WO2004079679A1 - Method and means for providing security - Google Patents

Method and means for providing security Download PDF

Info

Publication number
WO2004079679A1
WO2004079679A1 PCT/ZA2004/000024 ZA2004000024W WO2004079679A1 WO 2004079679 A1 WO2004079679 A1 WO 2004079679A1 ZA 2004000024 W ZA2004000024 W ZA 2004000024W WO 2004079679 A1 WO2004079679 A1 WO 2004079679A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
reader
container
signal
door
Prior art date
Application number
PCT/ZA2004/000024
Other languages
French (fr)
Inventor
Leslie Smiedt
Original Assignee
Leslie Smiedt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leslie Smiedt filed Critical Leslie Smiedt
Priority to BRPI0408120-0A priority Critical patent/BRPI0408120A/en
Priority to JP2006509118A priority patent/JP2006520507A/en
Priority to EP04737295A priority patent/EP1614078A1/en
Priority to US10/548,061 priority patent/US20070001842A1/en
Publication of WO2004079679A1 publication Critical patent/WO2004079679A1/en
Priority to IL170712A priority patent/IL170712A0/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind

Definitions

  • THIS INVENTION relates to a method of and means for providing security.
  • containerization has resulted in there being in the order of 14 million shipping containers throughout the world.
  • the essence of containerization is that the shipping container is packed and locked shut at the point from which the goods are shipped and is not opened again until it reaches its destination.
  • Major ports handle many hundreds of thousands of containers annually.
  • the volume of containers being moved is such that only a very small percentage is inspected.
  • the present invention provides, according to one of its aspects, a method of determining that unlawful tampering with a shipping container has taken
  • a question which of necessity arises is whether the patrolmen are in fact patrolling as required or whether, during quiet periods, the patrols diminish in frequency or are discontinued altogether. This has to be monitored if the system is going to fulfil its primary objective.
  • a further requirement of an adequate patrol monitoring system is that those in the control room should be aware of the progress of the patrolman around the premises. It is not acceptable for a patrol man to leave the control room and reappear at a later time without any intervening information on what he did.
  • the patrolman leaves the guard house and returns at a later time. There is no record of where he went or whether he completed his round. Also, there is no way of knowing if he has encountered an intruder and been rendered ineffective until he fails to return at the correct time. The time delay inherent in such a system is not acceptable as it leaves an intruder with freedom to move about for a period of time without the alarm being raised.
  • a simple known system comprises a series of boxes along the patrol route. Each box contains the key to the next box on the round. Only by opening each box in turn and retrieving the key in it can the patrolman obtain the last key in the sequence which indicates completion of the round.
  • the system is deficient in that it fails to detect a problem in "real time”. Until the patrolman's return time has passed and he has failed to come back, there is nothing to indicate that there is a problem.
  • tags along the route and the patrolman has a reader in his possession. By bringing the reader into close proximity with a tag, details of the tag are recorded on the reader. The information on the reader is downloaded when the patrolman returns thereby, at least theoretically, indicating completion of a full round.
  • the tags it is possible for the tags to be collected on the first patrol and returned on the last. Intermediate patrols, without leaving the control house, record on their readers from the collected tags the information which should be there to show a completed patrol. Even if implemented properly, this system again suffers from the time lapse problem discussed above.
  • a method of enhancing security which method comprises distributing tags throughout an area to be protected, each tag transmitting an identification signal, bringing a tag reader into said area, the reader picking up the signals transmitted by the tags, and downloading from the reader to a remote location the signals picked up by the reader from the tags.
  • the signal transmitted by the tag is preferably a radio frequency signal. Likewise it is preferred that the reader transmit at radio frequency.
  • the signal transmitted by each tag can include data indicative of the status of the tag.
  • the status indicating data transmitted is compared with stored data and a determination made as to whether there has been a change in the status of the tag.
  • the reader is carried by a patrolman patrolling said area, the signal from each tag which the patrolman passes being picked up by the reader and transmitted to said remote location whereby the
  • Said area can be one having shipping containers therein and the tags can be fitted to the containers, said data changing upon a door of the container to which the tag is fitted being opened whereby unauthorized door opening can be detected when the signal from that tag is read.
  • a method of determining whether a door of a shipping container has been opened comprising applying a tag to one component of a shipping container, there being a tag operating means which moves with another component of the shipping container, said components being ones that move relatively to one another during opening of said door of the container, storing a signal on said tag as said components move together on door closing, changing said stored signal upon said tag and its operating means being separated during door opening, downloading the signal stored in the tag at the time the door is lawfully closed, and accessing said stored signal on the tag before the door is lawfully opened to verify that said signal has not changed due to unlawful door opening.
  • the method can include the further step of applying a tag operating device to the other component of the container.
  • the invention can comprise the steps of fitting said tag or device to a handle constituting said one of said components, said handle being moved to unlock the container, and fitting the device or tag to a further component with respect to which said one component moves during opening.
  • said tag and device are fitted one to said door and one to the frame of the container so that the device and tag are separated as the container door is opened.
