WO2016093873A1 - Transportation security system and associated methods - Google Patents

Transportation security system and associated methods Download PDF

Info

Publication number
WO2016093873A1
WO2016093873A1 PCT/US2015/017136 US2015017136W WO2016093873A1 WO 2016093873 A1 WO2016093873 A1 WO 2016093873A1 US 2015017136 W US2015017136 W US 2015017136W WO 2016093873 A1 WO2016093873 A1 WO 2016093873A1
Authority
WO
WIPO (PCT)
Prior art keywords
container
sensor
csd
security device
door
Prior art date
Application number
PCT/US2015/017136
Other languages
French (fr)
Inventor
Kirill Mostov
Cyril RASTOL
Original Assignee
Kirsen Technologies, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/565,339 external-priority patent/US9262896B1/en
Application filed by Kirsen Technologies, Llc filed Critical Kirsen Technologies, Llc
Publication of WO2016093873A1 publication Critical patent/WO2016093873A1/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D90/00Component parts, details or accessories for large containers
    • B65D90/22Safety features
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2211/00Anti-theft means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2590/00Component parts, details or accessories for large containers
    • B65D2590/0083Computer or electronic system, e.g. GPS systems

Abstract

A security system and method for monitoring a cargo container being transported on a cargo transport vehicle. The security system includes a mounting device that removably couples a container security device (CSD) with the cargo container. Monitoring cargo inside the container and detecting vehicle intrusions and container damage, the CSD includes an anti-tamper sensor, a microcontroller, a communication device, and a plurality of accelerometers and strain gages. The microcontroller generates an alarm signal based on output data from the anti-tamper sensor and records container events. Embodiments of the mounting device are disclosed for mounting the device to a reefer container, a roll-up door, and externally to a plurality of cam lock shafts of a trailer. Improvements also included methods to optimize battery life of the CSD batteries. Communicating with a telecommunications network, a network operations center of the security system receives data from the CSD.

