比方說#它被裝載至運輸工 ^二,木質地板會與地面隔開—段㈣,進而降低地面 产比方說任何穿過木f地板之電磁場的強度之程 於依靠電磁場形式來試㈤貞測容器之人為入侵的監 1改!ί來說,當容器從地面被抬高時所發生之此一電磁場 、交可能被誤判為人為活動,且可能使保全系統產生人 20 1242173 為入侵之錯誤指示。有鑒於上述考量,我們可以理解,可 以可靠方式偵測貨物容器之未經授權的人為入侵且對於因 比方說容器移動等因素所致之入侵錯誤指示具有極低發生 機率的技術是有必要的。 5 【^^明内】 發明概要 本赉明之一悲樣包括:在一容器中發射一無線訊號; 在該容器之範圍内偵測該無線訊號;監視該被偵測無線訊 唬以視其特性是否改變;以及透過將一改變發生之無線通 头傳送至退離5亥谷器之位置的方式來回應該被偵測無線 訊號之特性改變的偵測。 本發明之另一態樣包括:監視一容器以判定代表容器 之未經授權的入侵狀態是否發生;判定該容器是否靜止; 當該容器處於靜止狀態時,透過傳送一狀態存在之無線通 15知的方式來回應該判定;以及當該容器處於移動狀態時, 透過忽略該狀態存在與否的方式來回應該判定。 本發明之又-態樣包括:監視一容器之門是否處於關 閉位置,以及發射-無線訊號以指示該容器之門是否處於 關閉位置。 20圖式簡單說明 本發明可從下列詳細說明,以及隨附之圖示中獲得更 佳的理解,圖示中: 第1圖為-概略圖,顯示一習知類型之貨物容器,該貨 物容器具有一位於該容器内側之發射器、-位於該容器外 1242173 侧之接收器、以及一位於該容器範圍内之固定式閱讀器; 第2圖為類似第1圖之概略圖,顯示一替代實施例,該 實施例包括一習知類型之貨物容器、一位於該容器内側之 發射器、兩個位於該容器外側之接收器、一使該兩個接受 5 器同步之震盪器、一耦合至該兩個接收器之發射器、以及 一位於該容器範圍内之固定式閱讀器; 第3圖為類似第1圖之概略圖,顯示另一替代實施例, 該實施例包括增加一耦合至該發射器的動作偵測器; 第4圖為類似第2圖之概略圖,顯示另一替代實施例, 10 該實施例包括增加一耦合至該發射器的動作偵測器; 第5圖為另一替代實施例之概略透視圖,顯示一習知類 型之貨物容器,該貨物容器具有一設於該容器外部之發射 器、以及一位於該容器範圍内之固定式閱讀器; 第6圖為第5圖中所示之發射器的放大尺寸概略片段透 15 視圖;以及 第7圖為一概略片段透視圖,顯示第5圖中所示之容器 内的感應器配置。 I:實施方式3 較佳實施例之詳細說明 20 第1圖為一概略圖,顯示一習知類型之貨物容器10。在 第1圖中,該容器10具有一木質地板且其餘部分為鋼製成 的。然而,該容器可選擇性地以其他材料做成。該容器10 具有兩扇門11及12、以及概略例示於編號14處之把手與鎖 具總成。一低功率(比方說1 mW)射頻(RF)發射器21被安裝 1242173 於該容器内側,靠近一牆壁和屋頂之接合處。該發射器η 傳送-以該特定發射器之獨一無二識別石馬進行編碼的信標 脈衝。-射頻接收器/發射器23被固定至該容器1〇外側,^ 被組態以專m貞測該容⑼側之該發·21所傳送的奸訊 5號。當該容器10位在一概略例示於編號㈣之習知類型固 定式R F閱讀器的範圍内時,該接收器/發射器2 3可與該閱讀 器26齒合以做RF溝通。 當該容器門11及12被關閉且金屬表皮原封不動時,該 内部發射器2!之放射物會被該金屬表皮屏蔽,除了集膚效 1〇應電流以外,該集膚效應電流係在内側表面誘發並在開口 邊緣,如門接合處之裂縫,或側面牆壁底部與木質地板接 觸之處的四周傳導。位在該容器料側 ' 塊收、量賴紀絲自該發射㈣之此—減歡F=;: 功率水平。 15 ^果該f1U或12被打開,或該容器之該金屬表皮_ 孔(如比方說編號31所概略顯示者),射頻放射物將因為該開 口區域之輕射以及該開口邊緣四周之集膚效應傳導而增 加,且因此產生之訊號水平的上升將被該外側接收器/發射 器23偵測出來。如果訊號功率之增加超出一可調整並被選 2〇擇以壓制尺17嗓音誘發之錯誤警示的選定臨界值,則該外側 發射器23將感應並紀錄此一狀態改變並可能執行一或多個 額外的任務。 詳言之,該接收器/發射器23將紀錄此一狀態改變以及 它發生的時間,並保留該資料直到該容器1〇接近一如編號 1242173 26所示之RF閱讀器,且該閱讀器質問該接收器/發射器23並 接收該資料為止。這情形可能幾乎立即發生,如果該容哭 1 〇業已位在該閱讀器26附近的話,或者後來發生,_曰該 容器10首次接近該閱讀器26。選擇性地,該接收器/發射琴 5 23可紀錄此一狀恶改變以及它發生的時間,並立刻開妒傳 送以該資料編碼之週期性RF脈衝。如果該容器1〇業已位在 該閱讀器26附近的話,則這些脈衝將幾乎立即地被該閱讀 器26偵測出來。否則,該脈衝將在經過一段時間,當該容 為10再次接近該閱讀器26後,被偵測出來。 1〇 無論為何種情形,當一閱讀器從該接收器/發射器23接 收一内含指示入侵發生之資料的RF訊號時,該閱讀器26將 透過一圖中未加以顯示之習知型態資料網路將此一資訊傳 遞至-習知型態監視設備,以通知操作人員入侵之發生。 事實上,射頻噪音及環境之電磁特質的改變可能產生 15錯誤訊號。因此,該接收器/發射器23具有-執行習知型態 之適應式演算法的處理器,以識別並消除此等錯誤訊號。 關於此點,該接收器/發射器23為自我校準型,因為它㈣ 所接收之㈣率轉的初始絲,㈣擁狀祕依每次 安政之%&而k ’然後單純尋找與該底線狀態不同的改變。 2〇 $ 一感應谷為之入侵的技術涉及在主題容器内側偵測 射頻電力路徑長度之改變。詳言之,第2圖為一替代實施例 之概略圖心知例包括_貨物容器⑺,該容器與第^圖中 之該容器1〇相似,除了它具有不同的RF發射器及接收器配 置如下所述。洋吕之,一置於該容器1〇之一端的低功率 10 1242173 射頻發射器21朝各個方向發射振波。在這些射頻下,rf波 長與該容器10之尺寸比較起來較短,且在該容器内側沿不 同路#前進之無線電波將具有不同的整體相延遲。兩個rf $接收器24及25被置於該容器之相對端、相對角落處,並在 5傳播至不同空間之路徑以及傳導至容器牆壁後接收訊號, 以使該訊號在各該接收器24及25之位置上具有一獨一無二 且不同的相延遲。該接收器24及25由一共同近端震盪器(概 略顯示於編號27處)同步化,因此這兩個訊號之間之相差可 以可靠地偵測出來。當該發射器21至該接收器24或25之尺? 1〇電力路徑長度被一足以改變該路徑之介電及磁性特質的質 ϊ入侵改變時,該接收器24及25所接收之該兩個訊號之間 的相差將發生改變,且可以被偵測出來。當該容器之表皮, 如標號31所概略顯示者,被裁成一孔時,它將改變電力路 從,並使該接收器24及25所偵測之訊號之間的相差發生改 15 變。 該接收器分別被耦合至如標號28所概略顯示之發射 為。以類似第1圖中之該發射器23所使用的方式,第2圖中 之該發射器28將紀錄該接收器24及25所偵測之該兩個訊號 之間之相差的改變以及它發生的時間。然後該發射器28將 2〇保留該資料直到該容器10接近一如編號26所示之RF閱讀 器’且該閱讀器質問該發射器28並擷取該資料為止。這情 形可能幾乎立即發生,如果該容器10業已位在該閱讀器26 附近的話,或者後來發生,一旦該容器10首次接近該閱讀 器26。選擇性地,該發射器28可紀錄此一相差之改變以及 11 1242173 它發生的時間,I立刻開始傳送以該資料編碼之週期卿 脈衝。如果該容器10業已位在該閱讀器26附近的話,則這 些脈衝將幾乎立即地被該閱讀器26偵測出來。否則,該: 衝將在經過-段時間,當該容㈣再次接近該閱讀器26 5 後,被偵測出來。 貝口 無論為何種情形,當~閱讀器26從該發射器28接收一 内含指示人侵發生之資料的RF訊號時,該閱讀㈣將透過 -圖中未加以顯示之習知型態資料網路將此_資訊傳遞至 一習知型態監視設備,以通知操作人員入侵之發生。 10 事實上,第2圖所示之組態亦受可能產生錯誤訊號之射 頻噪音及環境之電磁特質的改變影響。因此,該接收器24 及25各自具有一執行習知型態之適應式演算法的處理器, 以識別並消除此等錯誤訊號。關於此點,該發射器28為自 我校準型,因為它量測該接收器24及25所接收之好訊號之 15間的初始相差,而該初始相差係依每次安裝之環境而變, 然後單純尋找與該底線狀態不同的改變。 在第2圖之實施例中,該接收器24及25被設置於該容器 10之外部的分離位置上。然而,選擇性地,也可以其他將 其分離之組恶設置。舉例來說,該接收器24及25可以安裝 20於該容器1〇内之分離位置上。另一考量為,為求清晰,第2 圖將3接收器24、該接收器25、該近端震盈器27以及該發 射器28顯示成實質分開之單元。然而,選擇性地,這些元 件中之或夕者可以整合成一單一的實質單元。 雖然第1及2圖之實施例的操作對許多應用來說皆令人 12 1242173 滿意,在某些其他應財,其操作可能會受 影響。舉例來說,當該容器10從地面被抬高並放=於一= 輸工具如卡車或輪船時,該容器中之貨物的位可A 變。選擇性地,該容器1G被裝載至運輸工具上t可^改 5輪工具之正常移動可能使貨物在該容器1〇中移動== 考第1圖,此一貨物移動可能影響該 測之該發射器21發射的^^訊號功率水平。因此,,所。里 發射器23可能發出錯誤的入侵偵測警示。參考幻圖接 移動可能改變該接收器2 4及2 5所偵測之訊號中其中一者或 兩者的前進路徑,進而導致其相差改變,致使該發射㈣ 發出錯誤的入侵偵測警示。 ° 另一個容器移動可能成為問題之狀況示範為,該容器 10幾乎完全由鋼製成,但具有_木質地板。第⑷圖= 之入侵伯測配置在該容器10内發射RF能量,其無法輕易穿 15過鋼製牆壁,但穿過木質地板就容易多了。當該容器坐落 在地面上時,某些RF能量可能穿過木質地板、從地面反射、 再穿過木質地板、然後影響該容器内之RF能量的整體特 性。如果容器從地面被抬高,比方說當它被裝載至運輸工 具上時,向下穿過木質地板之RF能量將不再從地面反射, 20也因此不會經由木質地板回到該容器。因此,該容器内之 RF能量的整體特性在該容器從地面被抬高時會改變。 參考第1圖,被反射之RF能量的降低會影響該接收器/ 發射器23所量測之該發射器21發射的RF能量功率水平。因 此,該接收器/發射器23可能發出錯誤的入侵偵測警示。參 13 1242173 考第2圖,被反射之妳能量的降低會影響該接收器24及25 ,偵測之訊號中其中-者或兩者,進而改變其相差,致使 邊發射器28發出錯誤的入侵價測兹厂、 5第3圖為類似第i圖之概略圖=示―與^實施例 近似的替代實施例,除了 1作偵測器41之增加以外,該 =偵測器被固定式地安裝於觀㈣之—牆壁並協助降 低谷器移動所致之錯誤入侵谓測警示的可能性。詳言之, :=,器41為一已知類型之市售裝置,它可感:物理 移動並可產生一電力訊號 不動作是否正在偵測當中。 )1 亥動作侦測器41之輸出被輕合至該接收器/發射器23之輸 當該動作偵測器41輸出—却_ 動時,該接收器/發射器23會透過使其“二 15 被入侵之動作停用的方式來回應該訊號二疋= 收器/發射器23以和第】圖所述 ’ « 經授權之入侵门方式匈騎是否發生未 靜止狀態時才如:t動她器41指出該容㈣呈 忖如此做。该容器1〇之未經授 可能發生錢U呈靜止狀_,第 入㈣物歧爾㈣,目綱#乡=例中的 的入侵_警示可以避免。為㈣化及清晰動2之錯誤 該動作_⑼被顯示為—分離元件,但第3圖所示之 它可以選軸地與魏元料之—或理解, 射器23,進行整合。 如垓接收器/發 第4圖為類似第2圖 概略圖,顯不-與第2圖之實施例 20 1242173 近似的替代實施例,除了 一動作偵測器41之增加以外,該 動作偵測器與第3圖所示之該動作偵測器相同。第4圖中之 該動作偵測器41被固定式地安裝於該容器10之一牆壁並協 助降低容器移動所致之錯誤入侵偵測警示的可能性。該動 5 作偵測器41之輸出被耦合至該發射器28之輸入。 當該動作偵測器41輸出一訊號告知它正在偵測容器移 動時,該發射器28會透過使其判斷該容器10是否有被入侵 之動作停用的方式來回應該訊號。換句話說,該發射器28 以和第2圖所述相同之方式判斷是否發生未經授權之入 10 侵,但只有在該動作偵測器41指出該容器10呈靜止狀態時 才如此做。