  • the method also includes the step of transmitting, at timed intervals and at radio frequency, the signal stored in the tag.
  • the method can comprise storing a unique tag identification signal in the tag, and transmitting, at timed intervals and a radio frequency, the unique identification signal stored in the tag.
  • a method of monitoring a patrolman's progress which method comprises distributing tags along the patrolman's route, each tag transmitting a unique identification signal, providing the patrolman with a reader for receiving said identification signals upon any of the tags and said reader being brought into sufficiently close proximity, and transmitting the tag identification signals picked up by the reader to a control room thereby to permit the patrolman's progress from tag-to-tag to be monitored.
  • Figure 1 is a diagrammatic pictorial view of one end portion of a shipping container.
  • Figure 2 is a diagrammatic plan view of a complex of buildings.
  • reference numeral 10 designates a shipping container the double doors 12 of which permit access to be had to the interior of the container.
  • the doors 12 are hinged at 14 along their outer edges and one is shown open.
  • a door locking mechanism is shown at 16 this including an operating handle 18 which is used to displace locking bolts.
  • the handle 18 is secured by a tamper evident sealing structure after the container has been loaded.
  • a tag is shown at 20, the tag being secured to the framework of the container so that it is hidden when the doors 12 are closed.
  • a tag operating device is shown at 22, this being fitted to the door.
  • the tag can be fitted to the handle 18 and the operating device to the door 12 close to the handle. The tag and device are separated sufficiently, on the handle being displaced from the locked position to the unlocked position, to operate the tag.
  • Suitable tags 20 are available from Wavetrend UK Ltd and technical information can be found on their website at www.wavetrend.net .
  • the tags include radio frequency transmitters and their own internal power source. They each have a unique identification number which is transmitted continuously after tag activation. Tag activation occurs at the end of the manufacturing procedure.
  • the tag transmits the unique identification number at predetermined intervals. The interval can be very short and can be a few milliseconds. The range of the transmitter is a few metres.
  • the tag In addition to the unique identification number the tag also has a further number which is incremented each time the tag and the operating device are brought into operating relationship.
  • the tag can include a magnetically operated switch such as a reed switch and the operating device can include a magnet.
  • the tag transmits the subsisting incremented number.
  • the tag and the tag operating device are, as described above, fitted to any two components of the shipping container which components move relatively to one another as the door 12 of the container is opened.
  • the stored number and the unique number can be transmitted at radio frequency via satellite or other communication system from the reader to the controlling computer.
  • the tag On arrival of the container at its destination, the tag is scanned, the stored unique and incremented numbers downloaded, and a comparison made between the downloaded incremented number and the incremented number stored in the controlling computer. If they match the container has not been unlawfully opened. If they do not match then the door has been opened in transit.
  • both the stored numbers are transmitted at predetermined intervals by the tag, these transmissions being received by the readers and stored in a computer onboard the ship. At intervals the received numbers can be transmitted via a satellite link to the controlling computer for comparison with the stored numbers. Thus an early warning that tampering has occurred can be obtained.
  • the ship's cargo manifest records the numbers of all shipping containers which are to be loaded at a specific port. This information is transmitted, once the list of the shipping containers to be loaded has been finalized, to the controlling computer. As the tag applied to a container will be permanently on that container (except in the event of damage) the controlling computer can correlate the tag identification with the container number. Those responsible for ensuring that the cargo is correctly loaded, and checked, are provided with hand held readers. Such readers comprise the tag reader itself plus a transceiver which enables data to be
  • the ship has an identity code. When the operator enters this in his reader and transmits, there is a download of full details of the containers to be loaded.
  • the tags on the containers all transmit their "incremental number". This number was re-set when the container was last opened and again when it was last closed.
  • the incremental numbers on the tags are not at this time known.
  • the incremental numbers being transmitted by the tags listed for loading on that ship are picked-up and stored in the reader against the tag number and the shipping container number.
  • the reader transmits the container numbers, the tag numbers and the incremental numbers back to the controlling computer. It will be appreciated that if an incremental number is not recorded against a tag, then the related container has not been loaded, or possibly its tag is malfunctioning.
  • Opening of a container causes the incremental number to change. This change can be detected when the tags of containers on board the ship are scanned. Scanning is preferably at intervals during the voyage but can be as the
  • FIG 2 this diagrammatically illustrates a complex comprising a boundary wall W, a control room C at the entrance E to the complex, and a plurality of tags T distributed through the complex and along the routes that the patrolmen have to follow.
  • the buildings in the complex are designated B1 , B2 etc. and the road system R1 , R2 etc.
  • the tags T are as described above except in that they do not require numbers that can be incremented.
  • the patrolman carries a tag reader which, when in the proximity of a tag, receives the unique number transmitted by the tag.
  • the readers transmit a signal to the control room indicating that the tag has been read. At the control room
  • C there is a receiver for detecting signals transmitted by the reader.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Labeling Devices (AREA)