Description

TRANSPORTATION SECURITY SYSTEM AND ASSOCIATED METHODS
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part of co-pending United States Application Serial No. 14/565,339, filed on December 9, 2014, which is a
continuation of United States Application Serial No. 14/165,387, filed on January 27, 2014, now United States Patent No. 8,907,793, which is a divisional application of United States Application Serial No. 13/767,736, filed on February 14, 2013, now United States Patent No. 8,643,503, which is a continuation-in-part of United States Application Serial No. 13/444,690, filed on April 1 1 , 2012, now abandoned, which is a continuation application of United States Application Serial No. 13/195,637, filed on August 1 , 201 1 , now United States Patent No. 8,164,458, which is a continuation application of United States Application Serial No. 1 1 /343,560, filed on January 30, 2006, now United States Patent No. 7,990,270, which claims the benefit of United States Provisional Application Serial No. 60/648,260, filed on January 28, 2005. Priority to each of the prior applications is expressly claimed, and the disclosures of the applications are hereby incorporated herein by reference in their entireties and for all purposes.
BACKGROUND
[0002] Cargo loss due to theft has become a serious problem. Cargo is often misappropriated by shipping company employees, cargo handlers, and/or security personnel. Many insurance professionals believe that more than half of all major cargo thefts are planned in logistics departments, by employees at the shipper or manufacturer who are thought to be trustworthy. Certain authorities believe that gangs operating in many metropolitan areas are actually training some of their members in logistics so that they will be eligible for employment at desirable trucking, warehousing, or forwarding firms.
[0003] Because of the emergence of terrorist threats and activities, container security has become a national security issue. Terrorists are exploiting
transportation modalities such as air, rail, truck-trailer, vessel-barge and bus. As evidenced by recent attacks, terrorists are directing, or seeking to direct, mobile transportation assets into office buildings and/or other heavily populated areas.
[0004] Shipping containers may also be used by terrorists for the arms shipments. Of greatest concern is the shipment of nuclear, chemical, or biological materials that can be used to produce weapons of mass destruction. Some of these materials are relatively small in size and could be hidden in shipping containers without being detected by government authorities. If such weapons were to fall into the wrong hands, the results could be devastating.
[0005] With the above scenarios in mind, improving container security is desired. In one approach that is commonly in use, a locking mechanism or security seal is applied to container doors to seal the cargo within the container. However, anyone who possesses the key or the combination, whether authorized or not, may gain access to the interior of a container. Further, the locks can be easily picked or removed by other means. Thus, locking devices are a limited deterrent to thieves or terrorists.
[0006] Reefer containers are also susceptible to cargo theft and possible exploitation. However, many reefer doors do not have uniform dimensions as many dry containers do, and any container security device for reefer containers would need to be modified to fit the non-uniform dimensions of reefer containers. [0007] Containers/trailers with sliding or roll-up doors present challenges for mounting a security device to the roll-up door. Security for these containers/trailers is just as important as shipping containers. Trucking companies desire a tracking system for the container/trailer to provide the geographic location of the
container/trailer along with detecting intrusions.
[0008] The batteries used by the container security devices have a limited power supply and may need to be recharged during the duration of a shipment. Opening the containers to recharge the batteries creates a security risk.
[0009] In another approach an electronic seal ("e-seal") may be applied to a container. These e-seals are similar to traditional door seals and applied to the containers via the same, albeit weak, door hasp mechanism. These e-seals include an electronic device, such as a radio or radio reflective device that can transmit the e-seal's serial number and a signal if the e-seal is cut or broken after installation. However, the e-seal does not communicate with the interior or contents of the container and does not transmit information related to the interior or contents to other devices.
[0010] The e-seal typically employs either a low power radio transceiver or uses radio frequency backscatter techniques to convey information from an e-seal to a reader installed at, for example, a terminal gate. The radio frequency backscatter technique involves use of a relatively expensive, narrow band, high-power radio technology based on a combination of radar and radiobroadcast technologies. The radio frequency backscatter technology requires that a reader send a radio signal of relatively high transmitted power (e.g., 0.5-3.0 W) that is reflected or scattered back to the reader with modulated or encoded data from the e-seal. [0011] Furthermore, the e-seals are not effective at monitoring security of the container. For example, other methods of intrusion into the container may occur (e.g. breaching other parts of the container such as the side walls). Further, a biological agent may be implanted into the container through the container's standard air vents.
[0012] The secure mounting and timely activation of an electronic device, such as e-seal, may also prove problematic. This problem is partially addressed in United States Patent Application Publication No. US 2007/0075076 (Hewitt, et al.). Typically, a tracking and/or monitoring electronic device is attached to a bracket mounted on the container door. However, activation and deactivation of the electronic device often is voluntary and possibly untimely. For example, once a tracking and/or monitoring electronic device is coupled to a container door, it may not be activated until moments after the container door has been closed. The gap in time between the closing of the container door and the activating of the electronic device may be significant and may present a window of opportunity for potential abuse.
SUMMARY
[0013] The present disclosure relates to transportation a security system and associated method. Various devices are disclosed for mounting a container security device onto different types of containers (i.e., reefer container, sliding or roll-up door container, trailer doors). Also disclosed are methods to optimize a power
consumption of the power source for the container security device.
[0014] In accordance with an aspect disclosed herein, there is set forth a mounting device for coupling a container security device to a cargo container, comprising a first beam extending from a first bracket and having a distal end region with a magnetic sensor; and a second beam extending from a second bracket for receiving the distal end region and having a plurality of magnetic switches for detecting the magnetic sensor in the first beam and a position of the first beam relative to a locked position, wherein the first and second brackets include first and second bracket members for engaging a door of the cargo container.
[0015] In some embodiments, the mounting device further comprising an enclosure attached to the second beam for receiving the container security device.
[0016] In some embodiments of the mounting device, the first and second bracket members project toward a region between the first and second brackets.
[0017] In some embodiments of the mounting device, a secondary magnetic switch is disposed within the first beam and configured to detect removal of the first beam from the second beam.
[0018] In some embodiments of the mounting device, the first bracket and first member form a first preselected angle.
[0019] In some embodiments of the mounting device, the second bracket and the second member form a second preselected angle.
[0020] In some embodiments of the mounting device, the first preselected angle is equal to the second preselected angle.
[0021] In some embodiments of the mounting device, the first or second preselected angle is a right angle.
[0022] In some embodiments of the mounting device, the first beam forms a plurality of recesses for accommodating different respective configurations of a cam actuator side door lock of the cargo container. [0023] In some embodiments of the mounting device, the first beam further comprises a plurality of magnetic sensors for accommodating different respective configurations of a cam actuator side door lock of the cargo container.
[0024] In accordance with an aspect disclosed herein, there is set forth a mounting device for coupling a container security device to a sliding or roll-up door of a trailer, comprising a bracket that cooperates with a housing for receiving the container security device, including: a bolt extending from the bracket; an arm projecting from the bracket extending through a recess formed by the housing; and a plurality of magnetic switches for detecting a position of said arm relative to a locked position; and a strike mounted on the housing for receiving the bolt after the bolt passes through an opening formed in a trailer door latch on the sliding or roll-up door.
[0025] In some embodiments of the mounting device, the housing further comprises a location sensor for determining a current location of the container.
[0026] In accordance with an aspect disclosed herein, there is set forth a system for monitoring at least one cargo container, comprising a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container; and a network operations center for receiving the container alert status and comprising a communications facility for communicating with at least one telecommunication network, wherein the system calculates an arrival time of the selected cargo container to minimize an expenditure of stored energy of said container security device.
[0027] In some embodiments of the system, the container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining a container alert status; a microcontroller for generating the container alert status from the output data; a communication device for transmitting at least one of the output data and the container alert status; and a global positioning sensor providing a current location of the selected cargo container.
[0028] In accordance with an aspect disclosed herein, there is set forth a method for monitoring at least one cargo container, comprising calculating an arrival time of a selected cargo container using a current geographic location and a predetermined destination, and optimizing power consumption of the container security device based on the arrival time to the destination.
[0029] In some embodiments, the method further comprises determining the current geographic location of the selected cargo container from a location sensor disposed on the selected cargo container.
[0030] In some embodiments, the method further comprises updating the arrival time is based on a current and forecasted weather estimate along a shipping route of the selected cargo container.
[0031] In some embodiments, the method further comprises updating the arrival time based on a plurality of historical statistics of previous travels along a shipping route of the selected cargo container.
[0032] In some embodiments, the method further comprises using an actual arrival time is used to update a prediction model for traveling time of the selected cargo container to a destination.
[0033] In some embodiments, the method further comprises programming an operational mode for the container security device and a plurality of sensors disposed within the selected cargo container based on the current geographic location of the container and an associated threat level for the current geographic location.
[0034] In accordance with an aspect disclosed herein, there is set forth a system for monitoring at least one cargo container, comprising a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container; a plurality of sensor units, each unit comprising an interconnected sensor, a battery and a communication unit for wireless communication with the container security device; and a network operations center for receiving the alert status from the container security device and comprising a communications facility for communicating with at least one
telecommunication network.
[0035] In some embodiments of the system, the container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining the container alert status; a microcontroller for generating the container alert status from the output data; and a communication device for transmitting at least one of the output data and the container alert status.
[0036] In some embodiments of the system, the sensor units include an integrated memory device for storing the output data.
[0037] In some embodiments of the system, the sensor units transmit the output data according to a schedule calculated by the container security device.
[0038] In accordance with an aspect disclosed herein, there is set forth a method of communicating between a container security device and a plurality of sensor units, comprising receiving sensor data from a sensor unit positioned on a container; storing the sensor data in the non-volatile memory of a memory unit contained within the sensor unit; and programming the sensor unit to exit a sleep mode and transmit the stored sensor data at a predetermined time.
[0039] In some embodiments, the method further comprises sending an instruction for adjusting a scanning frequency for the sensor unit.
[0040] In accordance with an aspect disclosed herein, there is set forth a system for monitoring at least one cargo container, the system comprising a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container a network operations center for receiving the container alert status of the container security device and comprising a communications facility for communicating with at least one telecommunication network, and a global positioning sensor providing current geographic location of the selected cargo container, wherein the system calculates a sensor use plan based on an arrival time of the selected cargo container and a power capacity characteristic of said container security device in order to minimize an expenditure of stored energy of said container security device.
[0041] In some embodiments of the system, the container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining the container alert status; a microcontroller for generating the container alert status from the output data; a reference device connected to a battery for the container security device configured to measure charging current and discharging current of the battery to determine the power capacity characteristic of the container security device; and a communication device for transmitting the capacity characteristic of the battery to the container security device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0042] FIG. 1 is an exemplary top-level block diagram illustrating an embodiment of a transportation security system.
[0043] FIG. 2 is a block diagram of the transportation security system depicted in FIG. 1 .
[0044] FIG. 3 is a block diagram of a Container Security Device (CSD).
[0045] FIG. 4 is a flowchart illustrating one exemplary method for detecting and registering a container intrusion signal.
[0046] FIG. 5 is a flowchart of method for detecting and registering a container intrusion signal by accelerometer.
[0047] FIG. 6 is a flowchart of method for detecting and registering a container intrusion signal by a light sensor.
[0048] FIG. 7 is a flowchart of method for detecting and registering a container intrusion signal by a strain gage.
[0049] FIG. 8 is a flowchart of method for detecting and registering a container intrusion signal by a smoke detector.
[0050] FIG. 9 is a flowchart of method for detecting and registering a container intrusion signal by a humidity sensor.
[0051] FIG. 10 is a flowchart of method for detecting and registering a container intrusion signal by a temperature sensor.
[0052] FIG. 1 1 is a flowchart of method for detecting and registering a container intrusion signal by a door-opening sensor. [0053] FIG. 12 is a flowchart of method for detecting and registering a container intrusion signal by a microphone.
[0054] FIG. 13 is a flowchart of method for detecting and registering a container intrusion signal by an Ultrasound Micropower Radar (UMPR).
[0055] FIG. 14 is a schematic diagram illustrating exemplary parameters for measuring a digital signature.
[0056] FIG. 15 shows a cross-sectional view of one exemplary Mass- tomograph in accordance with one embodiment.
[0057] FIG. 16 shows a cross-sectional view of the Mass-tomograph depicted in FIG. 15 when the container is steady.
[0058] FIG. 17 shows a cross-sectional view of the Mass-tomograph depicted in FIG. 15 when the container is moving.
[0059] FIG. 18 shows a block diagram of one exemplary bridge.
[0060] FIG. 19 shows a block diagram of the bridge, depicted in FIG. 18, when stationary.
[0061] FIG. 20 shows a block diagram of one exemplary portative bridge depicted in FIG. 18.
[0062] FIG. 21 shows a block diagram of one exemplary service bridge depicted in FIG. 18.
[0063] FIG. 22 shows a diagramed depiction of one exemplary Network Operations Center depicted in FIG. 1 .
[0064] FIG. 23 shows a diagramed depiction of one exemplary Network Operations Center server depicted in FIG. 22.
[0065] FIG. 24 shows a flowchart showing one exemplary method for monitoring container integrity. [0066] FIG. 25 shows a diagramed depiction of personal conditions monitoring system.
[0067] FIG. 26 is an exemplary detail drawing illustrating a perspective view of an embodiment of a cargo container, wherein a plurality of accelerometers and a plurality of strain gages are positioned on the cargo container for determining the moment of inertia of the cargo container.
[0068] FIG. 27 is an exemplary detail drawing illustrating a perspective view of a mounting device for attaching an electronic device to a cargo container, wherein a portion of a flat spring coupled to the mounting device is shown as extending through a square-shaped opening of the mounting device.
[0069] FIG. 28(a) is an exemplary detail drawing illustrating a top view of one embodiment of the mounting device of FIG. 27, wherein the mounting device is fixed on a first door of a cargo container when a second door of the cargo container is closed.
[0070] FIG. 28(b) is an exemplary detail drawing illustrating a top view of the embodiment of the mounting device of FIG. 28(a), wherein the mounting device is fixed on the first door of a cargo container when the second door of the cargo container is opened.
[0071] FIG. 29 is an exemplary detail drawing illustrating a front view of an alternate embodiment of the mounting device of FIG. 27 without mounting screws, wherein the mounting device is configured to be installed on a reefer door.
[0072] FIG. 30 is an exemplary detail drawing illustrating a front view of an alternative embodiment of the mounting device of FIG. 29 with mounting screws installed. [0073] FIG. 31 is an exemplary detail drawing illustrating a profile view of the mounting device of FIG. 29, wherein the mounting device is mounted on a selected reefer door.
[0074] FIG. 32 is an exemplary drawing illustrating a sliding or roll-up door and locking mechanism for the sliding or roll-up door in the unlocked position.
[0075] FIG. 33 is an exemplary drawing illustrating the sliding or roll-up door of
FIG. 32, wherein the trailer door is in the closed, locked position.
[0076] FIG. 34 is an exemplary drawing illustrating the sliding or roll-up door of
FIG. 32 with a sliding or roll-up door mounting device being installed on the locking mechanism.
[0077] FIG. 35 is another exemplary drawing illustrating the sliding or roll-up door of FIG. 32 with the sliding or roll-up door mounting device installed.
[0078] FIG. 36 is an exemplary detail drawing illustrating a top view of the mounting device of FIG. 35.
[0079] FIG. 37 is an exemplary detail drawing illustrating a top view of the mounting device of FIG. 35 illustrating the bolt in the locked position.
