USRE42777E1 - Anti-theft method for detecting the unauthorized opening of containers and baggage - Google Patents

Anti-theft method for detecting the unauthorized opening of containers and baggage Download PDF

Info

Publication number
USRE42777E1
USRE42777E1 US12/057,270 US5727008A USRE42777E US RE42777 E1 USRE42777 E1 US RE42777E1 US 5727008 A US5727008 A US 5727008A US RE42777 E USRE42777 E US RE42777E
Authority
US
United States
Prior art keywords
aperture
opened
electrical
closure members
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US12/057,270
Inventor
John R. Tuttle
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Round Rock Research LLC
Original Assignee
Round Rock Research LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/151,599 external-priority patent/US5406263A/en
Application filed by Round Rock Research LLC filed Critical Round Rock Research LLC
Priority to US12/057,270 priority Critical patent/USRE42777E1/en
Assigned to ROUND ROCK RESEARCH, LLC reassignment ROUND ROCK RESEARCH, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON TECHNOLOGY, INC.
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KEYSTONE TECHNOLOGY SOLUTIONS, LLC
Application granted granted Critical
Publication of USRE42777E1 publication Critical patent/USRE42777E1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1445Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0286Tampering or removal detection of the child unit from child or article

Definitions

  • This invention relates generally to anti-theft devices and in particular to a method for detecting unauthorized opening of containers and baggage.
  • Security systems today can be as elaborate as those installed to protect banking institutions, equipped with video cameras, hooked-up as alarms to the local police station and security guards, or be as simple as a car alarm that is sounded when the door is forced open.
  • the protection system used must be compact for concealment purposes, and somewhat simple in operation, thereby making them easy to produce and install in mass quantities while being fairly easy to monitor and operate.
  • the anti-theft method of the present invention conveniently addresses all of these issues to provide a workable and fairly inexpensive solution to securing safe transportation of articles shipped in some type of enclosed shipping container.
  • the present invention introduces a method for protecting against the unauthorized opening of shipping containers which is disclosed in the several embodiments following.
  • a first embodiment comprises a simple trip-wire or magnetic circuit that provides continuity, which is detected electrically. Simply, if continuity is disabled by a forced entry of the container, electrical detection means, such as a radio-frequency-identification (RFID) transceiver tag (or simply RFID tag), will alert the owner or monitoring station.
  • RFID radio-frequency-identification
  • the trip-wire concept would require the replacing of a broken trip wire (resulting from forced entry), while the magnetic circuit concept can be reused repetitively.
  • a second embodiment comprises the magnetic circuit approach of the first embodiment by having the magnetic circuit and the detection device embedded into the shipping article during manufacturing.
  • the preferred detection device, and RFID tag could also be a battery backed transceiver type on which a replaceable or rechargeable battery could be mounted on the inside of the shipping container during manufacturing.
  • the RFID tag would communicate with an interrogator unit, which could be connected to a host computer. The interrogator and/or the host computer would then monitor the shipping container's status (opened or closed).
  • the RPID tag could also have an output that changes state upon alarm, so that another device could be connected to indicate the alarm via sound, flashing lights or other means.
  • FIG. 1 is a process flow diagram showing the major processing stations and fabrication stages used in an overall manufacturing process of an RFID tag
  • FIG. 2 is an enlarged perspective view of an RFID tag as constructed in accordance with the process flow of FIG. 1 ;
  • FIGS. 3A through 3E are cross sectional views of FIG. 2 showing the major processing steps used to construct the RFID tag;
  • FIG. 4 is a functional block diagram showing the major signal processing stages within the RFID integrated circuit chip described herein and also within the interrogation unit used to interrogate the chip;
  • FIG. 5 is a functional block diagram showing the communication between several RFID tags and interrogation unit
  • FIGS. 6 , 6 A and 6 B depict a shipping container (luggage) on which a first embodiment of the present invention has been installed;
  • FIGS. 7 , 7 A and 7 B depict a shipping container (luggage) on which a second embodiment of the present invention has been installed.
  • the process flow diagram shown in this figure includes nine (9) major processing stations or fabrication stages which are used in the overall manufacturing process steps that may be used to fabricate an RFID (radio frequency indentification) tag unit used in the anti-theft method of the present invention. These stages are described in more detail below with reference to FIGS. 2 and 3A through 3 E.
  • a circuit pattern is formed on a polymer base material in station 10 , whereafter the circuit pattern is cured and an epoxy conductive material is applied to station 12 before aligning an integrated circuit chip onto the polymer base in station 14 .
  • batteries batteries are aligned onto the polymer base in station 16 whereafter the epoxy is cured in station 18 .
  • the rear battery epoxy is applied in station 20 before adding a stiffener and then folding the polymer base over onto the top cover as indicated in station 22 .
  • the epoxy material is then cured in station 24 before providing a final sealing step in stage 26 to complete the package as described in more detail below.
  • an RFID tag is depicted that includes a base support member 30 upon which an integrated circuit chip 32 is disposed on the near end of the device and connected to a dipole antenna consisting of metal strips 34 and 36 extending laterally from the chip 32 and typically screen printed on the upper surface of the base support member 30 .
  • a pair of rectangular shaped batteries 38 and 40 are positioned as shown adjacent to the IC chip 32 and are also disposed on the upper surface of the base support member 30 .
  • the two rectangular batteries 38 and 40 are electrically connected in series to power the IC chip 32 in a manner more particularly described below.
  • the device or package shown in FIG. 2 is then completed by the addition of an outer or upper cover member 42 which is sealed to the exposed edge surface portions of the base member 30 to thereby provide an hermetically sealed and completed package.
  • the integrated chip 32 has transmitter, memory, logic, and receiver stages therein and is powered by the two batteries 38 and 40 during the transmission and reception of data to and from an interrogator to provide the interrogator with the various above identified information parameters concerning the article or person to which the RFID tag 30 is attached.
