WO2010106552A2 - Secure logistic system - Google Patents

Secure logistic system Download PDF

Info

Publication number
WO2010106552A2
WO2010106552A2 PCT/IN2010/000138 IN2010000138W WO2010106552A2 WO 2010106552 A2 WO2010106552 A2 WO 2010106552A2 IN 2010000138 W IN2010000138 W IN 2010000138W WO 2010106552 A2 WO2010106552 A2 WO 2010106552A2
Authority
WO
WIPO (PCT)
Prior art keywords
digital
secure
secure container
container
remote monitoring
Prior art date
Application number
PCT/IN2010/000138
Other languages
French (fr)
Other versions
WO2010106552A3 (en
Inventor
Krishna Dharma Bharathraj
Original Assignee
Krishna Dharma Bharathraj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Krishna Dharma Bharathraj filed Critical Krishna Dharma Bharathraj
Publication of WO2010106552A2 publication Critical patent/WO2010106552A2/en
Publication of WO2010106552A3 publication Critical patent/WO2010106552A3/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G7/00Safety transaction partitions, e.g. movable pay-plates; Bank drive-up windows
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/005Portable strong boxes, e.g. which may be fixed to a wall or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/12Safes or strong-rooms for valuables with fluent-material releasing, generating or distributing means, e.g. fire-retardant or fire extinguishing means
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/14Safes or strong-rooms for valuables with means for masking or destroying the valuables, e.g. in case of theft
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05YINDEXING SCHEME RELATING TO HINGES OR OTHER SUSPENSION DEVICES FOR DOORS, WINDOWS OR WINGS AND DEVICES FOR MOVING WINGS INTO OPEN OR CLOSED POSITION, CHECKS FOR WINGS AND WING FITTINGS NOT OTHERWISE PROVIDED FOR, CONCERNED WITH THE FUNCTIONING OF THE WING
    • E05Y2400/00Electronic control; Power supply; Power or signal transmission; User interfaces
    • E05Y2400/60Power supply; Power or signal transmission
    • E05Y2400/65Power or signal transmission
    • E05Y2400/66Wireless transmission