Abstract

the present invention provides a method of detecting that a shipping container has been tampered with by unlawful opening of its doors, and a method of ensuring that patrolmen on duty are both safe and are patrolling their appointed route. Tags which are activated to transmit a signal as a result of an activating unit being brought into proximity thereto, or separated therefrom, are used. In protecting a shipping container the tag forms part of a detector structure which stores and transmits data which data changes when the container doors are opened and closed. In protecting premises, the patrolman activates each tag as he passes it to cause signals to be transmitted back to a control room. This indicates that the patrolman is moving from tag to tag in accordance with his schedule.

Description

METHOD AND MEANS FOR PROVIDING SECURITY
FIELD OF THE INVENTION
THIS INVENTION relates to a method of and means for providing security.
BACKGROUND TO THE INVENTION
In the face of increasingly sophisticated acts of terrorism, those charged with providing security must endeavour to locate vulnerable security areas, and strengthen those areas before terrorists identify an opportunity for an act of destruction. Ships, and in particular the shipping containers they carry, have been identified as a potential risk area.
Some authorities have concluded that containerization has resulted in there being in the order of 14 million shipping containers throughout the world. The essence of containerization is that the shipping container is packed and locked shut at the point from which the goods are shipped and is not opened again until it reaches its destination. Major ports handle many hundreds of thousands of containers annually. The volume of containers being moved is such that only a very small percentage is inspected.
This has been recognised by certain authorities as posing a terrorist threat. The scenario they postulate is that somewhere between where the container is closed and the point at which the container is opened lawfully, the container will be opened unlawfully, biological, chemical or other weapons will be secreted in the container, and the container will be re-closed. The intended purpose would be to release the weapons in an area where there is a population, and a further purpose would be to disrupt commercial activities.
The present invention provides, according to one of its aspects, a method of determining that unlawful tampering with a shipping container has taken
place.
Buildings and building complexes, particularly research establishments having sensitive materials in them, are also targets for terrorist activity. Such establishments have sophisticated security systems. Even with such systems patrols are still considered essential and the patrolmen move around the complex checking for signs of illegal activity.
A question which of necessity arises is whether the patrolmen are in fact patrolling as required or whether, during quiet periods, the patrols diminish in frequency or are discontinued altogether. This has to be monitored if the system is going to fulfil its primary objective.
A further requirement of an adequate patrol monitoring system is that those in the control room should be aware of the progress of the patrolman around the premises. It is not acceptable for a patrol man to leave the control room and reappear at a later time without any intervening information on what he did.
If current systems of monitoring patrol activities are considered, the way in which they fall short of meeting the requirements set out above will be understood.
In the simplest possible system the patrolman leaves the guard house and returns at a later time. There is no record of where he went or whether he completed his round. Also, there is no way of knowing if he has encountered an intruder and been rendered ineffective until he fails to return at the correct time. The time delay inherent in such a system is not acceptable as it leaves an intruder with freedom to move about for a period of time without the alarm being raised.
To ensure that the patrolman does complete his round, a simple known system comprises a series of boxes along the patrol route. Each box contains the key to the next box on the round. Only by opening each box in turn and retrieving the key in it can the patrolman obtain the last key in the sequence which indicates completion of the round. The system is deficient in that it fails to detect a problem in "real time". Until the patrolman's return time has passed and he has failed to come back, there is nothing to indicate that there is a problem.
In other systems there are tags along the route and the patrolman has a reader in his possession. By bringing the reader into close proximity with a tag, details of the tag are recorded on the reader. The information on the reader is downloaded when the patrolman returns thereby, at least theoretically, indicating completion of a full round. In practice, it is possible for the tags to be collected on the first patrol and returned on the last. Intermediate patrols, without leaving the control house, record on their readers from the collected tags the information which should be there to show a completed patrol. Even if implemented properly, this system again suffers from the time lapse problem discussed above.