該容器10之未經授權的人為入侵最可能發生在 該容器呈靜止狀態時,因此第4圖之實施例中的入侵偵測準 確度及可靠度很高,因為容器移動所致之錯誤的入侵偵測 警示可以避免。為求簡化及清晰,第4圖所示之該動作偵測 15 器41被顯示為一分離元件,但吾人可以理解,它可以選擇 性地與其他元件中之一或多者,如該發射器28,進行整合。 第5圖為一概略透視圖,顯示一習知類型之貨物容器 110,該貨物容器類似第1至4圖所示之該容器10。該容器110 之主要部分皆以鋼材做成,除了該容器110之地板以木頭做 20 成以外。該容器110可選擇性地以其他適合的材料做成。該 容器110具有一以樞軸支撐之門111以及一門閂總成114。該 容器110及該門閂總成114之例示組態為示範性,其各自可 以選擇性地具有許多其他組態中之任一種。舉例來說,該 門閂總成Π4可選擇性地包括一垂直圓筒形桿,該垂直圓筒 15 1242173 形桿被可旋轉地支樓於該門ln上、固定式關合至該門閃 總成114之門把,並在兩端分別駐紫一隻佔據該容器ιι〇之 外部表面中所設之凹槽的狗。 該門閃總成114由-已知類型之保全裝置116維持於一 5上鎖組態中。該保全裝置116包括_與該門閃總成ιΐ4合作 之鋼製門栓,以及-與該鋼製門拾合作且包含一已知類型 之電池操作式射頻朗(RFID)標籤的箱體。献Fm標藏可 以發送以及/或者接收無線電訊號119,以便與一已知類型 之鄰近固定式閱讀器121溝通。 1〇 如果該保全裝置116在其鋼製門栓與該門閃總成114齒 口之後察覺它正遭受某種形式之干擾,該保全装置ιΐ6會傳 送一無線電訊號119給該閱讀器121。然後該閱讀器i2i^呈 遞一警示狀態給操作人員以及/或者保全人員,使他們處理 該容器110的被入侵行為。接下來保全人員可以在入侵尚在 15進行時進入該容器110以逮捕罪犯。 ^假使該保全裝置116在其察覺干擾之初剛好不在該閱 讀器121之無線電範圍内,該保全裝置116會連續傳送該無 線電訊號119以指出干擾已經產生。因此,如果該保全裝置 U6後來進入該閱讀器121之無線電範圍内,該閱讀器121將 20接收該訊號119並在那一時點上產生一警示狀態。 兔射器141被固定式地連接至該門111之外部表面的 上面部分。該發射器141包括一已知類型之電池操作式 標二?1,該標籤大致與該保全裝置116中所設置之標籤類似。 該發射器141可以傳送射頻(RF)訊號144給該閱讀器。 16 1242173 第6圖為第5圖中所示之該發射器141的放大尺寸概略 片段透視圖。兩個門栓146及147將該發射器14ι固定式地安 裝於該門111上。在這方面,該門111具有三個完全貫穿它 的分離開口。這些開口中的兩個被用以承接該門栓146及 5 147之柄。該門111中之第三個開口以虛線於編號151處被概 略顯示。未於圖示中顯示之電線從該發射器141穿過該開口 151再延伸至一設於該容器11〇内之感應器總成,該感應器 總成將於下文中被討論。 詳言之,第7圖為該容器110内部之一部分的概略片段 10透視圖,並於標號161處顯示上述感應器總成。該感應器總 成161包括一基板163 ’該基板在一設於該門111之頂部邊緣 的向上延伸金屬凸緣164正下方被固定至該門m。該基板 163具有兩個開口,該開口分別承接該門栓丨46及147之刻有 螺紋的柄。兩個螺母167及168齒合該門栓146及147之該刻 15 有螺紋的柄。 该感應器總成161包括一感應器支撐板171,該感應器 支撐板171與該基板163成垂直地延伸,並具有一以任何便 利方式,如焊接或螺栓,被固定式地連接至該基板163之邊 緣。該支撐板171中具有一水平圓筒形開口 172,且一已知 20類型之磁性感應器173被固定式地安裴於該開口 172中。該 磁性感應器173被穿過該門ni中之該開口 151的該圖中未 示電線電力耦合至該發射器丨41(第6圖)。 該感應器總成161亦包括一進階基板177,該基板由兩 個螺釘178及179固定式地連接至該容器11〇之屋頂或天花 17 1242173 板。一金屬支撐零件丨82以任何便利方式,如焊接或螺栓, 被固定式地連接至該基板177。該支撐零件182中具有一水 平圓筒形開口 183,且一永久磁鐵184被固定式地安裝於該 開口 183中。在所揭示之實施例中,元件163、171、177及 5 182皆為銘製品,但它們各自可以選擇性地以其他適合材料 做成。 在第7圖中,該門m被顯示其關閉位置,其中該磁性 感應器173相當接近該磁鐵184。該感應器173將偵測該磁鐵 184之磁場,並透過穿過該開口 151之該電線將其傳達給第6 10圖中之该發射器141。與之成對比地,如果該容器之該門111 被打開,該感應器173將被移至一與該磁鐵184分離之位 置。於是,該感應器173將不再偵測該磁鐵184之磁場,並 透過牙過该開口 151之未於圖示中顯示的該電線將其傳達 給該發射器141。 參考第5圖,當該保全裝置116就定位且其鋼製門栓也 已經與該m-Ι總成114齒合,該保全裝置116將定期地傳送 無線電訊號119,以告知該閱讀器121該保全裝置116已就 定位且並未偵測出任何干擾。由於這與該容器之該門川呈 20 2閉之知作狀態有關’該磁鐵184將與該磁性感應器173相 2〇 ^接近。該磁性感應器173將偵測附近的磁鐵184,並透過 忒開口 151中之未於圖示中顯示的該電線將其通知給該發 =器⑷。δ亥發射器141將傳送無線電訊號144,以將此一訊 息告知該閱讀器121。然後,該閱讀器121將知道該保全裝 置116已齒合且並未受到干擾,且將知道該容器之該門ΐη 18 1242173 處於關閉位置。 饭使竊賊企圖打開該門丨丨丨而不干擾該保全裝置丨16, 。亥磁性感應器173將察覺它已經被移離該磁鐵184,且將透 過牙過该開口 151之未於圖示中顯示的該電線將此一訊息 5提供給该發射器141。然後該發射器141透過使用該無線電 汛號144將此一訊息提供給該閱讀器121。由於該門111將可 月b在不干擾該保全裝置116之情況下被打開,該保全裝置 116仍將傳送該無線電訊號119,告知該閱讀器i2i該保全裝 置116並未受到任何干擾。因此,由於該閱讀器121將從該 10發射器141接收一告知該門⑴已被打開之通知,當該保全 裝置116指出它並未受到任何干擾且因此該門111仍維持關 閉狀態的時候,該閱讀器121將從此一不一致得知未經授權 之入侵已經發生。然後該閱讀器可以呈遞一警示狀態給操 作人員以及/或者保全人員,使他們處理該容器11〇的被入 15 侵行為。 该閱讀器121可選擇性地定期傳送一無線電訊號144給 该發射器141,以要求該發射器141回傳一無線電訊號,確 β该磁性感應器173仍在偵測該磁鐵184之磁場,以代表該 門ill仍維持關閉狀態。如果該閱讀器121沒有收到該發射 20器141對此一要求之回覆,該閱讀器121可假設有人已經破 壞或停用該發射器141。然後該閱讀器121可假設該門111可 旎已經被打開’並呈遞一適當的警示狀態以便派遣人員以 ^周查ό亥谷器11 〇是否產生被入侵行為。 該磁性感應器總成161呈現一入侵偵測之健全的解決 19 1242173 方案,因為從該容器110外部產生之電磁場將大致無法貫穿 該容器110之鋼製牆壁。如上所述’標號no所顯示之容器 通常具有一木質地板而非鋼製地板,但該感應器總成161被 刻意置於該容器之屋頂附近,或者換言之,遠離該容器之 5 地板,以便該容器110之該木質地板下方所發射的任何磁場 在該磁性感應器173處不具有充足的強度來推翻該磁鐵184 之磁場效應。 雖然特定實施例業已以純粹示範之方式被例示及詳 述,吾人應該理解,各種替代及改變在沒有背離如下列申 1〇請專利範圍所界定之本發明的精神與範疇下都是可行的。 【囷式簡單說明】 15 20 示丄圚马一概略圖,顯示一習知類型之貨物容器,該貨 位於該容器内側之發射器、—位於該容器外 之接收盗、以及一位於該容器範圍内之固定式閱讀器; 春第2圖為類似第!圖之概略圖,顯示一替代實施例,該 貫施例包括—習知類型之貨物容器 ^ 菸鉍奖 议% 4谷态内側之 :了位於該容器外側之接收器、—使 -同步之震逢器、一搞合至該兩個接收器之又 一位於該容器範®内之©定式閱讀器; 、°以及 第3圖為類似第1圖之概略圖,顯示 該=括增加,至該發射器的動作偵上轉 弟4圖為類似第2圖之概略圖,顯示另 该實施例包括增加1合至該發 #代貫轭例, 第如 t射為的動作偵測器; 圖為另—替代實施例之概略透視圖,顯示1知類 20 1242173 型之貨物容器,該貨物容器具有一設於該容器外部之發射 器、以及一位於該容器範圍内之固定式閱讀器; 第6圖為第5圖中所示之發射器的放大尺寸概略片段透 視圖;以及 5 第7圖為一概略片段透視圖,顯示第5圖中所示之容器 内的感應器配置。 【圖式之主要元件代表符號表】 10, 110·.·貨物容器 121...固定式閱讀器 11,12, 111···門 144…射頻(RF)訊號 14...把手與鎖具總成 146, 147…門栓 21...射頻發射器 151,"開口 23...射頻接收器/發射器 161…感應器總成 26...閱讀器 163, 177...基板 24, 25...RF接收器 164…金屬凸緣 27...共同近端震盪器 167, 168…螺母 31...金屬表皮 171...感應器支撐板 28, 141...發射器 172, 183…水平圓筒形開口 41...動作偵測器 173…磁性感應器 114...門閂總成 178, 179…螺釘 116…保全裝置 182...金屬支撐零件 119,144...無線電訊號 184...永久磁鐵 21LJ Background of the Invention Metal cargo containers have a fixed entry mechanism to prevent unauthorized intrusion of the container during transportation. A conventional practice is to use a conventional lock 10 to secure a doorknob or latch. Another method is to fix the doorknob or latch with steel bolts with immovable fasteners. The bolt must be cut with a bolt cutter to release the handle or latch so the door can open. Another approach is to provide a device that includes a steel bolt and an immovable fastener for use with a radio frequency identification (RFID) tag. Once the 15 pieces of the buckle are closed, the leg visa will monitor the fastener and the bolt, and if any abnormality is found, the tag will send a radio signal to a remote receiver used as a reader So that this warning status can get the attention of the operator and / or the security personnel, so that they can deal with the intrusion of the container. 