  • the integrated chip may be designed to contain the needed circuitry one skilled in the art needs to accomplish the desired task and therefore may or may not contain all the circuitry listed above.
  • FIG. 3A there is shown a plan view of the geometry of the base support member 30 and the cover member 42 which, during the initial manufacturing stage, are joined at an intersecting line 44 .
  • a conductive strip 50 is provided on the upwardly facing inside surface of the top cover 42 , so that when the cover 42 is folded by 180° C., its outer boundary 52 is ready to be sealed with the outer boundary 54 of the base support member 30 , and simultaneously the conductive strip 50 completes the series electrical connection used to connect the two batteries 38 and 40 in series with each other and further in the series circuit with the integrated circuit chip 32 through the two conductors 46 and 48 .
  • FIG. 3B shows in cross section the IC chip 32 bonded to the base support member 30 by means of a spot button of conductive epoxy material 56 .
  • the conductive strip 48 is shown in cross section on the upper surface of the base support member 30 . This figure would correspond generally to the fabrication stations 10 , 12 , and 14 in FIG. 1 .
  • FIG. 3C the battery 40 is aligned in place as indicated earlier in FIG. 2 and has the right hand end thereof connected to the upper surface of the conductive strip 48 .
  • FIG. 3 would therefore correspond to stations 16 and 18 in FIG. 1 .
  • FIG. 3D a stiffener material 58 is applied as shown over the upper and side surfaces of the IC chip 32 , to provide a desired degree of stiffness to the package as completed.
  • FIG. 3D would therefore correspond to stations 20 and 22 in FIG. 1 .
  • a conductive epoxy is applied to the upper surfaces of the two batteries 38 and 40 , and then the polymer base material 30 with the batteries thereon are folded over onto the cover member 42 to thus complete and seal the package in the configuration shown in FIG. 3E and corresponding to the remaining stations 24 and 26 in FIG. 1 .
  • the rectangular outer boundary 159 in this figure defines the active area on the integrated circuit chip in which the integrated circuit transceiver has been formed using state of the art MOS planar processing techniques. These MOS planar processing techniques are well known in the art and are, therefore, not described in detail herein.
  • an RF receiver stage 160 which is connected to an antenna 161 and via one or more lines or circuit connections 162 , to a control logic stage 164 .
  • the control logic stage 164 is in turn connected via one or more integrated circuit connections or lines 166 to a memory stage 168 .
  • the control logic stage 164 is further connected via a line 170 to a transmitter stage 174 , and the memory stage 168 is also connected via line 172 to the trasmitter stage 174 .
  • the memory stage 168 is operative to provide input data to the transmitter stage 174 upon request, and functions in a manner operationally described in the example given below.
  • FIG. 5 is a functional block diagram showing a method of communication between several RFID tags and an interrogation unit in light of the anti-theft detection units later described in FIGS. 6 and 7 .
  • Host/CPU 51 interacts with interrogator/transceiver unit 52 and instructs unit 52 to interrogate RFID tags A ( 53 ) and B ( 54 ) for alarm data. If interrogator 52 receives no reply from either tag A or tag B the host 51 continues to instruct unit 52 to interrogate tags A and B as often as internal software demands it. However, if tag A responds (in an alarm state) the interrogator unit 52 communicates that information to the host 51 and an appropriate alarm is sounded to notify personnel that unauthorized opening of a container has just taken place.
  • FIG. 6 a first embodiment of an “unauthorized opening detection device” is shown in FIG. 6 with variations of this embodiment shown in expanded views of FIG. 6 presented in FIGS. 6A and 6B .
  • shipping container 60 (luggage in this case) is adorned with an “unauthorized opening detection unit” enclosed by outlined dashed circle 62 .
  • Expanded view 6 A of dashed circle 62 shows a continuous wire 63 attached to both sides of container 60 at a first connection node 64 , then to second connection node 65 , continuing to RFID tag 67 (which is affixed to label 66 ) onto which wire 63 is attached.
  • Wire 63 then completes its continuity path by attaching tag 67 to starting point node 64 . If continuity is disrupted (wire 63 breaks by unauthorized opening of container 20 ) tag 67 would then signal the interrogator or some other device to sound an alarm and alert the owner or possibly security personnel in case of airline luggage transportation. Disarming the detection unit may be done by command from the interrogator or by the software at a given site, say at the container's destination, which may simply ignore the “opened” signal.
  • FIG. 6B shows a second means of installing a detection device wherein continuous wire 63 attaches to a first connection node 64 , continues to a second connection node 65 , routes to RFID tag 67 (which is affixed to label 66 ) and routes back to node 65 and finally to node 64 .
  • Tag 67 could be affixed to label 66 with tag 67 itself being adhered to a self-adhesive paper, such as stamp, and then applied to the label.
  • FIG. 7 A second embodiment of an “unauthorized opening detection device” is shown in FIG. 7 with this embodiment shown in expanded views 7 A and 2 B.
  • shipping container 70 (luggage in this case) is adorned with an “unauthorized opening detection unit” enclosed by outlined dashed circles 71 and 72 .
  • a magnetic contact 73 is embedded in the edge of container 70 .
  • This magnetic contact 73 is preferably located in close proximity to a latch of container 70 , or magnetic contact 73 may also function as half the latching mechanism to the container.
  • an RFID tag 78 is affixed to the top face of container 70 .
  • Electrical connections 74 extend from RFID tag 70 and attached to magnetic contacts 75 and 76 . Magnetic contacts 75 and 76 may also function as the other half of the latching mechanism to the container.
  • the detection device of FIG. 7A could be further enhanced by providing a replaceable battery 79 , a power enabling means, for powering tag 78 . It would be logical to have the battery only accessible from the inside of container 70 which would mean tag 78 would need to be embedded into container 70 and preferably embedded during the manufacturing of container 70 . With a replaceable battery powered tag, tag 78 would now have the capability to send an alert signal to an interrogator unit or other device (such as a computer controlled transceiver unit) which would monitor the status of container 70 over its entire lifetime.
  • an interrogator unit or other device such as a computer controlled transceiver unit