In another of its aspects the present invention provides a method of and means for ascertaining details of the patrols undertaken by the patrolmen on
duty.
BRIEF DESCRIPTION OF THE INVENTION
According to one aspect of the present invention there is provided a method of enhancing security which method comprises distributing tags throughout an area to be protected, each tag transmitting an identification signal, bringing a tag reader into said area, the reader picking up the signals transmitted by the tags, and downloading from the reader to a remote location the signals picked up by the reader from the tags.
The signal transmitted by the tag is preferably a radio frequency signal. Likewise it is preferred that the reader transmit at radio frequency.
The signal transmitted by each tag can include data indicative of the status of the tag. In a specific form, the status indicating data transmitted is compared with stored data and a determination made as to whether there has been a change in the status of the tag. In a further form the reader is carried by a patrolman patrolling said area, the signal from each tag which the patrolman passes being picked up by the reader and transmitted to said remote location whereby the
progress of the patrolman is tracked.
Said area can be one having shipping containers therein and the tags can be fitted to the containers, said data changing upon a door of the container to which the tag is fitted being opened whereby unauthorized door opening can be detected when the signal from that tag is read.
According to a further aspect of the present invention there is provided a method of determining whether a door of a shipping container has been opened, the method comprising applying a tag to one component of a shipping container, there being a tag operating means which moves with another component of the shipping container, said components being ones that move relatively to one another during opening of said door of the container, storing a signal on said tag as said components move together on door closing, changing said stored signal upon said tag and its operating means being separated during door opening, downloading the signal stored in the tag at the time the door is lawfully closed, and accessing said stored signal on the tag before the door is lawfully opened to verify that said signal has not changed due to unlawful door opening. The method can include the further step of applying a tag operating device to the other component of the container.
The invention can comprise the steps of fitting said tag or device to a handle constituting said one of said components, said handle being moved to unlock the container, and fitting the device or tag to a further component with respect to which said one component moves during opening.
In another form of the method of the present invention said tag and device are fitted one to said door and one to the frame of the container so that the device and tag are separated as the container door is opened.
To enable continuous monitoring to take place, the method also includes the step of transmitting, at timed intervals and at radio frequency, the signal stored in the tag. The method can comprise storing a unique tag identification signal in the tag, and transmitting, at timed intervals and a radio frequency, the unique identification signal stored in the tag.
According to another aspect of the invention there is provided a method of monitoring a patrolman's progress which method comprises distributing tags along the patrolman's route, each tag transmitting a unique identification signal, providing the patrolman with a reader for receiving said identification signals upon any of the tags and said reader being brought into sufficiently close proximity, and transmitting the tag identification signals picked up by the reader to a control room thereby to permit the patrolman's progress from tag-to-tag to be monitored.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the present invention, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings in which:-
Figure 1 is a diagrammatic pictorial view of one end portion of a shipping container; and
Figure 2 is a diagrammatic plan view of a complex of buildings.
DETAILED DESCRIPTION OF THE INVENTION Referring firstly to Figure 1 , reference numeral 10 designates a shipping container the double doors 12 of which permit access to be had to the interior of the container. The doors 12 are hinged at 14 along their outer edges and one is shown open. A door locking mechanism is shown at 16 this including an operating handle 18 which is used to displace locking bolts. The handle 18 is secured by a tamper evident sealing structure after the container has been loaded.
A tag is shown at 20, the tag being secured to the framework of the container so that it is hidden when the doors 12 are closed. A tag operating device is shown at 22, this being fitted to the door. Alternatively, the tag can be fitted to the handle 18 and the operating device to the door 12 close to the handle. The tag and device are separated sufficiently, on the handle being displaced from the locked position to the unlocked position, to operate the tag.
Suitable tags 20 are available from Wavetrend UK Ltd and technical information can be found on their website at www.wavetrend.net .
