WO2017040525A1 - Protection inviolable de récipient par l'usage de la fabrication de fibres optiques imprimées et de capteurs intégrés - Google Patents

Protection inviolable de récipient par l'usage de la fabrication de fibres optiques imprimées et de capteurs intégrés Download PDF

Info

Publication number
WO2017040525A1
WO2017040525A1 PCT/US2016/049489 US2016049489W WO2017040525A1 WO 2017040525 A1 WO2017040525 A1 WO 2017040525A1 US 2016049489 W US2016049489 W US 2016049489W WO 2017040525 A1 WO2017040525 A1 WO 2017040525A1
Authority
WO
WIPO (PCT)
Prior art keywords
optical fiber
container
optical
substrate
fiber
Prior art date
Application number
PCT/US2016/049489
Other languages
English (en)
Inventor
Jorge Sanchez
Carol E. Fuller
Original Assignee
Opticallock, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opticallock, Inc. filed Critical Opticallock, Inc.
Priority to EP16842818.3A priority Critical patent/EP3345170A4/fr
Priority to CN201680060577.9A priority patent/CN108369769B/zh
Priority to KR1020187008997A priority patent/KR102034708B1/ko
Publication of WO2017040525A1 publication Critical patent/WO2017040525A1/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B33ADDITIVE MANUFACTURING TECHNOLOGY
    • B33YADDITIVE MANUFACTURING, i.e. MANUFACTURING OF THREE-DIMENSIONAL [3-D] OBJECTS BY ADDITIVE DEPOSITION, ADDITIVE AGGLOMERATION OR ADDITIVE LAYERING, e.g. BY 3-D PRINTING, STEREOLITHOGRAPHY OR SELECTIVE LASER SINTERING
    • B33Y80/00Products made by additive manufacturing
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/181Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
    • G08B13/183Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier
    • G08B13/186Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier using light guides, e.g. optical fibres
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B6/00Light guides; Structural details of arrangements comprising light guides and other optical elements, e.g. couplings
    • G02B6/24Coupling light guides
    • G02B6/36Mechanical coupling means
    • G02B6/3608Fibre wiring boards, i.e. where fibres are embedded or attached in a pattern on or to a substrate, e.g. flexible sheets
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B6/00Light guides; Structural details of arrangements comprising light guides and other optical elements, e.g. couplings
    • G02B6/24Coupling light guides
    • G02B6/36Mechanical coupling means
    • G02B6/3608Fibre wiring boards, i.e. where fibres are embedded or attached in a pattern on or to a substrate, e.g. flexible sheets
    • G02B6/3612Wiring methods or machines