[0080] FIG. 38 is an exemplary detail drawing illustrating a side view of the mounting device of FIG. 35 illustrating the locking mechanism in the unlocked position.
[0081] FIG. 39 is an exemplary detail drawing illustrating a side view of a mounting device of FIG 35 illustrating the locking mechanism in the locked position.
[0082] FIG. 40 is an exemplary detail drawing illustrating a side view of the mounting device of FIG. 35 attached to the trailer door latch of a roll-up door.
[0083] FIG. 41 is an exemplary detail drawing illustrating a front view of the mounting device for installation on the shafts of a trailer door. [0084] FIG. 42 is an exemplary detail drawing illustrating a front view of the mounting device of FIG. 41 in the unlocked position.
[0085] FIG. 43 is an exemplary detail drawing illustrating a front view of the mounting device of FIG. 41 in the locked position, shown being installed on the shafts of a trailer door.
[0086] FIG. 44 is an exemplary detail drawing illustrating an overhead view of the mounting device of FIG. 41 , shown in the unlocked position being installed on the shafts of a trailer door.
[0087] FIG. 45 is another exemplary detail drawing illustrating an overhead view of the mounting device of FIG. 41 , shown in the locked position.
[0088] FIG. 46 depicts an exemplary flowchart showing an alternative embodiment of the method of operation of FIG. 4 for the system for monitoring container integrity.
[0089] FIG. 47 depicts a block diagram of an alternate embodiment of the system of FIG. 2 for operation of the container security device for conserving battery power.
[0090] It should be noted that the figures are not drawn to scale and that elements of similar structures or functions are generally represented by like reference numerals for illustrative purposes throughout the figures. It also should be noted that the figures are only intended to facilitate the description of the preferred embodiments. The figures do not illustrate every aspect of the described
embodiments and do not limit the scope of the present disclosure.
DETAILED DESCRIPTION
[0091] The present worldwide transportation security system provides a cost effective and reliable system and method for: (1 ) registering any event in connection with breach of any wall in a container; (2) detecting an opening, a closing, and/or a removal of the container's doors; (3) monitoring the condition of all seals and locks on the container; (4) monitoring cargo conditions inside the container; (5) detecting a human or an animal inside the container; (6) monitoring the container's movement; (7) detecting weapons of mass destruction in the container; (8) registration of movement inside the container; (9) measuring cargo weight inside the container; (10) registering environmental parameters inside the container (by way of example, the temperature, humidity, smoke, etc.); and/or (1 1 ) simultaneously providing means for tracking movements of the container for reasons of security and logistic efficiency. The system may generate false alarms with the probability equal to or better than a magnitude of 10 "5 to 10 "6.
[0092] The transportation security system provides an intermodal threat identification, detection, and notification transportation security system. The transportation security system may be applied to any conventional transportation modality, including, but not limited to, air, rail, truck, ship, barge and/or bus transport modes. The instant security system provides an inexpensive mechanism for monitoring each shipping container. Container tampering may be detected and reported rapidly. Thus, the present transportation security system could be a credible defense mechanism against terrorist attempts to smuggle weapons, weapons materials, and/or terrorist personnel by preventing unauthorized access to shipping containers. The threat of cargo theft or piracy is also mitigated. Thus, the present transportation security system provides governmental and law enforcement agencies with a mechanism for responding, in real-time, to cargo theft, piracy, and/or terrorist attacks. [0093] One aspect of the present application is directed toward a security system for monitoring at least one shipping container. The system includes a Container Security Device (CSD) configured to be removably coupled to at least one shipping container. The CSD can be configured to monitor cargo inside the container and detect intrusion of the container. The CSD includes at least one anti- tamper sensor, a microcontroller and a communication device. The microcontroller generates an alert status based on an output signal(s) from a selected sensor. In one embodiment, the output signal(s) are analyzed in accordance with an individual sensor processing procedure and then analyzed in accordance with an integrated sensor processing procedure. The integrated sensor processing procedure makes a decision of the container alert status based on the output status of the sensor. A Network Operations Center (NOC) includes a NOC communications facility configured to communicate with at least one telecommunication network. The NOC being configured to receive data from one or more CSDs. The NOC includes a data storage medium configured to store sensor data and contain an archive of container events.
[0094] In another aspect, the present application discloses a transportation security system for monitoring a plurality of shipping containers being transported by one or more cargo transport vehicles. Each of the plurality of cargo vehicles transports at least one shipping container. The system includes a CSD removably coupled to at least one freight shipping container for monitoring a cargo inside the container and detection of intrusion violations. The CSD includes at least one sensor. The CSD also includes a microcontroller and communication device. The system may also include a plurality of bridges. Each of the bridges may be disposed in one cargo transport vehicle. Each of the bridges may include a communication system being configured to communicate with the CSDs and a NOC. The bridges may also include a data storage medium configured to store data pertaining to container events. A NOC communicates with each of the plurality of bridges and CSDs. The NOC may receive data from one or more of the plurality of bridges and CSDs. The NOC includes a data storage medium configured to store one or more of sensor data and container events.
[0095] In another aspect, the present application discloses a method for monitoring at least one shipping container being transported by at least one cargo transport vehicle. The method includes providing a CSD configured to be removably coupled to the at least one shipping container for monitoring a cargo inside the container and detecting intrusion violations. The CSD includes at least one sensor. The CSD includes a microcontroller and a CSD communications device. The method may also include sending output data obtained from at least one sensor to the microcontroller.
[0096] In another aspect, the present application discloses a method for monitoring at least one shipping container being transported by at least one cargo transport vehicle from a point of origin to a destination point. The method includes providing route data corresponding to the path traversed by a selected cargo transport vehicle from a point of origin to a destination point. An actual position of at least one cargo vehicle is monitored to determine whether the actual position of the vehicle corresponds to the route data. An alert status condition is generated when the actual position of the vehicle does not correspond to the route data. A NOC is notified of the alert status.
[0097] In another aspect, the present application discloses a computer- readable medium having stored thereon a data structure for packetizing data transmitted between a CSD and a bridge. In one embodiment, the CSD is removably coupled to at least one shipping container disposed on a cargo transport vehicle. The bridge is disposed on the cargo transport vehicle. The data structure includes: a container CSD identification field containing data that uniquely identifies the container CSD; and a field containing either CSD status data or bridge command data depending on a course of the packet.
[0098] In another aspect, the present application discloses a computer- readable medium having stored thereon a data structure for packetizing data being transmitted between a bridge and a NOC. In one embodiment, the bridge is configured to monitor at least one container CSD configured to be removably coupled to the at least one freight shipping container disposed on a cargo transport vehicle. The bridge can be disposed on the cargo transport vehicle. The data structure includes: a bridge identification field containing data that uniquely identifies the container CSD; and a field containing either bridge-status or the NOC command data depending on the source of the packet.
[0099] In another aspect, the present application discloses a personal conditions monitoring system. The system includes a monitoring module. The monitoring module includes sensor array and ADC. The system includes a communication subsystem and a power subsystem with replaceable batteries. The communication subsystem includes a transceiver and an antenna.
[0100] In another aspect, the present application discloses a mounting device for coupling the CSD to a selected cargo container. The mounting device comprises a bracket configured for fastening the device on a door of the cargo container. In one embodiment, the mounting device is coupled to the door of the cargo container, wherein the CSD remains on the inside of the cargo container. The mounting device includes a magnetically-operated switch for automatically activating and deactivating the CSD when the door is closed and opened, respectively. Thus, once the mounting device is fastened to the cargo container door, the CSD will automatically activate when the cargo container door is closed, minimizing the gap in time between the closing of the door and the activating of the CSD, and thus effectively eliminating any window of opportunity for potential for theft, breach, and/or abuse. Further, the mounting device is easy to install.
[0101] Additional features and advantages of the system will be set forth in the detailed description which follows, and in part will be readily apparent to those skilled in the art from the description or recognized by practicing the system as described herein, including the detailed description which follows, the claims and the drawings.
[0102] FIG. 1 shows one exemplary embodiment of a transportation security system 100. Each mode of transportation (e.g., transportation by ship 1 10) is monitored and tracked using the transportation security system 100. The ship 1 10 is illustratively shown carrying a plurality of shipping containers 130. Each shipping container 130 comprises a Container Security Device ("CSD") 140 for
communicating with a Network Operations Center ("NOC") 170, preferably via a Bridge 150. When the CSD 140 detects a break-in violation, an alert status is generated and transmitted to NOC 170, via the Bridge 150. In one embodiment, the CSD 140 communicates with the Bridge 150 using an Unlicensed International Frequency Band Local Area Communication Network 160C. In another
embodiment, if the CSD 140 unable to communicate with the NOC 170 through the Bridge 150, the CSD 140 may communicate with the NOC 170 via a cellular communications channel 160A or a satellite communication channel 160B. The alert status generated by the CSD 140, when onboard a ship for example, includes the identity of the container 130. The alert status generated by the CSD 140 can also include the location of the ship 1 10, the time and date of the alert status generation, and a description of the alert status. The NOC 170, upon receipt of the alert status, may either confirm or reject the alert status. If the alert status is confirmed, the NOC 170 may generate an alarm signal.
[0103] FIG. 2 is a block diagram that provides further detail regarding one embodiment of the transportation security system 100 of FIG. 1 . In particular, FIG. 2 illustratively shows communication between the CSD 140, the NOC 170 and the Bridge 150 in further detail. In this example, the CSD 140 is shown communicating with the NOC 170 via satellite communications. In another embodiment, the Bridge 150 may also communicate with the NOC 170 via cellular 160A connection (shown in FIG. 1 ) or via an Ethernet connection 160D.
[0104] FIG. 3 is a block diagram illustrating one exemplary embodiment of CSD 300. CSD 300 may, for example, represent CSD 140 of FIG. 1 . The CSD 300 comprises a Sensor Block 310, local alert mechanisms 320, a Microcontroller Unit 330, a GPS receiver 340, a Cellular Modem 350A, a Satellite Modem 350B, a wireless LAN (WLAN) Interface 350C, an Antenna Block 360 and/or a Power Unit 370. The WLAN Interface 350C uses one of the standard type Unlicensed
International Frequency transceiver, by way of example, Bluetooth, Zigbee, etc.
[0105] The Sensor Block 310 may comprise a Light Sensor 31 OA, a
Capacitive Proximity Sensor 310B, an Accelerometer 310C, a Micro Power Radar (MPR) 310D, and/or an Inductive Sensor 310E. The Sensor Block 310 may also include one or more of: a radio-frequency identification (RFID) reader 31 OF, a Strain Gage 310G, a Piezo sensor 310H, an Ultrasonic Sensor 3101, a Microphone 310P, an Ultrasound Micropower Radar (UMPR) 310J, an Infrared Sensor 31 OK, a Door Opening Sensor 310L, a Seal Break Sensor 310M, a Sensor control parameters of surrounding 31 ON, as shown in FIG. 4. Sensor control parameters of surroundings 31 ON can include one or more of: a Temperature Sensor, a Smoke Detector Sensor, a Humidity Sensor, etc. The Antenna block 360 can include a GPS antenna 360A, a Cellular antenna 360B, a Satellite antenna 360C, and a low power LAN antenna 360D.
[0106] In one example of operation, the microcontroller 330 monitors output of sensor block 310 to determine an alert status. If an alert status is determined, microcontroller 330 can provide the Cellular modem 350A, the Satellite modem 350B and/or LAN interface 350C with a formatted message packet. This message packet may, for example, be transmitted from the Antenna block 360 to either the Bridge 150 (shown in FIGS. 1 , 2) or the NOC 170 (shown in FIGS. 1 , 2). Transmission message packets from the Bridge 150 and/or the NOC 170 are received by the Antenna block 360 and directed to one or more of the Cellular modem 350A, the Satellite modem 350B, and the LAN interface 350C. The Microcontroller 330 can then process the Bridge 150 and/or the NOC 170 message packet to receive information and/or instructions from the NOC 170, for example.
[0107] FIG. 4 is a flowchart illustrating one exemplary method for detecting and registering container intrusion signals (e.g., alert statuses). In one embodiment, Accelerometer 310C, Piezo sensor 31 OH, Ultrasonic sensor 3101, and Microphone 31 OP output signals that can be monitored by the microcontroller 330 (shown in FIG. 3), which can identify sensors 310 that exceed one or more pre-set threshold levels.
[0108] Once the container 130 is loaded with its payload, the microcontroller 330 operates in a calibration mode. The walls of the container 130 may be struck several times and 'images' of these hits may be recorded and stored in a pulling library of images 425 in the microcontroller 330 for use as calibration images pertaining to this particular container 130. In one example, one or more exemplary images of intrusion or damage to the container 130 can also be stored in the library of images 425.
[0109] The microcontroller 330 identifies signals that exceed certain threshold levels. These signals may be separated by the microcontroller 330, at 400, into a single hit signal 405 and/or a series of hit signals 407. Within the microcontroller 330, a Short Time Fast Fourier Analysis can be used to process the single hit signal 405, at 410, and a Wavelet analysis may also be performed, at 415. An image of the single hit signal is then created. Correlation Functions at 420 and Theory of Sample Recognition at 430 are utilized to compare the hit image to the exemplary images stored within the library of images 425. If the microcontroller 330 determines that the single hit image correlates with the images of intrusion into a damaged container, a majority voting algorithm is applied to the single hit image. The majority voting algorithm is a part of an integrated sensor processing procedure 470.
[01 10] The majority voting algorithm is based on major voting mark of unrelated criteria. Each criterion may be assigned positive and/or negative points. When the majority voting algorithm is applied to the image of the single hit signal, the decision about intrusion attempt is based on voting process based on a sum of all points given during processing of the hit signal image. If the sum of total points given to the hit signal image indicates that an intrusion attempt took place, the single hit image is further analyzed in accordance with the integrated sensor processing procedure 470, which makes a decision as to whether an intrusion occurred.
[01 11] The majority voting algorithm may also be applied to the series of hit signals 407 at 470. If the sum of total points given during processing of the series of hit signals 407 indicates that intrusion, or even an intrusion attempt, occurred, the series of hit signals 407 are analyzed in accordance with the integrated sensor processing procedure 470, which makes a decision as to whether an intrusion occurred.
[01 12] If the data processed by the integrated sensor processing procedure 470 is incomplete or inconsistent, this data is sent by the CSD 140 to the NOC 170 for a further analysis. In this case the NOC 170 (i.e., not the CSD 140) will make the decision as to whether an intrusion occurred.
[01 13] The microcontroller 330 can also utilize correlation functions 420 to compare output from the Accelerometer 310C and other sensors like the Piezo sensor 31 OH and/or the Ultrasonic sensor 310I to an exemplary image that corresponds to a signal generating by a metal cutting instrument, for example, stored in the library of images 425. If, at 420, the microcontroller 330 determines that the intrusion signal 420 correlates to the stored signal image generated by a metal cutting instrument, the intrusion signal is then further analyzed in accordance with the integrated sensor processing procedure 470 that makes a decision as to whether an intrusion took place.
[01 14] Output signals from the accelerometer 310C can also be monitored by the microcontroller 330 to detect vibration of the container wall. Once a vibration signal 402 of the container wall is detected by the microcontroller 330, the
microcontroller 330 can process, at 403, the vibration signal 402 to produce a wavelet analysis and a "window" Fourier analysis for comparison, at 440, to one or more recorded images of library of images 425 to determine which mode of transportation is used to move the container 130. The integrated sensor processing procedure 470 can then be applied to these signals to determine the mode of transport or whether an intrusion took place.
[01 15] An output signal from the light sensor 31 OA can be monitored by the microcontroller 330 to determine intrusion or fire. For example, if the microcontroller 330 determines that the output signal indicates that the measured light within the container exceeds a certain rate of change threshold, the microcontroller 330 can initiate further analysis of the output signal, and/or other sensor signals, to determine whether an intrusion is occurring and/or whether there is a presence of smoke. If the microcontroller 330 determines that an intrusion has occurred and/or smoke is present, the output signal can be further analyzed in accordance with the integrated sensor procedure 470 that makes the decision whether intrusion occurred or not.
[01 16] Output signals from the capacitive proximity sensor 310B, Strain gage 310G and RFID reader 31 OF also can be monitored by the microcontroller 330 to detect addition or removal of objects from the container 130. The output signals can, for example, be analyzed by the microcontroller 330, at 445, to detect change in the cargo mass. If change in cargo mass is detected, the capacitive proximity sensor output can be analyzed in accordance with the integrated sensor processing procedure 470, which makes a decision about the alert status of the container 130.
