EP2146328A2 - Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité - Google Patents
Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité Download PDFInfo
- Publication number
- EP2146328A2 EP2146328A2 EP09009349A EP09009349A EP2146328A2 EP 2146328 A2 EP2146328 A2 EP 2146328A2 EP 09009349 A EP09009349 A EP 09009349A EP 09009349 A EP09009349 A EP 09009349A EP 2146328 A2 EP2146328 A2 EP 2146328A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- lock
- computer
- security
- security server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012544 monitoring process Methods 0.000 claims abstract description 17
- 230000032258 transport Effects 0.000 description 33
- 230000008901 benefit Effects 0.000 description 17
- 230000005540 biological transmission Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 230000006378 damage Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 230000033001 locomotion Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001271959 Anablepidae Species 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000004146 energy storage Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C2009/0092—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
Definitions
- the invention relates to a lock, a security container with such a lock, a system for monitoring the transport of the lock, a method for controlling the lock and a method for transporting the security container. Furthermore, the invention relates to a method for securing a fuse space whose door is coupled with such a lock.
- security containers are used for the transport of various goods, which are equipped with different locks or locking devices depending on the design of the security container. There are security containers in different sizes and with different security standards.
- a security container picks up the cargo and is closed by the sender. To open, the recipient must have the correct key.
- the key may be either a conventional mechanical key or an electronic access code.
- a mechanical key must either be present at the sender or at the receiver, or the mechanical key must be sent to the recipient. This makes the key itself a security risk. Although the sender can only send the security container when the key has arrived at the recipient, but this involves a considerable time and economic effort and therefore unsuitable for practice. It is also possible to copy a mechanical key.
- An electronic lock can be opened with an electronic access code as a key.
- an electronic access code as a key.
- a circuit complexity is required in the castle, which requires a power supply. This increases both the expense of the lock and a security container with such a lock.
- the receiver To open a security container with such an electronic lock, the receiver first requires the access code, which must be transmitted from the sender to the recipient. The access code must also be in the electronic lock of the Security container are stored and is thus in principle visible to third parties.
- an encryption method can be used to store the access code. With an encryption method, however, sufficient protection against unauthorized access can not be achieved, since all encryption methods are based on a calculation algorithm whose structure can be determined.
- a security container which is connected to a personal computer for inputting and transmitting the access code.
- the computer is used as an input and display medium.
- the access code to be entered via the computer is stored in the circuit of the security container and can thus be searched out by unauthorized persons with the appropriate effort during transport.
- such a key is fundamentally a security risk and can be determined by third parties with appropriate knowledge of the structure of the lock (for example, the encryption of the access code in the memory of the electronic lock).
- conventional electronic locks are not safe from access by third parties.
- a key may fall into the wrong hands as the only necessary means of opening a containment, creating another security risk.
- the invention proposes to equip the lock of the security container with a memory and only store data on this memory, which uniquely identify the security container and with which a user interface can be displayed on a computer.
- this data is automatically sent to the computer and the user can control the lock via the user interface.
- predetermined control data is necessary, which the user can query or request from a predetermined location, for example a security server on the Internet.
- a security server on the Internet.
- these user data are not verified by the security server and thus do not generate control data that allows the lock to be opened.
- a lock according to the present invention therefore includes a mechanical or electromechanical locking device for locking a lock of a security container or door of a security room.
- the lock comprises a control unit for controlling the locking device and a memory.
- the memory stores program data representing a user interface on a screen of a computer connected to the lock. Further, identification data storing the lock is stored in the memory.
- the lock contains an interface for sending the program data and the identification data to the connected computer. The interface also receives the control data for controlling the lock after it has been generated in the security server.
- the lock can be constructed with the simplest electronic means, so that it can be produced inexpensively.
- Such a lock is ideal for mass production.
- the lock according to the invention does not require an additional key. While the user of conventional electronic locks must enter a correct access code, which is then compared internally in the lock, the user only has to know about his correct user data in the lock according to the invention, which he inputs, for example via the user interface.
- the interface may be provided for receiving command data, the command data directing, in a direct and unencrypted manner, the lock for performing a particular action such as locking and unlocking.