Definitions

  • the presently disclosed embodiments and manufacturing processes relate to the prevention of tampering with a container of products to prevent substituting counterfeit products in the container, prevent theft and unauthorized access in general.
  • Shipping containers used for sea and land transport of goods are especially vulnerable to intrusion when left in a holding yard such as at a freight forwarder.
  • Containers can be compromised when illegally removed from holding yards or high-jacked while in transit.
  • An emerging issue noted especially by military shippers is a breach of a shipping container through its walls rather than through the container doors. Once a wall - breach occurs, the intruders can replace and repair the hole to make the container appear untouched. Detection of the breach becomes problematic for the shipper and the recipient of the goods until the time the contents are carefully examined. Often the time between a breach and examination can be lengthy, making it impossible to recover the lost goods and track down the intruders.
  • RFID tags are devices that are attached to the products or shipping container. They include an identification code and in some cases manufacturing information about the part. During shipment and at different locations of the supply chain, the RFID tags are scanned by equipment that applies radio frequencies to the tag and reads the identity of the part to determine if the tag will return the correct information. If this is the case, then the product is believed to be authentic.
  • RFID Radio Frequency Identification
  • a tag cannot be added to many of the miniature electronic devices such as resistors, capacitors, and many increasingly smaller integrated circuit packages, which are much smaller than an RFID tag.
  • the dimensions of a 01005 resistor is only 0.4mm by 0.2 mm; placing a tag on one of these devices is not physically nor economically feasible.
  • Critical mechanical parts have had tags inserted in the part itself. This approach will also be subject for tag removal or hacking of the tag code, and will only be successful using the more complex tags with a read block. In this last case there will be a significant cost increase and the addition of the tag embedded in the part can affect its performance.
  • RFID tags can be hacked where the part information can be read and placed in another fresh tag which can then be attached to counterfeit product.
  • RFID tags vary in price from 10 cents to several dollars each. Some of them have a "read block" feature in place meant to prevent tampering, however, this feature requires a State Machine or a processor function to be placed in the tag, therefore only the more costly tags will have the feature.
  • the read block tags will individually be placed in the more costly products, but they will still be subject to the issues previously described.
  • Embodiments disclosed herein address the above-stated needs to protect consumers from counterfeit parts and protecting goods during shipment by showing a method and apparatus designed for that protection.
  • the described technology relates to an arrangement of an optical fiber(s) that covers the six sides of the interior of a container, which include the bottom, the top, the two sides, and end walls.
  • An objective of the described technology is to embed optical fibers in media using specialized manufacturing techniques such as large scale rollers and in addition to embed fibers and sensors in media with the use of ink jet printing techniques. These approaches enable the solutions to be sufficiently low in cost so that they can be readily adopted by the market and used for any sized and shaped shipping container.
  • Optical fiber is embedded in a medium such as non-woven fabric, paper, cardboard, wood products, plastic sheets or other conformable, flexible media.
  • the arrangement of the described technology forms what is known as an Optical Shield Wallpaper.
  • the Optical Shield Wallpaper utilizes properties in optical fibers, which upon a parametric light wave measurement provides a characteristic profile that is unique to a particular fiber and fiber physical arrangement. This characteristic profile accounts for the fiber's bends, cracks, transmission modes, chromatic dispersion and other effects is known as the Optical Signature.
  • the parametric measurements may include time related measurement of light transmission, wavelength related measurement of light transmission, modulation of wavelength of light, modulation of amplitude for a single wavelength or multiple wavelengths, and/or polarization of light. It should be noted that any other characteristic response property of an optical fiber could be used to meet the objectives of the described technology.
  • the parametric information is revealed upon the application of laser light from an external laser source or other suitable light source.
  • the parametric measurement can be done at the product manufacturing facility, at the consumer location, or in a real-time manner with an embedded laser system.
  • a proprietary digital signal processing program selects various portions of the parametric measurement characteristics, in a predetermined or random manner, implements a mathematical algorithm to transform the measurement characteristics, and then encodes the information for security purposes.
  • the encoded information produced by the mathematical algorithm is known as the Identity Code.
  • the Identity Code is a unique identification of characteristics embedded in the fiber and is an encrypted, randomized subset of the information found in the Optical Signature.
  • the Identity Code along with the part number, date of manufacture, serial number, manufacturing location, part name, lot number, manufacturing line, test station, and physical characteristics constitute what is known as the Pedigree information.
  • the Optical Shield wallpaper uses various parametric measurements that affect the light transmission properties of optical fibers. For example, if an optical fiber is deliberately cracked in various areas, the cracks will cause any travelling light in the fiber to reflect back to the light source at time intervals, which are dependent on the location of the crack along the fiber. Another property of the fiber is known as dispersion, which causes any laser pulses injected into one end of the fiber to broaden in time before they reach the opposite end. When laser light is injected at one end of the fiber it is detected at the opposite end of the fiber. The specific wave-shape of the pulse received at the end of the fiber becomes one of the elements used to generate a unique Optical Signature.
  • a third property of the fiber is experienced when the optical fiber creates distortions including additional wavelength characteristics if the fiber is bent in any particular way. This creates a specific profile of laser light that can be observed with an optical spectrum analyzer. Additional properties of light transmission in an optical fiber such as light polarization, backscatter reflections such as Rayleigh, Brillouin or Raman can be used to produce the necessary parameters used to obtain a unique Optical Signature. One or more transmission characteristics from the Optical Signature of the fiber similar to, but not limited to, the prior examples can be selected by the proprietary digital signal processing program to generate the Identity Code. After the Code is initially generated at the manufacturing facility, the Code is embedded in the Pedigree and then sent on a secure Internet channel to the consumer and/or embedded in the RFID tag.