Abstract

A simple trip-wire or magnetic circuit associated with a shipping container provides continuity, which is detected electrically. Simply, if continuity is disabled by a forced entry of the container, electrical detection means, such as a radio-frequency-identification (RFID) tag, will alert the owner or monitoring station. The trip-wire concept would require the replacing of a broken trip wire (resulting from forced entry), while the magnetic circuit concept can be reused repetitively. In a second embodiment a magnetic circuit and the detection device (RFID tag) are embedded into the shipping article during manufacturing. The preferred detection device, an RFID tag, could also be a battery backed transceiver type on which a replaceable or rechargeable battery could be mounted on the inside of the shipping container during manufacturing. The RFID tag would communicate with an interrogator unit, which could be connected to a host computer. The interrogator and/or the host computer and/or other alarm devices would then monitor the shipping container's status (opened or closed).

Description

CROSS-REFERENCE TO RELATED APPLICATION
This applicationMore than one reissue application has been filed for the reissue of U.S. Pat. No. 5,831,531, which reissue applications are the intial reissue application Ser. No. 12/038,473, filed Feb. 27, 2008, and the present reissue continuation application Ser. No. 12/057,270, filed Mar. 27, 2008, which is a continuation application of U.S. patent application Ser. No. 12/038,473, filed Feb. 27, 2008, which is a reissue of U.S. Pat. No. 5,831,531, granted from U.S. patent application Ser. No. 08/827,037 filed Mar. 25, 1997, which is a continuation of application of U.S. patent application Ser. No. 08/421,571 filed Apr. 11, 1995, now U.S. Pat. No. 5,646,592, which is a continuation application of U.S. patent application Ser. No. 08/151,599 filed Nov. 12, 1993, now U.S. Pat. No. 5,406,263, which is a continuation-in-part of application Ser. No. 07/921,037 filed Jul. 27, 1992, now abandoned.
FIELD OF THE INVENTION
This invention relates generally to anti-theft devices and in particular to a method for detecting unauthorized opening of containers and baggage.
BACKGROUND OF THE INVENTION
Protecting personal property has become a major industry from a security system standpoint. Security systems today can be as elaborate as those installed to protect banking institutions, equipped with video cameras, hooked-up as alarms to the local police station and security guards, or be as simple as a car alarm that is sounded when the door is forced open.
Likewise, the shipping industry is faced with an increasingly growing security problem in that containers, packages, baggage, luggage and mail (all of which may be referred to as simply “shipping container” hereinafter) are vulnerable to being opened by unauthorized personnel, who might steal the contents. As this problem increases it becomes necessary to protect these articles in order to protect the customer's property.
Due to the smaller size and larger quantity of the shipping articles mentioned above, the protection system used must be compact for concealment purposes, and somewhat simple in operation, thereby making them easy to produce and install in mass quantities while being fairly easy to monitor and operate.
The anti-theft method of the present invention conveniently addresses all of these issues to provide a workable and fairly inexpensive solution to securing safe transportation of articles shipped in some type of enclosed shipping container.
SUMMARY OF THE INVENTION
The present invention introduces a method for protecting against the unauthorized opening of shipping containers which is disclosed in the several embodiments following.
A first embodiment comprises a simple trip-wire or magnetic circuit that provides continuity, which is detected electrically. Simply, if continuity is disabled by a forced entry of the container, electrical detection means, such as a radio-frequency-identification (RFID) transceiver tag (or simply RFID tag), will alert the owner or monitoring station. The trip-wire concept would require the replacing of a broken trip wire (resulting from forced entry), while the magnetic circuit concept can be reused repetitively.
A second embodiment comprises the magnetic circuit approach of the first embodiment by having the magnetic circuit and the detection device embedded into the shipping article during manufacturing. The preferred detection device, and RFID tag, could also be a battery backed transceiver type on which a replaceable or rechargeable battery could be mounted on the inside of the shipping container during manufacturing. The RFID tag would communicate with an interrogator unit, which could be connected to a host computer. The interrogator and/or the host computer would then monitor the shipping container's status (opened or closed). The RPID tag could also have an output that changes state upon alarm, so that another device could be connected to indicate the alarm via sound, flashing lights or other means.
Implementation of the present invention will become readily understandable to one skilled in the art in the detailed descriptions that follow.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a process flow diagram showing the major processing stations and fabrication stages used in an overall manufacturing process of an RFID tag;
FIG. 2 is an enlarged perspective view of an RFID tag as constructed in accordance with the process flow of FIG. 1;
FIGS. 3A through 3E are cross sectional views of FIG. 2 showing the major processing steps used to construct the RFID tag;
FIG. 4 is a functional block diagram showing the major signal processing stages within the RFID integrated circuit chip described herein and also within the interrogation unit used to interrogate the chip;
FIG. 5 is a functional block diagram showing the communication between several RFID tags and interrogation unit;
FIGS. 6, 6A and 6B depict a shipping container (luggage) on which a first embodiment of the present invention has been installed; and
FIGS. 7, 7A and 7B depict a shipping container (luggage) on which a second embodiment of the present invention has been installed.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring now to FIG. 1, the process flow diagram shown in this figure includes nine (9) major processing stations or fabrication stages which are used in the overall manufacturing process steps that may be used to fabricate an RFID (radio frequency indentification) tag unit used in the anti-theft method of the present invention. These stages are described in more detail below with reference to FIGS. 2 and 3A through 3E. Initially, a circuit pattern is formed on a polymer base material in station 10, whereafter the circuit pattern is cured and an epoxy conductive material is applied to station 12 before aligning an integrated circuit chip onto the polymer base in station 14. Next, batteries (batteries added to the RFID package is optional) are aligned onto the polymer base in station 16 whereafter the epoxy is cured in station 18.
In the next step, the rear battery epoxy is applied in station 20 before adding a stiffener and then folding the polymer base over onto the top cover as indicated in station 22. The epoxy material is then cured in station 24 before providing a final sealing step in stage 26 to complete the package as described in more detail below.
Referring now to FIG. 2, an RFID tag is depicted that includes a base support member 30 upon which an integrated circuit chip 32 is disposed on the near end of the device and connected to a dipole antenna consisting of metal strips 34 and 36 extending laterally from the chip 32 and typically screen printed on the upper surface of the base support member 30.
A pair of rectangular shaped batteries 38 and 40 are positioned as shown adjacent to the IC chip 32 and are also disposed on the upper surface of the base support member 30. The two rectangular batteries 38 and 40 are electrically connected in series to power the IC chip 32 in a manner more particularly described below. The device or package shown in FIG. 2 is then completed by the addition of an outer or upper cover member 42 which is sealed to the exposed edge surface portions of the base member 30 to thereby provide an hermetically sealed and completed package. The integrated chip 32 has transmitter, memory, logic, and receiver stages therein and is powered by the two batteries 38 and 40 during the transmission and reception of data to and from an interrogator to provide the interrogator with the various above identified information parameters concerning the article or person to which the RFID tag 30 is attached. The integrated chip may be designed to contain the needed circuitry one skilled in the art needs to accomplish the desired task and therefore may or may not contain all the circuitry listed above.
