ZA201009190B - Anti-theft system - Google Patents
Anti-theft system Download PDFInfo
- Publication number
- ZA201009190B ZA201009190B ZA2010/09190A ZA201009190A ZA201009190B ZA 201009190 B ZA201009190 B ZA 201009190B ZA 2010/09190 A ZA2010/09190 A ZA 2010/09190A ZA 201009190 A ZA201009190 A ZA 201009190A ZA 201009190 B ZA201009190 B ZA 201009190B
- Authority
- ZA
- South Africa
- Prior art keywords
- identifier
- signal
- response
- interrogating
- signals
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 8
- 230000000246 remedial effect Effects 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Burglar Alarm Systems (AREA)
Description
Lo ]
DE Tot
Page 2
[0001] This invention relates to an anti-theft system. More particularly the invention is concerned with a system for deterring the theft of luggage and baggage and the pilfering of baggage items.
[0002] The invention is described hereinafter with reference to the air travel industry but it is to be understood that this is exemplary only and is non-limiting.
[0003] Many people travel by air. In most instances a traveller has one or more baggage items which are checked in to be carried in a hold of an aircraft and which are not carried by the traveller into a cabin of the aircraft.
[0004] It is a fairly common occurrence that unaccompanied baggage is pilfered.
Often the baggage is scanned in an X-ray machine or similar device and an unscrupulous person thereby gains knowledge of at least some of the contents of an item of baggage and these contents can be targeted.
[0005] When an item of baggage is checked in the traveller concerned is given a baggage token. A corresponding token or label is attached to the baggage. This helps to establish a link between the traveller and the baggage item. However at a destination baggage items unloaded from an aircraft are placed on a carousel or similar mechanism. Each traveller is then free to gain possession of, and reclaim, his baggage. At this point theft is commonplace for there is little or no
P22275/sb _ L
+ ) ¢ a oC
Page 3 ; official supervision, and a dishonest person can easily claim an item of baggage which is not his.
[0006] The invention aims to address, at least partly, the aforementioned situations.
[0007] The invention provides a method of combating theft of an object which includes the steps of attaching a first identifier to the object, allocating a second identifier to a person who is authorised to possess the object, allowing the object to pass a surveillance point, at the surveillance point interrogating the first identifier to generate a first response signal, if possible, interrogating the second identifier to generate a second response signal, and allowing passage of the . object past a boundary if the first and second response signals are associated with each other in a predetermined way and are generated within a predetermined time period of each other.
[0008] The first identifier may be in the form of a transponder which is attached, for example, to a luggage item. The second identifier may, similarly, be a transponder.
[0009] In one form of the invention each transponder is a passive device i.e. it does not require an on-board or accompanying power supply.
P22275/sb
[0010] The first and second response signals are uniquely associated with each other. If the signals are received substantially at the same time and validated then this is taken as an indication that the authorised person is in possession of the object. If there is a time interval between the first and second response signals or if only one of the response signals is received then this is taken as an indication of a breach of security.
[0011] If only the first response signal is received then steps are taken to intercept the passage of the object past the boundary.
[0012] in a variation of the invention when the object is closed, i.e. not accessible, an interrogating signal does not elicit a response i.e. the first identifier is inoperative. If the object is opened or made accessible in an authorized manner then, again, the interrogating signal does not elicit a response. However if the object is opened or made accessible in an unauthorized manner then the first identifier is made operative and a response is produced upon reception of an interrogating signal.
[0013] This latter form of the invention is intended particularly to detect when pilferage of an object takes place and to narrow the zone in which such pilferage takes place. For example if an object is moving on a conveyer belt or from one location to another it is caused to move in succession past a plurality of spaced interrogating points at each of which an interrogating signal is produced. If the object has not been tampered with then the interrogating signal does not produce
P22275/sb
A. a response. However if the object has been tampered with then a component within the object is damaged and this is used as a trigger to produce a response when the object is subjected to an interrogating signal.
[0014] The invention is further described by way of examples with reference to the accompanying drawings in which :
Figure 1 schematically depicts an anti-theft system according to the invention; and
Figure 2 shows an arrangement according to the invention designed to deter pilferage of baggage.