  • any tampering of a package or a breach of the container wall will affect the Identity Code, and upon making a measurement, the consumer can compare the Code received to the Code measured and any difference exceeding a given threshold will reveal that intrusion has occurred, thus making the shipment suspect.
  • the Optical Shield Wallpaper installed on a container's walls will detect a breach, and notification of a breach of the container can be immediately sent to a designated recipient. Immediate notification of a container breach enables rapid response by appropriate authorities who can potentially prevent or interrupt an unauthorized intrusion.
  • a method of protection and detection of counterfeits for products involves taking a parametric measurement of an Optical Shield embedded in a package or surrounding the product or blanketing the interior walls of any container.
  • the measurement is taken at the product manufacturing facility and an Identity Code is obtained.
  • the Identity Code is encrypted and embedded in a Pedigree.
  • the Pedigree is sent to a customer specified location in the supply chain over a secure communications channel.
  • the receiver of the shipment of goods takes a similar measurement and verifies that the Identity Code is the same, which provides confidence that no tampering has occurred.
  • the Optical Shield Wallpaper in the described technology utilizes different types of response properties of optical fibers.
  • a type of light source for example, an LED light source, or a laser light source (fixed wavelength or tunable wavelength)
  • an amplitude modulated light source for example, a light source whose wavelength is modulated, or other appropriate light source
  • Response properties can be, for example: time related measurement of light transmission, wavelength related measurement of light transmission, modulation of frequencies of light, modulation of amplitude of a single wavelength or multiple wavelengths, and/or polarization of light. It should be noted that any other characteristic response property of an optical fiber could be used to meet the objectives of the described technology.
  • an article of manufacture for the protection of products from counterfeits is disclosed.
  • the Article includes optical fiber as a continuous web embedded in a medium such as non-woven fabric, paper, cardboard, wood products, plastic sheets or other conformable, flexible media.
  • the resulting combination is known as Optical Shield Wallpaper.
  • the Optical Shield Wallpaper is used to line the walls of a container or package to cover all six sides.
  • the beginning and end of the continuous fiber connects to an intelligent, autonomous detection unit called an iLockBox.
  • the iLockBox includes all of the necessary hardware and software required to monitor and report on the status of the wallpaper integrity.
  • Some of the functional elements in the iLockBox include but not limited to: GPS; RFID; battery; optical transceiver; communication channels for Internet, satellite, Bluetooth, and mobile; software, algorithm, and firmware for signal processing and encryption of communications.
  • FIG. 1 shows a typical shipping container used to transport goods over air, sea and land
  • FIG. 2 shows a breakdown of the different sides of a typical shipping container used to transport goods over air, sea and land;
  • FIG. 3a shows an embodiment of how the Optical Shield Wallpaper can be constructed
  • FIG. 3b shows a typical large scale manufacturing process for the Optical Shield Wallpaper
  • FIG. 4 is an embodiment of the Optical Shield Wallpaper as applied to one surface of a container
  • FIG. 5a shows how different Optical Shield Wallpaper panels can be applied to all interior surfaces of a container
  • FIG. 5b shows the application of an optical shield protection to a small container with medicines using ink jet printing manufacturing
  • FIG. 6 illustrates how the continuous web of Optical Shield Wallpaper connects to the iLockBox
  • FIG. 7 is an embodiment of the process used to characterize the container secured with the Optical Shield Wallpaper using the iLockBox.
  • FIG. 8 illustrates the monitor loop operation process used to protect the container from intrusions DETAILED DESCRIPTION OF CERTAIN INVENTIVE EMBODIMENTS
  • the disclosed embodiments provide a process for tamper proof security of a shipping container of any size or configuration.
  • a package with an optical fiber and a process including a test system and digital signal processing software allows a shipping container to be protected on all sides.
  • illustrations and discussions are directed to a shipping container, similar approaches will apply for other containers such as with a semi- truck, fixed storage container, train cars, secure warehouse or other type or storage that needs to be protected against unauthorized access or tampering.
  • FIG. 1 illustrates a typical shipping container 100, showing that it has six sides that need to be protected, any of which are vulnerable to unwanted intrusion.
  • a container as described herein can be any size or shape, and moved by any of the typical shipping methods used today, which is by air, land or sea.
  • FIG. 2 is a breakdown of all of the sides of a shipping container 200.
  • the sides are the top side 201, the bottom side 203, the left side 202, the right side 205, the back side 204 and the front 207.
  • 206 represents an overlapping flap where additional Optical Shield Wallpaper is placed in order to protect the entrance to the container.
  • FIG. 3a, 300 shows an illustration of how an Optical Shield Wallpaper 300 is made and which is used to protect the container.
  • the Optical Shield Wallpaper includes a flexible conformable media 305, over which a suitable optical fiber 303 may be applied or embedded and fixed in place.
  • the material can be paper, plastic, cloth, nonwoven material, wood product or any other conformable material that can accept the optical fiber.
  • the optical fiber can be glued to the backing material, can be embedded into the material when it is manufactured, or alternatively it is possible to place the fiber between two layers of the backing material as in a sandwich arrangement.
  • the optical fiber 302 is routed in a way to form a grid which can be rectilinear or any manner of random arrangement such that it does not allow penetration of a person, hands or arms or tools or the removal of goods from the container without disrupting the optical fiber arrangement.
  • Fig. 3 it shows one possible arrangement for the optical fiber where it is first routed in a horizontal pattern and then shows in 303 it is routed in a vertical pattern.