Definitions

  • This invention generally relates to secure logistics and more particularly, to a system for securely transporting and providing access to valuable items in a portable container.
  • a secure logistics system is intended to provide complete security to valuable items during their transportation from a first location (source) to a second location (destination).
  • a variety of such systems has been proposed in the recent years.
  • Such security threats include but are not limited to: deviating the container from! authorized route, an unauthorized person trying to open a container carrying the valuables, cut or punch the container, in-transit damage to the container like snatching, tilting, rough handling, etc.
  • Existing methods and systems provide solutions to some of these problems.
  • existing solutions provide for in-transit security of the container that can be sealed, stacked, audited, monitored (through various sensors) and tracked (through GPS).
  • such systems focus on in-transit security and damage only and fail to provide a complete logistic solution from an originating warehouse to a destination warehouse.
  • the existing systems does not take into account the potential security threats and lack of protocol compliance while the portable container is being transported from the source ware house to the carrier automobile (logistic vehicle) and from the carrier automobile to the destination warehouse.
  • there may be scenarios where law enforcement agencies and insurance companies might need 'informatipn ⁇ regarding the extent of damage and the state of the container after a breach of security has occurred.
  • Such information may be very relevant for assessment of insurance claims and investigation activities that may ensue after a successful attempt of robbery etc. For example, a swift remedial action may be taken based on evidence gathered by the logistic system immediately after the breach of security.
  • Existing systems and methods do not provide appreciable inputs to this end and post robbery information of the container always remains a subject matter for discovery by investigators of varying skills and experiences.
  • the valuables stored within the container may be damaged due to improper handling of the container by human operators not only during the transit but also during loading and unloading of the valuables into the container.
  • the security is weakest during such transportation and is heavily dependent on manual control and supervision.
  • Existing systems fail to address such improper handling and damages caused due to human participation in the logistic systems.
  • Embodiments of the present invention are directed to secure logistic system.
  • the secure logistic system includes a digital secure container for carrying one or more objects.
  • the one or more objects may include one or more of bullions, currency, valuable documents, valuable paintings, fragile items, liquids, etc.
  • the system also includes a handheld device configured to digitally pair with the digital secure container and implements a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse.
  • the system includes a portable device mountable at the secure logistic vehicle configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse.
  • the system further includes a remote monitoring subsystem configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized monitoring of the secure logistic system between the source warehouse and the destination warehouse.
  • Figure 1 schematically; illustrates" an example embodiment of a secure logistic system.
  • Figure 2 schematically illustrates a front view of digital secure container according to an embodiment.
  • Figure 3 illustrates an exemplary block diagram of the internal chamber within the upper chamber of the digital security container.
  • Figure 4 illustrates an exemplary smart/intelligent lock implemented in the digital secure container according to an embodiment.
  • Figure 5 illustrates layers of an exemplary secure logistics infrastructure according to an embodiment. Detailed Description of the Invention:
  • the proposed logistic solution implements an integrated approach by providing a three-layer secure logistic infrastructure.
  • the secure logistics infrastructure includes a transport layer providing infrastructure for transporting a digital secure container from a source warehouse to a destination warehouse.
  • the transport layer includes a hand held device, a digital secure container and a portable device mountable in a secure logistic vehicle.
  • the secure logistics infrastructure further includes a communication network layer providing infrastructure for two way communication between the digital secure container, the handheld device, the portable device, and a remote monitoring subsystem.
  • the secure logistics infrastructure further includes a remote monitoring layer providing infrastructure for remotely tracking, monitoring, and operating the digital secure container.
  • the secure logistic system includes a digital secure container for carrying one or more objects.
  • the one or more objects t ⁇ iay 1 include one or more of bullions, currency, valuable documents, valuable paintings, high value liquids (e.g. mercury), very high grade spirit, fragile valuable items, etc.
  • the system also includes a handheld device configured to digitally pair with the digital secure container and implements a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse.
  • the system includes a portable device mountable at the secure logistic vehicle configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse.
  • the system further includes a remote monitoring subsystem configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized ' m ⁇ riftbVirig of the secure logistic system between the source warehouse and the destination warehouse.
  • Fig. 1 schematically illustrates an example embodiment of a secure logistic system. Accordingly, the system includes a digital secure container 102, a handheld device 104a, and a portable device 104b.
  • the handheld device 104a works as a digital supervisor and may be of portable type or fixed type.
  • the handheld device 104a and the portable device 104b are identical and similar to a computer except that the form factors are such that the handheld device 104a and the portable device 104b are easy to carry.
  • the additional focus is in handcuffing the digital secure container 102 while loading, unloading or in-transit.
  • the handheld device 104a and the portable device 104b can perform constant polling or handshake with the containers and can send the results to a remote server besides local saving of the data.
  • the handheld device 104a and the portable device 104b have the capability to detect automatically and trigger an alarm on any of the digital secure containers in case of an attempted breakaway.
  • the digital secure container 102, the handheld device 104a, and the portable device 104b are configured to communicate with each other and through a network 106 with a remote monitoring subsystem 108.
  • the remote monitoring subsystem 108 may include any combination of hardware or software designed to track, monitor, and remotely operate the digital secure container 102.
  • the remote monitoring subsystem 108 may also refer to a computer,! which may be running a server operating system.
  • the network 106 may include one or more of wireless network, wired network, Wide Area Network (WAN), Metropolitan Area Network (MAN), Local Area Network (LAN), and Personal Area Network (PAN).
  • the network 106 may also include a mobile/cellular network.
  • Such mobile networks may be networks employed for Global System for Mobile communications or a Code Division Multiple Access (CDMA) based communications.
  • CDMA Code Division Multiple Access
  • other mobile device networks such as, personal communications service (PCS) may also be employed without departing from the scope of the ongoing disclosure.
  • PCS personal communications service
  • networks confirming to Wi-Fi and Wi-Max standards may also be implemented in the network 106.
  • the remote monitoring subsystem 108 may be a typical organization of backend server layer, which operate on Client-server relationship in a very secure environment.
  • the remote monitoring ⁇ subsystem 108 may include a main server and a fail-over server that receives data originating from the digital secure container 102 and transmitted through the network in the form of data, voice, or image.
  • the data is stored in secure databases, powerful automated programs installed in the remote monitoring subsystem 108 utilize this data to create applications for real time monitoring, and exception handling which arises when a certain level of alert is raised, and subsequently human intervention takes over.
  • the human operator at the remote monitoring' subsystem 108 has the ability to focus the data set of any particular logistic vehicle or digital secure container and make judgements for remedial actions in case of an attempted breakaway or robbery.
  • remedial actions may include a call to the ground operator, freezing the digital secure container 102 for operations on it, raising a first level or second level alarm, increase the frequency and granularity of tracking, locating, and informing the nearest authorities (law enforcement departments such as police etc.).
  • the remote monitoring subsystem 108 can generate various types of reports using the data available in the database and can distribute the generated reports.
  • Fig 2 illustrates a front view of digital secure container according to an embodiment.
  • the digital secure container 102 when in closed position, is walled from all sides.
  • Such containers may be custom made for specialized sizes and use or mass produced' for standardized sizes and use.
  • the digital secure container 102 includes an uppet'chamber 202 and a lower chamber 204 that are mated together through a hinge or a sliding mechanism, so that the two chambers stay together but are moved apart while accessing contents in the digital secure container 102.
  • the upper chamber 202 includes an internal chamber 206 that cannot be accessed from the outside (by a user).
  • the lower chamber 204 includes yet another inner chamber 208 that stores the valuable goods.
  • the inner chamber 208 houses one or more sensors 210 to sense changes in state of the digital secure container 102, or changes in parameters associated with the safety of the contents stored within.
  • the lower chamber 204 can also hold and transport liquids.
  • the digital secure container 102 includes a first level lock 212 that is a mechanical or pin based lock.
  • the lock 212 fastens the upper chamber 202 and the lower chamber 204 together from the outside.
  • the digital secure container 102 also includes a smart or intelligent fastener/lock 214 that is again a mechanical lock operated upon by digital logic and* drive ⁇ iechanisms.
  • the smart lock 214 is housed inside the digital secure container 102 and cannot be accessed from outside.
  • the smart lock 214 is operated by a controller/processor, the logic is programmed such that opening, and closing of the smart lock 214 happens only after a designated set of validations.
  • a user To access contents housed in the chamber 204, a user requires to open chamber 202 which is possible only if both the first level lock 212 and smart lock 214 are opened. However, if the smasHo ⁇ k 21.4 &nd the first lock 212 are open, the upper chamber 202 can be opened as in cases where an empty container needs to be transported.
  • smart lock 214 can be kept in an open state.
  • the digital secure container 102 gets the flexibility of being usable as a conventional container which can be locked or opened using an external mechanical lock (first lock 212).
  • Valuables are stored in the inner chamber 208 which may be either permanently fixed to the lower chamber 204 or is removable.
  • the lower chamber 204 can be used to transport liquid in which case lower chamber 204 is removable, leak proof and has a special port to ingress and egress the liquid.
  • the walls of the inner chamber 208 may be made of suitable intrusion resistant materials, such as but not limited to, higtr'gatige ''steel or a composite material or multiple sandwiched material layers so that it offers tough resistance to intrusion by way of impact, drill, and cut through etc.
  • the inner chamber 208 can be designed to provide one or more strong intrusion resistant mechanical layers. For example, one layer could be of a fire resistant material. In another embodiment, one layer of the wall could be with a chamber to hold a liquid, semi solid or gaseous material such that when there is an attempt to destroy this layer by any means, the layer discharges stain liquid or greasy sticky flowing glue.
  • the liquid thus discharged when exposed to outside environment can emit a white or colored smoke that could be pungent or non pungent.
  • Such means of capturing attention can leave a stain trace or attract attention, causing deterrence to further intrusions.
  • such liquid or gas may be held in chambers that are housed in such a manner to disperse stain liquids on the content (valuables) of the inrle ⁇ cftaniber ⁇ OS so that the goods contained within get a stain.
  • stain liquids or materials may be selected in such a manner that they can leave a permanent or a long lasting mark on the goods.
  • the stain material may contain permanent DNA markers that help in legal validation of ownership of goods etc.
  • one layer of the wall could be that of an electromagnetic (EM) shielding material so that goods/contents sensitive to such radiations could be protected.
  • EM electromagnetic
  • the ⁇ emissior ⁇ of gases or discharge of liquids can be controlled by using an actuating valve that is electronically operable.
  • an actuating valve that is electronically operable. It may be appreciated by a person ordinarily skilled in the art that the inner chamber 208 is removable and replaceable and can be constructed with one or more layers depending upon the contents inside the inner chamber 208 and the varying level of mechanical security intended.
  • the sensors 210 may be housed inside the inner chamber
  • the upper chamber 202 also includes a user access chamber 216 that can be accessed by a user from outside.
  • the layered walls may emit gases from micro vents through the user access chamber 216, included in the upper chamber 202, to the outside environment to attract immediate attention in case of an security breach .
  • the user access chamber 216 cases the devices and ports that a user may need to access externally.
  • the user access chamber 216 includes an area for mounting a display unit that can display text, image, video or graphical rich text.
  • the chamber may also include a keypad that is used to capture user inputs and also to select and navigate menu that may be displayed on the display unit.
  • a camera sensor could optionally be placed in the user access chamber 216 to gather images or video with sound.
  • the user access chamber 216 may also include a wired interface port from which external cables pertaining to "USB, UART, LAN devices, etc. can be plugged so that external peripherals and onboard computer can communicate with each other.
  • a power socket may be included for providing external power if required, which could conserve onboard power and at the same time can be used for recharging batteries if any.
  • An external battery may also be deployed in the user access chamber 216 so that a, user cahVeplace the battery if required or for quick continuity of service for long haul travel.
  • the user access chamber 216 may also include an illumination provision that helps in better visibility, avoid operation in stealth under darkness, and enhances the light value falling on the camera sensor.
  • a speaker can optionally be housed in the user access chamber 216 so that audibility from sound guidance system, warnings etc. can be heard better by a user.
  • the user access chamber 216 may include a receptacle to accept smaller dimension goods, such as, a document or a bundle of currency.
  • a receptacle is one way where goods can be dropped into the digital secure container 102 but cannot be taken out. In situations where goods need to be collected only, such a receptacle avoids the need for opening the digital secure container 102. This is also useful when goods from several pick up points need to go into the same digital secure container 102 for one destination drop off.
  • the user access chamber 216 may also include indicator panel that- ; ,i ⁇ ' a' « battery- of lights or LEDs which indicate any abnormality, such as, no signal being received, low battery etc.
  • indicator panel that- ; ,i ⁇ ' a' « battery- of lights or LEDs which indicate any abnormality, such as, no signal being received, low battery etc.
  • Such a panel can show the status through lights or color of its lights, the regular or irregular status for pieces of hardware or software that the users carrying the container may need to know.
  • Figure 3 illustrates a breakout block diagram of the internal chamber 206 within the upper chamber 202 of the digital secure container 102.
  • the internal chamber 206 houses all the electronics needed for providing onboard security to the digital secure container 102 and for connecting and communicating to the devices and communication network outside of the digital secure container 102.
  • a power switch (not shown) is used. This power switch is accessible only from the inside of the digital secure container 102 so that switching ON and OFF canf happen -w ' rien both the first level lock 212 and the smart lock 214 is open.
  • the power switch may be of a key type of power switch where a mechanical key is required to activate the ON / OFF state. This enhances security by preventing access without a mechanical key or casual / inadvertent operation on the power switch
  • the internal chamber 206 includes an onboard controlling/processing module 302 that connects to the input module 304 for capturing data and signals. The data thus captured is processed and the results are communicated to the devices external to the digital secure container 102 (for e.g. handheld device 104a, portable device 104b, remote monitoring subsystem 108 etc.)
  • the controlling/processing module 302 is of embedded type that is connected to all the electronic modules in the digital secure container 102 (e.g. input module, output module, communication interfaces, power module).
  • the controlling/processing module 302 includes a high range processor, RAM, non volatile fixed and removable memory (SD card, USB pen), peripherals ports like UART, USB, Ethernet, WiFi, display and keypad support, large number of input output pins.
  • The* controlling/processing module 302 also includes an in-built powerful operating system and supports an advanced FAT file management systems so that data can be saved into popular file systems like word, text pad and viewed in user friendly formats.
  • the controlling/processing module 302 supports advanced display systems that run on a parallel bus so that both graphics and video can be displayed with high quality.
  • the controlling/processing module 302 further includes an onboard audio capability with built in codecs for audio and video processing and an in-built real time clock (RTC) with dedicated power source.
  • the input module 304 includes a camera module which can capture and display both still images and video images with sound. As discussed supra, one or more sensors (e.g.
  • the camera sensors are mounted in single or several places in the digital secure container 102 and may be either covert or overt to the user.