Referring now to FIG. 3A, there is shown a plan view of the geometry of the base support member 30 and the cover member 42 which, during the initial manufacturing stage, are joined at an intersecting line 44. The dipole antenna strips 34 and 36 shown positioned on each side of the IC chip 32, and the two conductive strips 46 and 48 serve to connect the tops of the batteries 38 and 40 into the IC chip 32. A conductive strip 50 is provided on the upwardly facing inside surface of the top cover 42, so that when the cover 42 is folded by 180° C., its outer boundary 52 is ready to be sealed with the outer boundary 54 of the base support member 30, and simultaneously the conductive strip 50 completes the series electrical connection used to connect the two batteries 38 and 40 in series with each other and further in the series circuit with the integrated circuit chip 32 through the two conductors 46 and 48.
Referring now to FIGS. 3B through 3E, FIG. 3B shows in cross section the IC chip 32 bonded to the base support member 30 by means of a spot button of conductive epoxy material 56. The conductive strip 48 is shown in cross section on the upper surface of the base support member 30. This figure would correspond generally to the fabrication stations 10, 12, and 14 in FIG. 1.
Referring now to FIG. 3C, the battery 40 is aligned in place as indicated earlier in FIG. 2 and has the right hand end thereof connected to the upper surface of the conductive strip 48. FIG. 3 would therefore correspond to stations 16 and 18 in FIG. 1.
Referring now to FIG. 3D, a stiffener material 58 is applied as shown over the upper and side surfaces of the IC chip 32, to provide a desired degree of stiffness to the package as completed. FIG. 3D would therefore correspond to stations 20 and 22 in FIG. 1.
Next, a conductive epoxy is applied to the upper surfaces of the two batteries 38 and 40, and then the polymer base material 30 with the batteries thereon are folded over onto the cover member 42 to thus complete and seal the package in the configuration shown in FIG. 3E and corresponding to the remaining stations 24 and 26 in FIG. 1.
Referring now to FIG. 4, the rectangular outer boundary 159 in this figure defines the active area on the integrated circuit chip in which the integrated circuit transceiver has been formed using state of the art MOS planar processing techniques. These MOS planar processing techniques are well known in the art and are, therefore, not described in detail herein. Within the chip active area there is provided an RF receiver stage 160 which is connected to an antenna 161 and via one or more lines or circuit connections 162, to a control logic stage 164. The control logic stage 164 is in turn connected via one or more integrated circuit connections or lines 166 to a memory stage 168. The control logic stage 164 is further connected via a line 170 to a transmitter stage 174, and the memory stage 168 is also connected via line 172 to the trasmitter stage 174. The memory stage 168 is operative to provide input data to the transmitter stage 174 upon request, and functions in a manner operationally described in the example given below.
FIG. 5 is a functional block diagram showing a method of communication between several RFID tags and an interrogation unit in light of the anti-theft detection units later described in FIGS. 6 and 7. Referring now to FIG. 5, Host/CPU 51 interacts with interrogator/transceiver unit 52 and instructs unit 52 to interrogate RFID tags A (53) and B (54) for alarm data. If interrogator 52 receives no reply from either tag A or tag B the host 51 continues to instruct unit 52 to interrogate tags A and B as often as internal software demands it. However, if tag A responds (in an alarm state) the interrogator unit 52 communicates that information to the host 51 and an appropriate alarm is sounded to notify personnel that unauthorized opening of a container has just taken place.
By using the communication approach taken in FIG. 5, a first embodiment of an “unauthorized opening detection device” is shown in FIG. 6 with variations of this embodiment shown in expanded views of FIG. 6 presented in FIGS. 6A and 6B.
Referring now FIG. 6, shipping container 60 (luggage in this case) is adorned with an “unauthorized opening detection unit” enclosed by outlined dashed circle 62. Expanded view 6A of dashed circle 62 shows a continuous wire 63 attached to both sides of container 60 at a first connection node 64, then to second connection node 65, continuing to RFID tag 67 (which is affixed to label 66) onto which wire 63 is attached. Wire 63 then completes its continuity path by attaching tag 67 to starting point node 64. If continuity is disrupted (wire 63 breaks by unauthorized opening of container 20) tag 67 would then signal the interrogator or some other device to sound an alarm and alert the owner or possibly security personnel in case of airline luggage transportation. Disarming the detection unit may be done by command from the interrogator or by the software at a given site, say at the container's destination, which may simply ignore the “opened” signal.
Expanded view of FIG. 6B shows a second means of installing a detection device wherein continuous wire 63 attaches to a first connection node 64, continues to a second connection node 65, routes to RFID tag 67 (which is affixed to label 66) and routes back to node 65 and finally to node 64.
Both attaching methods serve as examples of how the opening detection unit may be attached to containers or doors that open. It would be preferred to have the wire attached so that it is not easily detected by casual observance and not easily broken by accident. Tag 67 could be affixed to label 66 with tag 67 itself being adhered to a self-adhesive paper, such as stamp, and then applied to the label.
A second embodiment of an “unauthorized opening detection device” is shown in FIG. 7 with this embodiment shown in expanded views 7A and 2B.
Referring now to FIG. 7, shipping container 70 (luggage in this case) is adorned with an “unauthorized opening detection unit” enclosed by outlined dashed circles 71 and 72. In expanded view 7A of dashed circle 71, in the edge of container 70 a magnetic contact 73 is embedded. This magnetic contact 73 is preferably located in close proximity to a latch of container 70, or magnetic contact 73 may also function as half the latching mechanism to the container. In expanded view 7B of dashed circle 72, an RFID tag 78 is affixed to the top face of container 70. Electrical connections 74 extend from RFID tag 70 and attached to magnetic contacts 75 and 76. Magnetic contacts 75 and 76 may also function as the other half of the latching mechanism to the container. When container 70 is closed, contacts 75 and 76 mate with contact 73, thereby completing an electrical circuit. Unless disabled by the owner, should the container be forced open and continuity between contacts 73, 75 and 76 be disrupted, an alarm state bit is set in (in the alarm flagging circuitry) tag 78 which will signal the interrogator or other controlling device to sound an alarm to alert the owner or security personnel. Tag 78 will remain in an alarm state until the alarm state bit is reset by the interrogator/controlling unit.
The detection device of FIG. 7A could be further enhanced by providing a replaceable battery 79, a power enabling means, for powering tag 78. It would be logical to have the battery only accessible from the inside of container 70 which would mean tag 78 would need to be embedded into container 70 and preferably embedded during the manufacturing of container 70. With a replaceable battery powered tag, tag 78 would now have the capability to send an alert signal to an interrogator unit or other device (such as a computer controlled transceiver unit) which would monitor the status of container 70 over its entire lifetime.
The methods of the embodiments discussed above, can easily be implemented into security systems. For example, by attaching the RFID tag and continuity completing circuitry to span between an entry/exit door and the framework supporting the door, unauthorized entry can now be monitored by activating the system when the door is to remain closed. Other such security schemes could also use the monitoring methods of the present invention.
It is to be understood that although the present invention has been described in several embodiments, various modifications known to those skilled in the art, such as applying these techniques to any kind of containers (mail, freight, etc.) or by various methods of attaching the detection device to the container, may be made without departing from the invention as recited in the several claims appended hereto.