[01 17] An output signal from the capacitive proximity sensor 310B can be monitored by the microcontroller 330 to determine if any objects are in close proximity to the locks and the seals of the container 130. If any objects are detected in close proximity to the locks and the seals of the container 130, the output signals from one or more sensors can be further analyzed within the microcontroller 330 to determine whether a break-in has occurred. If a break-in is detected by the microcontroller 330, further analysis of these signals can be made by the integrated sensor processing procedure 470 to make a decision as to whether an intrusion occurred.
[01 18] Output signals from sensors are monitored by the microcontroller 330 in sensors control parameters of surrounding 31 ON. These sensors can, for example, include a temperature sensor that produces an output signal which can be monitored by the microcontroller 330 to detect thermal excursions outside one or more predetermined temperature ranges and/or to detect rates of change in temperature that occur outside one or more predefined rates of change. If, for example, the microcontroller 330 determines that the sensed temperature is outside predetermined temperature ranges and/or that the rate of temperature change is outside these predetermined limits, output signals from one or more sensors will be further analyzed by the integrated sensor procedure 470 to decide whether an intrusion occurred.
[01 19] In another example, an output signal from the smoke detector sensor can be monitored to determine if chemicals are present within the air, and/or air clarity inside the container 130 exceeds a predefined threshold level. If, for example, a chemical is detected within the air, the output signals from one or more sensors can be further analyzed by the integrated sensor processing procedure 470 to make a decision as to the container 130 alert status.
[0120] In another example, an output signal from the UMPR 310J can be monitored by the microcontroller 330 to detect presence of humans or animals within the container 130. If, for example, presence of humans and/or animals is detected, the output signals from one or more sensors can be further processed by the integrated sensor procedure 470 to make a decision as to whether an intrusion occurred. The UMPR 310J can, for example, utilize the Doppler's effect to detect movement inside the container 130. The UMPR 31 OJ can, for example, comprise an ultrasonic transceiver. This sensor can also be used to detect force entry attempts into the container 130, based upon registration of impact drilling, gas-cutting, etc., by utilization of the UMPR 31 OJ as a highly sensitive UMPR-based microphone. The later purpose is accomplished by applying a procedure to determine, at 460, the integrity of the container's wall. If the UMPR 310J output data exceeds the threshold determined in at 460 and 465, application of a procedure to determine the integrity of the walls and the cargo movement inside the container 130 can be applied. The output data of one or more sensors can then be further analyzed within the microcontroller 330 for presence of humans/animals or presence of wall integrity failure. If, for example, presence of humans/animals and/or wall destruction are detected, the output signals from one or more sensors 310 are analyzed in accordance with the integrated sensor procedure 470 to make a decision as to whether an intrusion occurred.
[0121] Output signals from sensor MPR 310D can be processed to produce a radioprint (e.g., radio-imprint) based upon locations of the objects inside the container 130. The radioprint can be monitored by the microcontroller 330 to detect deviations in object location, by comparing the radioprint to an initial radio print recorded during calibration, for example. Radioprints are built based on the analysis of all reflected signals, including signals reflected by objects that are not located in the direct field of the sensor. If, for example, the microcontroller 330 detects deviation between a current radioprint and the radioprint recorded during calibration, the radioprints and output signals from other sensors can be analyzed in accordance with the integrated sensor processing procedure 470 to determine whether an intrusion occurred. [0122] Output signals from the infrared sensor 31 OK can be monitored by the microcontroller 330 to detect warm objects within the container. If, for example, the microcontroller 330 detects a warm object, the output signal from one or more sensors can be further analyzed, at 465, within the microcontroller 330 to determine the presence of humans or animals by applying procedures that determines movement inside the container 130. If, for example, humans or animals are detected, output signals from one or more sensors can be analyzed in accordance with the integrated sensor processing procedure 470 to make a decision as to whether an intrusion occurred.
[0123] An output signal from the GPS receiver 340 can be monitored to determine a location of the CSD 140, and further to determine if this location differs from a programmed route for the container 130. If, for example, the microcontroller 330 determines that the current location differs from the programmed route, the output signal can be further analyzed, at 435, to determine deviation from the programmed route. If, for example, significant deviation from the programmed route is detected, the output signals from one or more sensors can be analyzed in accordance with the integrated sensor processing procedure 470 to make a decision as to whether an intrusion occurred.
[0124] In another example, the microcontroller 330 monitors the door opening sensor 310L and the seal break sensor 310M to detect changes in integrity of the doors and the seals of the container 130. If the microcontroller 330 detects changes in integrity, the output signals from one or more sensors can be analyzed in accordance with the integrated sensor processing procedure 470 to make a decision as to whether an intrusion occurred. [0125] Considering the workload and low performance of standalone CSD microprocessor stemming from strict limitations to its power consumption, a simple accelerometer signal analysis algorithm could often be employed to determine impacts against the structure of secured container.
[0126] FIG. 5 illustrates a flowchart of method for detecting and registering a container intrusion signal by accelerometer. In order to save CSD power, accelerometer indications can be monitored in two modes: Standby and Active. In Standby mode, the accelerometers can be checked in equal time periods with frequency F1 about 100 Hz, instead of constant monitoring. Sensors go offline between checkpoints, and the module's microcontroller, if not being used, enters sleep mode.
[0127] In Standby, the accelerometer's 310C indications are read in time intervals dT = 1/F1 in Step 501 . Then, the accelerometer 310C is turned on, and the microcontroller 330 is in Active mode at 502. Then the accelerometer's values are taken at 503. At 504, the accelerometer 310C is turned off. Based on values obtained, an absolute value of apparent acceleration vector λ~ Α* * A>~ * A* and its deviation from gravity vector, D = A - 1 , are determined at 505. If D does not exceed preset threshold P1 shown at 506, the CSD 140 remains in Standby at 507, otherwise it enters Active mode of accelerometer indications monitoring. P1 should be ~ 0.5g.
[0128] In Active mode, the accelerometers remain online from the moment of Active mode entry shown at 508 to the moment when the gravity vector D remains below threshold P1 shown at 513 for N measurement cycles as shown at 514 and 515. When S (number of cycles when gravity vector D is less than P1 ) exceeds N, then this in itself is the condition for exiting the Active mode as shown at 516, then the accelerometers 301 C are turned off. The gravity vector D is measured and determined in each measurement cycle shown at 510 and 51 1 and its maximum value maxD is recorded as shown at 509. MaxD is verified upon exiting the Active mode. If the value MaxD exceeds threshold P2 as shown at 517, the majority algorithm of the integrated sensor processing procedure 470 indicates an impact against the container's structure and time and amplitude of hit have fixed values as shown at 518. If, however, the value MaxD does not exceed the threshold P2, then the microcontroller returns into the Standby mode as shown at 519.
[0129] FIG. 6 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by a light sensor 31 OA. The algorithm is used to determine breaking in the container by a change in light intensity inside the container as the result of both penetration of outside light and light flashes occurring in metal cutting tools operation.
[0130] The indications of the light sensor 31 OA (shown in FIG. 6) are read and analyzed with frequency about 3 Hz as shown at 601 . A sampled sensor signal A is filtered out, and errors due to random deviations of sensor indications are eliminated as shown at 602. Filtered signal AF is compared in two stages with original sensor readings. If the filtered signal AF exceeds a predetermined signal A* by more than 2% as show at 603, the integrated sensor procedure 470 reports potential breaking in the container as show at 609. If the filtered signal AF exceeds the predetermined signal A* by more than 5% as shown at 604, the integrated sensor procedure 470 reports the break in the container 130 as shown at 605. However, if the filtered signal AF does not exceed the predetermined signal A* by more than 5% as shown at 604, the integrated sensor processing procedure 470 reports high chance of breaking in the container as show at 609. The Light sensor 31 A can be recalibrated every fifteen minutes in the process of its monitoring as show at 606, 607, 608 and 610. Recalibration is required because containers are not hermetically sealed, due to which light intensity inside of them could change in changing outside light conditions (at day/night).
[0131] FIG. 7 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by a strain gage 310G. The algorithm is used to record damage (alterations) to container structure.
[0132] The strain gage 310G can be queued with frequency about 1 kHz in 15 ms-long sessions shown at 701 . A Vector of measured results A<15> can be median filtered to form a filtered signal AF as shown at 702. The Measurement sessions can occur with frequency about 3 Hz. The filtered signal AF can be compared in two stages with original sensor readings A*. If the filtered signal AF exceeds original sensor readings A* by more than 1 % as show at 703, the integrated sensor processing procedure 470 reports potential damage to container structure as shown at 707. If the filtered signal AF exceeds original sensor readings A* by more than 3% as shown at 704, the integrated sensor processing procedure 470 reports the break in the container 130 as shown at 708. However, if the filtered signal AF does not exceed original sensor readings A* by more than 3% as shown at 704, the integrated sensor processing procedure 470 reports potential damage to container structure as shown at 707. Strain gage is recalibrated hourly in the process of its monitoring as shown at 705, 706, 709 and 710. This is required because changing ambient temperature (at day/night) causes strain of the metal container walls.
[0133] FIG. 8 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion by a smoke detector sensor. The algorithm can be used to determine smoke content in the container due to fire or breaking in using metal cutting instruments.
[0134] The indications of the smoke detector sensor 31 ON (shown in FIG. 8) can be read and analyzed with frequency about 0.1 Hz shown at 801 . Sampled sensor signal A can be filtered out and errors due to random deviations of sensor indications are eliminated as shown at 802. Filtered signal AF can be compared in two stages with original sensor readings A*. If the filtered signal AF exceeds original sensor readings A* by more than 3% shown at 803, the integrated sensor processing procedure 470 can report potential smoke content inside the container shown at 805. If the filtered signal AF exceeds original sensor readings A* by more than 10%, the integrated sensor processing procedure can report smoke content inside the container as shown at 806. However, if the filtered signal AF does not exceed original sensor readings A* by more than 10%, the integrated sensor processing procedure 470 reports potential smoke content inside the container as shown at 805. The smoke detector sensor 31 ON can be calibrated once during activation of security module.
[0135] FIG. 9 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by a humidity sensor. The algorithm is used to record relative humidity inside the container.
[0136] The indications of humidity sensor 31 ON (shown in FIG. 9) can be read and analyzed with frequency about 0.1 Hz as shown at Step 901 . Sampled sensor signal can be filtered out and errors due to random deviations of sensor indications can be eliminated as shown at 902. Filtered signal passes two-stage evaluation. If relative humidity exceeds 85% as shown at 903, the integrated sensor processing procedure 470 reports increased humidity inside the container as shown at 906. If relative humidity exceeds 95% as shown at 904, the integrated sensor processing procedure reports high humidity inside the container as shown at 905. However, if relative humidity does not exceed 95% as shown at 904, the integrated sensor processing procedure 470 reports increased humidity inside the container as shown at 906.
[0137] FIG. 10 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by a temperature sensor. Aside from recording the temperature inside the container in order to manage cargo storage conditions, the algorithm is able to monitor the rate of temperature change.
[0138] The indications of the temperature sensor 31 ON (shown in FIG. 10) are read and analyzed with frequency about 0.3 Hz as shown at 1001 . Sampled sensor signal A can be filtered out and errors due to random deviations of sensor indications can be eliminated as shown at 1002. Filtered signal AF can be compared in two stages with original sensor readings A*. If the filtered signal AF exceeds original sensor readings A* by more than 2°C as shown at 1003, the integrated sensor processing procedure 470 reports temperature change inside the containers as shown at 1007. If the filtered signal AF exceeds original sensor readings A* by more than 5 °C as shown at 1006, the integrated signal processing procedure 470 reports drastic change of temperature inside the container as shown at 1009. However, if the filtered signal AF does not exceed original sensor readings A* by more than 5°C as shown at 1006, the integrated sensor processing procedure 470 reports temperature change inside the containers as shown at 1007. Temperature sensor can be recalibrated every fifteen minutes in the process of its monitoring as shown at 1004, 1005, 1008 and 1 1 10. Recalibration is required because containers heat up and cool down in a broad temperature range during day/night cycle.
[0139] FIG. 1 1 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by an incremental door opening sensors. In order to obtain more reliable judgment in some
embodiments, two sensors can be installed per container door.
[0140] The door opening sensors 310L can be queued with frequency 0.3 Hz. In order to eliminate random errors, each sensor can be queued thrice as shown at 1 101 , after which each sensor's condition can be determined using majorization as part of the integrated sensor processing procedure 470 as shown at 1 102. Based on obtained values, a judgment can be drawn about condition of each container door as shown at 1 103. If both sensors indicate closed door as shown at 1 104, the door is reported to be closed. If both sensors indicate opened door as shown at 1 104, the door is reported to be opened as shown at 1 106. If sensor indications are inconsistent, sensor signal processing procedure reports potential opening of the door as shown at 1 105.
[0141] FIG. 12 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal by a microphone 31 OP, which enables the CSD 140 to record noise caused by container breaking tools, and to determine possible type of tool.
[0142] The microphone 31 OP can be queued in sessions in two second intervals. This saves the CSD 140 power while avoiding the danger of missing the noise of metal cutting tools' operation. Measurement session T can last 0.2 seconds as shown at 1201 . At the first level of examination, amplitude of microphone signal can be verified across the entire frequency band. If input signal Ainp is below preset threshold Amin as shown at 1202, subsequent signal processing is skipped until next measurement cycle as shown at 1201 . Otherwise, power of received signal
*' f (Equation 1 ) is evaluated. The power of the received signal can be calculated in accordance with Equation 1 . If signal power exceeds preset threshold PA>Pmin judgment can be drawn about presence of noise correspondent to breaking in the container as shown at 1203. A second level of processing then takes place, which includes a spectrum analysis of the signal power in order to determine the type of tool used to break in the container as show at 1205. In this connection, bands exhibiting signal amplitude above preset threshold ^ ^ are gated out across the entire frequency range. Spectrum power of sound
½'
Figure imgf000035_0001
(Equation 2) can be calculated for gated bandwidth AF. The spectrum power of sound can be calculated in accordance with Equation 2. Through signal processing, a spectrum power array at different frequency bands S is generated. Each container-breaking tool is characterized by its own array of sound spectrum power S,*, limited from below. Tool of breaking is determined in comparing arrays S and S,*. If array S is included in an array of sound spectrum power S, as shown at 1205, then breaking took place and the tool used for breaking is recognized as shown at 1207. However, if array S is not included in an array of sound spectrum power S, as shown at 1205, then breaking took place but the tool used for breaking is unknown as shown at 1206. [0143] FIG. 1 3 is an exemplary flowchart illustrating an embodiment of a method for detecting and registering a container intrusion signal based on
Ultrasound Micropower Radar (UMPR) 31 OJ . The UMPR 31 OJ enables the system to construct a unique digital imprint of the container interior, representing
arrangement of items within radar coverage. The imprint can correspond to changes in arrangement of interior items.
[0144] To obtain the imprint, the UMPR 31 OJ emits 2 ms-long pulses in an ultrasonic frequency, such as 40 kHz, as shown at 1 301 . Meanwhile, the UMPR 31 0J receiver stays idle. The Emitted signal reflects repeatedly from container interior items and then returns to the UMPR 31 0J , where it is received by an ultrasonic receiver. The Receiver goes online for 50 ms after the pulse has been sent as shown at 1 302. Changes in amplitude of received signal for this period are the imprint of container interior.
[0145] To compare the obtained imprint against the referenced one (which was obtained at the beginning of the trip and stored in the pulling library of images 425), UMPR 31 0J receiver signal can be sampled with at least double frequency of emitted signal. An obtained set of N values Y<N>, can be compared against reference imprint X<N> using correlation functions as shown at 1 303. For example, a function could be used based on a supposition that the actual imprint could be represented on the reference basis using correlation factors A and B and expressed Y w AX * 8
as * . Correlation factors are derived from the system of equations
Figure imgf000036_0001
(Equation 3)
Figure imgf000037_0001
(Equation 4)
The correlation factor A can be calculated in accordance with Equation 3. And the correlation factor B can be calculated in accordance with Equation 4. The value of correlation function formulated using least-squares method
Figure imgf000037_0002