  • the single or multiple camera sensors may be connected through a logic gate (for e.g. OR/ AND NOR gate) so that data from a single or multiple sensors are coupled to derive a unit of logic.
  • Further/the controlling/processing module 302 can address each of the camera sensors individually for activation and deactivation.
  • the output from the camera sensors are passed to the controlling/processing module 302 as a trigger for logic action or for storage into the non-volatile memory of the controlling/processing module 302.
  • the camera sensors can operate in low light conditions with auto focus or in dark light conditions under an infrared (IR) light operation.
  • the data from the sensors can be displayed on to a display unit through the controlling/processing module 302 either as a still image or as a video image.
  • the input module 304 also includes a voice and audio capture module (not shown) which may be based on one or more highly sensitive microphones embedded in single or multiple locations within the digital secure container 102 which may be either overt or covert to a user.
  • the microphones and complementing circuits can capture, amplify noise, filter the sounds, which may be human or any sound in the vicinity of the digital secure container 102 and pass the audio data to the logic unit of the controlling/processing module 302.
  • a voice synthesizer circuit may be optionally coupled to compare the input voice and a stored voice sample to pass a return value to the controlling/processing module 302 for further logical actions.
  • the controlling/processing module 302 can uniquely address each of the audio sensors for activation and • /deactivation.
  • the logic unit in the controlling/processing module 302, after examining all the audio signals can elect to record and save data to a non- volatile memory into multiple sub folders or just elect to save the data with the best voice quality.
  • the controlling/processing module 302 can also establish a two-way real time audio communication by streaming the audio data to the remote monitoring subsystem 108.
  • the two way audio communication also enables the remote monitoring subsystem 108 to warn/initiate a remote dialogue with the unauthorized holder of the digital secure container 102.
  • an operator at the remote monitoring subsystem 108 can talk remotely to the authorized ground operator for technical help, violation alerts etc.
  • - human voice can be used as a switch for detection of a human in the vicinity of the digital secure container 102 and can be used as a decision input to trigger one or more programmed actions on the digitally secure container 102.
  • human voice can become a layer of identification of the user of the digitally secure container 102 or can be merely an audit log for evidence.
  • the human voice can become a layer of password to gain access or to initiate hands free commands for the digital secure container 102.
  • repeated and incoherent high decibel sounds could be used as an input for construing that the walls of the digital secure container have been potentially breached into by use of mechanical impact.
  • the input module 304 further includes other sensor modules such as, vibration sensor, flame sensor, temperature, proximity sensor, light sensor, load and object sensor, tilt sensor, gyro sensor, 3 -axis motion sensor, mechanical contact switch, magnetic contact switch, and wireless jamming sensor, etc.
  • signals from such sensor modules can be detected and measured through the input pins of a micro controller or an embedded computing device like the controlling/processing module 302.
  • the sensors may be of analog type or digital type.
  • an analog to digital convertor ADC may be used to convert analog signals to digital signals for processing by the controlling/processing module 302 that work on digital principles to recognize and record values.
  • ADC analog to digital convertor
  • One or more of the sensors that provide critical inputs can be wired as an array of multiple sensors arid passed through a logical gate (for e.g. NOR gate (AND/OR) or XOR gate) so that in the event of any of the sensors failing, false alarms are obviated.
  • the input module 304 includes vibration sensors embedded at suitable positions in the wall of the digital secure container 102 that detect any vibrations.
  • the controlling/processing 302 detects vibration signals and in case of levels beyond predetermined thresholds, construes the vibration signal as an alert that the walls of the digital secure container 102 could be in a state of intrusion. Such an alert may also arise when the digital secure container 102 is being mal- handled by dropping or due to a shock resulting from rough handling either in the secure logistic vehicle or by a user carrying the digital secure container 102.
  • Vibration sensors may find particular applications in cases where the digital secure container 102 is utilized for transporting high value goods or fragile goods or goods that can malfunction due to sudden shock in transport.
  • a continuous audit and record of the state of the digital secure container 102 can be performed to determine if the digital secure was subjected to shocks during a static state or when in transport.
  • the audit results can be recorded and saved in to the non- volatile memory of the controlling/processing module 302 and simultaneously conveyed to the, remote monitoring subsystem 108. Further, such information can be conveyed to the remote monitoring subsystem 108 in real time as an alert to evaluate if there is an attempted security breach or a case of inadvertent mal-handling.
  • such an input can become a part of the transport log report and can be data for breakage claims or insurance claims.
  • the input module 304 includes flame sensors that work on the principle of excessive and intensive heat generated from flames. By embedding such sensors in the digital secure container 102, an attempt to breach the walls of the container by use of flame torches can be detected; corresponding alerts can be saved and transmitted to the remote monitoring subsystem 108 as a security breach event. Further, if there is an 1 occurrence of fire by natural causes like during transport of chemically reactive substances' or unnatural causes, the fire can be immediately detected and an alert can be saved and transmitted as a log of date, time, and location to the remote monitoring subsystem 108.
  • the input module 304 may also include other sensors such as temperature sensor that monitors the internal temperature of the digital secure container 102 and is akin to a thermometer.
  • Certain valuable goods may require that the temperature be maintained within a range for goods such as, certain medicines, vaccines, and test samples, etc.
  • the digital secure container 102 through the digital thermometer, monitors the inside temperature continually which is saved and transmitted to the remote monitoring subsystem 108. In the event that predetermined temperature bands are exceeded, alert for remedial action can be generated. In case the valuable goods are spoilt or damaged, if temperature was a cause, it can be isolated for claims.
  • Other sensors may be implemented such as proximity sensor that works on an infrared (IR) transmission principle. Humans emit infrared radiations and when humans move, the IR levels vary, which is used by the sensor to detect human proximity and motion. Modern day sensors available in the market have an inbuilt mechanism for suppressing false alarms by way of motions from animals etc.
  • Such sensors that receive signals from the exterior of the digital secure container 102, detect the presence of humans in the near vicinity like a security guard or somebody walking up to operate on the digital security container 102. Signals thus captured from the inside get stored and transmitted to the remote monitoring subsystem 108, when the lid of upper chamber/lower chamber of the digital secure container 102 is opened or when 216 is opened.
  • Such a signal is used as an alert and a confirmation for the event that the lid was opened by a human and not accidental for any reasons.
  • the digital secure container 102 also uses this as an input signal to activate voice guidance systems or to issue warning and alarms if s ⁇ miehow, the slid was opened in violation of procedures or the lid was intruded upon irregularly.
  • the event is captured, saved locally, and transmitted to the remote monitoring subsystem 108.
  • light sensors may be embedded in the digital secure container 102 to detect the presence of light from a dark state to an active state or vice versa.
  • the digital secure container 102 when closed and locked is dark in the inside. If the container walls are breached, some light is expected to get inside the chamber which acts as a security alert.
  • the same principle can be used as a way to know if the lid has been opened and this complements the proximity sensor as a lid opening detection signal. In regular cases, such a signal can be coupled to the voice guidance system and in irregular cases the signal could be coupled to the warning and alert system.
  • the controlling/processing module performs a correlation between clock time, user operation time, and light sensor state to detect an irregularity and raise an alarm.
  • load and object sensor may be implemented in the digital secure container 102 to detect the presence of objects and can work on optical reflecting principle or pressures created from load.
  • the walls of the digital secure container 102 use this to detect presence of objects within it.
  • An in-service digital secure container can tell if it is actually carrying any load or if the valuable goods have been fully unloaded. There may be cases where all the locking and operating procedures may be complied with, but no goods are actually loaded and a false claim is made of the shipment. Similarly, in case of unloading, procedure for complete unloading may not be complied with and a few pieces of the dispersed valuables like cash, bullion may be left behind with mala fide intention.
  • the digital secure container 102 has the ability to detect presence of load and complete unload from the container along with date, time and location details which is saved locally and also transmitted to the remote monitoring subsystem.
  • tilt sensor or gyro sensor or 3 -axis accelerometer may be placed in the digital secure container 102 to detect if the container is moved in any of the* X, Y, arid 1 Z axes.
  • Such sensors may also help in determining whether the digital secure container 102 is in a state of rest or motion.
  • the digital secure container 102 therefore has the ability to detect, save and transmit an alert or log if the goods have been subjected to movement in any of the 3 axes of movement.
  • the sensors can also determine a measure of care or shock along the 3- axes that it was subject to during transport and is valuable for goods that can suffer damage due to sudden movement in any of the three axes.
  • the state of rest or motion can be used as an input logic for locking/unlocking operations among other logic conditions.
  • the lock being operated upon in a state of motion may correspond to irregular security condition.
  • contact switches either of the mechanical type or of the magnetic type or both may be used to detect contact actions between any two surfaces. The switches in single units or multiple units may be interfaced through a logic NOR or XOR gate to detect if lids of parting chambers 202 & 204 are fully and properly closed.
  • Such sensors can detect if the lid has been opened which can be a trigger for voice guidance systems or illumination systems under validated openings and an alarm can be raised in case of security breaches.
  • the entire log of opening, closing can be saved and transmitted. If the mating planes of the upper lid and lower lid of the two chambers, 202 and 204 are not perfect it can be detected as a sign of mechanical fault or improper fastening. Hence, the digital secure container 102 knows if the lids are fastened properly and when it was opened and & or closed with full log.
  • sensors may also be used. It may be appreciated by a person skilled in the art that such integration of addition sensors is achieved through modular design of the hardware and software where sensors can be added or taken out as required through a simple configuration in the onboard computer (e.g. controlling/processing module 302) to consider their addition or deletion in the logic processing.
  • onboard computer e.g. controlling/processing module 302
  • the input module 304 also includes biometric capture module (not shown) to control access to the digital secure container 102 which takes inputs by way of a human fingerprint to images of the IRIS of the eye or merely a live photo of the person.
  • the data is saved locally and transmitted to the remote monitoring subsystem 108.
  • the onboard computer in the container (controlling/processing module 302) or the remote monitoring subsystem 108 runs a matching program to compare the input received with that stored previously in the database (as approved data identity). The comparison results in a match/no match message which is sent to the controlling/processing module 302 to allow or deny access to the person trying to open the digital secure container 102.
  • biometric capture module allows access to pre-approved users only, detects who among them actually operated upon the box and the details of the last user, time, location of operation upon the digital secure container 102.
  • the input module 304 may also include a keypad which is an access control device that allows users to present what they know by way of PINS or passwords etc. Such an access control device can be used to select a menu of programs that are allowed on the digital secure container 102 for a particular user. Typically, such inputs may be required during start of service or end of service or during load and unload at select points in the route.
  • the keypad may not be fixed to the container but can be plugged by an external port at locations where it needs to be used.
  • the digital secure container 102 has an ability to allow/activate use of this access control device at allowed location, date, and time. Input from a GPS receiver (optionally mounted on the secure logistic vehicle or the digital secure container) and the onboard clock is matched to arrive at a logical decision to allow access. It is possible to freeze the use of the keypad from the remote server if a security breach is perceived and hence even if the passwords are known, input mechanism is denied.
  • radio frequency tags can be used for identification of the digital secure container 102.
  • Certain constant data associated with the digital secure container 102 e.g. identification number
  • the digital secure container 102 can be digitally identified for its unique number.
  • other static details of the digital secure container 102 can be fed into the RF chip through a wireless mode obviating the need for any human punching of container identification details which is prone to error.
  • a passive tag with long range identification acts as a "last resort to track and trace" of container in case the container is stolen and all the electronics is powered off or disabled.
  • the input module 3Q4 may also include magnetic reader module.
  • a module can be placed in the user access chamber 216 or in the handheld device 104a and can be activated using a menu function. When a user carries his identity with such a magnetic strip, it allows for digital validation of the user based on what he is carrying. Additionally such magnetic readers can be used to scan for RF tags and uniquely identify containers digitally. When unit goods are marked with magnetic tags, such a reader can scan these tags from a distance and take stock of the unit goods as they are being loaded or unloaded into the container in a natural way. Further, in combination with a software program, an automated packing list can be prepared that can be saved and shared locally or transmitted to the remote monitoring subsystem 108 for distributed sharing.
  • the input module 304- rnay alsb vl include bar code readers that can be optionally installed either in the user access chamber 216 or in the handheld device 104a. Before taking in or taking out any unit of goods from the digital secure container 102, the barcode labels pasted on the unit good is scanned through this reader. The reader captures the goods that gets into the container and such data can be passed to the controlling/processing module 302 for creating and saving a packing list that can be updated whenever an load/unload operation takes place.
  • the internal chamber 206 includes an output module 306 to communicate with a user of the digital secure container 102.
  • the output module 306 would include all such devices that would be required for outputting data to a user of the digital secure container 102.
  • the output module 306 includes a speaker unit, which can include one or more speakers located within the container for best user audibility.
  • a voice guidance system and remote % ' oice' communication can be implemented by using the speaker to output amplified sound to the user of the digital secure container 102.
  • Various alarms and sounds can be generated using the speakers to attract attention in the event of a security breach.
  • the output module 306 includes an alarm system which may be a two layered system.
  • the primary alarm may be milder in nature and warns for corrective actions in case of any violation of operating procedures.
  • the warning could be in the form of a mild beeping sound or flashing of lights in the indicator panel (in the user access chamber 216).
  • the primary alarm could be a recorded voice emanating from the voice guidance system.
  • the secondary alarm could be more intensive in nature and can be triggered when a serious security breach has occurred.
  • the security breach may correspond to an event like, confirmation of an attempt to break into the digital secure container or an attempt to carry the whole container away irregularly.
  • the secondary alarms could be in the form of very high decibel siren sounds, voice guidance units that sound distress level recordings, and in extreme forms as a last resort based on multiple judgments.
  • a smoke trace dye or trace stain liquids may be released from the inner chamber 208 in conjunctions with the generation of the secondary alarm.
  • Alarms may also include notifications sent to predefined parties by way of SMS / alert through GPRS, email, or a pre-recorded automatic voice call.
  • the output module 306' includes 'a 1 voice guidance unit configured to play pre- recorded voice and is used to guide a user (of the digital secure container 102) interactively on the sequence of operations. In case of errors, the voice guidance unit suggests corrective actions.
  • the voice guidance unit provides a better user experience and noise alerts the environment to the operation on the container in a natural way forming a security feature.
  • the voice guidance unit can suppress the sound in exception cases but such an exception is logged as an event and notified to the remote monitoring subsystem 108.
  • the volume of the voice guidance unit can be adjusted down to only a certain minimum level but total audibility cannot be suppressed by absolute minimization of volume. Every volume adjustment can be tracked as an event and logged.
  • the output module 306 includes a light indicator panel that is illuminated using display lights from bulbs or LEDs and is typically cased.