- the lock may send a control data request via the computer to the security server, which then generates the control data based on the identification data and user data.
- the connected computer may then convert the control data request based on the command data.
- the lock Based on the command data, the lock creates the control data request, which is then sent to the security server along with the identification data and user data. There, the control data request is converted into the control data, which are then sent to the lock and with which the lock can be safely opened.
- the control data may be provided for opening and closing the lock. These two commands are particularly important in freight forwarding. A sender of a security container sealed with the lock can thus be sure that only the right recipient can enter the correct control data for opening the lock, which open the security container. This also closes the security gap within the company against unauthorized access.
- a first Emergency access code are entered, with a second emergency access code stored in the memory.
- the control unit may itself generate control data to open the lock.
- the first emergency access code also receives command data which is executed directly based on the comparison without generating a control data request.
- the lock can also be opened if, for example, no connection to the security server is possible and thus no correct control data can be sent.
- the emergency access code ensures that a security container locked with the lock can be opened by persons or authorities who are not authorized by the sender to open it, but who nevertheless need to open the security container for inspection purposes or in emergency situations.
- the security container or a room locked with the lock can still be opened.
- the emergency access code may be provided for single use only.
- the lock is protected from repeated attempts by third parties to obtain unauthorized access to the lock with the emergency access code.
- the lock may include an encryption unit for encrypting the control data request and / or the identification data before sending and decrypting the control data after receiving via the interface. It is true that the control data request in particular can protect itself from unauthorized access by its content alone, since only one of the options is normally correct among a large number of possible responses to the control data request. By encrypting the traffic between the lock and the connected computer, however, additionally made illegible, so that further steps are necessary to understand the lock and gain access to the castle. Encryption thus further enhances security.
- the lock can be constructed completely passive, so that in principle no power supply is required in the lock. This makes it possible to open the lock, even if the security container with the lock is long on the way or the lock on the door of a room has no power connection.
- the interface may preferably be designed as a USB interface. However, any other suitable interface may be used. This interface provides power to the lock, control unit and memory, etc., from the connected computer. Thus, the complexity and weight of the lock can be reduced.
- USB interfaces are particularly common in modern personal computers, so that almost every computer is able to be connected to the container or to the lock and to provide power to the lock and its components. Another advantage is in particular the fact that the program data are stored in the memory of the castle and thus can be retrieved when connected to a power supply and can be transmitted to the connected computer. That is, the computer does not need special programs to be used to open or close the lock.
- the lock In order to determine the position of the lock or the security container during transport, the lock is preferably equipped with a positioning system for detecting the position. The position is detected at predetermined times or events. Such a location system makes it possible to monitor the transport process of the lock and / or security container between sender and receiver. It can thus be used, for example, to draw conclusions as to whether a security container closed with the lock has met a predetermined route during its transport.
- the security container may further comprise a transmitter for wirelessly transmitting the position data, whereby the route of the containment can be checked during transport.
- the security container may include an accumulator for storing electrical energy. With its own power supply, the location system can be supplied with energy in the first place. Thus, the location system can transmit the position data during transport independently of a USB connection to a computer.
- the location system may determine the position of the lock based on a GPS signal.
- GPS signals are available globally, so the positioning system is almost unlimited in position detection.
- a GPS receiver and a transmitter is required that captures the position data to a predetermined recipient, for example. The sender of the containment transmitted.
- the location system can also determine the position of the lock and / or security container based on information from a mobile radio network.
- the security container or the lock is equipped with a mobile terminal, which can send and receive. This has the advantage that the lock can also use the mobile radio terminal or network to communicate with a user, for example to send the position data.
- the memory may also be provided for storing security status data indicating whether the lock has been electronically or physically manipulated.
- security status data indicating whether the lock has been electronically or physically manipulated.
- the security state data may include a random number received, for example, with the command data.
- the random number can also be generated when receiving the command data in the lock itself. It is also possible that the random number is generated based on the reception of the control data in the lock. In all cases, this random number makes it possible to store a state in the lock which is virtually impossible to copy, depending on the random distribution of the random number. For example, if this random number has been stored in memory in connection with a closing command, it can be checked when receiving and opening the security container, whether the random number has not been changed in the memory, which the sender has stored in the memory when locking the lock. If this is not the case, a third party has at least tried to send command data to the lock.