20 "Even with the above type of safety measures, it is still possible to open the container door without directly breaking = the above type of safety measures. For example, you can cut the doorknob or ask at noon. Similarly, when the doorknob is fixedly connected to a rotatable connection, and the two ends of the rotatable connection are resident at each end and occupy a groove provided in the container box, the dog may be cut. 1242173 Disconnecting the wire causes both ends of the wire to rotate to release the dog from the groove, which in turn opens up D. Other methods include drilling seams on door handles, removing chain stitches, or drilling holes in sheet metal walls or roofs or wooden floors. Can be reliable = effective measurement of any of these people's attitudes-a technique that can avoid false alarms: Another consideration is that in some cases it is necessary to consider the effect of container movement during transportation. For example, when the container is removed from the ground Lifting and placing—When transporting vehicles such as trucks or ships, the position of the cargo in the container may change. After selectively 'the container is loaded on the shipping vehicle, the normal transportation of the vehicle may cause the cargo to move in the container. Moving goods should not be misjudged as human movement by the security system, otherwise the security system may cause false indications of human intrusion. 15 Another example is that a typical cargo container is usually made of steel, except for the floor, which is usually made of wood. If the monitoring system relies on some kind of electromagnetic field 幵 1 to make human invasion in Yizhen County, the movement of the container may affect the electromagnetic. . When the container is resting on the ground, the ground may affect the strength of any electromagnetic field that passes through the wooden floor. ^ 果 容 ϋ is lifted from the ground, let ’s say # it is loaded to the transporter ^ Second, the wooden floor will be separated from the ground — segment ㈣, thereby reducing the strength of the ground, such as any electromagnetic field passing through the wooden floor. Cheng Yu relied on the form of electromagnetic fields to test the monitoring of human intrusions of containers. 来说 For example, this electromagnetic field and traffic that occurs when the container is elevated from the ground may be misjudged as a human activity, and may cause human activities. The security system generates a false indication that the person 20 1242173 is an intrusion. In view of the above considerations, we can understand that technology that can reliably detect unauthorized human intrusion of cargo containers and has a very low probability of intrusion error indications due to factors such as container movement, etc. is necessary. 5 [^^ 明 内] Summary of the invention One aspect of this invention includes: transmitting a wireless signal in a container; detecting the wireless signal within the range of the container; monitoring the detected wireless signal to see its characteristics Whether to change; and to detect the change in the characteristics of the wireless signal back and forth by transmitting a changed wireless head to the position of the device. Another aspect of the present invention includes: monitoring a container to determine whether an unauthorized intrusion state representing the container has occurred; determining whether the container is stationary; and when the container is stationary, transmitting a wireless notification of the existence of the state The way should be judged back and forth; and when the container is in a moving state, it should be judged by ignoring the existence of the state. Another aspect of the present invention includes monitoring whether a door of a container is in a closed position and transmitting a wireless signal to indicate whether the door of the container is in a closed position. 20 Schematic illustration of the invention The present invention can be better understood from the following detailed description, and the accompanying drawings, in which: Figure 1 is a schematic diagram showing a conventional type of cargo container, the cargo container It has a transmitter located inside the container, a receiver located on the 1242173 side of the container, and a fixed reader located within the container; Figure 2 is a schematic diagram similar to Figure 1, showing an alternative implementation This embodiment includes a conventional type of cargo container, a transmitter located inside the container, two receivers located outside the container, an oscillator synchronizing the two receivers, and a coupling to the A transmitter of two receivers, and a fixed reader located within the container; Figure 3 is a schematic diagram similar to Figure 1, showing another alternative embodiment, which includes adding a coupling to the transmitter Figure 4 is a schematic diagram similar to Figure 2, showing another alternative embodiment. 