  • the light indicator panel serves the purpose of providing' status' knd warnings. For example, if the signal strength is low or battery level is low or when a light alarm by way of a strobe light needs to be raised, light indicator panel can be used.
  • the output module 306 includes a display unit of requisite specification that can handle text, graphics, and video.
  • the display unit can be touch enabled i.e. a stylus could be used to select and navigate user menus when displayed on the display unit.
  • Display unit is controlled by the controlling/processing module 302 that decides when and what is to be displayed.
  • the output module 306 may also include an Illumination unit that illuminates the chambers 208 and 216 respectively and consists of bulbs or LEDs that output a certain level of light to provide for visibility within the chambers and to provide ambient light for sensors to capture pictures. Operating the digital secure container 102 under well-lighted condition is a security feature, absence of the same as captured by light sensors is considered an irregular security state which may be recorded, and an alert can be raised.
  • the inner chamber 206 further includes a data communication interface 308 that includes both wired ports and wireless ports.
  • the controlling/processing module 302 supports wired connection between the digital secure container 102 and external peripherals through data ports that ⁇ confirm to universal industry standards like, UART, USB, Ethernet port, parallel port, etc.
  • the digital secure container ⁇ 02 has an interface port to connect to external peripherals like devices ' that use UART port or USB devices etc.
  • external peripherals and the controlling/processing module 302 can exchange communication with the help of software drivers and programs.
  • Such ports can be used to exchange files, images, video, or any other data stored in the non-volatile memory of the controlling/processing module 302 to external devices through USB storage or to other computers directly through the Ethernet port.
  • the communication interface 308 also includes wireless data interface that enables wireless communication and exchange of data between the digital secure container 102 and the external devices or networks.
  • the interface can be a set of suitable antennas that transmit or receive data from wireless devices cased in the digital secure container 102.
  • Several wireless devices are connected to the controlling/processing module 302 -as modules and directly controlled by the controlling/processing module 302.
  • the software logic of the controlling/processing module 302 drives which of the modules (amongst input module 304, output module 306, power module 310) would be used based on features or security requirements from of each of the modules.
  • infrared (IR) 1 devices can be used to exchange data in cases where one needs to cover only short range distances and hence are applicable to proximity based security requirements.
  • the handheld device 104a or the portable device 104b can perform a remote control action on the digital secure container 102.
  • radio frequency (RF) devices can be used to exchange data between the digital secure container 102 and the external devices.
  • Such devices use radio waves of varying frequencies and can be microwave, UHF, VHF etc. based on the frequencies of operation.
  • unlicensed radio frequency bands like ISM band can be utilized.
  • customers like regulatory authorities or military who hold licensed frequency bands by suitable choice of the hardware, such licensed frequency bands can be used for exclusive communication.
  • the handheld device 104a may use RF as a medium to realize the handcuff function.
  • RF transceivers are embedded in both the ' digital secure container 102 and the handheld device 104a and the transmission power/signal range of such transceivers can be set.
  • the signal strength is constantly polled and monitored by both transceivers and if there is a break due to distance exceeding a set range; it becomes an event to trigger further logical action.
  • RF transceivers are also used to exchange data such as GPS data or stream file data between RF transceivers.
  • the communication interface 308 also includes a GPS/GPRS modem that enables exchange of voice and data over very long distances using cellular based telecom networks (e.g. 3G or 4G). Modern day cellular networks have coverage that can span across a country or most countries of the globe through extended arrangements.
  • a subscriber module is embedded in the modem which when powered is in constant touch with the nearest cellular tower. Such towers then pass or request information from any other cell enabling cell-based wide network communication.
  • Such networks may be classified as 2G, 3 ⁇ ,-4G, etc. based on the sophistication they provide. For example, 3 G, 4G enables high bandwidth interactive voice, video and TV.
  • the modem in the digital secure container 102 can initiate and receive voice calls, transmit/receive data in the form of text, pictures, voice, video etc.
  • the controlling/processing module 302 controls the modem as a slave and performs wide coverage communication between the remote monitoring subsystem 108 and the digital secure container '! 02 sorjbetween the digital secure container 102 and any mobile telephone.
  • location of the nearest cell can be used for tracking purposes as to where the container is located with respect to the nearest cellular tower. Such a Cell ID based tracking gives a reasonable level of accuracy of location for monitoring purposes.
  • the digital secure container 102 uses cell based ID location tracking in addition to the primary source of tracking which is the GPS based tracking.
  • the GPS receivers receive information from the sky-based satellites and provide geo-coordinates and other information like velocity, altitude of the receiver location. Such receivers require view to the sky to receive the information.
  • the digital secure container 102 has a GPS receiver embedded into it and data received by it is saved and transmitted to the remote monitoring subsystem 108. GPS is a key primary engine for tracking the location of the digital secure container 102. rSinc'e,direbt : view to the sky or signals from sky may not always be possible as in cases where the secure container is within a vehicle.
  • a custom built device called GPS sprayer is implemented where a dedicated GPS receiver that has best view to the sky or best GPS signal gathers the information and broadcasts (forwards) it to the digital secure container 102 in the vicinity using the RF wireless medium.
  • the GPS data from the custom built GPS sprayer can only be received by designated RF modules in the digital secure container 102 and is effected by special logic in the firmware of the RF transcievers. Additionally, it is possible to remotely and randomly set from the remote monitoring subsystem 108, a matching authentication code on the basis of which the RF transmitter and RF receiver can establish communication. Such a security feature obviates the possibility of unauthorized tapping, intruding, modifying, or taking control of the RF communication by an unauthorized party.
  • wireless commuiiicatiW i standards like, Bluetooth, Wifi, Wimax, and Zigbee may be used to exchange data and voice.
  • Standardized hardware modules corresponding to such standards can be connected to the controlling/processing module 302 and be programmed to exchange medium range data, images, and voice using wireless communication.
  • the digital secure container 102 may include all or some of these devices to transfer files, images and to establish hands-free voice communication between the digitals supervisor(s) (handheld device 104a and portable device 104b) and the digital secure container 102 as a local area wireless communicator.
  • the digital secure container l'02f' has an onboard controlling/processing module 302 with an Internet Protocol (IP) address of its own; the container can be networked to other computers in the near range vicinity through a wireless LAN device connected to the onboard computer of the container.
  • IP Internet Protocol
  • High speed exchange of data can happen in warehouses or offices near the warehouse so that information sharing can be done at high speeds and wirelessly.
  • the inner chamber also includes a power module 310 that is activated after the power switch is enabled.
  • the digital secure container 102 includes a primary source of rechargeable battery power which is not accessible from outside the container.
  • the power module 310 has an external power interface socket, which can be connected from outside the container to the primary power source. When external power through the interface socket is provided, it supplies power to the entire board and at the same time charges the primary battery power source.
  • the power source automatically switches to the primary battery source without any flicker of power through appropriate circuitry (for example, capacitors). This ensures that the electronic circuits do not get reset and restart due to the momentary power flicker.
  • the power module 310 also includes a failover power source, which is accessible from outside and is typically cased in a user access chamber 216. There could be multiple fail-over dedicated power sources considering criticality of security provided by the power drawing modules. Failover power is also provided and can be used when main power source goes down and switch over happens automatically. Since different electronics devices operate on different voltages, the power module 310 includes a power regulator that converts the main power source to the required level for each of the electronic devices. The power module 310 also has a monitoring circuit that can monitor the level of battery charge that is available and can send a signal if the battery level goes ⁇ elow aMefmed threshold. Such signal is sent to controlling/processing module 302 or to the light indicator panel for remedial actions.
  • Fig.4 illustrates the mechanical aspects of the smart lock 214 (also referred to as "digital intelligent fastener" in the foregoing disclosure).
  • the smart lock 214 or the digital intelligent fastener fastens from inside the digital secure container 102 and is not accessible to the user.
  • the logic to allow fastening or unfastening by way of moving the locking elements is' primarily decided by the logic residing in the onboard controlling/processing module 302.
  • the variables among others to make a decision to fasten or unfasten by moving the locking head may be a function of time, place, GPS location, state of the sensors, local operation allowed /frozen status, user password, and biometric verifications. It may be appreciated that one or more variables known in the art could be the basis for the fastening and unfastening of the smart lock 214.
  • the smart lock 214 includes a drive controller 404 which gives the signal to a motor to move, stop movement, or number of steps to move along with the polarity or direction of movement.
  • the locking head could be moved through a solenoid, which when energized moves or releases the locking head.
  • the drive controller 404 in such a case passes the lock/unlock signal to a relay (not shown) which then energizes or de-energize the solenoid causing the locking head to move in locking/unlocking direction.
  • a relay not shown
  • the smart lock 214 also includes two sensors 410a and 410b that can detect and confirm the location of the heads (406a and 406b) is in lock or unlock position. The smart lock 214 can confirm that the lock head (406a and 406b) has actually moved to lock or unlock position unlike most locks in the existing systems that assume that the head has moved based on the lock/unlock signal sent to the drive 402.
  • the sensors 410a and 410b can be queried from the controlling/processing module 302 to get the lock/unlock status from a position state of the locking head. Such a query would return an input signal 412 which is sent to the controlling/processing module 302 for processing.
  • Yet another feature of the smart lock is that it can be remotely controlled from the remote monitoring subsystem 108 or from the handheld devicefyQ4& * in? ⁇ Ceftain embodiments. One such case could be when regulatory authorities need to inspect the secure logistics vehicle and the digital secure container 102. During such inspections, a voice based dialogue to the remote monitoring subsystem 108 can be established between the inspecting party and a remote operator, which is recorded along with picture and video of the inspection proceedings. Such recordings can be saved and transmitted to the remote monitoring subsystem 108 which can be usecflas f eVideifce ⁇ of exceptional opening due to demands of law.
  • the dialogue with the remote operator initiates from the voice communication facility in the digital secure container 102 or the handheld device 104a that raises the request and reason for such inspections.
  • the genuineness of the request is verified based on inputs from the ground operator of the digital secure container 102, confirmation, or permission from owner of the goods and authority vested with the server room manager.
  • a decision signal 414 is sent to the controlling/processing module 302 or to the handheld device 104a which can enable temporary unfastening and fastening of the smart lock 214.
  • Fig. 5 illustrates an exemplary secure logistics infrastructure in accordance with an embodiment.
  • the secure logistics infrastructure includes three distinct layers involved in the integrated and seamless digital security ecosystem. The objective of such an infrastructure is to move valuable goods between remote locations (from a source warehouse to destination warehouse) under a controlled and well monitored digital security system.
  • the secure logistics infrastructure 500 includes a transport layer 502 where multitudes of valuable goods are moved randomly and in distributed clusters.
  • the transport layer 502 provides infrastructure for transporting a digital secure container from a source warehouse to a destination warehouse.
  • the transport layer 502 for one cluster includes the digital secure container 102, the handheld device ⁇ l'04aj' M$ a 1 portable device 104b mountable in the secure logistic vehicle.
  • the handheld device 104a and the portable device 104b can be merged for operational ease through docking mechanisms.
  • Each of the digital secure containers, handheld devices, and portable devices have a unique identification mechanism (tag), and hence can be uniquely located, identified, tracked and interacted upon with from the remote monitoring subsystem 108.
  • each of these devices can be in a state of in-service or not in-service.
  • the digital secure container 102 and supervisor devices are digitally handcuffed i.e. both the 1 ! handcuffed devices have to move together and be located within a specified proximity range that can be flexibly set.
  • One of the intended purposes of the digital handcuff is to ensure that the guard or human carrier responsible for the security of the containers is in close proximity and closely watches the containers assigned to him. In case the digital handcuff and secure container exceed the specified proximity range, this is automatically detected by both the handheld device 104a and the digital secure container 102 as an event and notified to the remote monitoring subsystem 108.
  • the handheld also gets an alarm by way of a beep etc to take remedial action by the human carrier.
  • the digital secure container is carried away with an attempt of robbery, such action is automatically conveyed to the human carrier on his handheld and to the remote monitor station.
  • the server can also independently do the - ⁇ m ' ote adtion mentioned earlier.
  • the supervisor devices (104a and 104b) monitor the carriage of the digital containers through digital means and communicate the monitoring details in real time to the remote monitoring subsystem 108.
  • the digital secure containers can independently communicate information about its location and security status to the server at the remote monitoring subsystem 108 in a continual manner.
  • the secure logistics infrastructure 500 further includes a communication network layer 504 a communication network layer that provides infrastructure for two way communication between the digital secure container 102, the handheld device 104a, the portable device 104b, and the remote monitoring subsystem 108.
  • the communication network layer may include all present day public and private communication networks like, Wide Area Network (WAN), Virtual Private Network (VPN), telecom infrastructure, radio wave communication infrastructures for high frequencies like UHF or VHF, satellite based GPS signals or satellite based communications, internet, WI-FI, Wi-Max, 3G, 4G, etc. It may be appreciated that future communication technologies can be easily integrated into the communication network layer 502 without departing from the scope of the ongoing description.
  • WAN Wide Area Network
  • VPN Virtual Private Network
  • telecom infrastructure radio wave communication infrastructures for high frequencies like UHF or VHF, satellite based GPS signals or satellite based communications, internet, WI-FI, Wi-Max, 3G, 4G, etc.
  • the secure logistics infrastructure 500 also includes a remote monitoring layer 506 to provide infrastructure for remotely tracking, monitoring, and operating the digital secure container 102.
  • the remote monitoring layer 506 includes the remote monitoring subsystem 108 which is the aggregation point for all data (data, images, sound) emerging from the clusters of distributed devices in field service.
  • the remote monitoring layer 506 includes sophisticated programs that track all the operational devices in real time. In the event of any exceptions or emergencies, the remote monitoring layer 506 is designed tp «react swiftly to take remedial measures in addressing the security situation of different levels.
  • the remote monitoring subsystem 108 can zoom into a single fleet or a single container and monitor it closely or perform actions on it like freezing operations to raising alarms at the local level to the nearby regulatory authorities.
  • the teachings of the present invention can be implemented as a combination of hardware and software.
  • the software is preferably implemented as an application program comprising a set of program instructions tangibly embodied in a computer readable medium.
  • the application program is capable of being read and executed by hardware such as a computer or processor of suitable architecture.
  • any examples, flowcharts, functional block diagrams and the like represent various exemplary functions, which may be substantially embodied in a computer readable medium executable by a computer, or p ⁇ ojc&ssor, whether or not such computer or processor is explicitly shown.
  • the processor can be a Digital Signal Processor (DSP) or any other processor used conventionally that is capable of executing the application program or data stored on the computer-readable medium.
  • DSP Digital Signal Processor
  • the example computer-readable medium can be, but is not limited to, (Random Access Memory) RAM, (Read Only Memory) ROM, (Compact Disk) CD or any magnetic or optical storage disk capable of carrying application program executable by a machine of suitable architecture. It is to be appreciated that computer readable media also includes any form of wired or wireless transmission. Further, in another implementation, the method in accordance with the present invention can be incorporated on a hardware medium using ASIC or FPGA technologies.