Claims (51)

1. For an apparatus having an aperture capable of being closed and opened by moving first and second closure members together and apart, respectively, an improved security device for signalling whether the aperture is opened, comprising:
(a) an elongated electrical conductor having first and second ends, the conductor extending between the two closure members and being attached to both the first closure member and the second closure member so that the two closure members cannot be moved apart more than a predetermined amount to open the aperture without breaking the conductor; and
(b) an RFID transceiver, connected to the two ends of the conductor, including an electrical circuit for detecting when electrical continuity between the two ends of the conductor is broken and subsequently transmitting a radio frequency alarm signal.
2. A security device according to claim 1, wherein said apparatus is a container and the first and second closure members are external walls of the container.
3. A security device according to claim 2, wherein the RFID transceiver is embedded within a wall of the container.
4. A security device according to claim 1, wherein said apparatus is a suitcase and the first and second closure members are external walls of the suitcase.
5. For an apparatus having an aperture capable of being closed and opened by moving first and second closure members together and apart, respectively, an improved security device for signalling whether the aperture is opened, comprising:
(a) an electrical device, mounted on the apparatus adjacent the aperture, for detecting whether the aperture is open or closed; and
(b) an RFID transceiver which transmits a radio frequency alarm signal after said device detects the aperture has been opened.
6. A security device according to claim 5, wherein the electrical device includes a magnet.
7. A security device according to claim 5, wherein the electrical device includes an elongated electrical conductor having first and second ends, the conductor extending between the two closure members and being attached to both the first closure member and the second closure member so that the two closure members cannot be moved apart a substantial amount to open the aperture without breaking the conductor.
8. A security device according to claim 5, wherein said apparatus is a container and the first and second closure members are external walls of the container.
9. A security device according to claim 8, wherein the RFID transceiver is embedded within a wall of the container.
10. A security device according to claim 5, wherein said apparatus is a suitcase and the first and second closure members are external walls of the suitcase.
11. For an apparatus having an aperture which is selectably closed and opened by moving first and second closure members together and apart, respectively, an improved security device for signalling whether the aperture is opened, comprising:
(a) an electrical device, mounted on the apparatus adjacent the aperture, for detecting whether the aperture is open or closed, wherein the electrical device includes:
(i) first and second electrical contacts mounted on the first closure member, and
(ii) a third electrical contact mounted on the second closure member at a position such that, when the two closure members are moved together so as to close the aperture, the third electrical contact mates with both the first and the second contacts so as to complete an electrical continuity between the first and second contacts; and
(b) an RFID transceiver which transmits a radio frequency alarm signal in response to said electrical continuity being broken.
12. A secure apparatus for signalling whether an aperture of the apparatus is opened, comprising:
an apparatus having first and second closure members and having an aperture capable of being closed and opened by moving the two closure members together and apart, respectively;
an electrical device, mounted on the apparatus adjacent the aperture, for detecting whether the aperture is opened; and
an RFID transceiver which transmits an alarm signal after said device detects the aperture has been opened.
13. Apparatus according to claim 12, wherein the electrical device includes an elongated electrical conductor having first and second ends, the conductor extending between the two closure members and being attached to both the first closure member and the second closure member so that the two closure members cannot be moved apart more than a predetermined amount to open the aperture without breaking the conductor.
14. Apparatus according to claim 13, further comprising:
a hinge mounted on a first end of each closure member;
wherein the conductor extends between the two closure members at a second end of each closure member opposite the hinge.
15. Apparatus according to claim 14, further comprising:
a handle mounted on the second end of one of the closure members; and
a strap encircling the handle;
wherein the RFID transceiver is mounted on the strap.
16. Apparatus according to claim 12, wherein:
the electrical device includes
first and second electrical contacts mounted on the first closure member, and
a third electrical contact mounted on the second closure member at a position such that, when the two closure members are moved together so as to close the aperture, the third contact mates with both the first and second contacts so as to complete an electrical continuity between the first and second contacts; and
the RFID transceiver transmits said radio frequency alarm signal in response to said electrical continuity being broken.
17. Apparatus according to claim 16, wherein the first, second and third electrical contacts respectively comprise first, second and third magnetic contacts.
18. Apparatus according to claim 12, wherein the electrical device includes a magnetic device.
19. Apparatus according to claim 12, wherein said apparatus is a container and the first and second closure members are external walls of the container.
20. Apparatus according to claim 19, wherein the RFID transceiver is embedded within a wall of the container.
21. Apparatus according to claim 12, wherein:
said apparatus is a suitcase; and
the first and second closure members are external walls of the suitcase.
22. Apparatus according to claim 12, wherein:
said apparatus is a doorway;
the first closure member is a door frame; and
the second closure member is a door.
23. A method for signalling whether an aperture is opened, comprising the steps of:
providing an apparatus having first and second closure members and having an aperture capable of being closed and opened by moving the first and second closure members together and apart, respectively;
detecting whether the aperture is opened; and
in response to detecting that the aperture is opened, transmitting a radio frequency alarm signal.
24. A method according to claim 23, wherein the detecting step comprises:
mounting adjacent the aperture an electrical detecting device having an electrical condition responsive to whether the aperture is opened; and
detecting whether the aperture is opened by detecting the electrical condition of the detecting device.
25. A method according to claim 24, wherein:
the step of mounting an electrical detecting device comprises extending between the two closure members an elongated electrical conductor having first and second ends, and attaching the conductor to both the first closure member and the second closure member so that the two closure members cannot be moved apart more than a predetermined amount to open the aperture without breaking the conductor; and
the step of detecting whether the aperture is opened comprises detecting whether electrical continuity between the two ends of the conductor is broken.
26. A method according to claim 24, wherein the step of mounting an electrical detecting device comprises mounting a magnet adjacent the aperture.
27. A method according to claim 23, wherein the providing step comprises:
providing a container having first and second external walls, wherein said apparatus is the container and said first and second closure members are the first and second external walls of the container, respectively.
28. A method according to claim 27, further comprising the step of:
embedding an RFID transceiver within a wall of the container;
wherein the transmitting step comprises the RFID transceiver transmitting the radio frequency alarm signal.
29. A method according to claim 28, further comprising the steps of:
mounting a replaceable battery within the container so as to be accessible only from the interior of the container; and
connecting the battery to the RFID transceiver.
30. A method according to claim 27, wherein the step of providing a container comprises:
providing a suitcase as said container.
31. A method according to claim 23, wherein the transmitting step further comprises:
receiving radio frequency interrogation signals; and
transmitting said radio frequency alarm signal only after receiving a radio frequency interrogation signal subsequent to said detecting that the aperture is opened.
32. A method for signalling whether an aperture is opened, comprising the steps of:
providing an apparatus having first and second closure members including at least a door, and having an aperture capable of being closed and opened by moving the first and second closure members together and apart to close and open the door, respectively;
after the door is closed, attaching an electrical detection device to the door, the detection device having an RFID device mounted via adhesive and having a wire arranged to form a circuit which is to be irreversibly disrupted if the door is opened, the RFID device to store information identifying the apparatus;
detecting whether the aperture is opened, based on whether the circuit is disrupted, using the RFID device;
interrogating a plurality of RFID transceiver tags for an alarm status using an interrogator unit that communicates with the RFID transceiver tags wirelessly via radio frequency interrogation signals; and
in response to detecting that the aperture is opened, transmitting the stored information identifying the apparatus in response to the radio frequency interrogation signals and transmitting a radio frequency alarm signal from the RFID transceiver tags to the interrogator unit if the aperture is detected to have been opened.
33. A method according to claim 32, wherein the wire is arranged across the closure members.
34. A method according to claim 32, further comprising communicating the alarm status to a host computer coupled to the interrogator if the interrogator receives the alarm signal from the RFID device.
35. A method according to claim 34, wherein the interrogator interrogates the RFID device in accordance with software running on the host computer coupled to the interrogator.
36. A method according to claim 32, further comprising continually interrogating the RFID device using an interrogator to continually monitor for an alarm.
37. A method according to claim 32, wherein detecting whether the aperture is opened comprises electrically detecting continuity between two electrical contacts.
38. A method according to claim 32, further comprising monitoring a status of the aperture as being either opened or closed via a host computer.
39. A method according to claim 32, wherein the apparatus comprises a shipping container.
40. A method according to claim 32, wherein the RFID device is hermetically sealed.
41. A secure container system for signalling whether an aperture of the apparatus is opened, comprising:
a container having first and second closure members and having an aperture capable of being closed and opened by moving the two closure members together and apart, respectively;
an electrical detection device, mounted on the apparatus adjacent the aperture, for detecting whether the aperture is opened, the electrical detection device comprises an RFID transceiver tag and an electrical circuit, the electrical circuit to be irreversibly disrupted when the aperture is opened to access interior of the container, the RFID transceiver tag sealed inside a package and attached to the container via adhesive, the RFID transceiver tag having an antenna and having memory to store identification information of the RFID transceiver tag and having a circuit to receive and transmit radio frequency signals via the antenna; and
an interrogator wirelessly coupled with the RFID transceiver tag via radio frequency signals, wherein in response to a command from the interrogator the RFID transceiver tag transmits the identification information of the RFID transceiver tag to the interrogator and transmits an alarm signal to the RFID interrogator after the electrical circuit detects the aperture has been opened.
42. A secure container system according to claim 41, wherein the electrical circuit extends between the closure members.
43. A secure container system according to claim 41, wherein the electrical detection device is powered by a battery.
44. A secure container system according claim 41, further comprising a host computer coupled to the interrogator to receive the alarm signal.
45. A secure container system according to claim 44, wherein the interrogator interrogates the RFID device in accordance with software running on the host computer coupled to the interrogator.
46. A secure container system according to claim 41, wherein the interrogator continually interrogates the RFID device to continually monitor for an alarm.
47. A secure container system according to claim 41, wherein the RFID transceiver tag electrically detects continuity between two electrical contacts to detect whether the aperture is opened.
48. For a secure container having an aperture capable of being closed and opened by moving first and second closure members together and apart, respectively, an improved security device for signalling whether the aperture is opened, comprising:
(a) an electrical device, mounted on the apparatus adjacent the aperture, for detecting whether the aperture is open or closed, the electrical device comprising a circuit to be irreversibly disrupted when the aperture is opened to access interior of the secure container; and
(b) an RFID transceiver tag sealed inside a package and attached to the secure container via adhesive, the RFID transceiver tag coupled to the electrical device to determine whether the circuit is disrupted, the RFID transceiver tag having an Integrated Circuit (IC) chip and an antenna, the IC chip having memory to store identification information of the RFID transceiver tag and having a circuit to receive and transmit radio frequency signals via the antenna, wherein when an interrogation command is received via the antenna, the RFID transceiver tag transmits the identification information of the RFID transceiver tag and transmits a radio frequency alarm after the electrical device detects the aperture has been opened.
49. A security device according to claim 48, wherein the circuit spans the closure members.
50. A security device according to claim 49, wherein the electrical detection device is powered by a battery.
51. A security device according to claim 50, wherein the RFID transceiver tag electrically detects continuity of the circuit to detect whether the aperture is opened.
US12/057,270 1992-07-27 2008-03-27 Anti-theft method for detecting the unauthorized opening of containers and baggage Expired - Lifetime USRE42777E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/057,270 USRE42777E1 (en) 1992-07-27 2008-03-27 Anti-theft method for detecting the unauthorized opening of containers and baggage