10 This embodiment includes adding a motion detector coupled to the transmitter; Figure 5 is another Substitute A schematic perspective view of an embodiment, showing a conventional type of cargo container, the cargo container having a launcher disposed outside the container and a fixed reader located within the container; FIG. 6 is FIG. 5 A magnified size schematic fragment of the transmitter shown in Figure 15 is shown through 15 views; and Figure 7 is a schematic fragment perspective view showing the sensor arrangement in the container shown in Figure 5. I: Detailed description of the preferred embodiment of Embodiment 3 20 FIG. 1 is a schematic diagram showing a conventional type of cargo container 10. In Figure 1, the container 10 has a wooden floor and the remainder is made of steel. However, the container may optionally be made of other materials. This container 10 has two doors 11 and 12, and a handle and a lock assembly as exemplarily shown at number 14. A low power (say 1 mW) radio frequency (RF) transmitter 21 is installed 1242173 inside the container, near a junction of a wall and a roof. The transmitter η transmits-a beacon pulse encoded with a unique identifying stone horse for that particular transmitter. -The radio frequency receiver / transmitter 23 is fixed to the outside of the container 10, and is configured to measure the treacherous message 5 transmitted by the hair · 21 on the container side. The receiver / transmitter 23 can be engaged with the reader 26 for RF communication when the container 10 is in the range of a conventional type fixed RF reader that is exemplified in the number ㈣. When the container doors 11 and 12 are closed and the metal skin is left intact, the radiation of the internal emitter 2! Will be shielded by the metal skin. In addition to the skin effect 10 current, the skin effect current is on the inside The surface induces and conducts around opening edges, such as cracks in door joints, or where the bottom of the side wall contacts the wooden floor. Located on the material side of the container, the block is collected, and the amount of Lai Jisi has been since the launch—minus Huan F = ;: power level. 15 ^ If the f1U or 12 is opened, or the metal epidermis_hole of the container (for example, as schematically shown by number 31), radio frequency radiation will be due to the light shot of the opening area and the skin around the edge of the opening The effect conduction increases and the resulting signal level rise will be detected by the outer receiver / transmitter 23. If the increase in signal power exceeds a selectable threshold that can be adjusted and selected to suppress false alarms induced by the voice of the ruler 17, the outer transmitter 23 will sense and record this state change and may perform one or more Extra tasks. In detail, the receiver / transmitter 23 will record this state change and the time it happened, and retain the data until the container 10 approaches an RF reader as shown in the number 1242173 26, and the reader questions The receiver / transmitter 23 receives the data. This may happen almost immediately, if the Rong Cry 10 is already located near the reader 26, or later, the container 10 approaches the reader 26 for the first time. Alternatively, the receiver / transmitter 5 23 can record this evil change and the time when it occurred, and immediately send jealous RF pulses encoded with the data. If the container 10 is already located near the reader 26, these pulses will be detected by the reader 26 almost immediately. Otherwise, the pulse will be detected after a period of time when the capacity of 10 approaches the reader 26 again. 10 In any case, when a reader receives an RF signal from the receiver / transmitter 23 that contains information indicating the occurrence of an intrusion, the reader 26 will pass a known type not shown in the figure The data network passes this information to a conventional monitoring device to notify the operator of the intrusion. In fact, changes in radio frequency noise and the electromagnetic properties of the environment can produce 15 false signals. Therefore, the receiver / transmitter 23 has a processor which executes a adaptive algorithm of a known type to recognize and eliminate these false signals. In this regard, the receiver / transmitter 23 is a self-calibrating type, because it does not receive the initial wire of the received rate, and the state of support is based on the percentage of each security and k 'then simply looks for the bottom line. Changes in status. The $ 20 inductive valley technology involves detecting changes in the length of the RF power path inside the subject container. In detail, FIG. 2 is a schematic diagram of an alternative embodiment. The example includes a cargo container, which is similar to the container 10 in FIG. ^, Except that it has different RF transmitter and receiver configurations. As described below. Yang Luzhi, a low-power 10 1242173 RF transmitter 21 placed at one end of the container 10 emits vibration waves in all directions. At these radio frequencies, the rf wavelength is shorter compared to the size of the container 10, and radio waves traveling along different paths # inside the container will have different overall phase delays. Two rf $ receivers 24 and 25 are placed at the opposite ends