- the security state data may alternatively or additionally include a physical state of the lock and / or its closure device. This may, for example, be a degree of destruction of the lock because a third party has tried by mechanical means to open it. The advantage of this is that even then mechanical manipulations are recognized on the lock, if they are not visible to the naked eye at first glance.
- the safety-state data may also contain safety-relevant regulations for controlling the lock itself. These rules are especially important if the lock should be checked when receiving in a particularly safety-relevant manner with regard to the correct recipient. This can be, for example, the input of correct data, which identify the person more accurately and ensure that even with recipients with a very large group of people, such as large companies, only the right person opens the containment.
- the lock may also include a clock to generate a time stamp, with the time stamp added to the security status data.
- the timestamp can be used to trace the time of an unauthorized access attempt to the lock.
- the interface may send the security state data along with the identification data to a security server.
- the security state data may be used in generating the control data in the security server.
- the time stamp can be used, for example, to check whether the recipient opens the security container at the right time.
- the time stamp can be used in the generation of the control data. This can be the case, for example, with a sender who wishes to set the recipient a certain period for opening the container. If the recipient unlocks the lock after the deadline, then even if the recipient is authorized, no control data is sent to the lock that opens the lock.
- the lock may include at least one sensor for detecting its physical condition. The detection of the physical state thus further increases the security of the lock or the security container, so that it is possible to detect whether a third party has attempted by mechanical means to access the lock without authorization.
- the sensor can additionally or alternatively monitor the lock and thus register mechanical access attempts by unauthorized third parties.
- the senor can additionally or alternatively monitor the control unit and thus register unauthorized access attempts of third parties by electrical means.
- the sensor may be a GPS sensor for detecting a transport route.
- the safety status data can be transmitted via the sender or the interface are sent to the sender and / or the security server. This can preferably be done during transport in order to determine unauthorized access attempts and / or transport damage immediately.
- the object is further achieved with a security container having an interior for receiving an object.
- the interior can be closed with a cover or a lid, for example doors and gates in large security containers for Euro pallets or shipping containers.
- the cover or the cover is lockable on the security container with at least one lock according to the invention.
- the lock can also be attached to a door of a room that is subject to strict safety requirements.
- the above-mentioned special embodiments can also be applied to the space with a lock according to the invention.
- the containment may also include one or more sensors for monitoring the physical condition. This sensor can then save its data in the memory of the lock and / or send via the transmitter and / or the interface. Thus, not only the security state of the lock alone but also the security container or space is monitored, which contains the cargo or objects to be stored.
- the sensor may also be a motion sensor for detecting movement of the containment. This can be used to determine if the containment is exposed to unusual loads due to excessive movement, such as may occur in a fall.
- the motion sensor can also be combined with the GPS sensor in the lock so that not only the transport path of the containment but also its physical condition can be monitored.
- the sensor can monitor the interior of the containment and thus allow conclusions to be drawn about the condition of the cargo itself.
- the sensor may additionally or alternatively monitor at least one wall of the security container and thus determine unauthorized access attempts and / or transport damage to the shell of the security transport container.
- the sensor may also be a temperature sensor for detecting an ambient temperature and / or an interior temperature of the containment and thus, for example, harmful temperature influences on the containment and / or register the goods to be transported.
- a humidity sensor sensor may be used to detect moisture within and / or outside the containment to determine if the containment and / or cargo has been accidentally wet or even wet.
- a surface protection sensor as a sensor can detect damage to a shell of the security container and thus detect and register in particular unauthorized mechanical access attempts by third parties.
- the surface protection sensor may be a capacitive sensor for detecting a change in permittivity of the sheath or a resistance sensor for detecting a resistance change of the sheath.
- the invention also provides a system for monitoring the transport of the containment or lock.
- the system contains at least the lock, a computer and a security server.
- the computer is connected to the lock and receives identification and program data from the lock.
- the computer presents the user interface based on the program data and receives user data from the user, which it sends along with identification data to the security server.