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US92103792A 1992-07-27 1992-07-27
US08/151,599 US5406263A (en) 1992-07-27 1993-11-12 Anti-theft method for detecting the unauthorized opening of containers and baggage
US08/421,571 US5646592A (en) 1992-07-27 1995-04-11 Anti-theft method for detecting the unauthorized opening of containers and baggage
US08/827,037 US5831531A (en) 1992-07-27 1997-03-25 Anti-theft method for detecting the unauthorized opening of containers and baggage
US12/038,473 USRE43415E1 (en) 1992-07-27 2008-02-27 Anti-theft method for detecting the unauthorized opening of containers and baggage
US12/057,270 USRE42777E1 (en) 1992-07-27 2008-03-27 Anti-theft method for detecting the unauthorized opening of containers and baggage

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US08/827,037 Reissue US5831531A (en) 1992-07-27 1997-03-25 Anti-theft method for detecting the unauthorized opening of containers and baggage

Publications (1)

Publication Number Publication Date
USRE42777E1 true USRE42777E1 (en) 2011-10-04

Family

ID=25444826

Family Applications (2)

Application Number Title Priority Date Filing Date
US08/827,037 Ceased US5831531A (en) 1992-07-27 1997-03-25 Anti-theft method for detecting the unauthorized opening of containers and baggage
US12/057,270 Expired - Lifetime USRE42777E1 (en) 1992-07-27 2008-03-27 Anti-theft method for detecting the unauthorized opening of containers and baggage

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US08/827,037 Ceased US5831531A (en) 1992-07-27 1997-03-25 Anti-theft method for detecting the unauthorized opening of containers and baggage

Country Status (1)

Country Link
US (2) US5831531A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110210030A1 (en) * 2009-01-07 2011-09-01 Meadwestvaco Corporation Security packaging
US11210914B2 (en) * 2019-11-15 2021-12-28 Steve Harvey Loop conductor security alarm system