and corners of the container, and receive signals after the path of 5 to different spaces and the walls of the container, so that the signals at each receiver 24 And 25 have a unique and different phase delay. The receivers 24 and 25 are synchronized by a common near-end oscillator (shown roughly at number 27), so the difference between the two signals can be reliably detected. When the transmitter 21 to the receiver 24 or 25 feet? 10 When the length of the power path is changed by an intrusion that is sufficient to change the dielectric and magnetic properties of the path, the phase difference between the two signals received by the receivers 24 and 25 will change and can be detected come out. When the skin of the container, as schematically shown by reference numeral 31, is cut into a hole, it will change the power path and change the phase difference between the signals detected by the receivers 24 and 25. The receivers are respectively coupled to the transmitting behaviors as schematically shown at 28. In a manner similar to that used by the transmitter 23 in Figure 1, the transmitter 28 in Figure 2 will record the change in the phase difference between the two signals detected by the receivers 24 and 25 and the occurrence of it time. The transmitter 28 then retains the data 20 until the container 10 approaches an RF reader ' as shown at number 26 and the reader interrogates the transmitter 28 and retrieves the data. This may happen almost immediately if the container 10 is already located near the reader 26, or later, once the container 10 approaches the reader 26 for the first time. Alternatively, the transmitter 28 can record this phase change and the time when it occurred 11 1242173. I immediately start transmitting periodic pulses encoded with the data. If the container 10 is already located near the reader 26, these pulses will be detected by the reader 26 almost immediately. Otherwise, the: rush will be detected after a period of time, when the capacity is close to the reader 26 5 again. Regardless of the situation, when the reader 26 receives an RF signal containing information indicating the occurrence of human intrusion from the transmitter 28, the reader will pass through the conventional type data network which is not shown in the figure. Lu passed this information to a known type of surveillance equipment to notify the operator of the intrusion. 10 In fact, the configuration shown in Figure 2 is also affected by changes in radio frequency noise that may produce erroneous signals and changes in the electromagnetic characteristics of the environment. Therefore, the receivers 24 and 25 each have a processor that executes a adaptive algorithm of a known type to identify and eliminate these false signals. In this regard, the transmitter 28 is a self-calibrating type because it measures the initial phase difference between 15 of the good signals received by the receivers 24 and 25, and the initial phase difference depends on the environment of each installation, and then Simply look for changes that differ from the bottom line. In the embodiment of FIG. 2, the receivers 24 and 25 are disposed at a separate position outside the container 10. Alternatively, however, other evil settings can be used to separate them. For example, the receivers 24 and 25 can be installed 20 in a separate position within the container 10. Another consideration is that for clarity, Figure 2 shows the 3 receiver 24, the receiver 25, the near-end microphone 27, and the transmitter 28 as substantially separate units. Alternatively, however, one or more of these elements may be integrated into a single substantial unit. Although the operation of the embodiment of Figs. 1 and 2 is satisfactory for many applications, the operation may be affected in certain other financial situations. For example, when the container 10 is lifted from the ground and placed on a vehicle such as a truck or a ship, the position of the cargo in the container may be changed by A. Optionally, the container 1G is loaded on the transportation means. The normal movement of 5 wheels of the tool may change the cargo's movement in the container 10. == Consider the first figure. This cargo movement may affect the measurement. The power level of the signal transmitted by the transmitter 21. So, so. The transmitter 23 may issue a false intrusion detection alert. Reference to the magic picture movement may change the forward path of one or both of the signals detected by the receivers 24 and 25, thereby causing the phase difference to change, causing the launcher to issue a false intrusion detection alert. ° Another example of a situation where container movement may be a problem is that the container 10 is made almost entirely of steel but has a wooden floor. Figure = The invasion test configuration emits RF energy in the container 10, which cannot easily pass through a steel wall, but it is easier to pass through a wooden floor. When the container is on the ground, some RF energy may pass through the wooden floor, be reflected from the ground, then through the wooden floor, and then affect the