  • the beginning of the fiber is connected to an input fiber optic connector 301 and the end of the fiber is connected to an output fiber optic connector 304.
  • the fiber optic connectors can meet different standards such as FC, SC, SMA, or some other configuration or standard, or can be a customized connector.
  • the Optical Shield Wallpaper may include a layer of adhesive to facilitate binding the Optical Shield Wallpaper to the sides of the container.
  • FIG. 3b shows a possible manufacturing process for the Optical Shield Wallpaper.
  • 3b 1 is a roll including optical fiber which is pretreated with an adhesive 3b2 which is applied by means of an adhesive print system 3b6. The optical fiber is then applied to a media or substrate 3b3.
  • the adhesive 3b2 can be an encapsulate or other commercially available pressure-sensitive adhesive. Activation of the encapsulate or pressure-sensitive adhesive 3b2 is done with a pair of high pressure rollers 3b4 rotating as shown by arrows 3b5. The high pressure of the rollers forces the fiber onto the media 3b3 and activates the adhesive 3b2 on the fiber thus attaching it to an appropriate media or substrate 3b3.
  • the rollers 3b4 can be heated.
  • Figure 4, 400 illustrates how the Optical Shield Wallpaper can be applied to one of the six sides of the container to form a panel.
  • the Optical Shield Wallpaper 300 is applied to the wall of the container by using attachment pins or by using adhesive to apply it like standard wallpaper on a wall.
  • the Optical Shield Wallpaper can be protected from damage by an additional protection layer of material 403 which can be made out of wood, plastic, metal or some other protective material and attached to the side wall 202 of the container.
  • Connectors 301 and 304 will be available to connect the panel with the Optical Shield Wallpaper to additional panels to provide complete wall coverage.
  • Figure 5a, 500 illustrates the arrangement used to protect the sides 202, 204, 205, and 207, the top 201, and the bottom 203 of a container to prevent tampering.
  • a portion of the top 201 and the bottom 203 with their Optical Shield Wallpaper 300 and their respective protection layer or material 403 are shown for illustration purposes.
  • Several panels of The Optical Shield Wallpaper are shown attached to the mentioned sides of the container. In this case there are six Optical Shield Wallpaper panels 300.
  • the fiber in each of the panels is connected to the adjacent panel as shown in connection points 501 using connectors 301 at the beginning of the fiber and connectors 304 at the end of the fiber corresponding to each Optical Shield Wallpaper 300.
  • the optical fiber in the Optical Shield Wallpaper panel forms a continuous circuit so an optical signal is sent into connector 301 of a given panel will circulate through the fiber and an output signal will come out of connector 304.
  • Optical Shield Wallpaper panels can be attached to the top 201 and on the bottom 203 of the container. This arrangement will thus form a complete continuous loop of optical fiber in an arrangement that will cover the six interior walls of the container. Note that the Optical Shield Wallpaper panels can be overlapped so that there are no gaps in the coverage of the sides of the container.
  • the Optical Shield Wallpaper protection arrangement on the front side 207 shows the addition of an overlapping flap 206 used to protect the door of a container (or a cover, or an entrance to the container).
  • the overlapping flap 206 can be made of a similar material as the protective layer 403.
  • the Optical Shield Wallpaper 300 can be adhered to the overlapping flap 206.
  • the entire loop of fiber covering all six sides terminates in two connectors which are attached to the iLockBox 600, or a detection device, which is described in detail in Figure 6. Once the iLockBox is connected to connectors 301, 304 for the beginning and the end of the fiber loop respectively, the ends of the container 207 can be closed and the container will be secured.
  • Figure 5b shows an embodiment of the technology as it is applied to a small container with medicines or other valuable material.
  • the medicine container may be, for example, a common plastic container used to package tablets, capsules, powders and liquids.
  • the container cap 5b 1 is a plastic cap that closes the container bottle 5b2.
  • the optical fiber shield is made of a shrink wrap material in a cylindrical shape 5b3 that is the carrier of an optical fiber that conforms the optical fiber shield to a junction of the container bottle 5b2 and the container cap 5b 1.
  • light sensors which can detect light that is transmitted through the optical fiber, can be inkjet printed along with the optical fiber.
  • the optical fiber shield is placed oonn tthhee ccaarrrriieerr 55bb33 uussiinngg aann iinnkk jjeett ppririnnttiinngg mmaannuuffaaccttuurriinngg tteecchhnniiqquuee wwhhiicchh aallssoo aalllloowwss tthhee ppllaacceemmeenntt ooff aapppprroopprriiaattee sseennssoorrss aalloonngg tthhee lleennggtthh ooff tthhee ooppttiiccaall ffiibbeerr sshhiieelldd oorr ooppttiiccaall ffiibbeerr..
  • HHoowweevveerr wwhheenn tthhee sseeccoonndd sseennssoorr sseennsseess tthhee lliigghhtt,, tthhee bbrreeaacchh wwiillll bbee ddeetteecctteedd,, ssiinnccee tthhee bbrreeaacchh wwoouulldd hhaavvee aalltteerreedd tthhee pphhyyssiiccaall cchhaarraacctteerriissttiicc ooff tthhee ooppttiiccaall ffiibbeerr bbeettwweeeenn tthhee ffiirrsstt aanndd sseeccoon
  • TThhuuss aa uusseerr wwiillll bbee aabbllee ttoo ddeetteecctt tthhee llooccaattiioonn ooff tthhee bbrreeaacchh eeaassiieerr bbyy hhaavviinngg mmuullttiippllee sseennssoorrss tthhaatt aarree ppllaacceedd aalloonngg tthhee lleennggtthh ooff tthhee ooppttiiccaall ffiibbeerr..
  • Figure 6, 600 shows an embodiment of the iLockBox used to activate the Optical Shield Wallpaper which can notify shippers and owners of the goods, about potential intrusions.
  • iLockBox used to activate the Optical Shield Wallpaper which can notify shippers and owners of the goods, about potential intrusions.
  • FIG. 6 shows a top view of the sides of the container 500 as was done in Figure 5 with the understanding that the top 201 and bottom 203 of the container are also covered with the Optical Shield Wallpaper.
  • the iLockBox is not drawn to scale relative to the sides of the container. This was done to illustrate the details and functionality of the iLockBox.
  • the iLockBox includes the electronic and optical hardware and software used to detect intrusions into the container and to notify user of the intrusion in real time.
  • the iLockBox connects to the Optical Shield Wallpaper surrounding the container at location 601 where transmitter 602 in the iLockBox generates an optical signal which is injected into the optical fiber of the Optical Shield Wallpaper.
  • the optical signal in the transmitter may be from a semiconductor laser, an LED or other suitable light source.
  • the light circulates in the optical fiber loop of the Optical Shield Wallpaper and is received at connector 611 and detected by the receiver 610.
  • the iLockBox may include an RFID tag 603 and a GPS locator 604.
  • the Microcontroller or processor MCU 605 includes embedded software used to manage operations and to host the control system.