Abstract

The present invention relates to a secure logistic system (102) that includes a digital secure container (102) for carrying one or more objects. The system further includes a handheld device (104a) configured to digitally pair with the digital secure container (102) and implements a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse. The system includes a portable device (104b) mountable at the secure logistic vehicle which is configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse. The system also includes a remote monitoring subsystem (108) configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized monitoring of the secure logistic system between the source warehouse and the destination warehouse.

Description

Secure Logistic System
Field of the invention
This invention generally relates to secure logistics and more particularly, to a system for securely transporting and providing access to valuable items in a portable container.
Background of the invention
A secure logistics system is intended to provide complete security to valuable items during their transportation from a first location (source) to a second location (destination). A variety of such systems has been proposed in the recent years.
There are potential security threats while transporting valuable items between two remote locations. Such security threats, for example, include but are not limited to: deviating the container from! authorized route, an unauthorized person trying to open a container carrying the valuables, cut or punch the container, in-transit damage to the container like snatching, tilting, rough handling, etc.
Existing methods and systems provide solutions to some of these problems. For example, existing solutions provide for in-transit security of the container that can be sealed, stacked, audited, monitored (through various sensors) and tracked (through GPS). However, such systems focus on in-transit security and damage only and fail to provide a complete logistic solution from an originating warehouse to a destination warehouse. In other words, the existing systems does not take into account the potential security threats and lack of protocol compliance while the portable container is being transported from the source ware house to the carrier automobile (logistic vehicle) and from the carrier automobile to the destination warehouse. In addition, there may be scenarios ( where law enforcement agencies and insurance companies might need 'informatipn^regarding the extent of damage and the state of the container after a breach of security has occurred. Such information may be very relevant for assessment of insurance claims and investigation activities that may ensue after a successful attempt of robbery etc. For example, a swift remedial action may be taken based on evidence gathered by the logistic system immediately after the breach of security. Existing systems and methods do not provide appreciable inputs to this end and post robbery information of the container always remains a subject matter for discovery by investigators of varying skills and experiences.
In some cases, the valuables stored within the container may be damaged due to improper handling of the container by human operators not only during the transit but also during loading and unloading of the valuables into the container. In typical cases, the security is weakest during such transportation and is heavily dependent on manual control and supervision. Existing systems fail to address such improper handling and damages caused due to human participation in the logistic systems. Hence, there is a well-felt need for an integrated security system that provides complete security to the portable container from the originating warehouse to the destination warehouse. Summary of the Invention
Embodiments of the present invention are directed to secure logistic system. According to an embodiment, the secure logistic system includes a digital secure container for carrying one or more objects. The one or more objects may include one or more of bullions, currency, valuable documents, valuable paintings, fragile items, liquids, etc. The system also includes a handheld device configured to digitally pair with the digital secure container and implements a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse.
In addition, the system includes a portable device mountable at the secure logistic vehicle configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse. The system further includes a remote monitoring subsystem configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized monitoring of the secure logistic system between the source warehouse and the destination warehouse. These and other advantages and features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter. Brief Description of the Drawings To further clarify the above and other advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings in which:
Figure 1 schematically; illustrates" an example embodiment of a secure logistic system.
Figure 2 schematically illustrates a front view of digital secure container according to an embodiment.
Figure 3 illustrates an exemplary block diagram of the internal chamber within the upper chamber of the digital security container.
Figure 4 illustrates an exemplary smart/intelligent lock implemented in the digital secure container according to an embodiment. Figure 5 illustrates layers of an exemplary secure logistics infrastructure according to an embodiment. Detailed Description of the Invention:
Existing logistic solution systems predominantly focus on the security aspects during the in-transit phase of the complete logistics. As discussed supra, such systems may not address security* throats* in fother phases of the logistics, such as, loading phase, unloading phase, etc. At best, such threats are addressed in the state of the art systems by way of manual supervision.
Disclosed systems provide for a complete logistic solution and focus on various phases of the logistic solution. For example, the proposed logistic solution implements an integrated approach by providing a three-layer secure logistic infrastructure. In an embodiment, the secure logistics infrastructure includes a transport layer providing infrastructure for transporting a digital secure container from a source warehouse to a destination warehouse. The transport layer includes a hand held device, a digital secure container and a portable device mountable in a secure logistic vehicle.
The secure logistics infrastructure further includes a communication network layer providing infrastructure for two way communication between the digital secure container, the handheld device, the portable device, and a remote monitoring subsystem.
The secure logistics infrastructure further includes a remote monitoring layer providing infrastructure for remotely tracking, monitoring, and operating the digital secure container.
Another embodiment of a secure logistic system is disclosed. Accordingly, the secure logistic system includes a digital secure container for carrying one or more objects. The one or more objects tøiay1 include one or more of bullions, currency, valuable documents, valuable paintings, high value liquids (e.g. mercury), very high grade spirit, fragile valuable items, etc. The system also includes a handheld device configured to digitally pair with the digital secure container and implements a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse. In addition, the system includes a portable device mountable at the secure logistic vehicle configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse. The system further includes a remote monitoring subsystem configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized' mόriftbVirig of the secure logistic system between the source warehouse and the destination warehouse.
Fig. 1 schematically illustrates an example embodiment of a secure logistic system. Accordingly, the system includes a digital secure container 102, a handheld device 104a, and a portable device 104b.
The handheld device 104a works as a digital supervisor and may be of portable type or fixed type. In functional terms, the handheld device 104a and the portable device 104b are identical and similar to a computer except that the form factors are such that the handheld device 104a and the portable device 104b are easy to carry. The additional focus is in handcuffing the digital secure container 102 while loading, unloading or in-transit. Further, the handheld device 104a and the portable device 104b can perform constant polling or handshake with the containers and can send the results to a remote server besides local saving of the data. In addition, the handheld device 104a and the portable device 104b have the capability to detect automatically and trigger an alarm on any of the digital secure containers in case of an attempted breakaway. The digital secure container 102, the handheld device 104a, and the portable device 104b are configured to communicate with each other and through a network 106 with a remote monitoring subsystem 108. The remote monitoring subsystem 108 may include any combination of hardware or software designed to track, monitor, and remotely operate the digital secure container 102. The remote monitoring subsystem 108 may also refer to a computer,! which may be running a server operating system.
The network 106 may include one or more of wireless network, wired network, Wide Area Network (WAN), Metropolitan Area Network (MAN), Local Area Network (LAN), and Personal Area Network (PAN). In an implementation, the network 106 may also include a mobile/cellular network. Such mobile networks may be networks employed for Global System for Mobile communications or a Code Division Multiple Access (CDMA) based communications. According to an embodiment other mobile device networks, such as, personal communications service (PCS) may also be employed without departing from the scope of the ongoing disclosure. For example, networks confirming to Wi-Fi and Wi-Max standards may also be implemented in the network 106.
The remote monitoring subsystem 108 may be a typical organization of backend server layer, which operate on Client-server relationship in a very secure environment. The remote monitoring^subsystem 108 may include a main server and a fail-over server that receives data originating from the digital secure container 102 and transmitted through the network in the form of data, voice, or image. The data is stored in secure databases, powerful automated programs installed in the remote monitoring subsystem 108 utilize this data to create applications for real time monitoring, and exception handling which arises when a certain level of alert is raised, and subsequently human intervention takes over. When an exception happens, the human operator at the remote monitoring' subsystem 108 has the ability to focus the data set of any particular logistic vehicle or digital secure container and make judgements for remedial actions in case of an attempted breakaway or robbery. Such remedial actions may include a call to the ground operator, freezing the digital secure container 102 for operations on it, raising a first level or second level alarm, increase the frequency and granularity of tracking, locating, and informing the nearest authorities (law enforcement departments such as police etc.). The remote monitoring subsystem 108 can generate various types of reports using the data available in the database and can distribute the generated reports.
Fig 2 illustrates a front view of digital secure container according to an embodiment. As shown in fig. 2, the digital secure container 102, when in closed position, is walled from all sides. Such containers may be custom made for specialized sizes and use or mass produced' for standardized sizes and use. The digital secure container 102 includes an uppet'chamber 202 and a lower chamber 204 that are mated together through a hinge or a sliding mechanism, so that the two chambers stay together but are moved apart while accessing contents in the digital secure container 102. The upper chamber 202 includes an internal chamber 206 that cannot be accessed from the outside (by a user). The lower chamber 204 includes yet another inner chamber 208 that stores the valuable goods. The inner chamber 208 houses one or more sensors 210 to sense changes in state of the digital secure container 102, or changes in parameters associated with the safety of the contents stored within. The lower chamber 204 can also hold and transport liquids. The digital secure container 102 includes a first level lock 212 that is a mechanical or pin based lock. The lock 212 fastens the upper chamber 202 and the lower chamber 204 together from the outside. The digital secure container 102 also includes a smart or intelligent fastener/lock 214 that is again a mechanical lock operated upon by digital logic and* drive ήiechanisms. The smart lock 214 is housed inside the digital secure container 102 and cannot be accessed from outside. The smart lock 214 is operated by a controller/processor, the logic is programmed such that opening, and closing of the smart lock 214 happens only after a designated set of validations. To access contents housed in the chamber 204, a user requires to open chamber 202 which is possible only if both the first level lock 212 and smart lock 214 are opened. However, if the smasHoόk 21.4 &nd the first lock 212 are open, the upper chamber 202 can be opened as in cases where an empty container needs to be transported.
In another example, when the box is not in security service and is empty or when it needs servicing etc., smart lock 214 can be kept in an open state. In such a case, the digital secure container 102 gets the flexibility of being usable as a conventional container which can be locked or opened using an external mechanical lock (first lock 212).
Valuables are stored in the inner chamber 208 which may be either permanently fixed to the lower chamber 204 or is removable. In an embodiment, the lower chamber 204 can be used to transport liquid in which case lower chamber 204 is removable, leak proof and has a special port to ingress and egress the liquid. The walls of the inner chamber 208 may be made of suitable intrusion resistant materials, such as but not limited to, higtr'gatige ''steel or a composite material or multiple sandwiched material layers so that it offers tough resistance to intrusion by way of impact, drill, and cut through etc. The inner chamber 208 can be designed to provide one or more strong intrusion resistant mechanical layers. For example, one layer could be of a fire resistant material. In another embodiment, one layer of the wall could be with a chamber to hold a liquid, semi solid or gaseous material such that when there is an attempt to destroy this layer by any means, the layer discharges stain liquid or greasy sticky flowing glue.
In an alternative embodiment, the liquid thus discharged when exposed to outside environment can emit a white or colored smoke that could be pungent or non pungent. Such means of capturing attention can leave a stain trace or attract attention, causing deterrence to further intrusions. In some embodiments, such liquid or gas may be held in chambers that are housed in such a manner to disperse stain liquids on
Figure imgf000008_0001
the content (valuables) of the inrle^cftaniber^OS so that the goods contained within get a stain. Such stain liquids or materials may be selected in such a manner that they can leave a permanent or a long lasting mark on the goods. For example, the stain material may contain permanent DNA markers that help in legal validation of ownership of goods etc.
In some embodiments, one layer of the wall could be that of an electromagnetic (EM) shielding material so that goods/contents sensitive to such radiations could be protected.
In an embodiment, the^emissior^ of gases or discharge of liquids can be controlled by using an actuating valve that is electronically operable. It may be appreciated by a person ordinarily skilled in the art that the inner chamber 208 is removable and replaceable and can be constructed with one or more layers depending upon the contents inside the inner chamber 208 and the varying level of mechanical security intended.
In an embodiment, the sensors 210 may be housed inside the inner chamber
208 or in the lower chamber 204 such that multiple inputs are fed to electronic detection systems in case the inner chambers (202 and 204) & (206 and 208) move in relation to each other or when the walls of the inner chamber 208 are being intruded upon. Such deployment of sensors provides for an electronic security layer over and above or within the mechanical layer of security.
The upper chamber 202 also includes a user access chamber 216 that can be accessed by a user from outside. J Ih some embodiments, the layered walls may emit gases from micro vents through the user access chamber 216, included in the upper chamber 202, to the outside environment to attract immediate attention in case of an security breach .
The user access chamber 216 cases the devices and ports that a user may need to access externally. The user access chamber 216 includes an area for mounting a display unit that can display text, image, video or graphical rich text. The chamber may also include a keypad that is used to capture user inputs and also to select and navigate menu that may be displayed on the display unit. A camera sensor could optionally be placed in the user access chamber 216 to gather images or video with sound. Further, the user access chamber 216 may also include a wired interface port from which external cables pertaining to "USB, UART, LAN devices, etc. can be plugged so that external peripherals and onboard computer can communicate with each other. Additionally, a power socket may be included for providing external power if required, which could conserve onboard power and at the same time can be used for recharging batteries if any. An external battery may also be deployed in the user access chamber 216 so that a, user cahVeplace the battery if required or for quick continuity of service for long haul travel. Besides, the user access chamber 216 may also include an illumination provision that helps in better visibility, avoid operation in stealth under darkness, and enhances the light value falling on the camera sensor.
A speaker can optionally be housed in the user access chamber 216 so that audibility from sound guidance system, warnings etc. can be heard better by a user. In some embodiments, the user access chamber 216 may include a receptacle to accept smaller dimension goods, such as, a document or a bundle of currency. Such a receptacle is one way where goods can be dropped into the digital secure container 102 but cannot be taken out. In situations where goods need to be collected only, such a receptacle avoids the need for opening the digital secure container 102. This is also useful when goods from several pick up points need to go into the same digital secure container 102 for one destination drop off. The user access chamber 216 may also include indicator panel that-;,iβ' a'« battery- of lights or LEDs which indicate any abnormality, such as, no signal being received, low battery etc. Such a panel can show the status through lights or color of its lights, the regular or irregular status for pieces of hardware or software that the users carrying the container may need to know.
Figure 3 illustrates a breakout block diagram of the internal chamber 206 within the upper chamber 202 of the digital secure container 102. The internal chamber 206 houses all the electronics needed for providing onboard security to the digital secure container 102 and for connecting and communicating to the devices and communication network outside of the digital secure container 102.
To activate or deactivate most electronics in the digital secure container 102 at the start of service or end of service, a power switch (not shown) is used. This power switch is accessible only from the inside of the digital secure container 102 so that switching ON and OFF canf happen -w'rien both the first level lock 212 and the smart lock 214 is open. When the digital secure container 102 is in service i.e. in transit, as the switch is inside the container, mala fide intentions of disabling the electronic circuits by starving it of power is obviated. In addition to saving power, a user is forced to switch off the power at end of service by way of a continuous prompting alarm till the action is completed. The power switch may be of a key type of power switch where a mechanical key is required to activate the ON / OFF state. This enhances security by preventing access without a mechanical key or casual / inadvertent operation on the power switch