[0015] Figure 1 of the accompanying drawings illustrates an anti-theft system 10 according to the invention implemented, for example, at an airport terminal. This application is exemplary and is non-limiting.
[0016] Typically at an arrival section at an airport a number of baggage items are deposited on a carousel. Travellers who have arrived with their baggage then scrutinize the carousel and remove their own items of luggage. This situation creates an opportunity for theft for an unauthorized person can easily remove an item of luggage which is not his.
P22275/sb
)
[0017] At a departure point, e.g. at check in, a traveller 12, apart from complying with normal check in requirements, is handed a token 14 (notionally shown) in any suitable form e.g. a voucher or receipt, which contains a passive transponder 16. An item of luggage 18, checked in by the traveller, has applied to it a label 20 which carries a passive transponder 22 (also notionally shown).
[0018] The transponders 16 and 22 are uniquely associated with each other.
Each transponder is passive and thus does not require an onboard power supply.
However if interrogated each transponder emits a unique signal. The transponders emit signals which are uniquely linked to each other. For example the transponder 16 may emit an unique signal in binary form and the transponder 22 may emit the same signal plus a defined difference e.g. one. This is exemplary only and is non-limiting. Other sets of transponders at the departure section are similarly linked to each other but the signals which are emitted upon interrogation differ from transponder set to transponder set.
[0019] At an arrival point a legitimate passenger 12 secures access to his item of luggage 18. The traveller is then guided past a boundary line 30 at which is located a processor 32. The processor constantly operates an interrogating transmitter 34 which emits interrogating signals to which a person, who is crossing the boundary line 30, is subjected. In the given example the transponders 16 and 22 respond to the interrogating signal by emitting respective unique identifying signals which are received by the processor 32 and analysed.
If the signals are uniquely linked to each other and are received within a
P22275/sb predetermined time interval, which typically is of the order of one or two seconds, then it is taken that the traveller 12 is entitled to have possession of the luggage item 18. The traveller can then pass the boundary line unhindered. If the signals are not uniquely associated with each other or if only one signal is received, whether from the transponder 16 or from the transponder 20, then it is taken that the person crossing the boundary line has either misplaced an item of luggage, which in the normal course of events is unlikely, or has in his possession an unauthorized item of luggage i.e. there is an identification problem or attempted theft has taken place. In any event under each of these conditions an alarm 36 is activated to alert security personnel to the situation. Appropriate remedial action can then be taken. For example the person crossing the line can be questioned or the item of luggage can be inspected.
[0020] Figure 2 shows a refinement to the arrangement described in connection with Figure 1. An item of luggage 40 is closed or sealed using any suitable technique which makes use of a closure device which has a lock 42 or a cord 44.
The sealing is done in such a way that the luggage item 40 can only be opened if the lock is unlocked or if the cord is severed.
[0021] The lock or cord 42 carries a small electronic circuit 46 which includes a coded transmitter 50 which is similar to the transponder 22. The opening of the lock 42 in an unauthorized manner, for example by forcing the lock, or the severing of the cord 44, causes closure of a sensitive electronic switch 52. When this occurs the transmitter is operative and responsive to an interrogating signal
P22275/sb
£2090/09190 and, upon receipt thereof, the coded transmitter then emits a signal which indicates that tampering has taken place. If the lock has not been opened, or if the lock is opened in an unauthorised manner, then the transmitter is inoperative and the transmitter does not respond to an interrogating signal.
[0022] The item of luggage is moved in succession, in the normal cause of handling, past a plurality of spaced interrogating points at each of which is located a respective interrogating transmitter 34A, 34B, 34C.... Thus, if the interrogating transmitters are suitably spaced apart, it is possible to identify with a reasonable degree of geographical accuracy where pilferage is taking place and the culprit can be more readily identified and appropriate action can be taken.
[0023] In each example of the invention, to enhance the degree of security, the signals which are emitted, in response to an interrogation signal, can be stored beforehand in a database. When emitted signals are received then, in addition to any other checks or verification which may take place, the signals are compared to the signals which are stored in the database. If the comparison is negative then this is indicative that an unauthorized signal has been emitted in response to the interrogating signal. This precaution helps to avoid a false or counterfeit signal, generated in an unauthorized manner, from being taken as a legitimate signal.