The tags include radio frequency transmitters and their own internal power source. They each have a unique identification number which is transmitted continuously after tag activation. Tag activation occurs at the end of the manufacturing procedure. The tag transmits the unique identification number at predetermined intervals. The interval can be very short and can be a few milliseconds. The range of the transmitter is a few metres.
In addition to the unique identification number the tag also has a further number which is incremented each time the tag and the operating device are brought into operating relationship. By way of example, the tag can include a magnetically operated switch such as a reed switch and the operating device can include a magnet.
In addition to transmitting the unique number, the tag transmits the subsisting incremented number.
In accordance with the present invention the tag and the tag operating device are, as described above, fitted to any two components of the shipping container which components move relatively to one another as the door 12 of the container is opened.
To transfer information to a controlling computer it is possible to use a hand held reader which is brought into proximity with the tag and then download the information on the reader to the computer. For example, the stored number and the unique number can be transmitted at radio frequency via satellite or other communication system from the reader to the controlling computer.
On arrival of the container at its destination, the tag is scanned, the stored unique and incremented numbers downloaded, and a comparison made between the downloaded incremented number and the incremented number stored in the controlling computer. If they match the container has not been unlawfully opened. If they do not match then the door has been opened in transit.
As described, both the stored numbers are transmitted at predetermined intervals by the tag, these transmissions being received by the readers and stored in a computer onboard the ship. At intervals the received numbers can be transmitted via a satellite link to the controlling computer for comparison with the stored numbers. Thus an early warning that tampering has occurred can be obtained.
A practical way in which the system can be implemented will now be described. The ship's cargo manifest records the numbers of all shipping containers which are to be loaded at a specific port. This information is transmitted, once the list of the shipping containers to be loaded has been finalized, to the controlling computer. As the tag applied to a container will be permanently on that container (except in the event of damage) the controlling computer can correlate the tag identification with the container number. Those responsible for ensuring that the cargo is correctly loaded, and checked, are provided with hand held readers. Such readers comprise the tag reader itself plus a transceiver which enables data to be
received and sent.
The ship has an identity code. When the operator enters this in his reader and transmits, there is a download of full details of the containers to be loaded.
The tags on the containers all transmit their "incremental number". This number was re-set when the container was last opened and again when it was last closed. The incremental numbers on the tags are not at this time known. By setting the reader to the appropriate mode, the incremental numbers being transmitted by the tags listed for loading on that ship are picked-up and stored in the reader against the tag number and the shipping container number.
Once all the incremental numbers have been logged, the reader transmits the container numbers, the tag numbers and the incremental numbers back to the controlling computer. It will be appreciated that if an incremental number is not recorded against a tag, then the related container has not been loaded, or possibly its tag is malfunctioning.
Opening of a container causes the incremental number to change. This change can be detected when the tags of containers on board the ship are scanned. Scanning is preferably at intervals during the voyage but can be as the
•.. vessel approaches a port.
Turning now to Figure 2, this diagrammatically illustrates a complex comprising a boundary wall W, a control room C at the entrance E to the complex, and a plurality of tags T distributed through the complex and along the routes that the patrolmen have to follow. The buildings in the complex are designated B1 , B2 etc. and the road system R1 , R2 etc. The tags T are as described above except in that they do not require numbers that can be incremented.
The patrolman carries a tag reader which, when in the proximity of a tag, receives the unique number transmitted by the tag. The readers transmit a signal to the control room indicating that the tag has been read. At the control room
C there is a receiver for detecting signals transmitted by the reader.
It will be understood that, in real time, those in the control room can follow the progress of the patrolman from tag to tag as the reader picks up the signal from each tag. In the event that an expected reading from a subsequent tag in a sequence is not received, the controller becomes aware, after a minimal time lapse, that there is a circumstance which requires investigation.