overall characteristics of the RF energy inside the container. If the container is lifted from the ground, for example when it is loaded on a transport tool, the RF energy passing down the wooden floor will no longer be reflected from the ground, and therefore 20 will not return to the container via the wooden floor. Therefore, the overall characteristics of the RF energy in the container will change when the container is lifted from the ground. Referring to FIG. 1, the decrease in the reflected RF energy will affect the RF energy power level measured by the receiver / transmitter 23 and transmitted by the transmitter 21. Therefore, the receiver / transmitter 23 may issue a false intrusion detection alert. Refer to Figure 13 1242173. As shown in Figure 2, the decrease of your reflected energy will affect the receivers 24 and 25. One or both of the detected signals will change the phase difference, causing the side transmitter 28 to send a wrong intrusion. Figure 3, Figure 5 is a schematic diagram similar to Figure i = shows-an alternative embodiment similar to the ^ embodiment, except that 1 is added to the detector 41, the = detector is fixedly It is installed on the wall of the observation tower and helps to reduce the possibility of false intrusion detection warning caused by the movement of the trough. In detail,: =, the device 41 is a commercially-available device of a known type, and it can sense: physical movement and can generate an electric power signal. Whether it is in motion or not is being detected. ) 1 The output of the motion detector 41 is closed to the output of the receiver / transmitter 23. When the output of the motion detector 41-but _ moves, the receiver / transmitter 23 will make it "two 15 The way the invaded action is deactivated should return to the second signal = Receiver / transmitter 23 and the figure in the figure] '«Authorized invasion gate method The Hungarian ride is not stationary, such as: t move her The device 41 pointed out that the container could not do so. The unauthorised use of the container 10 could cause the money to be in a static state. The first entry into the city is the invasion of the project. The warning of the intrusion in the example # 乡 = can be avoided. . For the sake of clarification and clear movement, the action _⑼ is shown as a —separated element, but it can be selected with Wei Yuanli—or understand, as shown in Figure 3, as shown in Figure 23 for integration.垓 Receiver / transmission Figure 4 is a schematic diagram similar to Figure 2, showing-an alternative embodiment similar to Embodiment 20 1242173 of Figure 2, except for the addition of a motion detector 41, the motion detector It is the same as the motion detector shown in Fig. 3. The motion detector 41 in Fig. 4 is fixedly installed in the container. 10 is a wall and helps reduce the possibility of false intrusion detection alerts caused by container movement. The output of the motion detector 41 is coupled to the input of the transmitter 28. When the motion detector 41 outputs a When the signal informs it that it is detecting the movement of the container, the transmitter 28 responds to the signal by causing it to determine whether the container 10 has been deactivated by the invading action. The same way described above is used to determine whether unauthorized intrusion has occurred, but only when the motion detector 41 indicates that the container 10 is stationary. Unauthorized intrusion by the container 10 is most likely to occur When the container is stationary, the accuracy and reliability of the intrusion detection in the embodiment of FIG. 4 is very high, because false intrusion detection warnings caused by container movement can be avoided. For simplicity and clarity, the 4th The motion detection device 41 shown in the figure is shown as a separate component, but I can understand that it can be selectively integrated with one or more of other components, such as the transmitter 28. Figure 5 for A schematic perspective view showing a conventional type of cargo container 110, which is similar to the container 10 shown in Figures 1 to 4. The main part of the container 110 is made of steel, except that the floor of the container 110 is made of wood. In addition to 20%, the container 110 can be selectively made of other suitable materials. The container 110 has a pivot 111 and a latch assembly 114. Examples of the container 110 and the latch assembly 114 The configuration is exemplary, each of which may optionally have any of a number of other configurations. For example, the latch assembly Π4 may optionally include a vertical cylindrical rod, the vertical cylinder 15 1242173 shape The pole is rotatably supported on the door ln, and is fixedly closed to the door handle of the door flash assembly 114, and a groove is provided at each end to occupy the outer surface of the container ιι〇 Dog. The door flash assembly 114 is maintained in a 5-lock configuration by a security device 116 of a known type. The security device 116 includes a steel door bolt that cooperates with the door flash assembly, and a box that cooperates with the