- the security server generates control data and sends it to the lock.
- This system makes it possible to easily identify the user of the computer and to identify it via a higher-level monitoring instance (security server) as the authorized recipient of a lock-locked security container. As shown above, not only the authorized user but also the location, time and condition in the generation of the control data can be considered, thereby further improving the security.
- the computer may receive user-entered command data via the user interface and send it to the lock to open or close the lock of the lock.
- the advantage of this design is that the user of the computer can easily control the lock.
- the lock may send a control data request.
- This request can be received by the security server and / or the computer.
- the computer is preferably for receiving and for forwarding a control data request to the security server.
- This embodiment is particularly advantageous for the invention, since the computer has a network interface for a network connection to the security server to the Internet.
- the interface in the lock can be extremely simple. As a result, central user verification via a central security server, and thus a high level of security, can be achieved even with the simplest means.
- the security server may generate the control data based on the identification data and / or the user data and / or information in a database of the security server. This ensures a rudimentary recognition of the user and / or the lock when executing a command.
- the security server can, however, also include the control data request in the generation of the control data. This guarantees that every executed command is authenticated at the lock.
- the security server may use a time stamp sent by the lock to generate the control data. This allows for improved user monitoring since the time stamp even allows time-dependent access rights to the security container.
- the generation of the control data may require the input of user data from two or more users (four eyes principle). This has the advantage that, for example, the recipient of the containment is forced to consult a second person to open the containment. This ensures, for example, that the cargo in the containment is inspected for damage by at least two persons and thus helps to better identify transport damage and corruption.
- control data in the security server it may be advantageous for another user to input his user data from another computer connected to the security server.
- This may be, for example, the sender or another supervisor sitting at a further location.
- the security server may then generate the control data based on the user data from the user at the local computer and based on the user data from the other user at the other computer.
- This principle is called distance opening and allows, for example, a sender can co-determine whether and when a recipient may open the containment. This is particularly interesting for contract negotiations, if the sender sends a draft contract to two different potential contractors, but depending on the outcome of the contract negotiations, only one of the two contractors would ultimately like to allow access to the draft contract.
- the security server may also generate, based on the security state data, seal data that provides information about the state of the containment. These seal data are then sent to the computer and displayed on it. Preferably, these sealing data contain color data for color coding of a manipulation of the containment. This is a particularly effective way to give the user a quick overview of the state of the security container or lock in the room.
- the invention also provides a method of controlling the containment.
- the program data is transmitted from a security container to a computer to represent a user interface on the computer, which then represents the user interface.
- the identification data are transmitted to the computer.
- user data is entered into the computer via the user interface and sent to a security server along with the identification data.
- control data is generated which is suitable for controlling the security container and is sent back to it.
- command data can be sent from the computer to the containment.
- the command data is then converted by the containment into a request for the control data and sent to the security server.
- the security server then generates the control data based on this request.
- the identification data, the request for the control data, and / or the user data may be sent from the lock to the security server prior to transmission encrypted and decrypted after receiving in the lock. This further enhances the security of the process since unauthorized third parties can not evaluate the traffic to artificially generate the required control data.
- the security server can create a timestamp and send it to the security server along with requesting the control data.
- the control data can be generated based on the received time stamp.
- the user check can also take place in terms of time, for example to specify a specific time window in which a user may open the security container or the lock.
- a random number can be determined and sent together with the command data to the security server. Furthermore, the determined random number together with a physical state of the lock, a time stamp and / or rules for controlling the lock in the memory of the security container can be stored as security status data. Even the random number known to the security server and the security container, for example for closing the security container, can be used when opening the security container to determine whether the security container has received other command data or even control data that has not been authorized by the security server. In the same way, the timestamp can be sent to the security server to determine if the timestamp in the lock's memory matches the last timestamp sent in the security server. Such verification is possible based on all security state data and increases the possibility to detect manipulation attempts.
- the security state data may be sent to the security server along with the identification data. This creates, based on the security state data, seal data with a color that indicates tampering with the containment. The seal data is then sent to the computer and displayed. The color data provides the user with easy-to-understand information about the condition of the lock.