Claims

CLAIMS:
1. A method of enhancing security which comprises distributing tags throughout an area to be protected, each tag transmitting an identification signal, bringing a tag reader into said area, the reader picking up the signals transmitted by the tags, and downloading from the reader to a remote location the signals picked up by the reader from the tags.
2. A method as claimed in claim 1 , wherein the tags transmit their identification signals at radio frequency.
3. A method as claimed in claim 1 or 2, wherein the reader transmits to the remote location at radio frequency.
4. A method as claimed in claim 1 , 2 or 3, wherein the signal transmitted by each tag includes data indicative of the status of the tag.
5. A method as claimed in claim 4, wherein the status indicating data transmitted is compared with stored data and a determination made as to whether there has been a change in the status of the tag.
6. A method as claimed in any one of claims 1 to 3, wherein the reader is carried by a patrolman patrolling said area, the signal from each tag which the patrolman passes being picked up by the reader and transmitted to said remote location whereby the progress of the patrolman is tracked.
7. A method as claimed in claim 4 or 5, wherein said area is one having shipping containers therein and the tags are fitted to the containers, said data changing upon a door of the container to which the tag is fitted being opened whereby unauthorized door opening can be detected when the signal from that tag is read.
8. A method of determining whether a door of a shipping container has been opened, the method comprising applying a tag to one component of a shipping container, there being a tag operating means which moves with another component of the shipping container, said components being ones that move relatively to one another during opening of said door of the container, storing a signal on said tag as said components move together on door closing, changing said stored signal upon said tag and its operating means being separated during door opening, downloading the signal stored in the tag at the time the door is lawfully closed, and accessing said stored signal on the tag before the door is lawfully opened to verify that said signal has not changed due to unlawful door opening.
9. A method as claimed in claim 8 and including the step of applying a tag operating device to the other component of the container.
10. A method, as claimed in claim 9 and which comprises the steps of fitting said tag or device to a handle constituting said one of said components, said handle being moved to unlock the container, and fitting the device or tag to a further component with respect to which said one component moves during opening.
11. A method as claimed in claim 9, wherein said tag and device are fitted one to said door and one to the frame of the container so that the device and tag are separated as the container door is opened.
12. A method as claimed in any one of claims 8 to 11 and including the step of transmitting, at timed intervals and at radio frequency, the signal stored in the tag.
13. A method as claimed in claim 12, and including the further step of storing a unique tag identification signal in the tag, and transmitting, at timed intervals and a radio frequency, the unique identification signal stored in the tag.
14. A method of monitoring a patrolman's progress which method comprises distributing tags along the patrolman's route, each tag transmitting a unique identification signal, providing the patrolman with a reader for receiving said identification signals upon any of the tags and said reader being brought into sufficiently close proximity, and transmitting the tag identification signals picked up by the reader to a control room thereby to permit the patrolman's progress from tag- to-tag to be monitored.
PCT/ZA2004/000024 2003-03-06 2004-03-08 Method and means for providing security WO2004079679A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
BRPI0408120-0A BRPI0408120A (en) 2003-03-06 2004-03-08 method and device for providing security
JP2006509118A JP2006520507A (en) 2003-03-06 2004-03-08 Methods and means for providing crime prevention
EP04737295A EP1614078A1 (en) 2003-03-06 2004-03-08 Method and means for providing security
US10/548,061 US20070001842A1 (en) 2003-03-06 2004-03-08 Method and means for providing security
IL170712A IL170712A0 (en) 2003-03-06 2005-09-06 Method and means for providing security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2003/1835 2003-03-06
ZA200301835 2003-03-06

Publications (1)

Publication Number Publication Date
WO2004079679A1 true WO2004079679A1 (en) 2004-09-16

Family

ID=32962891

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2004/000024 WO2004079679A1 (en) 2003-03-06 2004-03-08 Method and means for providing security

Country Status (8)

Country Link
US (1) US20070001842A1 (en)
EP (1) EP1614078A1 (en)
JP (1) JP2006520507A (en)
CN (1) CN1781129A (en)
BR (1) BRPI0408120A (en)
IL (1) IL170712A0 (en)
WO (1) WO2004079679A1 (en)
ZA (2) ZA200507907B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007056976A2 (en) * 2005-11-15 2007-05-24 Klaus Dziersk Device for protecting an identification unit and method for producing such a devce and uses thereof
US7528719B2 (en) * 2005-12-15 2009-05-05 Motorola, Inc. Asset sealing and tracking system and method
CN108765622A (en) * 2018-05-30 2018-11-06 天仁民防建筑工程设计有限公司 The dual identifying system and method for closed guard gate's identity
CN110706366A (en) * 2019-10-12 2020-01-17 盐田国际集装箱码头有限公司 Port large-scale hoisting equipment inspection system and inspection method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968831B (en) * 2012-11-13 2015-12-02 海能达通信股份有限公司 A kind of electronic patrol method, terminal and system
JP6144910B2 (en) * 2012-12-28 2017-06-07 セコム株式会社 Traveling work support system, portable terminal, and traveling work support method
KR102602624B1 (en) 2020-11-30 2023-11-16 한양대학교 산학협력단 Chemiluminescence analysis device for evaluating the behavior of reactive oxygen species and chemiluminescence analysis method using the same