  • An event recorder 606 can be set to continuously monitoring the Optical Shield Wallpaper to ensure the loop is not affected by breaking or by changing its signature characteristic.
  • the event recorder can also be set to periodically monitor the Optical Shield Wallpaper, or to record an event at the time the event occurs.
  • the event recorder 606 is used to store the history of the information generated by the iLockBox 600 monitoring, its general operation and any access of the container during a given period of time.
  • a battery module 607 powers the system during the period of time when the container is protected. Typically the period of time can be arbitrarily extended by providing a sufficient amount of battery energy stored.
  • a Digital Signal Processor 609 is used to carry out multiple operations related to the generation of an optical signature for the Optical Shield Wallpaper as well as execution of mathematical models and statistical models.
  • the Digital Signal Processor 609 can also be implemented in software resident in the MCU 605.
  • Another module in the iLockBox 600 is the communications interface hardware. This is used to communicate to the user in a near or remote location the status of the container. Some of the communication interfaces 612 can be to a mobile phone via short distance wireless, to a cellular tower or an RF receiving tower, a land line, satellite, fiber optics cable and other types of communication channels. There are several methods used in the described technology used to prevent the deliberate isolation of the container for the purpose of keeping it from notifying the user that tampering is occurring. In one method the user system in a server can query the iLockBox 600 on a periodic basis to detect status.
  • a nonmetallic window such as glass in a given area of the container can be used to place a satellite antenna on the inside of the container to broadcast any tampering occurring in real time or in an event driven mode.
  • the non-metallic window can be protected from disturbance by a panel of Optical Shield Wallpaper that in this case is made with a material that will not block RF frequencies coming out of the antenna. The antenna is therefore not prevented from transmitting at any time. Both methods can be used at the same time for greater communication and security assurance.
  • Figure 7, 700 shows a process executed in the iLockBox 600 used to acquire a unique signature for the Optical Shield Wallpaper.
  • first step 701 we apply a signal to the fiber optic loop in the Optical Shield Wallpaper.
  • second step 702 we conduct a modulation of the optical carrier frequency (or wavelength) signal in the optical domain and apply a modulation signal envelope used to modulate the optical carrier.
  • the modulation envelope may apply AM, FM or any other type of modulation.
  • the carrier may be modulated as well by changing the wavelength of the light source. Both time and frequency modulation can be done in the electrical domain and in the optical domain one at a time or by a simultaneous time and frequency modulation.
  • step 703 we detect the optical signal after it circulated through the Optical Shield Wallpaper fiber loop.
  • the optical signal is converted to and electrical signal and it is digitized.
  • step 704 we perform a digital signal processing algorithm to extract a unique signature. This is done by a detection of the modulation elements, by detecting signal dispersion, optical polarization, chromatic dispersion, absorption reflection or other optical effect characteristic of the fiber section we are using.
  • Other relevant information produced by the various elements of the iLockBox 600 is collected in step 705 such as GPS location, RFID information, event recorder information, etc.
  • the information is then encrypted and sent in step 706 to a secure server over a secure communications channel.
  • various optical modules can be used to insert optical attenuation and distortion and can be arbitrarily used by placing them in between connection points 501 to further randomize the signature to make it unique and robust, free of efforts to counterfeit the signal.
  • the same information sent to the secure server is stored in the event recorder in step 707.
  • the ends of the container can be closed.
  • the system goes into a mode where the loop is continuously operated and monitored, or periodically or event driven monitoring.
  • FIG 8, 800 shows a process executed in the iLockBox 600 used to monitor the container security.
  • step 801 we apply an optical signal to the Optical Shield Wallpaper optical fiber loop.
  • step 802 we detect, amplify and digitize the optical signal coming out of the Optical Shield Wallpaper loop.
  • step 803 we obtain the signature of the Optical Shield Wallpaper optical fiber loop.
  • step 804 we compare the obtained signature with the signature obtained when the container was first closed and which was stored in the event recorder.
  • step 805 we determine if the signal is different or the same. If the signature comparison is the same between the two measurements, the loop is initialized again to continue the monitor mode. If the comparison is different, at 806 an alarm is sent to the server using one of the available communication channels.
  • more than one communication channel may be used to notify sever about tampering for redundancy and to prevent an intruder from cutting off real-time communication with the server.
  • the continuous monitoring loop can be adapted so it executes at a programmable intervals of time in order to save battery power. Another way to save battery power is to monitor and notify based on events, such as an intrusion, or unauthorized opening of the any of the container sides.
  • the various illustrative logical measurement techniques and processes to generate a Pedigree may be implemented in a variety of combined approaches.
  • the specifics of the apparatus used to test fiber responses used to generate the Optical Signature information can be expected to vary depending on the specific implementation of the described technology.
  • the described functionality in varying ways for each particular application for different types of parts, systems, equipment and other shipment products, but such implementation decisions should not be interpreted as causing a departure from the scope of the present described technology.
  • Variation of fiber characteristics can be dependent on temperature at the measurement location, package and container deformations. The operator can adjust the fiber optic characteristic measurement thresholds to account for those effects.
  • An external optical lock securing the doors of a shipping container may be used to further secure the opening of the container to provide a physical security barrier that mechanical opposes the unauthorized opening of the container.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Optics & Photonics (AREA)
  • Chemical & Material Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Materials Engineering (AREA)
  • Packages (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