The internal chamber 206 includes an onboard controlling/processing module 302 that connects to the input module 304 for capturing data and signals. The data thus captured is processed and the results are communicated to the devices external to the digital secure container 102 (for e.g. handheld device 104a, portable device 104b, remote monitoring subsystem 108 etc.) The controlling/processing module 302 is of embedded type that is connected to all the electronic modules in the digital secure container 102 (e.g. input module, output module, communication interfaces, power module). The controlling/processing module 302 includes a high range processor, RAM, non volatile fixed and removable memory (SD card, USB pen), peripherals ports like UART, USB, Ethernet, WiFi, display and keypad support, large number of input output pins. ' The* controlling/processing module 302 also includes an in-built powerful operating system and supports an advanced FAT file management systems so that data can be saved into popular file systems like word, text pad and viewed in user friendly formats. The controlling/processing module 302 supports advanced display systems that run on a parallel bus so that both graphics and video can be displayed with high quality. The controlling/processing module 302 further includes an onboard audio capability with built in codecs for audio and video processing and an in-built real time clock (RTC) with dedicated power source. In an embodiment, the input module 304 includes a camera module which can capture and display both still images and video images with sound. As discussed supra, one or more sensors (e.g. camera sensors) are mounted in single or several places in the digital secure container 102 and may be either covert or overt to the user. The single or multiple camera sensors may be connected through a logic gate (for e.g. OR/ AND NOR gate) so that data from a single or multiple sensors are coupled to derive a unit of logic. Further/the controlling/processing module 302 can address each of the camera sensors individually for activation and deactivation. The output from the camera sensors are passed to the controlling/processing module 302 as a trigger for logic action or for storage into the non-volatile memory of the controlling/processing module 302. In an embodiment, the camera sensors can operate in low light conditions with auto focus or in dark light conditions under an infrared (IR) light operation. In some of the embodiments, the data from the sensors can be displayed on to a display unit through the controlling/processing module 302 either as a still image or as a video image.
The input module 304 also includes a voice and audio capture module (not shown) which may be based on one or more highly sensitive microphones embedded in single or multiple locations within the digital secure container 102 which may be either overt or covert to a user. The microphones and complementing circuits can capture, amplify noise, filter the sounds, which may be human or any sound in the vicinity of the digital secure container 102 and pass the audio data to the logic unit of the controlling/processing module 302. A voice synthesizer circuit may be optionally coupled to compare the input voice and a stored voice sample to pass a return value to the controlling/processing module 302 for further logical actions. As in the case of camera sensors, the controlling/processing module 302 can uniquely address each of the audio sensors for activation and • /deactivation. The logic unit in the controlling/processing module 302, after examining all the audio signals can elect to record and save data to a non- volatile memory into multiple sub folders or just elect to save the data with the best voice quality. The controlling/processing module 302 can also establish a two-way real time audio communication by streaming the audio data to the remote monitoring subsystem 108.
Such a capability may be significant in a security event where the container is stolen and there is a need to collect, monitor the environment voice and sounds that could provide clues or evidence for investigation. The two way audio communication also enables the remote monitoring subsystem 108 to warn/initiate a remote dialogue with the unauthorized holder of the digital secure container 102. In regular cases, an operator at the remote monitoring subsystem 108 can talk remotely to the authorized ground operator for technical help, violation alerts etc.
In yet another implementation,- human voice can be used as a switch for detection of a human in the vicinity of the digital secure container 102 and can be used as a decision input to trigger one or more programmed actions on the digitally secure container 102. In certain security implementations, human voice can become a layer of identification of the user of the digitally secure container 102 or can be merely an audit log for evidence. In yet another embodiment, the human voice can become a layer of password to gain access or to initiate hands free commands for the digital secure container 102. In yet another implementation, repeated and incoherent high decibel sounds could be used as an input for construing that the walls of the digital secure container have been potentially breached into by use of mechanical impact. The input module 304 further includes other sensor modules such as, vibration sensor, flame sensor, temperature, proximity sensor, light sensor, load and object sensor, tilt sensor, gyro sensor, 3 -axis motion sensor, mechanical contact switch, magnetic contact switch, and wireless jamming sensor, etc.
Person skilled in the art would appreciate that signals from such sensor modules can be detected and measured through the input pins of a micro controller or an embedded computing device like the controlling/processing module 302. The sensors may be of analog type or digital type. In case of analog sensors, an analog to digital convertor (ADC) may be used to convert analog signals to digital signals for processing by the controlling/processing module 302 that work on digital principles to recognize and record values. One or more of the sensors that provide critical inputs can be wired as an array of multiple sensors arid passed through a logical gate (for e.g. NOR gate (AND/OR) or XOR gate) so that in the event of any of the sensors failing, false alarms are obviated.
In an embodiment, the input module 304 includes vibration sensors embedded at suitable positions in the wall of the digital secure container 102 that detect any vibrations. The controlling/processing 302 detects vibration signals and in case of levels beyond predetermined thresholds, construes the vibration signal as an alert that the walls of the digital secure container 102 could be in a state of intrusion. Such an alert may also arise when the digital secure container 102 is being mal- handled by dropping or due to a shock resulting from rough handling either in the secure logistic vehicle or by a user carrying the digital secure container 102. Vibration sensors may find particular applications in cases where the digital secure container 102 is utilized for transporting high value goods or fragile goods or goods that can malfunction due to sudden shock in transport.
Examples of such goods include electronic goods, hard disks, etc. By using a vibration sensor, a continuous audit and record of the state of the digital secure container 102 can be performed to determine if the digital secure was subjected to shocks during a static state or when in transport. The audit results can be recorded and saved in to the non- volatile memory of the controlling/processing module 302 and simultaneously conveyed to the, remote monitoring subsystem 108. Further, such information can be conveyed to the remote monitoring subsystem 108 in real time as an alert to evaluate if there is an attempted security breach or a case of inadvertent mal-handling. In some embodiments, such an input can become a part of the transport log report and can be data for breakage claims or insurance claims. In case of a security breach, losses can be minimized by quick detection and swift remedial measures. In one of the embodiments, the input module 304 includes flame sensors that work on the principle of excessive and intensive heat generated from flames. By embedding such sensors in the digital secure container 102, an attempt to breach the walls of the container by use of flame torches can be detected; corresponding alerts can be saved and transmitted to the remote monitoring subsystem 108 as a security breach event. Further, if there is an1 occurrence of fire by natural causes like during transport of chemically reactive substances' or unnatural causes, the fire can be immediately detected and an alert can be saved and transmitted as a log of date, time, and location to the remote monitoring subsystem 108.
While moving goods through use of several digital secure container(s) 102 within a secure logistic vehicle, in the event of an external fire it is likely that some of the containers may be damaged due to fire and some may not be. In such cases, the flame sensor in each of the digital secure container 102 provides the isolation data, which can be useful for finer claim processing in place of aggregated damage claims. Further, instant detection of such occurrence of fire can be used to take quick remedial actions like reporting to nearest fire brigade. Smoke sensors could optionally replace flame sensors or both may be implemented together. The input module 304 may also include other sensors such as temperature sensor that monitors the internal temperature of the digital secure container 102 and is akin to a thermometer. Certain valuable goods may require that the temperature be maintained within a range for goods such as, certain medicines, vaccines, and test samples, etc. The digital secure container 102 through the digital thermometer, monitors the inside temperature continually which is saved and transmitted to the remote monitoring subsystem 108. In the event that predetermined temperature bands are exceeded, alert for remedial action can be generated. In case the valuable goods are spoilt or damaged, if temperature was a cause, it can be isolated for claims. Other sensors may be implemented such as proximity sensor that works on an infrared (IR) transmission principle. Humans emit infrared radiations and when humans move, the IR levels vary, which is used by the sensor to detect human proximity and motion. Modern day sensors available in the market have an inbuilt mechanism for suppressing false alarms by way of motions from animals etc. Such sensors that receive signals from the exterior of the digital secure container 102, detect the presence of humans in the near vicinity like a security guard or somebody walking up to operate on the digital security container 102. Signals thus captured from the inside get stored and transmitted to the remote monitoring subsystem 108, when the lid of upper chamber/lower chamber of the digital secure container 102 is opened or when 216 is opened.
Such a signal is used as an alert and a confirmation for the event that the lid was opened by a human and not accidental for any reasons. The digital secure container 102 also uses this as an input signal to activate voice guidance systems or to issue warning and alarms if sόmiehow, the slid was opened in violation of procedures or the lid was intruded upon irregularly. The event is captured, saved locally, and transmitted to the remote monitoring subsystem 108.
In an implementation, light sensors may be embedded in the digital secure container 102 to detect the presence of light from a dark state to an active state or vice versa. The digital secure container 102 when closed and locked is dark in the inside. If the container walls are breached, some light is expected to get inside the chamber which acts as a security alert. Additionally, the same principle can be used as a way to know if the lid has been opened and this complements the proximity sensor as a lid opening detection signal. In regular cases, such a signal can be coupled to the voice guidance system and in irregular cases the signal could be coupled to the warning and alert system. In case, an attempt is made to intrude into the digital secure container 102 in complete darkness with dark vision gadgets etc, the controlling/processing module performs a correlation between clock time, user operation time, and light sensor state to detect an irregularity and raise an alarm.
Similarly, load and object sensor may be implemented in the digital secure container 102 to detect the presence of objects and can work on optical reflecting principle or pressures created from load. The walls of the digital secure container 102 use this to detect presence of objects within it. An in-service digital secure container can tell if it is actually carrying any load or if the valuable goods have been fully unloaded. There may be cases where all the locking and operating procedures may be complied with, but no goods are actually loaded and a false claim is made of the shipment. Similarly, in case of unloading, procedure for complete unloading may not be complied with and a few pieces of the dispersed valuables like cash, bullion may be left behind with mala fide intention. Therefore, the digital secure container 102 has the ability to detect presence of load and complete unload from the container along with date, time and location details which is saved locally and also transmitted to the remote monitoring subsystem. In some of the embodiments, tilt sensor or gyro sensor or 3 -axis accelerometer may be placed in the digital secure container 102 to detect if the container is moved in any of the* X, Y, arid1 Z axes. Such sensors may also help in determining whether the digital secure container 102 is in a state of rest or motion. The digital secure container 102 therefore has the ability to detect, save and transmit an alert or log if the goods have been subjected to movement in any of the 3 axes of movement. The sensors can also determine a measure of care or shock along the 3- axes that it was subject to during transport and is valuable for goods that can suffer damage due to sudden movement in any of the three axes. Additionally, the state of rest or motion can be used as an input logic for locking/unlocking operations among other logic conditions. For example, the lock being operated upon in a state of motion may correspond to irregular security condition. In another implementation, contact switches either of the mechanical type or of the magnetic type or both may be used to detect contact actions between any two surfaces. The switches in single units or multiple units may be interfaced through a logic NOR or XOR gate to detect if lids of parting chambers 202 & 204 are fully and properly closed. Such sensors can detect if the lid has been opened which can be a trigger for voice guidance systems or illumination systems under validated openings and an alarm can be raised in case of security breaches. The entire log of opening, closing can be saved and transmitted. If the mating planes of the upper lid and lower lid of the two chambers, 202 and 204 are not perfect it can be detected as a sign of mechanical fault or improper fastening. Hence, the digital secure container 102 knows if the lids are fastened properly and when it was opened and & or closed with full log.
Depending on the intended level of security, certain other sensors may also be used. It may be appreciated by a person skilled in the art that such integration of addition sensors is achieved through modular design of the hardware and software where sensors can be added or taken out as required through a simple configuration in the onboard computer (e.g. controlling/processing module 302) to consider their addition or deletion in the logic processing.
The input module 304 also includes biometric capture module (not shown) to control access to the digital secure container 102 which takes inputs by way of a human fingerprint to images of the IRIS of the eye or merely a live photo of the person. The data is saved locally and transmitted to the remote monitoring subsystem 108. Subsequently, the onboard computer in the container (controlling/processing module 302) or the remote monitoring subsystem 108 runs a matching program to compare the input received with that stored previously in the database (as approved data identity). The comparison results in a match/no match message which is sent to the controlling/processing module 302 to allow or deny access to the person trying to open the digital secure container 102. Hence, biometric capture module allows access to pre-approved users only, detects who among them actually operated upon the box and the details of the last user, time, location of operation upon the digital secure container 102. The input module 304 may also include a keypad which is an access control device that allows users to present what they know by way of PINS or passwords etc. Such an access control device can be used to select a menu of programs that are allowed on the digital secure container 102 for a particular user. Typically, such inputs may be required during start of service or end of service or during load and unload at select points in the route. Keeping this in view, in some embodiments, the keypad may not be fixed to the container but can be plugged by an external port at locations where it needs to be used. This raises the level of security, as the access tool to the box is available only at start and end points and not during the transit. Additionally, certain keys or keywords in the keypad can be reserved for a silent emergency alert, say when the container is hijacked and the human operator is forced to open the container under threat based oh access available to the person. In such a case, the reserved key words when used along with the regular PINS or passwords inform the remote monitoring subsystem 108 of the emergency situation for appropriate remedial action. The digital secure container 102 has an ability to allow/activate use of this access control device at allowed location, date, and time. Input from a GPS receiver (optionally mounted on the secure logistic vehicle or the digital secure container) and the onboard clock is matched to arrive at a logical decision to allow access. It is possible to freeze the use of the keypad from the remote server if a security breach is perceived and hence even if the passwords are known, input mechanism is denied.
In an embodiment, radio frequency tags can be used for identification of the digital secure container 102. Certain constant data associated with the digital secure container 102 (e.g. identification number) are stored in the RF chip embedded into the box. Using an RF reader in the handheld 'device 104a or the portable device 104b, the digital secure container 102 can be digitally identified for its unique number. Alternatively, other static details of the digital secure container 102 can be fed into the RF chip through a wireless mode obviating the need for any human punching of container identification details which is prone to error. Additionally, a passive tag with long range identification acts as a "last resort to track and trace" of container in case the container is stolen and all the electronics is powered off or disabled. The input module 3Q4 may also include magnetic reader module. Such a module can be placed in the user access chamber 216 or in the handheld device 104a and can be activated using a menu function. When a user carries his identity with such a magnetic strip, it allows for digital validation of the user based on what he is carrying. Additionally such magnetic readers can be used to scan for RF tags and uniquely identify containers digitally. When unit goods are marked with magnetic tags, such a reader can scan these tags from a distance and take stock of the unit goods as they are being loaded or unloaded into the container in a natural way. Further, in combination with a software program, an automated packing list can be prepared that can be saved and shared locally or transmitted to the remote monitoring subsystem 108 for distributed sharing.
The input module 304- rnay alsbvl include bar code readers that can be optionally installed either in the user access chamber 216 or in the handheld device 104a. Before taking in or taking out any unit of goods from the digital secure container 102, the barcode labels pasted on the unit good is scanned through this reader. The reader captures the goods that gets into the container and such data can be passed to the controlling/processing module 302 for creating and saving a packing list that can be updated whenever an load/unload operation takes place.
The internal chamber 206 includes an output module 306 to communicate with a user of the digital secure container 102. The output module 306 would include all such devices that would be required for outputting data to a user of the digital secure container 102.
In an embodiment, the output module 306 includes a speaker unit, which can include one or more speakers located within the container for best user audibility. A voice guidance system and remote %'oice' communication can be implemented by using the speaker to output amplified sound to the user of the digital secure container 102. Various alarms and sounds can be generated using the speakers to attract attention in the event of a security breach.
The output module 306 includes an alarm system which may be a two layered system. The primary alarm may be milder in nature and warns for corrective actions in case of any violation of operating procedures. The warning could be in the form of a mild beeping sound or flashing of lights in the indicator panel (in the user access chamber 216). Alternatively, the primary alarm could be a recorded voice emanating from the voice guidance system. The secondary alarm could be more intensive in nature and can be triggered when a serious security breach has occurred. The security breach may correspond to an event like, confirmation of an attempt to break into the digital secure container or an attempt to carry the whole container away irregularly. The secondary alarms could be in the form of very high decibel siren sounds, voice guidance units that sound distress level recordings, and in extreme forms as a last resort based on multiple judgments. In some embodiments, a smoke trace dye or trace stain liquids may be released from the inner chamber 208 in conjunctions with the generation of the secondary alarm. Alarms may also include notifications sent to predefined parties by way of SMS / alert through GPRS, email, or a pre-recorded automatic voice call.
The output module 306' includes 'a 1 voice guidance unit configured to play pre- recorded voice and is used to guide a user (of the digital secure container 102) interactively on the sequence of operations. In case of errors, the voice guidance unit suggests corrective actions. The voice guidance unit provides a better user experience and noise alerts the environment to the operation on the container in a natural way forming a security feature. The voice guidance unit can suppress the sound in exception cases but such an exception is logged as an event and notified to the remote monitoring subsystem 108. In an embodiment, the volume of the voice guidance unit can be adjusted down to only a certain minimum level but total audibility cannot be suppressed by absolute minimization of volume. Every volume adjustment can be tracked as an event and logged.
