ZA201009190B - Anti-theft system - Google Patents

Anti-theft system Download PDF

Info

Publication number
ZA201009190B
ZA201009190B ZA2010/09190A ZA201009190A ZA201009190B ZA 201009190 B ZA201009190 B ZA 201009190B ZA 2010/09190 A ZA2010/09190 A ZA 2010/09190A ZA 201009190 A ZA201009190 A ZA 201009190A ZA 201009190 B ZA201009190 B ZA 201009190B
Authority
ZA
South Africa
Prior art keywords
identifier
signal
response
interrogating
signals
Prior art date
Application number
ZA2010/09190A
Inventor
Jochanan Hosea Romm
Original Assignee
Jochanan Hosea Romm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jochanan Hosea Romm filed Critical Jochanan Hosea Romm
Publication of ZA201009190B publication Critical patent/ZA201009190B/en

Links

Landscapes

  • Burglar Alarm Systems (AREA)

Description

Lo ]
DE Tot
Page 2
BACKGROUND OF THE INVENTION
[0001] This invention relates to an anti-theft system. More particularly the invention is concerned with a system for deterring the theft of luggage and baggage and the pilfering of baggage items.
[0002] The invention is described hereinafter with reference to the air travel industry but it is to be understood that this is exemplary only and is non-limiting.
[0003] Many people travel by air. In most instances a traveller has one or more baggage items which are checked in to be carried in a hold of an aircraft and which are not carried by the traveller into a cabin of the aircraft.
[0004] It is a fairly common occurrence that unaccompanied baggage is pilfered.
Often the baggage is scanned in an X-ray machine or similar device and an unscrupulous person thereby gains knowledge of at least some of the contents of an item of baggage and these contents can be targeted.
[0005] When an item of baggage is checked in the traveller concerned is given a baggage token. A corresponding token or label is attached to the baggage. This helps to establish a link between the traveller and the baggage item. However at a destination baggage items unloaded from an aircraft are placed on a carousel or similar mechanism. Each traveller is then free to gain possession of, and reclaim, his baggage. At this point theft is commonplace for there is little or no
P22275/sb _ L
+ ) ¢ a oC
Page 3 ; official supervision, and a dishonest person can easily claim an item of baggage which is not his.
[0006] The invention aims to address, at least partly, the aforementioned situations.
SUMMARY OF THE INVENTION
[0007] The invention provides a method of combating theft of an object which includes the steps of attaching a first identifier to the object, allocating a second identifier to a person who is authorised to possess the object, allowing the object to pass a surveillance point, at the surveillance point interrogating the first identifier to generate a first response signal, if possible, interrogating the second identifier to generate a second response signal, and allowing passage of the . object past a boundary if the first and second response signals are associated with each other in a predetermined way and are generated within a predetermined time period of each other.
[0008] The first identifier may be in the form of a transponder which is attached, for example, to a luggage item. The second identifier may, similarly, be a transponder.
[0009] In one form of the invention each transponder is a passive device i.e. it does not require an on-board or accompanying power supply.
P22275/sb
[0010] The first and second response signals are uniquely associated with each other. If the signals are received substantially at the same time and validated then this is taken as an indication that the authorised person is in possession of the object. If there is a time interval between the first and second response signals or if only one of the response signals is received then this is taken as an indication of a breach of security.
[0011] If only the first response signal is received then steps are taken to intercept the passage of the object past the boundary.
[0012] in a variation of the invention when the object is closed, i.e. not accessible, an interrogating signal does not elicit a response i.e. the first identifier is inoperative. If the object is opened or made accessible in an authorized manner then, again, the interrogating signal does not elicit a response. However if the object is opened or made accessible in an unauthorized manner then the first identifier is made operative and a response is produced upon reception of an interrogating signal.
[0013] This latter form of the invention is intended particularly to detect when pilferage of an object takes place and to narrow the zone in which such pilferage takes place. For example if an object is moving on a conveyer belt or from one location to another it is caused to move in succession past a plurality of spaced interrogating points at each of which an interrogating signal is produced. If the object has not been tampered with then the interrogating signal does not produce
P22275/sb
A. a response. However if the object has been tampered with then a component within the object is damaged and this is used as a trigger to produce a response when the object is subjected to an interrogating signal.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] The invention is further described by way of examples with reference to the accompanying drawings in which :
Figure 1 schematically depicts an anti-theft system according to the invention; and