- the invention further provides a method for transporting a security container.
- the security container is connected to a first computer, which in turn is connected to a security server.
- the containment is according to the preceding method with a Lock command locked, disconnected from the first computer and transported to a second computer, which is also connected to the security server.
- the second computer is connected to the security container and unlocked by the above-described method with an opening command.
- FIG. 10 shows a structure of a security system 100 of the present invention.
- the system has a security container 110 with a lock 120.
- the lock 120 is electronically connected to a first computer 130.
- the first computer 130 is connected to a security server 140 via the Internet.
- a second computer 150 is also connected to a security server 140 via the Internet.
- the security container 110 is provided for the transport of goods whose reception is to be made dependent on certain conditions. In the simplest case, this may be the right recipient, characterized by certain user data. Other conditions are possible, for example, whether the freight is paid.
- the advantage of the present invention is that a sender establishes a variety of conditions for the containment 110 can be observed during transport and when opening the containment 110.
- a further advantage is that the lock 120 of the security container 110 can be monitored by the sender and / or the operator of the security server 140 or other persons or companies or institutions. By a suitable configuration of the lock 120, it is ensured that only the person has access to the lock 120, and thus to the transported goods, which has actually been selected by the sender of the security container 110 as the recipient.
- the lock 120 When the security container 110 arrives at a receiver, the lock 120 is electronically connected to the first computer 130. After the connection, all necessary data for controlling the lock 120 is automatically transferred from the lock 120 to the first computer 130 and installed or displayed. This is preferably a graphical user interface 131 based on program data, allowing the recipient to enter user data or an instruction for the lock 120. This command is called upon receipt of the security container 110 "unlock lock". Before the receiver can send this command to the lock 120 via the first computer 130, the lock 120 must first be connected to the security server 140 via the first computer 130. This is realized in the present embodiment by the user logging on to the security server 140 with corresponding user data.
- the lock 120 If the receiver now sends the command "unlock lock" via the first computer 130, the lock 120 generates a request for corresponding control data and sends it to the computer 130.
- This control data request can only be answered or processed by the security server 140. Therefore, the first computer 130 sends the control data request to the security server 140.
- the predetermined conditions can be varied.
- a condition may be that the receiver is also present in a database of the security server 140.
- Another condition may be that a user of the second computer 150 has given his consent to unlock the lock. There may be a variety of alternative and / or additional conditions, some of which appear from the following description.
- the first computer 130 receives the control data and forwards it to the lock 120. This then executes the command of the receiver based on the control data from the security server 140.
- the advantage of the present embodiment of the invention is that the lock 120, and thus the security container 110 locked with the lock 120, can indeed be controlled by the receiver but can still be monitored by the sender or other third parties.
- the recipient can be deprived of authorization to open the security container 110 at any time, for example. It can also be ensured that, for example, in large companies, the right recipient really opens the security container 110 and not a doorman, for example. It is also possible that the opening of the containment 110 can be made dependent on the state. If the security container 110 has been exposed to great loads during transport, for example, this is an indication that the item to be transported is defective. For reasons of guarantee law, the recipient can then be deprived of the permission to open. Such loads during transport can be detected by suitable sensors, as described later.
- the security container 110 and the lock 120 are shown as a unit, but this is not essential to the invention.
- the lock 120 alone may as well realize the invention.
- it may be in the form of a conventional padlock or in the form of another removable locking mechanism to close common transport containers or spaces.
- Only in the preferred embodiment of the invention are security containers 110 and lock 120 interconnected to further enhance security during transport of containment 110.
- Fig. 2 shows a block diagram of a security container 110 with the lock 120 according to a first embodiment of the invention.
- the containment 110 further includes an accumulator 250, an alarm unit 260 and sensors 270.
- the accumulator 250 stores electrical energy received from the lock 120. He can then deliver the stored electrical energy to the lock 120 and to the alarm unit 260 in order to operate it.
- the alarm unit 260 further receives data from the sensors 270 to evaluate and, based on the evaluation, determine whether the containment 110 has been subjected to unusual loads or is. These loads may be a tampering attempt when, for example, third parties attempt to gain access to the containment 110 mechanically by breaking a hull. These loads can be detected by a surface protection sensor, which will be described in more detail later.