Les modes de réalisation selon l'invention concernent un procédé de protection inviolable de récipients servant à l'expédition de biens. Une fibre optique est incorporée dans un revêtement de protection optique qui recouvre toutes les surfaces intérieures de toute taille d'un récipient d'expédition, d'un paquet, d'une boîte, d'un tonneau ou d'un récipient d'une autre forme. Le revêtement est fabriqué au moyen de rouleaux à grande échelle qui pressent la fibre optique comportant des adhésifs encapsulés sur un support approprié. De petits récipients de médicaments sont protégés par une protection en fibre optique et des capteurs fabriqués au moyen de techniques à jet d'encre. De la lumière est appliquée à la fibre optique et une mesure des caractéristiques de la fibre optique est réalisée. Un traitement de signal numérique sert à générer des informations de pedigree, qui peuvent inclure des éléments comme le lieu d'expédition, les numéros de série et les numéros de lots des biens. L'état du système inviolable autonome est contrôlé en temps réel afin de détecter des intrusions non autorisées. Les intrusions détectées sont relayées à un destinataire autorisé par divers canaux de communication.
PCT/US2016/049489 2015-08-30 2016-08-30 Protection inviolable de récipient par l'usage de la fabrication de fibres optiques imprimées et de capteurs intégrés WO2017040525A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP16842818.3A EP3345170A4 (fr) 2015-08-30 2016-08-30 Protection inviolable de récipient par l'usage de la fabrication de fibres optiques imprimées et de capteurs intégrés
CN201680060577.9A CN108369769B (zh) 2015-08-30 2016-08-30 通过使用印刷光纤制造和集成传感器的容器防篡改保护
KR1020187008997A KR102034708B1 (ko) 2015-08-30 2016-08-30 인쇄된 광섬유 제조 및 통합 센서들의 사용에 의한 용기 위조-방지 보호