The output module 306 includes a light indicator panel that is illuminated using display lights from bulbs or LEDs and is typically cased. The light indicator panel serves the purpose of providing' status' knd warnings. For example, if the signal strength is low or battery level is low or when a light alarm by way of a strobe light needs to be raised, light indicator panel can be used.
The output module 306 includes a display unit of requisite specification that can handle text, graphics, and video. The display unit can be touch enabled i.e. a stylus could be used to select and navigate user menus when displayed on the display unit. Display unit is controlled by the controlling/processing module 302 that decides when and what is to be displayed.
The output module 306 may also include an Illumination unit that illuminates the chambers 208 and 216 respectively and consists of bulbs or LEDs that output a certain level of light to provide for visibility within the chambers and to provide ambient light for sensors to capture pictures. Operating the digital secure container 102 under well-lighted condition is a security feature, absence of the same as captured by light sensors is considered an irregular security state which may be recorded, and an alert can be raised. The inner chamber 206 further includes a data communication interface 308 that includes both wired ports and wireless ports.
The controlling/processing module 302 supports wired connection between the digital secure container 102 and external peripherals through data ports that ϋ confirm to universal industry standards like, UART, USB, Ethernet port, parallel port, etc. Hence, the digital secure container \ 02 has an interface port to connect to external peripherals like devices' that use UART port or USB devices etc. Through the wired data communication interface, external peripherals and the controlling/processing module 302 can exchange communication with the help of software drivers and programs. Such ports can be used to exchange files, images, video, or any other data stored in the non-volatile memory of the controlling/processing module 302 to external devices through USB storage or to other computers directly through the Ethernet port.
The communication interface 308 also includes wireless data interface that enables wireless communication and exchange of data between the digital secure container 102 and the external devices or networks. The interface can be a set of suitable antennas that transmit or receive data from wireless devices cased in the digital secure container 102. Several wireless devices are connected to the controlling/processing module 302 -as modules and directly controlled by the controlling/processing module 302. The software logic of the controlling/processing module 302 drives which of the modules (amongst input module 304, output module 306, power module 310) would be used based on features or security requirements from of each of the modules. In some embodiments, infrared (IR)1 devices can be used to exchange data in cases where one needs to cover only short range distances and hence are applicable to proximity based security requirements. For example, the handheld device 104a or the portable device 104b can perform a remote control action on the digital secure container 102.
In certain implementations, radio frequency (RF) devices can be used to exchange data between the digital secure container 102 and the external devices. Such devices use radio waves of varying frequencies and can be microwave, UHF, VHF etc. based on the frequencies of operation. For civilian use, unlicensed radio frequency bands like ISM band can be utilized. For customers like regulatory authorities or military who hold licensed frequency bands, by suitable choice of the hardware, such licensed frequency bands can be used for exclusive communication. The handheld device 104a may use RF as a medium to realize the handcuff function. RF transceivers are embedded in both the ' digital secure container 102 and the handheld device 104a and the transmission power/signal range of such transceivers can be set. The signal strength is constantly polled and monitored by both transceivers and if there is a break due to distance exceeding a set range; it becomes an event to trigger further logical action. RF transceivers are also used to exchange data such as GPS data or stream file data between RF transceivers. The communication interface 308 also includes a GPS/GPRS modem that enables exchange of voice and data over very long distances using cellular based telecom networks (e.g. 3G or 4G). Modern day cellular networks have coverage that can span across a country or most countries of the globe through extended arrangements. A subscriber module is embedded in the modem which when powered is in constant touch with the nearest cellular tower. Such towers then pass or request information from any other cell enabling cell-based wide network communication. Such networks may be classified as 2G, 3Θ,-4G, etc. based on the sophistication they provide. For example, 3 G, 4G enables high bandwidth interactive voice, video and TV. In an embodiment, the modem in the digital secure container 102 can initiate and receive voice calls, transmit/receive data in the form of text, pictures, voice, video etc. The controlling/processing module 302 controls the modem as a slave and performs wide coverage communication between the remote monitoring subsystem 108 and the digital secure container '! 02 sorjbetween the digital secure container 102 and any mobile telephone. Additionally, using the principles of cellular technology, location of the nearest cell can be used for tracking purposes as to where the container is located with respect to the nearest cellular tower. Such a Cell ID based tracking gives a reasonable level of accuracy of location for monitoring purposes. The digital secure container 102 uses cell based ID location tracking in addition to the primary source of tracking which is the GPS based tracking.
The GPS receivers (in the digital secure container 102) receive information from the sky-based satellites and provide geo-coordinates and other information like velocity, altitude of the receiver location. Such receivers require view to the sky to receive the information. The digital secure container 102 has a GPS receiver embedded into it and data received by it is saved and transmitted to the remote monitoring subsystem 108. GPS is a key primary engine for tracking the location of the digital secure container 102. rSinc'e,direbt:view to the sky or signals from sky may not always be possible as in cases where the secure container is within a vehicle. In such a case, a custom built device called GPS sprayer is implemented where a dedicated GPS receiver that has best view to the sky or best GPS signal gathers the information and broadcasts (forwards) it to the digital secure container 102 in the vicinity using the RF wireless medium. The GPS data from the custom built GPS sprayer can only be received by designated RF modules in the digital secure container 102 and is effected by special logic in the firmware of the RF transcievers. Additionally, it is possible to remotely and randomly set from the remote monitoring subsystem 108, a matching authentication code on the basis of which the RF transmitter and RF receiver can establish communication. Such a security feature obviates the possibility of unauthorized tapping, intruding, modifying, or taking control of the RF communication by an unauthorized party.
In addition, wireless commuiiicatiWistandards like, Bluetooth, Wifi, Wimax, and Zigbee may be used to exchange data and voice. Standardized hardware modules corresponding to such standards can be connected to the controlling/processing module 302 and be programmed to exchange medium range data, images, and voice using wireless communication. The digital secure container 102 may include all or some of these devices to transfer files, images and to establish hands-free voice communication between the digitals supervisor(s) (handheld device 104a and portable device 104b) and the digital secure container 102 as a local area wireless communicator. The digital secure container l'02f'has an onboard controlling/processing module 302 with an Internet Protocol (IP) address of its own; the container can be networked to other computers in the near range vicinity through a wireless LAN device connected to the onboard computer of the container. High speed exchange of data can happen in warehouses or offices near the warehouse so that information sharing can be done at high speeds and wirelessly.
The inner chamber also includes a power module 310 that is activated after the power switch is enabled. The digital secure container 102 includes a primary source of rechargeable battery power which is not accessible from outside the container. The power module 310 has an external power interface socket, which can be connected from outside the container to the primary power source. When external power through the interface socket is provided, it supplies power to the entire board and at the same time charges the primary battery power source. When the external power cord is removed by intent' or -aefcideήV the power source automatically switches to the primary battery source without any flicker of power through appropriate circuitry (for example, capacitors). This ensures that the electronic circuits do not get reset and restart due to the momentary power flicker.
The power module 310 also includes a failover power source, which is accessible from outside and is typically cased in a user access chamber 216. There could be multiple fail-over dedicated power sources considering criticality of security provided by the power drawing modules. Failover power is also provided and can be used when main power source goes down and switch over happens automatically. Since different electronics devices operate on different voltages, the power module 310 includes a power regulator that converts the main power source to the required level for each of the electronic devices. The power module 310 also has a monitoring circuit that can monitor the level of battery charge that is available and can send a signal if the battery level goes φelow aMefmed threshold. Such signal is sent to controlling/processing module 302 or to the light indicator panel for remedial actions. Fig.4 illustrates the mechanical aspects of the smart lock 214 (also referred to as "digital intelligent fastener" in the foregoing disclosure). The smart lock 214 or the digital intelligent fastener fastens from inside the digital secure container 102 and is not accessible to the user. The logic to allow fastening or unfastening by way of moving the locking elements is' primarily decided by the logic residing in the onboard controlling/processing module 302. The variables among others to make a decision to fasten or unfasten by moving the locking head may be a function of time, place, GPS location, state of the sensors, local operation allowed /frozen status, user password, and biometric verifications. It may be appreciated that one or more variables known in the art could be the basis for the fastening and unfastening of the smart lock 214.
As illustrated in fig.4, the smart lock 214 includes a drive controller 404 which gives the signal to a motor to move, stop movement, or number of steps to move along with the polarity or direction of movement. In some embodiments, the locking head could be moved through a solenoid, which when energized moves or releases the locking head. The drive controller 404 in such a case passes the lock/unlock signal to a relay (not shown) which then energizes or de-energize the solenoid causing the locking head to move in locking/unlocking direction. When the drive controller 404 gets a decision ^signal1? from the controlling/processing module 302, the drive controller 404 moves movable locking heads 406a and 406b to engage/disengage with lock mates 408a and 408b either to a lock position or unlock position. The smart lock 214 also includes two sensors 410a and 410b that can detect and confirm the location of the heads (406a and 406b) is in lock or unlock position. The smart lock 214 can confirm that the lock head (406a and 406b) has actually moved to lock or unlock position unlike most locks in the existing systems that assume that the head has moved based on the lock/unlock signal sent to the drive 402.
Additionally, the sensors 410a and 410b can be queried from the controlling/processing module 302 to get the lock/unlock status from a position state of the locking head. Such a query would return an input signal 412 which is sent to the controlling/processing module 302 for processing. Yet another feature of the smart lock is that it can be remotely controlled from the remote monitoring subsystem 108 or from the handheld devicefyQ4&*in?<Ceftain embodiments. One such case could be when regulatory authorities need to inspect the secure logistics vehicle and the digital secure container 102. During such inspections, a voice based dialogue to the remote monitoring subsystem 108 can be established between the inspecting party and a remote operator, which is recorded along with picture and video of the inspection proceedings. Such recordings can be saved and transmitted to the remote monitoring subsystem 108 which can be usecflas feVideifce^of exceptional opening due to demands of law.
The dialogue with the remote operator initiates from the voice communication facility in the digital secure container 102 or the handheld device 104a that raises the request and reason for such inspections. The genuineness of the request is verified based on inputs from the ground operator of the digital secure container 102, confirmation, or permission from owner of the goods and authority vested with the server room manager. After verification from the remote monitoring subsystem 108, a decision signal 414 is sent to the controlling/processing module 302 or to the handheld device 104a which can enable temporary unfastening and fastening of the smart lock 214. Hence, exception handling for temporary unfastening during transit of the digital secure container 102 is in-built mainly for regulatory purposes and such an operation is primarily controlled by a remote server at the remote monitoring subsystem 108 with ^fMl^capfure "and record of events occurring during such exception handling. Fig. 5 illustrates an exemplary secure logistics infrastructure in accordance with an embodiment. The secure logistics infrastructure includes three distinct layers involved in the integrated and seamless digital security ecosystem. The objective of such an infrastructure is to move valuable goods between remote locations (from a source warehouse to destination warehouse) under a controlled and well monitored digital security system.
As shown in the fig.5, the secure logistics infrastructure 500 includes a transport layer 502 where multitudes of valuable goods are moved randomly and in distributed clusters. The transport layer 502 provides infrastructure for transporting a digital secure container from a source warehouse to a destination warehouse. In an embodiment, the transport layer 502 for one cluster includes the digital secure container 102, the handheld device^l'04aj' M$ a1 portable device 104b mountable in the secure logistic vehicle. In some embodiments, the handheld device 104a and the portable device 104b can be merged for operational ease through docking mechanisms. Each of the digital secure containers, handheld devices, and portable devices have a unique identification mechanism (tag), and hence can be uniquely located, identified, tracked and interacted upon with from the remote monitoring subsystem 108. Further, each of these devices can be in a state of in-service or not in-service. When in the in-service state, the digital secure container 102 and supervisor devices (104a and 104b) are digitally handcuffed i.e. both the1! handcuffed devices have to move together and be located within a specified proximity range that can be flexibly set. One of the intended purposes of the digital handcuff is to ensure that the guard or human carrier responsible for the security of the containers is in close proximity and closely watches the containers assigned to him. In case the digital handcuff and secure container exceed the specified proximity range, this is automatically detected by both the handheld device 104a and the digital secure container 102 as an event and notified to the remote monitoring subsystem 108. The handheld also gets an alarm by way of a beep etc to take remedial action by the human carrier. In a situation where the digital secure container is carried away with an attempt of robbery, such action is automatically conveyed to the human carrier on his handheld and to the remote monitor station. Based on the human carrier judgement, through the handheld a first level or second level alarm mentioned earlier can be raised. In addition, the server can also independently do the -ϊέm'ote adtion mentioned earlier. The supervisor devices (104a and 104b) monitor the carriage of the digital containers through digital means and communicate the monitoring details in real time to the remote monitoring subsystem 108. The digital secure containers can independently communicate information about its location and security status to the server at the remote monitoring subsystem 108 in a continual manner. Hence, location reporting and security status reporting is continual and from two sources (container and digital supervisors) in the ground besides information from the human operator of the container. There could be fleets of containers in the order of several thousands spread across geographies that can be monitored at the remote monitoring subsystem 108. The secure logistics infrastructure 500 further includes a communication network layer 504 a communication network layer that provides infrastructure for two way communication between the digital secure container 102, the handheld device 104a, the portable device 104b, and the remote monitoring subsystem 108. The communication network layer may include all present day public and private communication networks like, Wide Area Network (WAN), Virtual Private Network (VPN), telecom infrastructure, radio wave communication infrastructures for high frequencies like UHF or VHF, satellite based GPS signals or satellite based communications, internet, WI-FI, Wi-Max, 3G, 4G, etc. It may be appreciated that future communication technologies can be easily integrated into the communication network layer 502 without departing from the scope of the ongoing description.
The secure logistics infrastructure 500 also includes a remote monitoring layer 506 to provide infrastructure for remotely tracking, monitoring, and operating the digital secure container 102. The remote monitoring layer 506 includes the remote monitoring subsystem 108 which is the aggregation point for all data (data, images, sound) emerging from the clusters of distributed devices in field service. The remote monitoring layer 506 includes sophisticated programs that track all the operational devices in real time. In the event of any exceptions or emergencies, the remote monitoring layer 506 is designed tp«react swiftly to take remedial measures in addressing the security situation of different levels. The remote monitoring subsystem 108 can zoom into a single fleet or a single container and monitor it closely or perform actions on it like freezing operations to raising alarms at the local level to the nearby regulatory authorities.
It will be appreciated that the teachings of the present invention can be implemented as a combination of hardware and software. The software is preferably implemented as an application program comprising a set of program instructions tangibly embodied in a computer readable medium. The application program is capable of being read and executed by hardware such as a computer or processor of suitable architecture. Similarly, it will be appreciated by those skilled in the art that any examples, flowcharts, functional block diagrams and the like represent various exemplary functions, which may be substantially embodied in a computer readable medium executable by a computer, or pξojc&ssor, whether or not such computer or processor is explicitly shown. The processor can be a Digital Signal Processor (DSP) or any other processor used conventionally that is capable of executing the application program or data stored on the computer-readable medium.
The example computer-readable medium can be, but is not limited to, (Random Access Memory) RAM, (Read Only Memory) ROM, (Compact Disk) CD or any magnetic or optical storage disk capable of carrying application program executable by a machine of suitable architecture. It is to be appreciated that computer readable media also includes any form of wired or wireless transmission. Further, in another implementation, the method in accordance with the present invention can be incorporated on a hardware medium using ASIC or FPGA technologies.
It is to be appreciated that the subject matter of the claims are not limited to the various examples an language used to recite the principle of the invention, and variants can be contemplated for implementing the claims without deviating from the scope. Rather, the embodiments of the invention encompass both structural and functional equivalents thereof.
While certain present preferred embodiments of the invention and certain present preferred methods of practicing the same have been illustrated and described herein, it is to be distinctly understood that the invention is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.