- the loads can also be environmental, such as extreme temperatures or humidities that damage the cargo. Such loads can be detected with suitable temperature and / or humidity sensors. But these loads can also be caused by the transport itself, when the security container 110 falls down, for example, from a great height. All of these loads can be detected with the sensors 270 and transmitted to the alarm unit 260.
- the alarm unit 260 evaluates the loads, for example with regard to a degree of danger and makes them available for further processing.
- the alarm unit 260 may also include an internal memory that stores the load data and that may be read out at a later time. Preferably, alarm unit 260 provides the load data to lock 120.
- the lock 120 has a plurality of switches 210, a motor 220, a control unit 230 and an interface 240.
- the interface 240 is preferably a USB interface so that the entire power supply of the lock 120 can take place over it.
- the accumulator 250 may be powered outside the lock 120 via the USB interface for charging.
- the lock can be built even without any accumulator. The advantage of this design is that no further energy storage for the lock 120 are necessary, so that the lock 120 is very easy, technically simple and inexpensive to implement.
- the main task of the interface 240 is to communicate with a connected computer 130. Through the interface 240, data such as command and control data for controlling the lock 120, identification data, command data, timestamp, security state data, etc. are exchanged.
- the lock 120 receives command data, for example for unlocking or locking, via the interface 240, these are forwarded to the control unit 230. This generates a control data request based on the command data, which is then sent back to the connected computer 130 via the interface 240. Thereafter, the control unit 230 waits for the control data. After receiving the control data from the security server, the engine 220 becomes dependent the control data and the position of the switch 210 controlled so that the received command data are executed, so that an opening of the containment is possible.
- the control unit 230 includes a memory 231, a controller 232, a motor controller 233, a clock 234, a safety chip 235, a voltage converter 236 and a voltage switch 237.
- the controller 232 has a data connection to the memory 231 and to the interface 240. From memory 231, controller 232 obtains all data to perform its functions. These can be monitoring functions and control functions. The control functions serve to control the motor 230 via the motor controller 233. To this end, the controller 232 obtains the command data from the interface 240. From the command data, the control data request is prepared by appending to the command data identification data from the memory 231 representing the lock 120 of the controller Identify security container.
- a time stamp from the real-time clock 234 can be appended to the command data, by means of which the transmission time of the control data request can be clearly traced.
- the control data request is completed, it is encrypted via the security chip 235.
- the advantage of a separate security chip 235 for encryption and decryption is that the electronic key is incomprehensible for third parties. He is firmly embedded in the security chip 235 and can not be read by third parties.
- the security chip 235 has only one input for receiving data and one output for outputting data. With it, therefore, only data can be encrypted or decrypted. If the control data request is encrypted, it is sent to the first computer 130 via the interface 240, for example.
- the controller 232 now awaits a response to the request.
- the controller 232 may control, for example, the motor 220 via the motor controller 233 based on the control data.
- the receiver requires in the present embodiment, a connection to the Internet. If this is not available, an emergency access code can be stored in memory 231. Transfers the receiver over the Computer 130 the same emergency access code to the interface 240, the command data can be executed immediately and without generating a control data request. The execution of a command based on an emergency access code can be secured in a special way. For example, controller 232 may accept an emergency access code only once, regardless of whether the received emergency access code was correct or incorrect.
- the advantage of the emergency access code is that an exceptional control of the lock 120 and thus access to the security container 110 is made possible if there is no possibility of generating the correct control data. This is the case, for example, when there is no connection to the Internet, or when there is no user data available to connect to the security server.
- Another way to generate tax data unscheduled is, for example, to inform the sender as the responsible person. This can be done, for example, by the person wishing to unintentionally open the security containers 110, for example an employee of the customs authorities, informing the shipper of the emergency opening. For this purpose, this one unlocking request for the lock 120 via the user interface. The sender is then informed by e-mail about the desire to unlock. The sender, in turn, can now generate an access code for unlocking the lock 120 on the security server 140 and communicate it to the employee at customs. The employee can then unlock the lock 120 with the generated access code and open the security container 110. After the employee has checked the contents of the containment 110 at customs, he can close it again and lock the lock 120.