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562211816P 2015-08-30 2015-08-30
US62/211,816 2015-08-30

Publications (1)

Publication Number Publication Date
WO2017040525A1 true WO2017040525A1 (fr) 2017-03-09

Family

ID=58188370

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/049489 WO2017040525A1 (fr) 2015-08-30 2016-08-30 Protection inviolable de récipient par l'usage de la fabrication de fibres optiques imprimées et de capteurs intégrés

Country Status (4)

Country Link
EP (1) EP3345170A4 (fr)
KR (1) KR102034708B1 (fr)
CN (1) CN108369769B (fr)
WO (1) WO2017040525A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020169359A1 (fr) * 2019-02-21 2020-08-27 Inl - International Iberian Nanotechnology Laboratory Marquage d'un objet
EP4074536A3 (fr) * 2021-04-16 2022-12-21 Viavi Solutions Inc. Disposition de membrane de détection à base de fibre optique

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111399154A (zh) * 2019-10-21 2020-07-10 张国基 一种智能化无纺布底材光纤的布设系统
US20230286702A1 (en) * 2020-08-14 2023-09-14 Logistics and Supply Chain MultiTech R&D Centre Limited An anti-tampering container
CN112061551B (zh) * 2020-09-08 2022-05-27 拍拍看(海南)人工智能有限公司 防打孔保险包装物