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448220A (en) * 1993-04-08 1995-09-05 Levy; Raymond H. Apparatus for transmitting contents information
US5610596A (en) * 1993-10-22 1997-03-11 Compagnie Generale Des Matieres Nucleaires System for monitoring an industrial installation
US20020175807A1 (en) * 1998-03-02 2002-11-28 Terrence Keith Ashwin Identification device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9308426D0 (en) * 1993-04-23 1993-06-09 Roster Control Syst Ltd Watchmans clock system
US5936523A (en) * 1998-04-24 1999-08-10 West; Joe F. Device and method for detecting unwanted disposition of the contents of an enclosure
EP1246094A1 (en) * 2001-03-27 2002-10-02 TELEFONAKTIEBOLAGET L M ERICSSON (publ) Container surveillance system and related method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448220A (en) * 1993-04-08 1995-09-05 Levy; Raymond H. Apparatus for transmitting contents information
US5610596A (en) * 1993-10-22 1997-03-11 Compagnie Generale Des Matieres Nucleaires System for monitoring an industrial installation
US20020175807A1 (en) * 1998-03-02 2002-11-28 Terrence Keith Ashwin Identification device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007056976A2 (en) * 2005-11-15 2007-05-24 Klaus Dziersk Device for protecting an identification unit and method for producing such a devce and uses thereof
WO2007056976A3 (en) * 2005-11-15 2007-10-18 Klaus Dziersk Device for protecting an identification unit and method for producing such a devce and uses thereof
US7528719B2 (en) * 2005-12-15 2009-05-05 Motorola, Inc. Asset sealing and tracking system and method
CN108765622A (en) * 2018-05-30 2018-11-06 天仁民防建筑工程设计有限公司 The dual identifying system and method for closed guard gate's identity
CN108765622B (en) * 2018-05-30 2020-08-07 成都天仁民防科技有限公司 Double identification system and method for identity of civil air defense door
CN110706366A (en) * 2019-10-12 2020-01-17 盐田国际集装箱码头有限公司 Port large-scale hoisting equipment inspection system and inspection method

Also Published As

Publication number Publication date
US20070001842A1 (en) 2007-01-04
BRPI0408120A (en) 2006-03-01
CN1781129A (en) 2006-05-31
ZA200507907B (en) 2007-04-25
JP2006520507A (en) 2006-09-07
EP1614078A1 (en) 2006-01-11
IL170712A0 (en) 2009-02-11
ZA200508146B (en) 2007-10-31

Similar Documents

Publication Publication Date Title
US6995669B2 (en) System and method to enhance security of shipping containers
US7012520B2 (en) Global intelligent remote detection system
US8058985B2 (en) Locking apparatus for shipping containers
US20070200701A1 (en) Network centric sensor fusion for shipping container security
KR100778623B1 (en) Shipping container and method of using same
US20080303663A1 (en) Method for verifying the integrity of a container
US20110018707A1 (en) Shipping container having integral geoclock system
US20040178880A1 (en) Secure cargo transport system
US20100182148A1 (en) Method and devices for tracking and monitoring containers in global transportation
US20060164232A1 (en) Auditable security for cargo containers and other repositories
JP2010534286A (en) Intelligent lock management system located in ubiquitous
TW200532591A (en) Method and system for monitoring containers to maintain the security thereof
WO2004114242A1 (en) System and method for monitoring and detecting a security threat
US20070001842A1 (en) Method and means for providing security
CN101813703A (en) Utilize the method and system of multiple sensors for monitoring container security, content and state
EP2165282A1 (en) A method for verifying the integrity of a container
Carroll et al. Automating Barrier Assessment with Mobile Security Robots

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 170712

Country of ref document: IL

Ref document number: 2006509118

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2004737295

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2005/08146

Country of ref document: ZA

Ref document number: 200508146

Country of ref document: ZA

WWE Wipo information: entry into national phase

Ref document number: 20048115315

Country of ref document: CN

ENP Entry into the national phase

Ref document number: PI0408120

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: 2007001842

Country of ref document: US

Ref document number: 10548061

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 10548061

Country of ref document: US