(Equation 5) can be compared against the limit FMAX, and if the limit is exceeded as shown at 1304, a judgment is drawn about changes in container interior as shown at 1305. The value of correlation function can be calculated in accordance with Equation 5.
[0146] In one embodiment, the accelerometers 310C, as shown in FIG. 3, can be included within CSD 140 and can be used to create a digital signature (DS) and can be used to identify location of cargo within the container 130. FIG. 14 is a schematic diagram illustrating exemplary parameters that can be used to form the digital signature DS. As illustrated in FIG. 14, the following parameters characterize a spatial distribution of the container 130: M is the mass of the cargo; RM represents the coordinates of the center of mass within the body frame, which is strictly connected with the container itself; and Ix, ly, and Iz are components of the container moment of inertia, which characterize the mass distribution with respect to the center of mass.
[0147] These parameters can be used to define the digital signature DS and can further be used to define the expected motion of the container 130. Changes in one or more of these measured parameters can, therefore, correspond to certain events during cargo transportation. For example, if the digital signature DS has not changed, the cargo is intact. If M and Ix, ly, and Iz are the same but RM has changed, the cargo may not be stolen or damaged but may have moved within the container 130 (i.e., the coordinates of the center of mass RM change as the cargo moves within the container 130). It may, therefore, be necessary to check fastenings of the cargo within the container 130. If, for example, parameter M does not change, but parameters Ix, ly, and /z and RM have changed, it is probable that the cargo has not been stolen. The status of the cargo can be precisely determined based on the degree of change of the parameters. However, it is also possible that a partial destruction of the cargo took place (e.g., damage resulting from inaccurate unloading). Change of the moment of inertia with respect to the center of mass can occur due to this destruction. If all parameters of the digital signature DS have changed, it is likely that the container has been tampered with. In one embodiment, the determination of the digital signature DS allows one to reveal theft without opening the container. The determination of the digital signature DS can also provide continuous monitoring of the cargo's condition.
[0148] In one embodiment, the accelerometers 310C (shown in FIG. 3) that are included within the CSD 140 form a Mass-tomograph 1500 as shown in FIG. 15. The plurality of accelerometers 310C that form the Mass-tomograph can be coupled to walls of the container 130. The Mass-tomograph 1500 can be used to construct a spatial picture of mass distribution within the container 130. In particular, FIG. 15 shows a cross-sectional view of one exemplary Mass-tomograph 1500 in
accordance with one embodiment. Mass-tomograph 1500 may, for example, can be used to subtract effects of the surroundings on the accelerometers measurements. The initial calibration of accelerometers may occur without any cargo in the container 130. A second round of measurements may occur when an object or a cargo is placed inside the container 130. The calibration measurements of the accelerometers 310C are subtracted from the second round of measurements to eliminate influence of the container itself, and the accelerometer measurements are thus only determined for the mass of the object 1510.
[0149] FIG. 16 is an exemplary cross-sectional view illustrating an
embodiment of Mass-tomograph 1600 that is external to container 130 when the container 130 is in non-moving position. In this embodiment, the Mass-tomograph is used as a device to obtain imaging of the contents of the container 130. In this example, the mass-tomograph 1600 monitors the whole container 130. When the container 130 is in the non-moving position, the quality of the spatial mass distribution of the container mass depends on two parameters: the accuracy of accelerometers; and the distance, /acce/ 1620, between adjacent accelerometers 310C that form the Mass-tomograph 1600.
[0150] FIG. 17 is an exemplary cross-sectional view illustrated an embodiment of Mass-tomograph 1700 when the container 130 is moving. Mass-tomograph 1700 may, for example, represent the Mass-tomograph 1600 of FIG. 16. In this example, the Mass-tomograph 1700 scans the container 130 as the container 130 moves gradually through the Mass-tomograph 1700; in this example, the container 130 moves with a steady speed Vcont 1720. In this example, a high quality spatial mass distribution inside the container 130 can be determined. Since the quality of spatial mass distribution depends only on the accuracy of accelerometers, the perceived distance lacCei 1620 between adjacent accelerometers will be minimal due to the movement of the container 130.
[0151] In one embodiment, the moment of inertia of the container 130 can be used as a digital signature. FIG. 26 is an exemplary schematic diagram illustrating an embodiment of a method to determine the moment of inertia of the container 130 to be used as digital signature DS. As illustrated in FIG. 26, the container 130 is schematically shown as having lifting lugs 10 and 20. Accelerometers 310C_1 , 310C_2, 310C_3, 310C_4 and strain gages SGi.i, SG2,i, SGi,2, SG2,2 are shown as being distributed over the container 130. In the embodiment depicted in FIG. 26, accelerometer 310C_1 and strain gages SGi,i, SGi,2 are incorporated in the lifting lug 10 of the container 130, accelerometer 310C_2 and strain gages SG2,i, SG2,2 are incorporated in the lifting lug 20 of the container, accelerometer 310C_3 is positioned at a location within CSD 140 (not shown in FIG. 26), and accelerometer 310C_4 is positioned at a location within the container at a point spaced from the accelerometer 310C_3. According to one embodiment, the accelerometers 310C_3 and 310C_4 are spaced apart by a substantial distance to increase the precision of
measurements. Strain gages SGi,i, SG2,i measure vertical components of forces
P[,F2 , respectively, while strain gages SGi,2, SG2,2 measure horizontal components of forces P, F2 , respectively.
[0152] As further illustrated in FIG. 26, point O is the container mass center and points O-i, 02 are connection points of lifting lugs 10, 20, respectively, to the container.
[0153] According to one embodiment, the container moment of inertia / can be determined in accordance with the following equation: / = Fl R°°l R oi ^ where components 1, R001, 2, R002 ,y/''' are defined in a stationary system of coordinates and have the following meanings:
[0154] Fl , F1 are forces applied to the lifting lugs 10, 20, respectively; [0155] Roo-ι, R002 are radius vectors from the container mass center O to the connection points O-i, 02; and
[0156] ψ is the angle of inclination from the balanced (horizontal) position of the loaded container (as shown in FIG. 26).
[0157] In one embodiment, the following steps can be taken to define the parameters for determining the container moment of inertia / used as digital signature:
(a) Calculating Fl,F1 in a moving system of coordinates associated with the hanging container, from the readings of the strain gages (SG-1 ,1, SG2,i, SGi,2, SG2,2);
(b) Defining the angle ψ from the readings of the accelerometers 310C_1 , 310C_2, 310C_3, 310C_4;
(c) Defining ψ' and ψ" from the readings of the accelerometers 310C_1 , 310C_2, 310C_3, 310C_4;
(d) Defining Fl,F1 in a stationary system of coordinates from the results of the above steps (a) and (b);
(e) Defining acceleration of the container mass center in accordance with the
F + F
following equation: a0 =— - + g , where m is the container mass, defined for the m SG, , + SG2
stationary loaded container ( m =— : - ); and g \s the acceleration of gravity;
g
(f) Defining acceleration of points O1 and 02 (in a stationary system of coordinates) from the readings of the accelerometers 310C_1 , 310C_2, and the angle ψ : ax,a2 ; and
(g) Defining -Rool from α^ α^ψ',ψ" ; and defining -R002 from α20,ψ',ψ" .
[0158] When the CSD 140 determines an overall container alert signal based on the decision of the integrated sensor processing procedure 470 (shown in FIG. 4), the microcontroller 330 activates one or more local alert mechanisms (e.g., sound devices 320A and/or light device 320B, as shown in FIG. 3) that can generate a local alarm signal. The microcontroller 330 can also activate transceivers 350A-350C to transmit a message that includes this alert via antennas 360B-360D to the Bridge 150 and/or the NOC 170. The microcontroller 330 can also determines time intervals used to activate the transceivers 350A-350C during communication with the Bridge 150 or the NOC 170. In one example, these time intervals can be determined by the NOC 170.
[0159] The CSD 140 can be coupled to the wall of the container 130 in any conventional manner. By way of example, the CSD 140 can be coupled to the wall of the container 13 by rare earth magnets, double-stick tape, and/or hot-glue.
[0160] The CSD 140 can also be coupled to the container 130 by a mounting device. According to one embodiment, the CSD 140 can be mounted on a door 9 of the container 130 using a mounting device 1 , as illustrated in FIGS. 27 and 28(a), (b). The mounting device 1 of FIGS. 27 and 28(a), (b) is shown as having a U-shaped bracket 2 with a first lateral side, a second lateral side, and a central portion disposed between the first and second lateral side. The U-shaped bracket 2 can be configured to couple with an edge of the cargo container door 9 in any conventional manner. For example, the U-shaped bracket 2 can be coupled to the edge of the cargo container door 9 by rare earth magnets, double-stick tape, hot-glue, clamps, nails, etc. The U-shaped bracket 2 can also be advantageously-sized to correspond to the size of the cargo container door 9 such that the U-shaped bracket 2 fits snugly over the edge of the cargo container door 9. According to the present embodiment of FIGS. 27, 28(a), (b), two threaded openings 5 can be formed on the first lateral side of the U-shaped bracket 2. The threaded openings 5 are configured to receive fasteners, such as threaded screws 6, for securing the mounting device 1 against the container door 9. Thus, the U-shaped bracket 2 clamps to the edge of the door 9. The threaded screws 6 of FIG. 28(a), (b) are shown as having flat ends that secure against the side of the container door 9. This method of fixation, i.e., using threaded screws 6 with flat ends, is advantageous because no fastening openings are needed on the wall of the container 130 to receive the threaded screws.
[0161] As illustrated in FIGS. 27 and 28(a),(b), the CSD 140 is coupled to the same lateral side of the U-shaped bracket 2 that is configured with the threaded openings 5. And as further illustrated in FIG. 28, the U-shaped bracket 2 can be positioned on the door 9 in such a manner that the CSD 140 and the threaded opening/screw configuration are located inside the cargo container 130.
Advantageously positioning the CSD 140 and the securing means of the mounting device 1 on the inside of the container 130, as illustrated in FIG. 28(a), (b), can prevent tampering and destruction of the mounting device 1 when the container doors 9, 10 are closed. For example, as can be seen from FIG. 28(a), the CSD 140 is safely retained within the container 130 when container doors 9,10 are closed, and cannot be reached or dismounted from the outside.
[0162] In one embodiment, the CSD 140 can include a magnetically-operated switch 8 for activating and deactivating the CSD 140. According to one embodiment, mounting device 1 comprises a flat spring 4 configured to interact with magnetically- operated switch 8 based on the opening and closing of the second container door 10. As illustrated in the embodiment of FIG. 28(a), (b), one end of the flat spring 4 is attached to the lateral side of the U-shaped bracket 2 that is secured to the outside wall of the first door 9. A magnet 7, which interacts with the magnetically-operated switch, is attached to the other (free) end of the flat spring 4. The magnet 7 can be adapted to turn on and off the magnetically-operated switch 8. According to the embodiment of FIGS. 27 & 28(a), (b), the U-shaped bracket 2 can include a square- shaped opening 3 on the central portion of the bracket 2 for partially receiving the flat spring 4. As illustrated in FIGS. 27 & 28(a)(b), the opening 3 can allow the central portion of the flat spring 4 to extend through the opening 3 outside the bracket 2.
[0163] The opening 3 can be configured in such a manner that the central portion of the flat spring 4 extends towards the second container door 10 when the mounting device 1 is coupled to the first door 9. Thus, when the doors 9, 10 of the container 130 are closed, as shown in FIG. 28(a), the central portion of the flat spring 4 is pressed by the second door 10. Normally, when the second door 10 is open, as shown in FIG. 28(b), the flat spring 4 remains in a neutral state, i.e., the central portion of the flat spring 4 is not pressed by the second door 10, and the magnet 7 on the end of the flat spring 4 is in interaction with the magnetically-operated switch
8. In this neutral state, as depicted in FIG. 28(b), the magnetically-operated switch 8 is turned off, and the CSD 140 is deactivated. When the second door 10 is closed, as shown in FIG. 28(b), and the magnet 7 is displaced out of magnetic interaction with the magnetically-operated switch 8, the magnetically-operated switch 8 is turned on, and the CSD 140 is activated. When the second door 10 is opened again, the flat spring 4 returns back into its neutral state and brings the magnet 7 back into magnetic interaction with the magnetically-operated switch 8. Thus, according to the present embodiment, the CSD 140 is activated automatically when container doors
9, 10 are closed, effectively eliminating any gap in time between the moment the container 130 is closed and the moment the CSD 140 is activated. Hence, abuse can be prevented. Further, the mounting device is easy to install.
[0164] Another alternative embodiment of the bracket 2 is illustrated in FIG. 29. FIG. 29 shows an exemplary embodiment of a reefer bracket 2500 for installation on a reefer container (not shown). The reefer bracket 2500 is illustrated as including a central member 2501 that is disposed between, and couples, a proximal member 2502 and a distal member 2503. The proximal member 2502 can extend from the central member 2501 at a first predetermined angle; whereas, the distal member 2503 can extend from the central member 2501 at a second predetermined angle. As shown in Fig. 29, the first and second predetermined angles can be right angles such that the proximal member 2502 and the distal member 2503 extend from the central member 2501 in a parallel manner.
[0165] Although the first and second predetermined angles are shown and described as being right angles for purposes of illustration only, the first and second predetermined angles each can comprise any suitable angle, including a uniform angle and/or a different angle, such that the proximal member 2502 and the distal member 2503 can extend from the central member 2501 in any desired manner. Additionally and/or alternatively, the central member 2501 , the proximal member 2502 and the distal member 2503 preferably are at least partially integrated into a single member. At least one of the central member 2501 , the proximal member 2502 and the distal member 2503 can be provided as a separate member that is connected with the other members.
[0166] As shown in Fig. 29, the central member 2501 , the proximal member 2502 and the distal member 2503 are disposed in an arrangement that defines an inner channel 2504. The inner channel 2504 can be defined to have any
predetermined size, shape and/or dimension. Since the reefer bracket 2500 is configured for installation on a reefer container, the inner channel 2504 can have a size, shape and/or dimension that is suitable for receiving at least a portion of a reefer door 2505 (shown in FIG. 31 ) or reefer door seal 2512 (shown in FIG. 31 ). To accommodate a wide range of reefer containers, the size, shape and/or dimension of the inner channel 2504 preferably is larger than a maximum size, shape and/or dimension of the reefer doors 2505 produced by different manufacturers. The CSD 140 can be coupled to the wall of the container 130 in any conventional manner. By way of example, the CSD 140 can be coupled to the wall of the container 13 by rare earth magnets, double-stick tape, and/or hot-glue.
[0167] The reefer bracket 2500 optionally can be adapted to receive, or otherwise couple with a mechanical switch 2506. In one embodiment, the central member 2501 of the reefer bracket 2500, for example, can form a recession 2509 as illustrated in Fig. 29. The recession 2509 can have any preselected size, shape and/or dimension that is suitable for at least partially receiving the mechanical switch 2506. The recession 2509 can extend along a portion and/or an entirety of a selected dimension of the central member 2501 . As shown in Fig. 29, the recession 2509 can extend along an entire width of the central member 2501 and/or along a portion of a length of the central member 2501 . Advantageously, the central member 2501 can form at least one opening 251 1 that communicates with the recession 2509. The opening 251 1 can enable an actuator (not shown) of the mechanical switch 2506 to extend from the reefer bracket 2500 via the opening 251 1 during operation.
[0168] Alternatively in another embodiment the mechanical switch 2506 can be coupled with an extension of the central member 2512.
[0169] The reefer bracket 2500 advantageously can accommodate selected unique features of the reefer container, such as thicker doors 2505 (shown in FIG. 31 ) and additional insolation rubber 2512 for helping to ensure that an internal temperature of the reefer container can be well controlled. In addition, the doors 2505 of reefer containers have door shapes, door widths (T) and/or other door dimensions that can vary among different manufacturers. Stated somewhat differently, the features of reefer containers are not standardized. The reefer containers from each manufacturer however have similarities at a bottom region and/or a top region of the reefer door 2505.
[0170] The reefer bracket 2500 advantageously can accommodate the variations in the door shapes, door widths (T) and/or other door dimensions of reefer doors 2505. FIG. 29 depicts an aspect of the reefer bracket 2500 from inside the reefer container. The reefer bracket 2500 can be mounted at the top region and/or the bottom region of the reefer door 2505.
[0171] As illustrated in FIG. 29, the proximal member forms a plurality of openings 5 that can extend through the proximal member 2502 of the reefer bracket 2500. In some embodiments, the openings can be threaded. The openings 5 can be configured to receive fasteners, such as threaded screws 6 (shown in FIG. 30), for securing the reefer bracket 2500 against the reefer door 2505. Although shown and described as having two openings 5 for purposes of illustration only, the reefer bracket 2500 can include any suitable number of openings 5 for securing the reefer bracket 2500 to the reefer door 2505.
[0172] As illustrated in FIG. 30, the reefer bracket 2500 can be secured to the reefer door 2505 via one or more fasteners 6. The fasteners 6 thereby can hold the reefer bracket 2500 in place on the reefer door 2505. Each fastener 6 can comprise any conventional type of fastener, including, but not limited to, bolts, screws, threaded inserts, threated rods, pins, or a threaded screw. The reefer bracket 2500 can form openings 5 for receiving the fasteners 6. If the fasteners can comprise the threaded screws 6, for example, the openings 5 formed by the reefer bracket 2500 can comprise openings 5 through which the threaded screws 6 can extend.
Although shown and described as having two fasteners 6 for purposes of illustration only, the reefer bracket 2500 can include any suitable number of fasteners 6 for securing the reefer bracket 2500 to the reefer door 2505.