steel door and contains a known type of battery-operated radio frequency (RFID) tag. The Fm tag can send and / or receive radio signals 119 to communicate with a nearby fixed reader 121 of a known type. 10. If the security device 116 detects that it is experiencing some form of interference after its steel door bolt and the door flash assembly 114 teeth, the security device 116 transmits a radio signal 119 to the reader 121. The reader i2i ^ then presents a warning status to the operator and / or security personnel to enable them to deal with the intrusion of the container 110. The security officer can then enter the container 110 to arrest the criminal while the invasion is still underway. ^ If the security device 116 is not within the radio range of the reader 121 at the beginning of the interference detection, the security device 116 will continuously transmit the radio signal 119 to indicate that interference has occurred. Therefore, if the security device U6 later enters the radio range of the reader 121, the reader 121 will receive the signal 119 and generate a warning state at that point. The rabbit shooter 141 is fixedly connected to the upper portion of the outer surface of the door 111. The transmitter 141 includes a known type of battery-operated label II-1, and the label is substantially similar to the label provided in the security device 116. The transmitter 141 can transmit a radio frequency (RF) signal 144 to the reader. 16 1242173 Figure 6 is a fragmentary perspective view of the enlarged size of the transmitter 141 shown in Figure 5. Two bolts 146 and 147 fixedly mount the transmitter 14m on the door 111. In this regard, the door 111 has three separate openings that extend completely through it. Two of these openings are used to receive the handles of the bolts 146 and 5 147. The third opening in the door 111 is roughly shown with a dotted line at number 151. A wire not shown in the figure extends from the transmitter 141 through the opening 151 and then to a sensor assembly provided in the container 110, which will be discussed later. In detail, FIG. 7 is a perspective view of a schematic fragment 10 of a part of the inside of the container 110, and the above-mentioned sensor assembly is shown at 161. The sensor assembly 161 includes a base plate 163 'which is fixed to the door m directly below an upwardly extending metal flange 164 provided on the top edge of the door 111. The base plate 163 has two openings, and the openings respectively receive the threaded handles of the bolts 46 and 147. The two nuts 167 and 168 engage the moment 15 of the door bolts 146 and 147 with a threaded shank. The sensor assembly 161 includes a sensor support plate 171 that extends perpendicular to the base plate 163 and has a fixed connection to the base plate in any convenient manner, such as welding or bolts. The edge of 163. The support plate 171 has a horizontal cylindrical opening 172 therein, and a magnetic sensor 173 of a known type 20 is fixedly fixed in the opening 172. The magnetic sensor 173 is electrically coupled to the transmitter 41 (FIG. 6) through a wire not shown in the figure through the opening 151 in the door. The sensor assembly 161 also includes an advanced base plate 177, which is fixedly connected to the roof or ceiling 17 1242173 plate of the container 11 by two screws 178 and 179. A metal support part 82 is fixedly connected to the base plate 177 in any convenient manner, such as welding or bolting. The supporting part 182 has a horizontal cylindrical opening 183 therein, and a permanent magnet 184 is fixedly installed in the opening 183. In the disclosed embodiment, the elements 163, 171, 177, and 5 182 are all inscriptions, but they may each be selectively made of other suitable materials. In Figure 7, the door m is shown in its closed position, with the magnetic sensor 173 fairly close to the magnet 184. The sensor 173 will detect the magnetic field of the magnet 184 and transmit it to the transmitter 141 in Figs. 6-10 through the electric wire passing through the opening 151. In contrast, if the door 111 of the container is opened, the sensor 173 will be moved to a position separated from the magnet 184. As a result, the sensor 173 will no longer detect the magnetic field of the magnet 184 and will transmit it to the transmitter 141 through the wire that passes through the opening 151 and is not shown in the illustration. Referring to FIG. 5, when the security device 116 is positioned and its steel door bolt is already engaged with the m-1 assembly 114, the security device 116 will periodically transmit a radio signal 119 to inform the reader 121 that the The security device 116 has been located and has not detected any interference. Because this is related to the known state that the gate of the container is closed at 20 2 ', the magnet 184 will be close to the magnetic sensor 173. The magnetic sensor 173 will detect a nearby magnet 184 and notify the transmitter through the electric wire in the opening 151 which is not shown in the figure. The delta transmitter 141 will transmit a radio signal 144 to inform the reader 