Figure 2 shows an arrangement according to the invention designed to deter pilferage of baggage.
DESCRIPTION OF PREFERRED EMBODIMENTS
[0015] Figure 1 of the accompanying drawings illustrates an anti-theft system 10 according to the invention implemented, for example, at an airport terminal. This application is exemplary and is non-limiting.
[0016] Typically at an arrival section at an airport a number of baggage items are deposited on a carousel. Travellers who have arrived with their baggage then scrutinize the carousel and remove their own items of luggage. This situation creates an opportunity for theft for an unauthorized person can easily remove an item of luggage which is not his.
P22275/sb
)
[0017] At a departure point, e.g. at check in, a traveller 12, apart from complying with normal check in requirements, is handed a token 14 (notionally shown) in any suitable form e.g. a voucher or receipt, which contains a passive transponder 16. An item of luggage 18, checked in by the traveller, has applied to it a label 20 which carries a passive transponder 22 (also notionally shown).
[0018] The transponders 16 and 22 are uniquely associated with each other.
Each transponder is passive and thus does not require an onboard power supply.
However if interrogated each transponder emits a unique signal. The transponders emit signals which are uniquely linked to each other. For example the transponder 16 may emit an unique signal in binary form and the transponder 22 may emit the same signal plus a defined difference e.g. one. This is exemplary only and is non-limiting. Other sets of transponders at the departure section are similarly linked to each other but the signals which are emitted upon interrogation differ from transponder set to transponder set.
[0019] At an arrival point a legitimate passenger 12 secures access to his item of luggage 18. The traveller is then guided past a boundary line 30 at which is located a processor 32. The processor constantly operates an interrogating transmitter 34 which emits interrogating signals to which a person, who is crossing the boundary line 30, is subjected. In the given example the transponders 16 and 22 respond to the interrogating signal by emitting respective unique identifying signals which are received by the processor 32 and analysed.
If the signals are uniquely linked to each other and are received within a
P22275/sb predetermined time interval, which typically is of the order of one or two seconds, then it is taken that the traveller 12 is entitled to have possession of the luggage item 18. The traveller can then pass the boundary line unhindered. If the signals are not uniquely associated with each other or if only one signal is received, whether from the transponder 16 or from the transponder 20, then it is taken that the person crossing the boundary line has either misplaced an item of luggage, which in the normal course of events is unlikely, or has in his possession an unauthorized item of luggage i.e. there is an identification problem or attempted theft has taken place. In any event under each of these conditions an alarm 36 is activated to alert security personnel to the situation. Appropriate remedial action can then be taken. For example the person crossing the line can be questioned or the item of luggage can be inspected.
[0020] Figure 2 shows a refinement to the arrangement described in connection with Figure 1. An item of luggage 40 is closed or sealed using any suitable technique which makes use of a closure device which has a lock 42 or a cord 44.
The sealing is done in such a way that the luggage item 40 can only be opened if the lock is unlocked or if the cord is severed.
[0021] The lock or cord 42 carries a small electronic circuit 46 which includes a coded transmitter 50 which is similar to the transponder 22. The opening of the lock 42 in an unauthorized manner, for example by forcing the lock, or the severing of the cord 44, causes closure of a sensitive electronic switch 52. When this occurs the transmitter is operative and responsive to an interrogating signal
P22275/sb
£2090/09190 and, upon receipt thereof, the coded transmitter then emits a signal which indicates that tampering has taken place. If the lock has not been opened, or if the lock is opened in an unauthorised manner, then the transmitter is inoperative and the transmitter does not respond to an interrogating signal.
[0022] The item of luggage is moved in succession, in the normal cause of handling, past a plurality of spaced interrogating points at each of which is located a respective interrogating transmitter 34A, 34B, 34C.... Thus, if the interrogating transmitters are suitably spaced apart, it is possible to identify with a reasonable degree of geographical accuracy where pilferage is taking place and the culprit can be more readily identified and appropriate action can be taken.
[0023] In each example of the invention, to enhance the degree of security, the signals which are emitted, in response to an interrogation signal, can be stored beforehand in a database. When emitted signals are received then, in addition to any other checks or verification which may take place, the signals are compared to the signals which are stored in the database. If the comparison is negative then this is indicative that an unauthorized signal has been emitted in response to the interrogating signal. This precaution helps to avoid a false or counterfeit signal, generated in an unauthorized manner, from being taken as a legitimate signal.
P22275/sb