Families Citing this family (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5831531A (en) 1992-07-27 1998-11-03 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5406263A (en) 1992-07-27 1995-04-11 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5898370A (en) * 1997-12-16 1999-04-27 At&T Corp Security monitoring system and method
US6469627B1 (en) * 2000-02-11 2002-10-22 Marconi Communications Inc. Mounting clip having a wireless communication device
US6580357B1 (en) 2000-02-11 2003-06-17 Marconi Communications Inc. Handle tag for identification of a container
US6720865B1 (en) 2000-02-11 2004-04-13 Marconi Intellectual Property (Us) Resilient member with wireless communication device
US6778088B1 (en) 2000-02-11 2004-08-17 Marconi Intellectual Property (Us) Inc. Deployable identification device
US6294998B1 (en) * 2000-06-09 2001-09-25 Intermec Ip Corp. Mask construction for profile correction on an RFID smart label to improve print quality and eliminate detection
US6940392B2 (en) * 2001-04-24 2005-09-06 Savi Technology, Inc. Method and apparatus for varying signals transmitted by a tag
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US20020183882A1 (en) 2000-10-20 2002-12-05 Michael Dearing RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
WO2002035432A1 (en) 2000-10-20 2002-05-02 Promega Corporation Radio frequency identification method and system of distributing products
US6892441B2 (en) 2001-04-23 2005-05-17 Appleton Papers Inc. Method for forming electrically conductive pathways
US6779246B2 (en) 2001-04-23 2004-08-24 Appleton Papers Inc. Method and system for forming RF reflective pathways
US20030141973A1 (en) * 2001-07-24 2003-07-31 Hen-Geul Yeh Smart object locator
US20030030542A1 (en) * 2001-08-10 2003-02-13 Von Hoffmann Gerard PDA security system
US7023356B2 (en) 2001-11-26 2006-04-04 Aero-Vision Technologies, Inc. System and method for monitoring individuals and objects associated with wireless identification tags
US7116223B2 (en) * 2002-01-02 2006-10-03 International Business Machines Corporation Systems, methods, and apparatus for monitoring a container associated with an item
US20030156501A1 (en) * 2002-01-14 2003-08-21 Martin Spindel Trackable storage unit system and method
DE10211080A1 (en) * 2002-03-13 2003-10-09 Oce Printing Systems Gmbh Methods, device systems and computer programs for generating printed documents with a unique identifier
US6847912B2 (en) * 2002-05-07 2005-01-25 Marconi Intellectual Property (Us) Inc. RFID temperature device and method
US7224273B2 (en) * 2002-05-23 2007-05-29 Forster Ian J Device and method for identifying a container
US6705105B2 (en) * 2002-05-24 2004-03-16 American Standard International Inc. Base pan and cabinet for an air conditioner
US20040008123A1 (en) * 2002-07-15 2004-01-15 Battelle Memorial Institute System and method for tracking medical devices
US20040021572A1 (en) * 2002-08-05 2004-02-05 Schoen Marc L. Electronic baggage tracking and identification
US7411495B2 (en) * 2002-08-27 2008-08-12 Hi-G-Tek Ltd. Smart container monitoring system
US6753775B2 (en) * 2002-08-27 2004-06-22 Hi-G-Tek Ltd. Smart container monitoring system
US6778083B2 (en) * 2002-08-27 2004-08-17 Hi-G-Tek Ltd. Electronic locking seal
US7002472B2 (en) * 2002-09-04 2006-02-21 Northrop Grumman Corporation Smart and secure container
US6667092B1 (en) 2002-09-26 2003-12-23 International Paper Company RFID enabled corrugated structures
US6900762B2 (en) * 2002-09-30 2005-05-31 Lucent Technologies Inc. Methods and apparatus for location determination based on dispersed radio frequency tags
US20040070504A1 (en) * 2002-10-14 2004-04-15 Brollier Brian W. Semi-covert RFID enabled containers
US7151979B2 (en) 2002-11-26 2006-12-19 International Paper Company System and method for tracking inventory
US20040102870A1 (en) * 2002-11-26 2004-05-27 Andersen Scott Paul RFID enabled paper rolls and system and method for tracking inventory
US20060058913A1 (en) * 2002-11-26 2006-03-16 Andersen Scott P Inventory tracking
US7042354B2 (en) * 2002-12-11 2006-05-09 Hi-G-Tek Ltd. Tamper-resistant electronic seal
US6864791B1 (en) * 2003-01-22 2005-03-08 Rackel Industries Ltd. Security bag
US7091827B2 (en) 2003-02-03 2006-08-15 Ingrid, Inc. Communications control in a security system
US6888459B2 (en) * 2003-02-03 2005-05-03 Louis A. Stilp RFID based security system
US7511614B2 (en) 2003-02-03 2009-03-31 Ingrid, Inc. Portable telephone in a security network
US7057512B2 (en) 2003-02-03 2006-06-06 Ingrid, Inc. RFID reader for a security system
US7495544B2 (en) 2003-02-03 2009-02-24 Ingrid, Inc. Component diversity in a RFID security network
US7042353B2 (en) 2003-02-03 2006-05-09 Ingrid, Inc. Cordless telephone system
US7119658B2 (en) 2003-02-03 2006-10-10 Ingrid, Inc. Device enrollment in a security system
US7019639B2 (en) * 2003-02-03 2006-03-28 Ingrid, Inc. RFID based security network
US7023341B2 (en) * 2003-02-03 2006-04-04 Ingrid, Inc. RFID reader for a security network
US7079034B2 (en) 2003-02-03 2006-07-18 Ingrid, Inc. RFID transponder for a security system
US7079020B2 (en) 2003-02-03 2006-07-18 Ingrid, Inc. Multi-controller security network
US7532114B2 (en) 2003-02-03 2009-05-12 Ingrid, Inc. Fixed part-portable part communications network for a security network
US7053764B2 (en) * 2003-02-03 2006-05-30 Ingrid, Inc. Controller for a security system
US7283048B2 (en) 2003-02-03 2007-10-16 Ingrid, Inc. Multi-level meshed security network
US6995669B2 (en) * 2003-03-25 2006-02-07 Fernando Morales System and method to enhance security of shipping containers
US6870476B2 (en) * 2003-04-07 2005-03-22 Bulldog Technologies Inc. Continuous feedback container security system
US20040215750A1 (en) * 2003-04-28 2004-10-28 Stilp Louis A. Configuration program for a security system
US7183913B2 (en) * 2003-05-30 2007-02-27 Vane Line Bunkering, Inc. Life raft container security system and method
US7768405B2 (en) 2003-12-12 2010-08-03 Semiconductor Energy Laboratory Co., Ltd Semiconductor device and manufacturing method thereof
WO2005079223A2 (en) * 2004-02-13 2005-09-01 Avery Dennison Corporation Tamper monitoring article, system and method
WO2005094172A2 (en) * 2004-03-30 2005-10-13 Hi-G-Tek Inc. Monitorable locking assemblies
US7446663B2 (en) * 2004-04-20 2008-11-04 Alcoa Closure Systems International, Inc. Method of forming an RF circuit assembly having multiple antenna portions
US7274289B2 (en) * 2004-05-27 2007-09-25 Eastman Kodak Company System and device for detecting object tampering
US20060071786A1 (en) * 2004-10-05 2006-04-06 Accenture Global Sevices Gmbh Cargo security sensing system
US7212127B2 (en) * 2004-12-20 2007-05-01 Avery Dennison Corp. RFID tag and label
US7324921B2 (en) * 2004-12-28 2008-01-29 Rftrax Inc. Container inspection system
US7388505B2 (en) * 2005-01-05 2008-06-17 Wesley Jack White Storage container smart collar
US7712674B1 (en) 2005-02-22 2010-05-11 Eigent Technologies Llc RFID devices for verification of correctness, reliability, functionality and security
US20060292316A1 (en) * 2005-03-01 2006-12-28 Kevin Conwell Profile correction for RFID label with transponder
US7239244B2 (en) * 2005-04-22 2007-07-03 Se-Kure Controls, Inc. System and method for monitoring a portable article
WO2006116664A1 (en) * 2005-04-26 2006-11-02 Rf Code, Inc. Tamper monitoring system and method
US20070080802A1 (en) * 2005-08-22 2007-04-12 Cockburn John M Tamper & intrusion detection device
US7450007B2 (en) * 2005-10-03 2008-11-11 Chep Technology Pty Limited RFID asset identification systems
US20070187496A1 (en) * 2006-02-10 2007-08-16 Andersen Scott P Inventory tracking system and method
EP1826733A1 (en) * 2006-02-23 2007-08-29 The European Community, represented by the European Commission Container surveillance system
US7710275B2 (en) 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
TWI340934B (en) * 2007-07-18 2011-04-21 Ind Tech Res Inst Method and system for monitoring forestry products
US20110120199A1 (en) * 2007-08-09 2011-05-26 Hi-G Tek Monitorable sealing cable lock
US8009034B2 (en) * 2007-11-26 2011-08-30 Traklok Corporation Integrated tracking, sensing, and security system for intermodal shipping containers
US7886464B2 (en) * 2008-01-10 2011-02-15 Walt-Task, Llc Water air land tracks baggage identification locator systems and methods
US8184006B2 (en) * 2009-03-20 2012-05-22 Mach 1 Development, Inc. Shipping container integrity device and system
US8207854B2 (en) * 2009-02-09 2012-06-26 Mach 1 Development, Inc. Shipping container integrity device and system
DE102009030713A1 (en) * 2009-06-26 2010-12-30 Siemens Aktiengesellschaft Apparatus and method for monitoring containers
US20110018707A1 (en) * 2009-07-27 2011-01-27 Dobson Eric L Shipping container having integral geoclock system
CN105136241B (en) 2010-04-08 2020-04-21 飞利浦知识产权企业有限公司 Point-of-sale sensing system and method
US8564410B2 (en) 2010-05-20 2013-10-22 Paul Llewellyn Greene Shipping container security process
WO2012042515A1 (en) 2010-09-28 2012-04-05 Starcom Gps Systems Ltd Status detector and communication unit and system for remote tracking of padlocks
JP6194158B2 (en) * 2012-05-21 2017-09-06 富士通株式会社 Management device, management program, and management method
AU2013284447B2 (en) * 2012-06-27 2016-09-22 Treefrog Developments, Inc. Tracking and control of personal effects
US8890688B2 (en) * 2012-08-03 2014-11-18 Jerry Schell Communicating radio frequency modem for intrusion detection and tracking
DE102013205729A1 (en) * 2013-03-28 2014-10-02 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Device and method with a carrier with circuit structures
EP2830027A1 (en) * 2013-07-25 2015-01-28 Telefonaktiebolaget L M Ericsson (publ) Methods and devices for supervising baggage items
US9697711B2 (en) * 2015-03-19 2017-07-04 The Boeing Company System and method for tamper detection using RFID devices
US11200478B2 (en) 2018-01-25 2021-12-14 Hewlett-Packard Development Company, L.P. Security device for product packaging
NL2020662B1 (en) * 2018-03-26 2019-10-02 Sl Patent B V Improved flexible digitally printable and tamperproof suit-case locker
US10282951B1 (en) 2018-06-14 2019-05-07 Thomas A. Kulick Electrical continuity unattended package security apparatus and method of operation
US20220067313A1 (en) * 2020-09-03 2022-03-03 Taoglas Group Holdings Limited System, apparatus and methods for determination of trigger events using radio-frequency identification devices