121 of this information. Then, the reader 121 will know that the security device 116 has been engaged and has not been disturbed, and will know that the door ΐη 18 1242173 of the container is in the closed position. Fans made the thief attempt to open the door without disturbing the security device. The magnetic sensor 173 will perceive that it has been removed from the magnet 184, and will provide this message 5 to the transmitter 141 through the wire through the opening 151, which is not shown in the figure. The transmitter 141 then provides this message to the reader 121 by using the radio number 144. Since the door 111 will be opened without disturbing the security device 116, the security device 116 will still transmit the radio signal 119 to inform the reader i2i that the security device 116 has not been disturbed in any way. Therefore, since the reader 121 will receive a notification from the 10 transmitter 141 that the door lintel has been opened, when the security device 116 indicates that it has not been interfered in any way and therefore the door 111 remains closed, The reader 121 will know from this inconsistency that an unauthorized intrusion has occurred. The reader can then present a warning status to the operator and / or security personnel to enable them to handle the intrusion of the container 110. The reader 121 may selectively transmit a radio signal 144 to the transmitter 141 periodically to request the transmitter 141 to return a radio signal. It is ascertained that the magnetic sensor 173 is still detecting the magnetic field of the magnet 184. On behalf of the door ill remains closed. If the reader 121 does not receive a response from the transmitter 141 to this request, the reader 121 can assume that someone has broken or deactivated the transmitter 141. The reader 121 may then assume that the door 111 may have been opened ’and present an appropriate alert status to dispatch personnel to check weekly whether the intruder 11 has been hacked. The magnetic sensor assembly 161 presents a robust solution for intrusion detection. 19 1242173, because the electromagnetic field generated from the outside of the container 110 will not be able to penetrate the steel wall of the container 110. The container shown by the 'No' above usually has a wooden floor instead of a steel floor, but the sensor assembly 161 is deliberately placed near the roof of the container, or in other words, away from the floor of the container so that the Any magnetic field emitted under the wooden floor of the container 110 does not have sufficient strength at the magnetic sensor 173 to overturn the magnetic field effect of the magnet 184. Although specific embodiments have been exemplified and detailed in a purely exemplary manner, we should understand that various substitutions and changes are feasible without departing from the spirit and scope of the present invention as defined in the following claims. [Brief description of the style] 15 20 shows a schematic diagram of a horse, showing a conventional type of cargo container, the launcher located inside the container, a receiving theft located outside the container, and a range of the container. Inside the fixed reader; Spring Figure 2 is similar to the first! The schematic diagram of the figure shows an alternative embodiment, the conventional embodiment includes-a conventional type of cargo container ^ smoke bismuth award% 4 inside of the valley state: the receiver located outside the container,-make-synchronous shock Each device, one connected to the two receivers, and the other fixed reader located in the container range;, °, and Figure 3 are schematic diagrams similar to Figure 1, showing that == increases, to The action of the transmitter is shown in Figure 4. It is a schematic diagram similar to Figure 2, showing that the other embodiment includes the addition of 1 to the hair #generation through yoke example. Another—a schematic perspective view of an alternative embodiment, showing a cargo container of type 1 1242173, the cargo container has a launcher located outside the container and a fixed reader located within the container; The figure is a schematic enlarged fragmentary perspective view of the transmitter shown in FIG. 5; and FIG. 7 is a schematic fragmentary perspective view showing the sensor configuration in the container shown in FIG. 5. [Representative symbols for the main components of the figure] 10, 110 ··· Cargo container 121 ... Fixed reader 11,12,111 ··· Door 144 ... Radio frequency (RF) signal 14 ... Handle and lock assembly Into 146, 147 ... door bolt 21 ... RF transmitter 151, " opening 23 ... RF receiver / transmitter 161 ... sensor assembly 26 ... reader 163, 177 ... substrate 24, 25 ... RF receiver 164 ... Metal flange 27 ... Common proximal oscillator 167, 168 ... Nut 31 ... Metal skin 171 ... Sensor support plate 28, 141 ... Transmitter 172, 183 ... Horizontal cylindrical opening 41 ... Motion detector 173 ... Magnetic sensor 114 ... Latch assembly 178, 179 ... Screw 116 ... Security device 182 ... Metal support part 119, 144 ... Radio Signal 184 ... permanent magnet 21