Claims

I claim:
1. A secure logistic system (100) comprising: a digital secure container (102) for carrying one or more objects; a handheld device (104a) configured to digitally pair with the digital secure container and implement a digital handcuff on the digital secure container while the digital secure container is transported from a source warehouse to a secure logistic vehicle and from the secure logistic vehicle to a destination warehouse; a portable device (104b), mountable at the secure logistic vehicle configured to receive and transfer the digital handcuff from/to the handheld device and to digitally pair with the digital secure container while the secure logistic vehicle is in-transit between the source warehouse and the destination warehouse; and a remote monitoring subsystem (108) configured to communicate with the digital secure container, the handheld device, and the portable device and to establish a centralized monitoring of the secure logistic system between the source warehouse and the destination warehouse.
2. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to: electronically count and record data of the unit object; and detect the presence and absence of the one or more objects in the digital secure container.
3. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to: upload unit object details to the remote monitoring subsystem; capture, save, and transmit audit logs, biometric evidence to the remote monitoring subsystem; and provide recorded voice guidance instruction and error advise to a user of the container.
4. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to uniquely identify the digital secure container (102) through a digital identity and uniquely identify a trip between the source warehouse and the destination warehouse.
5. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to perform a digital self-lock operation from inside after one or more checks and validations.
6. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to detect and report to the remote monitoring subsystem, the conditions under which the digital secure container is handled between the source warehouse and destination warehouse.
7. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to implement electronic and mechanical layers of security and to detect and report electronic and mechanical breach of security to the remote monitoring subsystem.
8. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to provide access to a user upon validation of the user based at least in part on one or more inputs provided by the user, the inputs comprising one or more of finger prints, retina scan, password, user image, magnetic identity cards and voice.
9. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to receive inputs from one or more sensors and transmit the inputs to the remote monitoring subsystem.
10. The secure logistic system as claimed in claim 1, wherein the digital secure container is configured to communicate , reports of rough handling of the digital secure container during loading/unloading operation.
11. The secure logistic system as claimed in claim 1 , wherein the digital secure container is configured to communicate location of the digital secure container using the cellular technology and global positioning system GPS to the remote monitoring subsystem. .
>
12. The secure logistic system as claimed in claim 1, wherein the handheld device is configured to scan the digital secure container and implement the digital handcuff to a set proximity range between the handheld device and the digital secure container.
13. The secure logistic system as claimed in claim 1, wherein the handheld device is configured to pass on the digital handcuff to the portable device when the digital secure container is loaded onto the secure logistics vehicle.
14. The secure logistic system as claimed in claim 1, wherein the portable device is configured to periodically and wirelessly scan one or more digital secure container loaded in the vehicle.
15. The secure logistic system as claimed in claim 1, wherein the remote monitoring subsystem is configured to continually track the movement of the digital secure container.
16. The secure logistic system as claimed in claim 1, wherein the remote monitoring subsystem is configured to remotely operate or freeze operations on the digital secure container.
17. The secure logistic system as in claim 1, wherein the one or more objects among others comprises bullions, currency, valuable documents, paintings, valuable goods, fragile goods, liquids, and precious stones.
18. A secure logistics infrastructure (500) comprising: a transport layer (502) providing infrastructure for transporting a digital secure container from a source warehouse to a destination warehouse, the transport layer comprising: the digital secure container, a hand held device and a portable device mountable in a secure logistic vehicle; a communication network layer (504) providing infrastructure for two way communication between the digital secure container, the handheld device, the portable device, and a remote monitoring subsystem; and a remote monitoring layer (506) providing infrastructure for remotely tracking, monitoring and operating the digital secure container.
PCT/IN2010/000138 2009-03-10 2010-03-10 Secure logistic system WO2010106552A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2743/CHE/2008 2009-03-10
IN2743CH2008 2009-03-10

Publications (2)

Publication Number Publication Date
WO2010106552A2 true WO2010106552A2 (en) 2010-09-23
WO2010106552A3 WO2010106552A3 (en) 2010-11-04

Family

ID=42561194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2010/000138 WO2010106552A2 (en) 2009-03-10 2010-03-10 Secure logistic system

Country Status (1)

Country Link
WO (1) WO2010106552A2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PT106146A (en) * 2012-02-10 2013-08-12 Pnp Tech S A MODULAR SAVING SYSTEM SAFE TO MARK WITH A LIQUID DOCUMENTS OF ECONOMIC VALUE
EP2861812A1 (en) * 2012-06-15 2015-04-22 Spinnaker International Limited Apparatus for transporting or storing valuable items
CN104839977A (en) * 2015-04-28 2015-08-19 百度在线网络技术(北京)有限公司 Intelligent bag and method for damaging articles in intelligent bag
EP2983144A1 (en) * 2014-08-08 2016-02-10 SP SicherheitsProdukte Vertriebs GmbH Safety system for a secure storage unit
GB2533122A (en) * 2014-12-10 2016-06-15 Edmund Todd Robert An adaptive access-control and surveillance system and method thereof
WO2016105645A1 (en) 2014-12-23 2016-06-30 Intel Corporation Systems and methods for monitoring consumption
WO2017139188A1 (en) * 2016-02-09 2017-08-17 Omnicell, Inc. Relay box
WO2018125986A1 (en) * 2016-12-29 2018-07-05 T-Mobile Usa, Inc. Secure data corridors
CN108320358A (en) * 2018-02-13 2018-07-24 浙江联盾科技有限公司 Intelligent monitoring and controlling device, luggage, detecting system, is made an inventory of goods in a warehouse and turnover method at lock
US10242263B1 (en) 2017-11-14 2019-03-26 Wells Fargo Bank, N.A. Virtual assistant of safe locker
US10432642B2 (en) 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors for data feeds
US10432641B2 (en) 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors
US10747895B2 (en) 2015-09-25 2020-08-18 T-Mobile Usa, Inc. Distribute big data security architecture
US10806676B2 (en) 2018-01-30 2020-10-20 Omnicell, Inc. Relay tray
US10970549B1 (en) 2017-11-14 2021-04-06 Wells Fargo Bank, N.A. Virtual assistant of safe locker

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001028080A (en) * 1999-07-15 2001-01-30 Fujitsu Ltd System and method for prevention against cash cassette theft
US6933832B1 (en) * 1999-11-09 2005-08-23 Noel Simms Automated receiving and delivery system and method
DE202005021091U1 (en) * 2005-01-21 2007-02-15 OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh Safety container for storing e.g. cash, has storage storing identification profile of container, where storage is connected with radio frequency identification transponder for monitoring profile that is combination of luggage and objects
US7602294B2 (en) * 2006-12-06 2009-10-13 Ncr Corporation Across the pavement wireless security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PT106146A (en) * 2012-02-10 2013-08-12 Pnp Tech S A MODULAR SAVING SYSTEM SAFE TO MARK WITH A LIQUID DOCUMENTS OF ECONOMIC VALUE
EP2861812A1 (en) * 2012-06-15 2015-04-22 Spinnaker International Limited Apparatus for transporting or storing valuable items
EP2983144A1 (en) * 2014-08-08 2016-02-10 SP SicherheitsProdukte Vertriebs GmbH Safety system for a secure storage unit
US10152746B2 (en) 2014-12-10 2018-12-11 Robert Edmund Todd Flexible security system for cash-in-transit
AU2021203853B2 (en) * 2014-12-10 2023-08-10 Robert Edmund Todd Flexible security system for cash-in-transit
GB2533122A (en) * 2014-12-10 2016-06-15 Edmund Todd Robert An adaptive access-control and surveillance system and method thereof
WO2016092302A1 (en) * 2014-12-10 2016-06-16 Robert Edmund Todd Flexible security system for cash-in-transit
WO2016105645A1 (en) 2014-12-23 2016-06-30 Intel Corporation Systems and methods for monitoring consumption
CN104839977A (en) * 2015-04-28 2015-08-19 百度在线网络技术(北京)有限公司 Intelligent bag and method for damaging articles in intelligent bag
US10432642B2 (en) 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors for data feeds
US10747895B2 (en) 2015-09-25 2020-08-18 T-Mobile Usa, Inc. Distribute big data security architecture
US10432641B2 (en) 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors
WO2017139188A1 (en) * 2016-02-09 2017-08-17 Omnicell, Inc. Relay box
CN108604283A (en) * 2016-02-09 2018-09-28 欧美尼公司 Relay box
CN108604283B (en) * 2016-02-09 2021-10-26 欧美尼公司 Relay box
JP2019511935A (en) * 2016-02-09 2019-05-09 オムニセル, インコーポレイテッド Relay box
US10186100B2 (en) 2016-02-09 2019-01-22 Omnicell, Inc. Relay box
KR20180111945A (en) * 2016-02-09 2018-10-11 옴니셀 인코포레이티드 Relay box
US10460546B2 (en) 2016-02-09 2019-10-29 Omnicell, Inc. Relay box
EP3414731A4 (en) * 2016-02-09 2019-11-13 Omnicell, Inc. Relay box
KR102103813B1 (en) * 2016-02-09 2020-04-23 옴니셀 인코포레이티드 Relay box
WO2018125986A1 (en) * 2016-12-29 2018-07-05 T-Mobile Usa, Inc. Secure data corridors
US10970548B1 (en) 2017-11-14 2021-04-06 Wells Fargo Bank, N.A. Virtual assistant of safe locker
US10970549B1 (en) 2017-11-14 2021-04-06 Wells Fargo Bank, N.A. Virtual assistant of safe locker
US10242263B1 (en) 2017-11-14 2019-03-26 Wells Fargo Bank, N.A. Virtual assistant of safe locker
US10806676B2 (en) 2018-01-30 2020-10-20 Omnicell, Inc. Relay tray
CN108320358A (en) * 2018-02-13 2018-07-24 浙江联盾科技有限公司 Intelligent monitoring and controlling device, luggage, detecting system, is made an inventory of goods in a warehouse and turnover method at lock

Also Published As

Publication number Publication date
WO2010106552A3 (en) 2010-11-04

Similar Documents

Publication Publication Date Title
WO2010106552A2 (en) Secure logistic system
US11645898B2 (en) Multi sensor detection, stall to stop, and lock disabling system
EP1932338B1 (en) A security system for mass transit and mass transportation
US8154397B2 (en) Locking mechanism, systems and methods for cargo container transport security
US20160286156A1 (en) System for managing information related to recordings from video/audio recording devices
US20110258930A1 (en) Shipping Container Seal Monitoring Device, System and Method
USRE43990E1 (en) Multi sensor detection, stall to stop and lock disabling system
US8421624B2 (en) Home security system
CN202904839U (en) Intelligent security system based on internet of things
KR200448955Y1 (en) Movable monitoring system
USRE43891E1 (en) Multi sensor detection, stall to stop and lock disabling system
US20210281886A1 (en) Wearable camera system for crime deterrence
WO2023236438A1 (en) Freight vehicle and on-board goods safety protection system
Kulp et al. A framework for sensing radio frequency spectrum attacks on medical delivery drones
US20200234555A1 (en) Emergency equipment receptacle and alert notification system
EP3984009B1 (en) Kit for monitoring and assistance to security guards and porters
JP2001014558A (en) Crime prevention device for cash transporting car
KR20080025232A (en) A danger alarm system and a danger alarm method thereby
WO2023236435A1 (en) Vehicle-carried hazardous chemical safety monitoring system
US20240078885A1 (en) Monitoring and advanced asset recovery devices and systems
CA2639417A1 (en) Security system device and method of monitoring using same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10726606

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10726606

Country of ref document: EP

Kind code of ref document: A2