Claims (7)

oo. iy oe Page 9 : CLAIMS .
1. A method of combating theft of an object which includes the steps of attaching a first identifier to the object, allocating a second identifier to a person who is authorised to possess the object, allowing the object to pass a surveillance point, at the surveillance point interrogating the first identifier to generate a first response signal, if possible, interrogating the second identifier to generate a second response signal, and allowing passage of the object past a boundary if the first and second response signals are associated with each other in a predetermined way and are generated within a predetermined time period of each other.
2. A method according to claim 1 wherein the first identifier is a transponder.
3. A method according to claim 1 wherein if the first and second response signals are received substantially at the same time and validated then this is taken as an indication that the authorised person is in possession of the object.
4. A method according to claim 1 wherein if there is a time interval between the first and second response signals or if only one of the response signals is received then this is taken as an indication of a breach of security. P22275/sb
5. A method according to claim 1 wherein the object has a closed mode in which the first identifier is inoperative and an open mode in which the first identifier is operative.
6. A method of detecting tampering with an object which can be open or closed and which is associated with a transponder, wherein the closed object is moved in succession past a plurality of spaced locations and, at each location, is subjected to an interrogating signal which elicits a responding signal from the transponder only if the object has been opened.
7. An anti-theft system wherein signals which are respectively generated, in response to at least one interrogating signal, by first and second transponders, linked to an object and a person respectively, are compared and a security breach is indicated if the signals do not have a predefined relationship to each other. DATED this 20" day of December 2010 McCALLUM RADEMEYER lied Patent Agents for the Appligant P22275/sb
ZA2010/09190A 2009-11-19 2010-12-20 Anti-theft system ZA201009190B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
ZA200908143 2009-11-19

Publications (1)

Publication Number Publication Date
ZA201009190B true ZA201009190B (en) 2011-08-31

Family

ID=56363030

Family Applications (1)

Application Number Title Priority Date Filing Date
ZA2010/09190A ZA201009190B (en) 2009-11-19 2010-12-20 Anti-theft system

Country Status (1)

Country Link
ZA (1) ZA201009190B (en)

Similar Documents

Publication Publication Date Title
US7646292B2 (en) Methods and systems for verifying the position and status of hierarchically arranged objects
US5933098A (en) Aircraft security system and method
US7342497B2 (en) Object monitoring, locating, and tracking system employing RFID devices
USRE41172E1 (en) System and method to enhance security of shipping containers
US7839289B2 (en) Object monitoring, locating, and tracking system and method employing RFID devices
US7117121B2 (en) System and process to ensure performance of mandated inspections
US8058985B2 (en) Locking apparatus for shipping containers
US20070001854A1 (en) Object monitoring, locating, and tracking method employing RFID devices
US20060055552A1 (en) RFID device for object monitoring, locating, and tracking
US20120092130A1 (en) System and method for operating a synchronized wireless network
US20110018707A1 (en) Shipping container having integral geoclock system
US20080303663A1 (en) Method for verifying the integrity of a container
WO2006026365A2 (en) Object monitoring, locating, and tracking method, system, and rfid device
US20060266007A1 (en) Life Raft Container Security System and Method
CN108368710B (en) Security system with tamper-resistant sensor and network security
US20100264728A1 (en) System and method for creating and verifying a composite onboard identity (cobi) for a mobile entity
WO2000068921A1 (en) Cargo closure for sealing a cargo item
US6646550B1 (en) Radio frequency security system and method for a building facility
US20150015394A1 (en) System and method for alerting and tracking with improved confidentiality
US8519838B2 (en) Method and system for on-board vehicle detection of harmful material
US10832112B2 (en) Tamper-evident item and item validation system and method
ZA201009190B (en) Anti-theft system
CN110107160A (en) A kind of intelligence strip of paper used for sealing and its control method
Zeng et al. Vehicle Transport Security System Based on the Self‐Security Intelligence of Radioactive Material
WO2023041922A1 (en) Improvements to security device, packages or items with which the said devices are associated, and a method of use thereof