P22275/sb
Claims (7)
1. A method of combating theft of an object which includes the steps of attaching a first identifier to the object, allocating a second identifier to a person who is authorised to possess the object, allowing the object to pass a surveillance point, at the surveillance point interrogating the first identifier to generate a first response signal, if possible, interrogating the second identifier to generate a second response signal, and allowing passage of the object past a boundary if the first and second response signals are associated with each other in a predetermined way and are generated within a predetermined time period of each other.
2. A method according to claim 1 wherein the first identifier is a transponder.
3. A method according to claim 1 wherein if the first and second response signals are received substantially at the same time and validated then this is taken as an indication that the authorised person is in possession of the object.
4. A method according to claim 1 wherein if there is a time interval between the first and second response signals or if only one of the response signals is received then this is taken as an indication of a breach of security. P22275/sb
5. A method according to claim 1 wherein the object has a closed mode in which the first identifier is inoperative and an open mode in which the first identifier is operative.
6. A method of detecting tampering with an object which can be open or closed and which is associated with a transponder, wherein the closed object is moved in succession past a plurality of spaced locations and, at each location, is subjected to an interrogating signal which elicits a responding signal from the transponder only if the object has been opened.
7. An anti-theft system wherein signals which are respectively generated, in response to at least one interrogating signal, by first and second transponders, linked to an object and a person respectively, are compared and a security breach is indicated if the signals do not have a predefined relationship to each other. DATED this 20" day of December 2010 McCALLUM RADEMEYER lied Patent Agents for the Appligant P22275/sb
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA200908143 | 2009-11-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA201009190B true ZA201009190B (en) | 2011-08-31 |
Family
ID=56363030
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA2010/09190A ZA201009190B (en) | 2009-11-19 | 2010-12-20 | Anti-theft system |
Country Status (1)
Country | Link |
---|---|
ZA (1) | ZA201009190B (en) |
-
2010
- 2010-12-20 ZA ZA2010/09190A patent/ZA201009190B/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7646292B2 (en) | Methods and systems for verifying the position and status of hierarchically arranged objects | |
US5933098A (en) | Aircraft security system and method | |
US7342497B2 (en) | Object monitoring, locating, and tracking system employing RFID devices | |
USRE41172E1 (en) | System and method to enhance security of shipping containers | |
US7839289B2 (en) | Object monitoring, locating, and tracking system and method employing RFID devices | |
US7117121B2 (en) | System and process to ensure performance of mandated inspections | |
US8058985B2 (en) | Locking apparatus for shipping containers | |
US20070001854A1 (en) | Object monitoring, locating, and tracking method employing RFID devices | |
US20060055552A1 (en) | RFID device for object monitoring, locating, and tracking | |
US20120092130A1 (en) | System and method for operating a synchronized wireless network | |
US20110018707A1 (en) | Shipping container having integral geoclock system | |
US20080303663A1 (en) | Method for verifying the integrity of a container | |
WO2006026365A2 (en) | Object monitoring, locating, and tracking method, system, and rfid device | |
US20060266007A1 (en) | Life Raft Container Security System and Method | |
CN108368710B (en) | Security system with tamper-resistant sensor and network security | |
US20100264728A1 (en) | System and method for creating and verifying a composite onboard identity (cobi) for a mobile entity | |
WO2000068921A1 (en) | Cargo closure for sealing a cargo item | |
US6646550B1 (en) | Radio frequency security system and method for a building facility | |
US20150015394A1 (en) | System and method for alerting and tracking with improved confidentiality | |
US8519838B2 (en) | Method and system for on-board vehicle detection of harmful material | |
US10832112B2 (en) | Tamper-evident item and item validation system and method | |
ZA201009190B (en) | Anti-theft system | |
CN110107160A (en) | A kind of intelligence strip of paper used for sealing and its control method | |
Zeng et al. | Vehicle Transport Security System Based on the Self‐Security Intelligence of Radioactive Material | |
WO2023041922A1 (en) | Improvements to security device, packages or items with which the said devices are associated, and a method of use thereof |