[0173] A CSD 140 can be coupled to the proximal member 2502 of the reefer bracket 2500 as shown in FIGs. 29, 30, and 31 . When the reefer bracket 2500 is installed on the reefer door 2505 (shown in FIG. 31 ) and the reefer door 2505 is closed, the CSD 140 will be inside the reefer container. By mounting the CSD 140 on the inside of a selected reefer container, the CSD 140 can monitor the contents of the reefer container with the plurality of sensors 310 previously discussed. In one embodiment, an antenna 360 (shown in FIG. 3) can provide data communications between the CSD 140 and a network operation center 170 (shown in FIG. 1 ). The data communications between the CSD 140 and the network operation center 170 are discussed in more detail above with reference to Figs. 1 -2. The antenna 360 can be coupled on the opposite side of the distal member 2503 so that the antenna 360 is external to the reefer container when the reefer door 2505 is closed. The antenna 360 can provide the data communications between the CSD 140 and the network operation center 170.
[0174] As illustrated in Figs. 29, 30, and 31 the reefer bracket 2500 can include a mechanical switch 2506 that can be used as a door sensor. The mechanical switch 2506 can be mounted on center member 2501 of the reefer bracket 2500. The mechanical switch 2506 can be closed, activating the CSD 140, when the reefer door is closed and when the mechanical switch 2506 makes contact with an edge region 2507 of the ceiling 2508 of the reefer container as shown in FIG. 31 . The mechanical switch 2506 can open, deactivating the CSD 140, when the reefer door 2505 is opened. The mechanical switch 2506 can send electrical signals to the CSD 140 that indicate whether the reefer door 2505 is opened or closed. [0175] FIG. 31 illustrates a profile view of the reefer bracket 2500 installed on a reefer door 2505. FIG. 31 further illustrates the mechanical switch 2506 being depressed against the edge region 2507 of the reefer ceiling 2508 when the reefer door 2505 is closed. An electrical signal is passed via electrical wires from the CDS 140 to the mechanical switch 2506. When the reefer door 2505 is opened, the mechanical switch 2506 opens, interrupting the electrical signal to the CDS 140 alerting an intrusion into the reefer container.
[0176] FIG. 32 is an exemplary drawing illustrating the trailer door, the locking mechanism and the trailer bed (floor). In FIG. 32, the sliding or roll-up door 2620 is depicted in the closed or down position with the bottom of the sliding or roll-up door 2620 resting on the trailer bed (floor) 2622. A J-hook latch 2624 is coupled with the sliding or roll-up door 2620 such that the J-hook latch 2624 can rotate about a pin, as shown in FIG. 32, coupling the J-hook latch 2624 to the sliding or roll-up door 2620. A lock keeper 2602 is coupled to the slider or roll-up door 2620 such that the proximal end of the J-hook latch 2624 aligns with the lock keeper 2602 when the J- hook latch 2624 is in the locked position. The J-hook latch 2624 can capture a catch pin 2626 that is coupled with the trailer bed (floor) 2622. The catch pin 2626 can prevent the roll-up door 2620 from moving upward from the closed position with the J-hook latch 2624 is in the locked position.
[0177] FIG. 33 illustrates the sliding or roll-up door 2620 in the closed position such that the bottom of the sliding or roll-up door 2620 rests on the trailer bed (floor) 2622. FIG. 33 also illustrates the J-hook latch 2624 in the closed position such that the proximal end of the J-hook latch handle 2625 is aligned with the lock keeper 2602. The proximal end of the J-hook latch handle 2625 and the lock keeper 2602 each have a recess 2603 (shown in FIG. 40) through which a locking mechanism can extend through. The J-hook latch 2624 and lock keeper 2602 combination is the typical latching mechanism for securing a sliding or roll-up door for a trailer that provides a recess for insertion of a standard padlock for securing the contents of the trailer. However, other trailer door latching configurations exist that can also provide a recess for use of the sliding or roll-up door bracket 2600 for securing and monitoring the contents of a trailer.
[0178] FIG. 34 illustrates the sliding or roll-up door 2620 in the closed position with the roll-up door bracket 2600 being placed in position for mounting through the recess 2603 (shown in FIG. 40) on the proximal end of the J-hook latch 2624 and the recess on the lock keeper 2606. During installation, the bolt 2604 extends through the recess 2603 coupling the sliding or roll-up door bracket 2600 and the lock keeper 2602 (shown in FIG. 40).
[0179] FIG. 35 illustrates the sliding or roll-up door 2620 in the closed position with the sliding or roll-up door bracket 2600 installed. The bolt 2604 (shown in FIG. 34) being installed through the recess in the lock keeper 2602 and the proximal end of the J-hook latch 2624.
[0180] FIG. 36 illustrates an overhead view of the sliding or roll-up door bracket 2600. The roll-up door bracket 2600 can provide location tracking, door monitoring as well as a locking mechanism. The sliding or roll-up door bracket 2600 can be attached to the sliding or roll-up rear door lock keeper 2602 (shown in FIGs. 32-35) of a trailer. The roll door bracket 2600 provides a strong, weather proof enclosure for the CSD 140 because the monitoring electronics will be located outside of the protection of the container 130 (shown in FIG. 1 ). In one embodiment, the sliding or roll-up bracket 2600 comprises a bolt 2604, a strike 2606, and a housing 2608. The housing 2608 can contain the CDS 140, the strike 2606 and an activation switch 8. The bolt 2604 can pass through an opening on the trailer door latch 2602, connecting the bracket 2600 with the roll-up door. The strike 2606 can be mounted on the housing 2608. The housing 2608 can be attached to the container 130 (shown in FIG. 1 ) at location such that the strike 2606 can be aligned with the bolt 2604 when the roll-up door is closed.
[0181] The housing 2608 includes an activation switch 8 and the roll-up door 2620 (shown in FIGs. 32-35) has an activator configured and mounted to activate the CSD 140 when the bolt 2604 is moved out of a position aligned with the strike 2606. Additionally and/or alternatively, the housing 2608 and the strike 2606 preferably are at least partially integrated into a single structure. In some embodiments, the strike 2606 can provided as a separate structure that is connected with the housing 2608. Additionally and/or alternatively, the arm extension 2610 and the bolt 2604 are at least partially integrated into a single structure. In some embodiments, the arm extension 2610 and bolt 2604 can provided as a separate structures that are connected together.
[0182] The CSD 140 located inside the housing 2608 of the roll-up door bracket 2600 can communicate with sensors 310 mounted internal to the container 130 (shown in FIG. 1 ) via wireless communications such as but not limited to a Bluetooth communication protocol. Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices. Bluetooth uses a radio technology called frequency-hopping spread spectrum. The transmitted data are divided into packets and each packet is transmitted on one of the 79 designated Bluetooth channels. Each channel has a bandwidth of 1 MHz. Bluetooth 4.0 uses 2 MHz spacing which allows for 40 channels. The first channel starts at 2402 MHz and continues up to 2480 MHz in 1 MHz steps. Bluetooth communications usually perform 1600 hops per second, with Adaptive Frequency-Hopping (AFH) enabled. Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to seven slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 μβ intervals. Two clock ticks make up a slot of 625 μβ; two slots make up a slot pair of 1250 μβ. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1 , 3 or 5 slots long, but in all cases the master transmit will begin in even slots and the slave transmit in odd slots. A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology), though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave). The Bluetooth communications can provide for short range communication between sensors 310 inside the container 130 and the CSD 140 that is outside the container 130.
[0183] FIGs. 36 and 37 provide an illustration of the interior of the roll-up door bracket 2600. FIG. 36 illustrates the roll-up door bracket 2600 in the open or unlocked position. The roll-up door bracket 2600 comprises an extension arm 2610 including an embedded magnet 7 which activates a magnetically operated switch 8 inside the housing 2608 of the roll-up door bracket 2600. The magnetically operated switch 8 is designed to detect the unlocking/removal on the sliding or roll-up door bracket 2600 from the trailer door latch 2602. In some embodiments the housing can contain a plurality of magnetic switches 8. The housing 2608 can also contain the sensors 310, battery 370A and antenna 360 for the CSD 140.
[0184] FIG. 37 illustrates the roll-up door bracket 2600 in the closed or locked position with the embedded magnet 7 positioned to activate the magnetically operated switch 8. The roll-up door bracket 2600 includes a sliding latch with several components: a bolt extension 2604, an arm extension 2610, and a housing 2608. The bolt extension 2604 is configured to slide into the housing 2608 that is configured to receive the arm extension 2610. The bolt extension 2604 can extend into the strike 2606 that is affixed to the outside of the housing 2608. The bolt 2604 is configured to pass through an opening on the trailer door latch 2602 (shown in Fig. 40) that is attached to the sliding or roll-up door 2620 (shown in FIGs. 32-35) of the trailer.
[0185] FIG. 38 illustrates an exterior profile view of the roll-up door bracket 2600 in the unlocked position. In the depicted embodiment of the roll-up door bracket 2600, the proximal end of the arm extension 2610 is mounted to an angled bracket 2613. On the top surface of the angled bracket 2613 an extension 2615 is mounted. On the extension 2615 a bolt 2604 is mounted in such a way that it is aligned with an opening on the strike 2606 mounted on the housing 2608.
[0186] FIG. 39 illustrates an exterior profile view of the roll-up door bracket 2600, of FIG. 34, in the closed or locked position. As can be seen, the bolt 2604 fits into the opening of the strike 2606. The distal end of the arm extension 2610 can extend through an opening 2616 (shown in FIG. 38) in the housing 2608. An opening 2617 on the distal end of the arm extension 2610 can provide for the installation of a locking device on the roll-up door bracket 2600. In some
embodiments, the locking device can include a standard padlock. [0187] FIG. 40 illustrates another profile view of the roll-up door bracket 2600. In this illustration, the roll-up door bracket 2600 interfaces with the trailer door lock keeper 2602 that is attached to the roll-up door 2620 (shown in FIGs. 32-35). The distal end of the arm extension 2610 passes through an opening 2616 (shown in FIG. 34) in the housing 2608.
[0188] FIG. 41 illustrates another embodiment of a locking device for use outside the container 130. The collar bracket 2700 can be used on any type of container and 2-door trailers with external locking shafts 2710 (shown in FIG. 42). The collar bracket 2700 includes an incorporated CSD 140 that provides monitoring of contents of the container 130, location tracking, door monitoring, as well as a locking mechanism. The collar bracket 2700 provides a clearly visible structural locking system to deter potential intrusions. As with the roll-up door bracket 2600, the enclosure for the collar bracket 2700 is designed to be mounted on outside of the container 130. The collar bracket 2700 can include an enclosure 2708 that houses the CDS 140. The some embodiments the enclosure 2708 can be weatherproof.
[0189] The collar bracket 2700 can comprise a first beam 2706 extending from a first bracket 2707, the distal end region of the first beam 2706 can have an embedded magnetic sensor 2712 (shown in FIGS. 44-45), a second beam 2705 extending from a second bracket 2702 for receiving the distal end region of the first beam and having a plurality of magnetic switches 2714, 2716 (shown in FIG. 44-45) for detecting a position of the first beam 2706 relative to a locked position, wherein the first and second brackets 2707, 2702 include first and second bracket members 2708, 2703 for engaging a door of the cargo container 130.
[0190] The first bracket 2707 is coupled to the first beam 2706 such that the first member 2708 of said first bracket 2702 extends toward a region between the first and second brackets. The second beam 2705 can be configured to receive the proximal end of the first beam 2706 inside the second beam 2705. A second bracket 2702 can be coupled to a proximal end region of the second beam 2705 such that the second member 2703 extends toward a region between the first and second brackets when coupled.
[0191] The first bracket 2708 and first member 2708 are coupled forming a first preselected angle. The second bracket 2702 and second member 2703 are coupled forming a second preselected angle. In some embodiments, the first and second preselected angles are right angles or are L-shaped. Additionally and/or alternatively, the first bracket 2707, the first member 2708, and the first beam 2706 preferably are at least partially integrated into a single structure. Similarly, the second bracket 2702, second member 2703, and second beam 2705 preferably are at least partially integrated into a single structure. Alternatively, the first and second members 2708, 2703 respective first and second brackets each can be integrated into single structures that are coupled respectively with first and second beams 2706, 2705.
[0192] A recess 2704 can be formed extending through the second beam
2705 and through the distal end of the first beam 2706. A locking mechanism such as a standard padlock, not shown, can extend through the recess 2704 securing the housing 2705 and the beam 2706 in place. In some embodiments, the first beam
2706 can have multiple recesses to accommodate variation of the spacing between the locking shafts 2710 of the container 130.
[0193] FIG. 42 illustrates the collar bracket 2700 in the open or unlocked position being installed around the locking shafts 2710 of a trailer. As shown the first and second bracket members 2708, 2703 engage with the cam lock shafts 2710 to secure the contents of the container 130.
[0194] FIG. 43 illustrates the collar bracket 2700 in the closed or locked position around the locking shafts 2710 of a trailer. As can be seen the first and second angled brackets prevent the locked collar bracket 2700 from being removed from the locking shafts 2710 of a trailer. With the collar bracket 2700 installed, the locking shafts 2710 of the trailer cannot be opened. The CSD enclosure 2708 can include a sensor 310, a battery 370A, and an antenna 360.
[0195] FIG. 44 illustrates an overhead view of the collar bracket 2700 in the open or unlocked position. A magnetic sensor 2712 can be embedded in the proximal end of the first beam 2706. A CSD 140 can be coupled to said housing 2705, said CSD 140 comprising a plurality of magnetic switches 2714, 2716 configured to detect the unlocking of the collar bracket 2700. The magnetic switches 2714, 2716 can detect both the unlocking and disassembly of the collar bracket 2700. When the magnetic sensor 2712 moves out of alignment from the magnetic switch 2714, a signal is sent to the CSD 140 to indicate the unlocking of the collar bracket 2700. When the magnetic sensor 2712 moves past the magnetic switch 2716, a signal is sent to the CSD 140 to indicate the disassembly of the collar bracket 2700. In some embodiments, the magnetic switches 2714, 2716 can be reed switch. A reed switch allows currently to flow through a circuit when the switch is the presence of a magnetic field. When the magnetic field is removed, the switch opens disrupting the flow of current in the circuit.
[0196] FIG. 45 illustrates the collar bracket 2700 in the locked position with the magnetic sensor 2712 in line with the magnetic switch 2714. In some embodiments, the collar bracket 2700 may only have one magnetic switch 2714 or 2716 to detect either intrusion or disassembly.
[0197] The power unit 370 (shown in FIG. 3) of the CSD 140 can include one or more storage batteries 370A (shown in FIG. 3). The power unit 370 may also be configured to receive electrical power from a power source of the cargo transport vehicle. In this case, if the power source is interrupted, the power unit 370 can revert to use of the storage batteries 370A and/or solar power, for example. In the event of a power interruption or if the storage battery charge falls below a threshold level, the CSD 140 can transmit, via antennas 360 (shown in FIG. 3), a power interrupt alarm to the Bridge 150 and/or the NOC 170.
[0198] The microcontroller 330 can also implement power-management techniques to reduce power consumption. For example, one or more time windows may be specified, during initialization process or via transceivers 350A-350C, to define activation times for one or more components of the CSD 140. When not operating, (i.e., when outside the specified time windows), the CSD 140 can switch into a sleep (or low-power or suspend) mode to avoid unnecessary power utilization. In fact, sleep mode may account for a significant part of the life of the CSD 140; the CSD 140 may operate over several years without need of storage battery
replacement. In one example of operation, the CSD 140 remains awake (i.e., does not switch to sleep mode) when communicating with the Bridge 150 and/or the NOC 170. If the CSD 140 does not receive a signal from the Bridge 150 or the NOC 170, the CSD 140 will only stay awake as long as necessary to insure that no signal is present during a time windows specified. The CSD 140 can also switch from sleep to awake mode if any one anti-tamper sensor of block 310 exceeds a certain threshold level. [0199] FIG. 18 shows a block diagram illustrating one exemplary Bridge 1800. Bridge 1800 can, for example, represent bridge 150 of FIG. 1 . The Bridge 1800 comprises a Microcontroller unit 1810, GPS receiver 1830, Cellular Modem 1840A, Satellite Modem 1840B, WLAN Interface 1840C, Ethernet interface 1850A, User interface 1850B, External connection interface 1850C, Antennas Block 1860 and Power Unit 1870. The block of Antennas 1860 includes GPS antenna 1860A, Cellular antenna 1860B, Satellite antenna 1860C, and International Frequency Band Local Area Communication antenna 1860D. The Cellular modem 1840A is utilized to communicate with the NOC 170 via cellular communication channel 160A, for example. The Satellite modem 1840B is utilized to communicate with the NOC 170 via satellite communication channel 160B, for example. The WLAN interface 1840C is utilized to communicate with the CSD 140 via LAN 160C. The CSD 140 communicates to the NOC 170 via the Bridge 1800. Communication from the CSD 140 to the NOC 170 is less costly when the Bridge 1800 is utilized to relay the communication, as compared to when the CSD 140 communicates with the NOC 170 via cellular or satellite communications channels. In one example, the CSD 140 transmits the system status, including any alert status, to the Bridge 1800 upon request of the NOC 170.
[0200] FIG. 46 depicts an alternate method 2800 of operation of the container security device 140 for conserving stored power such as battery power. The method 2800 comprises calculating, at 2804, an arrival time of a selected cargo container using the current geographic location and a predetermined destination. The method also comprises optimizing, at 2806, a power consumption of the container security device based on the arrival time to destination. The current geographic location can be determined using a location sensor on the selected container or on the transportation vehicle/vessel of the selected container. The power source that is optimized can be the power consumption of any power storage device such as rechargeable batteries.
[0201] FIG. 47 depicts a block diagram of the modified system 2900 of operating the CSD 140 for conserving battery power. The Network Operation Center 170 can communicate with the CSD 140 via cellular 160A communications. The Power Management Unit 2902 monitors the status of the batteries 370A. This power management information can transmitted via an electrical signal from the Power Management Unit 2902 through electrical wiring to the container security device 140. The CSD 140 can provide instructions to the wireless channel controller 2910 the sensor units 2920 for optimizing battery life.