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3854792A (en) * 1973-03-22 1974-12-17 Atomic Energy Commission Fiber optic security seal
US20070210173A1 (en) 2006-03-13 2007-09-13 Nagel Andreas R System, method and device to detect product tampering
US20090115607A1 (en) 2004-11-05 2009-05-07 Tamperproof Container Licensing Corp. Tamper detection system
WO2010071803A2 (fr) 2008-12-19 2010-06-24 University Of Maine System Board Of Trustees Système de détection de brèche pour conteneurs
US20150017402A1 (en) * 2012-02-28 2015-01-15 Nippon Kayaku Kabushiki Kasha Water-based inkjet ink for tampering detection, method for inkjet printing using same, and printed article
US20150226637A1 (en) * 2013-07-31 2015-08-13 Jorge Sanchez Method and Optical Shield for Detecting Tampering

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050063638A1 (en) * 2003-09-24 2005-03-24 Alger William O. Optical fibers embedded in a printed circuit board
JP2006032020A (ja) * 2004-07-13 2006-02-02 Sharp Corp 液晶表示装置
JP2006189672A (ja) * 2005-01-07 2006-07-20 Nippon Sheet Glass Co Ltd 光学モジュール
KR101296242B1 (ko) * 2010-11-30 2013-08-14 한국조폐공사 위변조방지용 카드 및 카드의 위변조 판별방법
JP5644574B2 (ja) * 2011-02-18 2014-12-24 日本電気株式会社 光モジュール及び光モジュール搭載基板

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3854792A (en) * 1973-03-22 1974-12-17 Atomic Energy Commission Fiber optic security seal
US20090115607A1 (en) 2004-11-05 2009-05-07 Tamperproof Container Licensing Corp. Tamper detection system
US20070210173A1 (en) 2006-03-13 2007-09-13 Nagel Andreas R System, method and device to detect product tampering
WO2010071803A2 (fr) 2008-12-19 2010-06-24 University Of Maine System Board Of Trustees Système de détection de brèche pour conteneurs
US20150017402A1 (en) * 2012-02-28 2015-01-15 Nippon Kayaku Kabushiki Kasha Water-based inkjet ink for tampering detection, method for inkjet printing using same, and printed article
US20150226637A1 (en) * 2013-07-31 2015-08-13 Jorge Sanchez Method and Optical Shield for Detecting Tampering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
See also references of EP3345170A4
TIM WOLFER ET AL., PROCEDIA TECHNOLOGY, vol. 15, 1 January 2014 (2014-01-01), pages 521 - 529

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020169359A1 (fr) * 2019-02-21 2020-08-27 Inl - International Iberian Nanotechnology Laboratory Marquage d'un objet
CN113366518A (zh) * 2019-02-21 2021-09-07 Inl-国际伊比利亚纳米技术实验室 物体的标记
EP4074536A3 (fr) * 2021-04-16 2022-12-21 Viavi Solutions Inc. Disposition de membrane de détection à base de fibre optique

Also Published As

Publication number Publication date
CN108369769A (zh) 2018-08-03
EP3345170A1 (fr) 2018-07-11
CN108369769B (zh) 2019-11-01
EP3345170A4 (fr) 2019-08-28
KR102034708B1 (ko) 2019-10-21
KR20180086409A (ko) 2018-07-31

Similar Documents

Publication Publication Date Title
US10107014B2 (en) Security system with anti-tampering sensors and cybersecurity
US10388129B1 (en) Container tamper-proof protection by use of printed fiber optics manufacturing and integrated sensors
KR102034708B1 (ko) 인쇄된 광섬유 제조 및 통합 센서들의 사용에 의한 용기 위조-방지 보호
CN108368710B (zh) 具有防篡改传感器和网络安全的安全系统
US7170409B2 (en) Tamper evident packaging
US7646292B2 (en) Methods and systems for verifying the position and status of hierarchically arranged objects
US7274289B2 (en) System and device for detecting object tampering
US20060195705A1 (en) Tamper Evident Seal System and Method
US20100283580A1 (en) Device and method for detecting the opening of a vessel
SE545584C2 (en) A sample holding device, a system, and a method for securing non-tampering of a sample
US20230130945A1 (en) Secure shipment container and related methods
JP2008140146A (ja) 開封検知システム
US20240153411A1 (en) Variable pattern shield protection system for a tamper-evident container
WO2023069364A1 (fr) Conteneur d'expédition sécurisé et procédés associés
Johnston et al. How to be a Better Seal User
Rizzo et al. An Innovative RFID Sealing Device to Enhance the Security of the Supply Chain.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16842818

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20187008997

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2016842818

Country of ref document: EP