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3426166A (en) 1966-06-09 1969-02-04 Int Standard Electric Corp Magnetic closure and switch for doors and similar devices
US4117468A (en) 1977-03-15 1978-09-26 Tulio Vasquez Sound alarm for protecting briefcases and the like
US4155079A (en) * 1976-11-02 1979-05-15 Hui-Lang Shieh Theft-proof suitcase
US4262284A (en) 1978-06-26 1981-04-14 Stieff Lorin R Self-monitoring seal
US4591835A (en) * 1983-03-25 1986-05-27 Sharp Graham D F Remotely activatable alarm system
US4684929A (en) 1985-10-17 1987-08-04 Ball Corporation Microwave/seismic security system
US4908606A (en) * 1987-12-28 1990-03-13 Raffi Kevonian Theft resistant security containers using shocking wires and audio alarm
US5099228A (en) * 1989-02-09 1992-03-24 Marcia Israel Electronic anti-theft merchandise tag having means for activating an alarm in response to an attempt to remove the tag from the merchandise
US5111184A (en) 1991-02-25 1992-05-05 Atlantic Research Corporation Tamper-proof device for detecting opening and closing of a secure container
US5126719A (en) 1990-05-23 1992-06-30 Desorbo John Remotely armed alarm system
US5169188A (en) 1991-08-19 1992-12-08 The United States Of America As Represented By The United States Department Of Energy Ceramic tamper-revealing seals
US5189396A (en) 1990-06-16 1993-02-23 Anatoli Stobbe Electronic seal
US5396218A (en) 1993-07-23 1995-03-07 Olah; George Portable security system using communicating cards
US5406263A (en) 1992-07-27 1995-04-11 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5510768A (en) * 1994-10-11 1996-04-23 Mann; Glenn E. Alarm strap for luggage
US5831531A (en) 1992-07-27 1998-11-03 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3426166A (en) 1966-06-09 1969-02-04 Int Standard Electric Corp Magnetic closure and switch for doors and similar devices
US4155079A (en) * 1976-11-02 1979-05-15 Hui-Lang Shieh Theft-proof suitcase
US4117468A (en) 1977-03-15 1978-09-26 Tulio Vasquez Sound alarm for protecting briefcases and the like
US4262284A (en) 1978-06-26 1981-04-14 Stieff Lorin R Self-monitoring seal
US4591835A (en) * 1983-03-25 1986-05-27 Sharp Graham D F Remotely activatable alarm system
US4684929A (en) 1985-10-17 1987-08-04 Ball Corporation Microwave/seismic security system
US4908606A (en) * 1987-12-28 1990-03-13 Raffi Kevonian Theft resistant security containers using shocking wires and audio alarm
US5099228A (en) * 1989-02-09 1992-03-24 Marcia Israel Electronic anti-theft merchandise tag having means for activating an alarm in response to an attempt to remove the tag from the merchandise
US5126719A (en) 1990-05-23 1992-06-30 Desorbo John Remotely armed alarm system
US5189396A (en) 1990-06-16 1993-02-23 Anatoli Stobbe Electronic seal
US5111184A (en) 1991-02-25 1992-05-05 Atlantic Research Corporation Tamper-proof device for detecting opening and closing of a secure container
US5169188A (en) 1991-08-19 1992-12-08 The United States Of America As Represented By The United States Department Of Energy Ceramic tamper-revealing seals
US5406263A (en) 1992-07-27 1995-04-11 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5646592A (en) 1992-07-27 1997-07-08 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5831531A (en) 1992-07-27 1998-11-03 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5396218A (en) 1993-07-23 1995-03-07 Olah; George Portable security system using communicating cards
US5510768A (en) * 1994-10-11 1996-04-23 Mann; Glenn E. Alarm strap for luggage

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Tuttle, John, U.S. Appl. No. 07/921,037; "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage", filed Jul. 27, 1992, now abandoned.
Tuttle, John, U.S. Appl. No. 12/038,473; "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage" filed Feb. 27, 2008.
USPTO Transaction History of U.S. Appl. No. 07/921,037, filed Jul. 27, 1992, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now abandoned.
USPTO Transaction History of U.S. Appl. No. 08/151,599, filed Nov. 12, 1993, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,406,263.
USPTO Transaction History of U.S. Appl. No. 08/421,571, filed Apr. 11, 1995, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,646,592.
USPTO Transaction History of U.S. Appl. No. 08/827,037, filed Mar. 25, 1997, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,831,531.
USPTO Transaction History of U.S. Appl. No. 12/038,473, filed Feb. 27, 2008, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage."

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110210030A1 (en) * 2009-01-07 2011-09-01 Meadwestvaco Corporation Security packaging
US8698627B2 (en) 2009-01-07 2014-04-15 Meadwestvaco Corporation Security packaging
US11210914B2 (en) * 2019-11-15 2021-12-28 Steve Harvey Loop conductor security alarm system
US20220092954A1 (en) * 2019-11-15 2022-03-24 Steve Harvey Loop Conductor Security Alarm System

Also Published As

Publication number Publication date
US5831531A (en) 1998-11-03

Similar Documents

Publication Publication Date Title
USRE42777E1 (en) Anti-theft method for detecting the unauthorized opening of containers and baggage
USRE43415E1 (en) Anti-theft method for detecting the unauthorized opening of containers and baggage
US5898370A (en) Security monitoring system and method
US7081815B2 (en) Radio frequency security system, method for a building facility or the like, and apparatus and methods for remotely monitoring the status of fire extinguishers
US8031069B2 (en) Electronic security seal and system
US5859587A (en) Data communication and electronic article surveillance tag
US6050622A (en) Safety sealing device
US7015814B2 (en) Security tag
US7034683B2 (en) Electronic vehicle product and personnel monitoring
US20020067264A1 (en) Tamper Evident Radio Frequency Identification System And Package
US8547227B2 (en) RF communication device with energy enhancement
US7274289B2 (en) System and device for detecting object tampering
US5767772A (en) Marker for an article which is detected when it passes through a surveillance zone
US7397378B1 (en) Selectively responsive tag suitable for RFID systems and the like
WO1998013804A9 (en) A data communication and electronic article surveillance tag
TW200417848A (en) Method and system for monitoring containers to maintain the security thereof
MXPA06012409A (en) Deactivating a data tag for user privacy or tamper-evident packaging.
EP0850442A1 (en) A conformable intelligent tag
US6646550B1 (en) Radio frequency security system and method for a building facility
EP1337985A1 (en) Security tag
JP3597581B2 (en) Marking device
EP1058918B1 (en) Method for protecting the identity of objects and device for performing the method
JP2005301755A (en) Emergency monitoring apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: ROUND ROCK RESEARCH, LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:023786/0416

Effective date: 20091223

AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KEYSTONE TECHNOLOGY SOLUTIONS, LLC;REEL/FRAME:023839/0881

Effective date: 20091222