[0202] In some embodiments the Network Operation Center 170 can be used for monitoring the travel of the container 130 and setting basic operation modes to reduce the power consumption of the batteries 370A for the CSD 140. As a result, the arrival time of the container 130 becomes predictable and the consumption of the batteries 370A can be optimized over the trip. Therefore, the operation of the CSD 140 can be controlled to ensure that the container 130 reaches its destination before the batteries 370A for the CSD 140 are discharged.
Using the data from the CSD 140 and its own database, the system server 2220 of the Network Operations Center 170 determines the time At remaining to the arrival of the container at destination. Thus, the client (owner of the container) can be kept informed about the expected arrival time, and the most effective operational modes for the CSD 140 and sensor unit 2920 can be defined. The time At can be determined using a pre-defined prediction model in view of the following data: remaining distance to the destination; current and forecasted weather on the shipping route; and statistics of previous travels along the same route.
[0203] On arrival at destination the weight coefficients of the prediction model can be adjusted. Thus, for each new shipment At can be determined with greater precision.
[0204] To determine parameters (e.g., temperature, acceleration, light) around the container 130, sensor unit 2920 positioned in various points around the container 130 can be connected to the CSD 140 via a wireless channel. Each sensor unit 2920 includes an interconnected sensor, a battery and a communication unit for wireless communication with the CSD 140. Optionally, the sensor unit 2920 can include its own non-volatile memory module, not shown.
[0205] Using the time At determined as above, the system server 2220 can determine operational modes for the CSD 140 and each sensor unit 2920, as well as parameters of communication protocol for data exchange.
[0206] More specifically, the frequency rate of scanning for each of the sensors can be determined. It shall be noted that most of the time the CSD 140 and the sensor unit 2920 can be in sleeping mode in which energy consumption is minimized. According to a schedule generated by the system server 2220, not shown, the sensor unit 2920 can "wake up" and read the data from the sensors. When it is time for the CSD 140 to "wake up", the sensor unit(s) 2920 can send the data to the CSD 140 via a wireless channel. Finally, both the CSD 140 and the sensor unit 2920 can "go to sleep" again.
[0207] Alternatively, after the sensor unit 2920 reads the data from its sensor, the CSD 140 can remain asleep, and the sensor unit 2920 can save the data in its own non-volatile memory module. This can allow the CSD 140 to operate according to a customized power schedule not linked to the schedule of the sensor unit 2920 and get the results of several readings stored in the memory of the sensor unit 2920. The wireless channel used for connection between the CSD 140 and sensor units 2920 can have a protocol which allows: a) receiving data (including remaining capacity for the battery) from the sensor unit 2920; b) sending from the CSD 140 to the sensor unit 2920 the setting representing the time remaining to the moment the sensor unit 2920 shall quit the sleeping mode, connect to the CSD 140 and send the data stored in its memory; and c) sending to the sensor unit 2920 instructing concerning frequency of scanning
[0208] In some embodiments charging sockets for the batteries 370A can be used in the CSD 140 and the sensor units 2920 are arranged on their respective housings. Thus, the batteries 370A can be repeatedly charged without opening respective housings, and the CSD 140 and sensor units 2920 remain sealed all the times.
[0209] In some embodiments a reference measuring device can be installed on each battery 370A for measuring charging current and discharging current to calculate the capacity characteristic of the battery 370A. The battery characteristic measurement can be individual for each battery 370A. Using the measured battery characteristic, the remaining battery capacity can be determined with greater precision. Also, the degree of the battery degradation growing with charge- discharge cycles can be determined.
[0210] In the process of discharging, the remaining battery capacity can be evaluated by integration of current consumption. Coefficients for the integration can be adjusted as a result of the battery charging measurement made from the reference device. The degree of the battery degradation can also be determined. On arrival at destination the battery 370A can be charged using a charging device. A reference device can be connected in parallel for measuring the discharge current and charge current as a function of the remaining (accumulated) capacity. This allows the reference device to determine the charging capacity characteristics of the batteries 370A. Therefore, discharge of the batteries 370A can be determined with greater precision. Thus, the consumption of the batteries capacity can be optimized to allow using the batteries 370A of reasonable capacity and ensure that the container reaches its destination before the batteries 370A are discharged.
[0211] In some embodiments, inductive charging can be used to charge batteries 370A inside the containers. In one embodiment, the system comprises a CSD 140, having at least one rechargeable battery and an appropriate battery charging circuit connected thereto, and a support unit which can be placed in close proximity to the CSD 140 during battery charging. Placing the support unit in close proximity to the CSD 140 inductively couples them so that no cabling or mechanical connections are necessary. The support unit can includes a primary winding of a transformer, a power amplifier and a modulator. The power amplifier derives power from an AC power source, such as an AC outlet, via a power cord.
[0212] The CSD 140 can include a secondary winding connected in parallel with the input of a full wave bridge rectifier, the output of which is connected to the battery charging circuit. When the support unit is positioned in proximity to the CSD 140 such that the primary and secondary windings can be inductively coupled, the amplified signals in the primary winding induce corresponding signals of the same frequency in the secondary winding. The rectifier circuit can rectify the induced signals to a level of direct current (DC) appropriate for charging the battery and can output the rectified signal to the charging circuit. [0213] The signals induced in the secondary winding can alternatively be used as a direct source of operating power for the CSD 140. Rather than being applied to the battery charging circuit, as described above, the induced signals can be input, via the rectifier, to a sink of electrical power, which sink can then be used as a source of operating power for the CSD 140.
[0214] The Bridge 1800 includes a power unit 1870, which may receive power from a power network 1870B. In the event that this power network 1870B is interrupted, the power unit 1870 can be configured to switch over to utilize Storage batteries 1870A. This power interruption can be detected by the microcontroller unit 1810, for example, which may transmit an alarm message to the NOC 170. The alarm message can, for example, identify the bridge 1800 by an identification code, the location of the ship provided by the GPS receiver 1830, the date and time of the alarm, and further description of the alarm event (e.g., loss of ship's power).
[0215] FIG. 19 is an exemplary block diagram illustrating an embodiment Stationary Bridge 1900. The Stationary Bridge 1900 can be placed in the areas of high container concentration, such as places of consolidation/deconsolidation of containers, ports, terminals, etc. The Stationary Bridge 1900 can be used for continuous communication with the NOC 170. Stationary Bridge 1900 comprises the WLAN Interface 1910 and the Ethernet interface 1920. In one embodiment, the Stationary Bridge 1900 may not include a user interface. Further, since the geographical location of the Stationary Bridge 1900 remains the same, it may not require a GPS receiver.
[0216] FIG. 20 is an exemplary block diagram illustrating an embodiment of Portative Bridge 2000. The Portative Bridge 2000 can be used where containers are transported, such as on ships, trains, etc. The Portative Bridge 2000 comprises a GPS receiver 2010, a Cellular Modem 2020A, a Satellite modem 2020B, a WLAN 2020C, an External connection interface 2030 and an Antenna Block 2060. In communicating with the NOC 170, the Portative Bridge 2000 uses cellular 160A and satellite 160B communication channels. In one embodiment, the Portative Bridge 2000 may not have a user interface.
[0217] FIG. 21 is an exemplary block diagram illustrating an embodiment of Service Bridge 2100. The Service Bridge 2100 can be used to support and communicate with at least one CSD 140. The Service Bridge 2100 can comprise a cellular modem 2120A, a satellite-modem 2120B, a WLAN 2120C, a user interface 2130A, an External connection interface 2130B, and an Antenna block 2160. The service Bridge 2100 can communicate with the NOC 170 via other Stationary and/or Portative Bridges (e.g., portative bridge 1 100) using UBFT 160C and/or through the Cellular 160A and/or satellite 160B communication channels.
[0218] FIG. 22 is an exemplary diagram illustrating an embodiment NOC 2200. The NOC 2200 can, for example, represent NOC 170 of FIG. 1 . The NOC 2200 can comprise a plurality of terminals 2210 and servers 2220 interconnected via Internet 2250. The servers 2220 may include a Data Base 2230. The data base 2230 can, for example, be used to store sensor data and can contain archives of container events received from at least one CSD 140. The data base 2230 can also store information pertaining to the location and condition of cargo containers. The NOC 170 can use the services of a Commercial world-wide digital cellular communication operator 2260A, configured to communicate with the CSD 140 and/or the Bridge 150 via the cellular communication channels 160A. The NOC 170 can also use the service of a Commercial world-wide satellite digital communication operator 2260B that is configured to communicate with the CSD 140 and/or the Bridge 150 via satellite communication channels 160B.
[0219] FIG. 23 is a detailed diagram illustrating an embodiment of the system server 2220, wherein the system server 2220 is illustrated as interacting with other system elements. The system server 2220 can comprise a software complex and a database 2230. Generally, the system server 2220 includes the following software: database, program for communication with CSD 2380, programs for communication with operator terminals 2350, and program for analysis of CSD sensor data 2370.
[0220] The database 2230 comprises identification and custom data of secured objects, their condition, CSD operation parameters and commands issued to security modules by system operators. The database can also include data from CSD sensors for its further detailed examination by server means.
[0221] The CSD communication program 2380 receives CSD data during communication session established directly or via bridge, moves the data to server database, extracts operator commands and required service data from the database and sends them to modules.
[0222] The operator terminal communication program 2350 could be used for data exchange with custom terminal programs installed on user computers, or for development of web interface accessible by any authorized user from any computer without dedicated software installed. Accordingly, there can be two types of operator terminals: a computer with terminal application installed 2310; and a computer with a web browser 2330. The computer with terminal application installed 2310 has the advantage of quick data exchange. The computer with web browser 2330 provides easy access to the system. Both applications handle operator commands issuing to CSD, their saving in the database and transfer of information about secured objects from database to operator terminals.
[0223] The CSD sensor data analysis program 2370 is used when CSD software is incapable of processing sensor data to the level sufficient for deciding on the condition of a secured object due to its limited computing performance. The CSD sensor data analysis program extracts CSD sensor data from the database, processes it and concludes about the condition of CSD and secured object.
Calculation results are stored in server database 2230.
[0224] FIG. 24 is an exemplary flowchart illustrating an embodiment of method 2399 for monitoring container integrity. When production of the CSD 140 takes place, the CSD 140 gets initiated at 2400. The initiation at 2400 includes a data packet that is downloaded into the microcontroller 330 of CSD 140. The data packet includes certain parameters that remain unchanged during the lifetime of the CSD 140. These parameters include an identification code for the CSD 140, an address of a server that may be used to communicate with the CSD, and associated parameters of communication, etc. The initiation of the CSD 140 can, for example, be done by the Bridge 150 or other equipment (not shown).
[0225] The operation of the CSD 140 is cyclic. Each CSD 140 cycle lasts one container trip/route (i.e., from the moment of uploading to before the unloading of the container 130). At the route start, the CSD 140 is activated by the Bridge 150 or the NOC 170. During activation of the CSD 140, at 2402, the microcontroller 330 of CSD 140 is cleared of any previously stored information. New information pertaining to the container's route and movement schedule, as well as parameters and logic that use regimes pertaining to the safety of the container 130, are downloaded into the microcontroller 330. The CSD 140 is placed in the active mode, at 2402, by the Bridge 150 or by the server 2220 of the NOC 170.
[0226] During the container's route, condition of the container 130 and its cargo are continually or periodically monitored. During the container's route, the microcontroller 330 of the CSD 140 checks for an alert status from the integrated sensor processing procedure 470 at 2404. Then, at 2406, the microcontroller 330 checks if it is a time for the packet of the information pertaining to the container's condition to be sent to the NOC 170. Then at 2408, the microcontroller 330 also checks if the request for communication with the NOC 170 was received from the Bridge 150. If the NOC 170 receives a message containing an alert status from the CSD 140, the NOC 170 sends a request to the GPS receiver 340 of the CSD 140. In response to this request, the GPS receiver 340 determines the geographical location of the CSD 140 at 2410 and sends this location information to the microcontroller 330.
[0227] The CSD 140 can also determine its geographical location by requesting location information from the bridge 150. The microcontroller 330 can also periodically request location information from either the GPS receiver 340 or the bridge 150. When the microcontroller 330 sends the request to the GPS receiver 340 at 2420, the GPS receiver 340 determines the geographical position of the container 130 at 2422.
[0228] At 2412, the CSD 140 establishes connection to the NOC 170. The CSD 140 communicates with the NOC 170 through the Bridge 150 using Unlicensed International Frequency Band Local Area Communication Network 160C. However, if the CSD 140 unable to communicate with the NOC 170 through the Bridge 150, the CSD 140 may communicate with the NOC 170 via cellular communications channels 160A or satellite communications channels 160B. The CSD's
communication via the Bridge 150 may be less expensive and may also save energy, as compared to contacting the NOC 170 directly via cellular 160A or satellite 160B communication channels.
[0229] During communication, at 2412, between the CSD 140 and the NOC 170, the CSD 140 sends the information packet to the NOC 170. This packet can include one or more of the transmission time, the channel of communication, level of batteries charge, location of the CSD 140, etc. In response to this information, the NOC 170 requests that the CSD 140 perform certain commands, at 2414, pertaining to further operation of the CSD 140, including a regime for monitoring the container's safety, etc. In one example, the CSD 140 can receive a command from the NOC 170 to deactivate the CSD 140. At 2416, the CSD 140 verifies that the received command is a deactivation command and, if it is, the CSD 140 deactivates at 2418; otherwise at 2404-2416, steps are performed continually until a deactivation command is received. In one example, the CSD 140 can deactivate at route completion before the cargo is unloaded. During this deactivation period, the CSD 140 ceases to monitor containers and cargo safety.
[0230] The proposed system could be employed not only for providing security to general ISO containers, but also for ensuring safety of other moving objects, such as vehicles, boats, etc., as well as of remote fixed objects, e.g. country houses. The difference in these cases is the mobile module at secured object.
[0231] FIG. 25 is an exemplary diagram illustrating an embodiment of a personal conditions monitoring system 2500. The personal conditions monitoring system 2500 could be employed for monitoring health conditions and accumulated workload of physically-weakened persons, those in need for constant medical supervision, as well as specialists directly engaged in potentially-dangerous activities. For example, the personal conditions monitoring system 2500 can be used with military and special services personnel, professional drivers, athletes, alpinists, etc. Generally, security module could be used for monitoring personal conditions, accumulated physical load, for recording events occurred to the person (falling, impacts, changes of position of the body, traveling in transport, etc.), as well as for recording events in the immediate vicinity of the person (gunshots, explosions, changes of temperature and humidity, etc.).
[0232] Monitoring module, for example can be the CSD 140, which comprises the sensor array 310 and ADC 320, computing subsystem comprised of the microcontroller 330 and memory unit, communication subsystem including the transceiver 350 and the antenna 360, and power subsystem with replaceable batteries 370. The combination of sensors is determined by the purpose of the module. For most applications, the accelerometers 310C can be used as they enable to monitor position and movement of a person, his pulse and a number of events in the surroundings, and electrodes for measuring amplitude-time parameters of heart biopotentials (ECG), and electrical impedance of the body to automatically estimate functional state of cardiovascular system on the basis of data obtained in examination of electrical activity of the heart, type of vegetative regulation of the rhythm and central geodynamic parameters obtained in automatic syndromal ECG diagnostics, heart rate variability analysis and impedance gram analysis of the body.
[0233] In its operation, monitoring module continuously monitors sensor indications, performs initial processing of measured values, concludes about the condition of the person or events occurred to him, and sends data to the server 2220. Data is sent to server if personal conditions have changed or when certain emergency events occur, and periodically, e.g., hourly. Data can be transferred over a wireless Wi-Fi based link 160C or using cellular networks 160B. The server 2220 receives information from the monitoring module 140, performs its additional processing if necessary, and stores it in the database 2230. In emergency cases, server sends standard message service (SMS) notification to phone numbers specified for the person. Terminal program displays all data on the terminal 2310 available at the server in real-time, notifying operator in emergency if necessary.
[0234] It should be noted that the matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limited sense. The following claims are intended to cover all generic and specific features described herein, as well as all statements of the scope of the present method and system, which, as a matter of language, might be said to fall there between.

Claims

CLAIMS What is claimed is:
1 . A mounting device for coupling a container security device to a cargo container, comprising:
a first beam extending from a first bracket and having a distal end region with a magnetic sensor; and
a second beam extending from a second bracket for receiving the distal end region and having a plurality of magnetic switches for detecting the magnetic sensor in the first beam and a position of the first beam relative to a locked position,
wherein the first and second brackets include first and second bracket members for engaging a door of the cargo container.
2. The mounting device of claim 1 , further comprising an enclosure attached to the second beam for receiving the container security device.
3. The mounting device of claim 1 or claim 2, wherein the first and second bracket members project toward a region between the first and second brackets.
4. The mounting device of any one of claims 1 -3, further comprising a secondary magnetic switch disposed within the first beam configured to detect removal of the first beam from the second beam.
5. The mounting device of any one of claims 1 -4, wherein said first bracket and first member form a first preselected angle.
6. The mounting device of any one of claims 1 -5, wherein said second bracket and the second member form a second preselected angle.
7. The mounting device of any one of claims 1 -6, wherein the first preselected angle is equal to the second preselected angle.
8. The mounting device of claim 1 -7, wherein the first or second preselected angle is a right angle.
9. The mounting device of any one of claims 1 -8, wherein the first beam forms a plurality of recesses for accommodating different respective configurations of a cam actuator side door lock of the cargo container.
10. The mounting device of any one of claims 1 -9, wherein the first beam further comprises a plurality of magnetic sensors for accommodating different respective configurations of a cam actuator side door lock of the cargo container.
1 1 . A mounting device for coupling a container security device to a sliding or roll-up door of a trailer, comprising: a bracket that cooperates with a housing for receiving the container security device, including: a bolt extending from the bracket; an arm projecting from the bracket extending through a recess formed by the housing; and a plurality of magnetic switches for detecting a position of said arm relative to a locked position; and a strike mounted on the housing for receiving the bolt after the bolt passes through an opening formed in a trailer door latch on the sliding or roll-up door.
12. The mounting device of claim 1 1 , wherein the housing further comprises a location sensor for determining a current location of the container.
13. A system for monitoring at least one cargo container, comprising: a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container; and a network operations center for receiving the container alert status and comprising a communications facility for communicating with at least one
telecommunication network, wherein the system calculates an arrival time of the selected cargo container to minimize an expenditure of stored energy of said container security device.
14. The system of claim 13, wherein said container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining a container alert status; a microcontroller for generating the container alert status from the output data; a communication device for transmitting at least one of the output data and the container alert status; and a global positioning sensor providing a current location of the selected cargo container.
15. A method for monitoring at least one cargo container, comprising: calculating an arrival time of a selected cargo container using a current geographic location and a predetermined destination, and optimizing power consumption of the container security device based on the arrival time to the destination.
16. The method of claim 15, further comprising determining the current geographic location of the selected cargo container from a location sensor disposed on the selected cargo container.
17. The method of claim 15 or claim 16, wherein the arrival time is updated based on a current and forecasted weather estimate along a shipping route of the selected cargo container.
18. The method of claim 15 or claim 16, wherein the arrival time is updated based on a plurality of historical statistics of previous travels along a shipping route of the selected cargo container.
19. The method of any one of claims 15-18, wherein an actual arrival time is used to update a prediction model for traveling time of the selected cargo container to a destination.
20. The method of any one of claims 15-19, further comprising programming an operational mode for the container security device and a plurality of sensors disposed within the selected cargo container based on the current geographic location of the container and an associated threat level for the current geographic location.
21 . A system for monitoring at least one cargo container, comprising: a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container; a plurality of sensor units, each unit comprising an interconnected sensor, a battery and a communication unit for wireless communication with the container security device; and a network operations center for receiving the alert status from the container security device and comprising a communications facility for communicating with at least one telecommunication network.
22. The system of claim 21 , wherein said container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining the container alert status; a microcontroller for generating the container alert status from the output data; and a communication device for transmitting at least one of the output data and the container alert status.
23. The system of claim 21 or claim 22, wherein said sensor units include an integrated memory device for storing the output data.
24. The system of any one of claims 21 -23, wherein said sensor units transmit the output data according to a schedule calculated by the container security device.
25. A method of communicating between a container security device and a plurality of sensor units, comprising: receiving sensor data from a sensor unit positioned on a container; storing the sensor data in the non-volatile memory of a memory unit contained within the sensor unit; and programming the sensor unit to exit a sleep mode and transmit the stored sensor data at a predetermined time.
26. The method of claim 25, further comprising sending an instruction for adjusting a scanning frequency for the sensor unit.
27. A system for monitoring at least one cargo container, the system comprising: a container security device for detecting a tampering violation of a selected cargo container and generating a container alert status, said cargo container security device being removably coupled with the selected cargo container; a network operations center for receiving the container alert status of the container security device and comprising a communications facility for communicating with at least one telecommunication network; and a global positioning sensor providing current geographic location of the selected cargo container, wherein the system calculates a sensor use plan based on an arrival time of the selected cargo container and a power capacity characteristic of said container security device in order to minimize an expenditure of stored energy of said container security device.
28. The system of claim 27, wherein the container security device includes: at least one anti-tamper sensor for generating output data that undergoes an individual sensor processing procedure and an integrated sensor processing procedure for determining the container alert status; a microcontroller for generating the container alert status from the output data; a reference device connected to a battery for the container security device configured to measure charging current and discharging current of the battery to determine the power capacity characteristic of the container security device; and a communication device for transmitting the capacity characteristic of the battery to the container security device.
PCT/US2015/017136 2014-12-09 2015-02-23 Transportation security system and associated methods WO2016093873A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/565,339 2014-12-09
US14/565,339 US9262896B1 (en) 2005-01-28 2014-12-09 Transportation security system and associated methods

Publications (1)

Publication Number Publication Date
WO2016093873A1 true WO2016093873A1 (en) 2016-06-16

Family

ID=56108401

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/017136 WO2016093873A1 (en) 2014-12-09 2015-02-23 Transportation security system and associated methods

Country Status (1)

Country Link
WO (1) WO2016093873A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018051323A1 (en) * 2016-09-19 2018-03-22 Emerson Climate Technologies - Transportation Solutions Aps Container shock detection system
RU187023U1 (en) * 2018-10-15 2019-02-14 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Explosion-proof magnetic contact detector
WO2019106513A1 (en) * 2017-11-28 2019-06-06 Feber Group S.R.L. Electronic lock for an access door to a closed environment and electronic system thereof to control access to the closed environment
RU191095U1 (en) * 2019-03-29 2019-07-23 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Magnetic contact anti-tamper detector
IT201800005500A1 (en) * 2018-05-18 2019-11-18 ANTI-THEFT SYSTEM FOR CONTAINERS, IN PARTICULAR, FOR CONTAINERS
RU197779U1 (en) * 2020-02-18 2020-05-28 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Magnet Contact Detector Magnet Block
USD932284S1 (en) 2020-08-21 2021-10-05 Carrier Corporation Door latch housing
EP4089604A1 (en) * 2021-05-14 2022-11-16 Carrier Corporation Systems and methods for container condition determination in transport refrigeration
US11521155B2 (en) 2018-07-13 2022-12-06 Blackberry Limited Method and system for detecting duration and cause of border delays
US11846120B2 (en) 2019-08-22 2023-12-19 Carrier Corporation Latch assembly with removable battery
WO2024042096A1 (en) * 2022-08-25 2024-02-29 Net Feasa Limited An apparatus for monitoring of transport containers

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7436298B2 (en) * 2003-10-27 2008-10-14 Savi Technology, Inc. Container security and monitoring
US8643503B2 (en) * 2005-01-28 2014-02-04 Kirill Mostov Transportation security system and associated methods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7436298B2 (en) * 2003-10-27 2008-10-14 Savi Technology, Inc. Container security and monitoring
US8643503B2 (en) * 2005-01-28 2014-02-04 Kirill Mostov Transportation security system and associated methods

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018051323A1 (en) * 2016-09-19 2018-03-22 Emerson Climate Technologies - Transportation Solutions Aps Container shock detection system
US10611545B2 (en) 2016-09-19 2020-04-07 Emerson Climate Technologie—Transportation Solutions ApS Container shock detection system
WO2019106513A1 (en) * 2017-11-28 2019-06-06 Feber Group S.R.L. Electronic lock for an access door to a closed environment and electronic system thereof to control access to the closed environment
IT201800005500A1 (en) * 2018-05-18 2019-11-18 ANTI-THEFT SYSTEM FOR CONTAINERS, IN PARTICULAR, FOR CONTAINERS
US11521155B2 (en) 2018-07-13 2022-12-06 Blackberry Limited Method and system for detecting duration and cause of border delays
RU187023U1 (en) * 2018-10-15 2019-02-14 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Explosion-proof magnetic contact detector
RU191095U1 (en) * 2019-03-29 2019-07-23 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Magnetic contact anti-tamper detector
US11846120B2 (en) 2019-08-22 2023-12-19 Carrier Corporation Latch assembly with removable battery
US11859410B2 (en) 2019-08-22 2024-01-02 Carrier Corporation Latch assembly for vertical door
US11946286B2 (en) 2019-08-22 2024-04-02 Carrier Corporation Latch assembly for vertical door and method of operating
RU197779U1 (en) * 2020-02-18 2020-05-28 Общество с ограниченной ответственностью "ЕХ-ПРИБОР" Magnet Contact Detector Magnet Block
USD932284S1 (en) 2020-08-21 2021-10-05 Carrier Corporation Door latch housing
EP4089604A1 (en) * 2021-05-14 2022-11-16 Carrier Corporation Systems and methods for container condition determination in transport refrigeration
WO2024042096A1 (en) * 2022-08-25 2024-02-29 Net Feasa Limited An apparatus for monitoring of transport containers

Similar Documents

Publication Publication Date Title
US9262896B1 (en) Transportation security system and associated methods
WO2016093873A1 (en) Transportation security system and associated methods
US8164458B2 (en) Transportation security system and associated methods
US11136788B2 (en) Door improvements and data mining via accelerometer and magnetometer electronic component
US8392296B2 (en) Active container management system
US9460593B2 (en) Container breach detector system
KR101118016B1 (en) Method and System For Monitoring Containers To Maintain the Security Thereof
GB2533964A (en) Padlock
US20240078885A1 (en) Monitoring and advanced asset recovery devices and systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15866757

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/11/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15866757

Country of ref document: EP

Kind code of ref document: A1