- the state of the lock 120 is then continued with the state that the lock 120 had prior to unlocking.
- the sender can also generate different access codes for different persons. Among these persons may be, for example, an employee of the transport company, who can control the employee of the customs authorities.
- the customs representative may also be admitted to the security server 140 as a normal user, such as the sender and the recipient, to unlock the lock 120.
- the controller 232 may also be provided for performing monitoring functions.
- the monitoring functions may be used to determine a suspected manipulation of the lock 120 and / or or the containment 110 may be required.
- This may be a function that determines an access state by counting the number of control data requests sent but not answered and stored in memory 231.
- Another function may determine a tamper condition of the lock 120 upon execution of a received command based on the received control data. Such a condition may be determined based on the real-time clock 234.
- a random number scribed by the controller 232 or the control data request itself could enter the manipulation state. In this manipulation state can also enter the identification data of the lock 120 and the user data of the user who has sent the command data.
- the manipulation state can be stored in the memory 231. However, the controller 232 also sends this to the security server 140 for backup purposes. When a new command is executed, it can then be checked whether the manipulation state in the memory 231 of the lock matches the manipulation state in the security server 140. Should deviations occur, these indicate an unauthorized access.
- the control unit 230 has a voltage switch 237 which can choose between the power supply from the interface 240 or the power supply from the accumulator 250.
- the voltage switch 237 can access the power supply of the interface 240 by default and only switch to the accumulator 250 in an emergency.
- the voltage switch 237 in the case of a power supply from the interface 240, all elements of the control unit 230 and in the case of power supply from the accumulator only selected elements, such as the controller 232 and the memory 231, energized to power save and the accumulator 250 not unnecessarily burden.
- the voltage converter 236 is additionally provided to convert the voltage for low-power elements such as the safety chip 235 and the motor controller 233.
- Fig. 3 shows a structural diagram of a containment 110 according to a second embodiment of the invention.
- the accumulator 250, the alarm unit 260 and the sensors 270 in the containment 110 will be described in more detail. All other elements off Fig. 3 are the same effect to the elements Fig. 2 and will therefore not be explained again.
- the accumulator 250 may include a charging electronics 351 and a storage unit 352.
- the charging electronics 351 may be configured not only to charge the storage unit 352 with electric power but also to supply the alarm unit 260 with electric power.
- the alarm unit 260 has a voltage converter 361, a voltage switch 362, a microcontroller 363 and a transmission unit 364.
- the voltage switch 362 receives its electrical energy from the charging electronics 351 and the storage unit 352 of the accumulator 250. Otherwise, it works exactly like the voltage switch 237 in the control unit 230 and therefore will not be further described.
- the voltage converter 361 converts the voltage from the voltage switch 362 in the same manner as the voltage converter 236 in the control unit 230. Thus, the energy-intensive sensors 270 can be operated at a high voltage and the almost powerless microcontroller 363 can be operated at a low voltage.
- the sensors 270 detect a condition of the containment 110 and / or the lock 120 to allow for evidence of tampering and / or unexpected loading on the containment 110 and / or the lock 120.
- the alarm unit 260 in the containment 110 may also detect conditions such as a position of the containment 110 itself.
- the alarm unit 260 has a transceiver 364 which can receive or transmit signals.
- the transceiver preferably has a GPS unit 330, a mobile radio unit 320 and / or a WLAN unit 310, via which suitable position signals can be received.
- the advantage of the GPS unit 330 is that global positioning is possible because GPS signals can be extraterrestrially transmitted and thus received.
- the position determination in the alarm unit 260 can also take place with the mobile radio unit 320.
- the position is determined based on a local mobile network. Under this local mobile network is in principle an existing network structure to understand, which may for example also be a wireless network. It does not matter whether the WLAN network is set up ad-hoc or with a fixed base station. Thus, the position can not only over a mobile network but over any network structure can be derived from which position information can be derived.
- the advantage of this embodiment is the bidirectional data connection, wherein with the received position signal at the same time, for example, data can be sent to the security server. This will be described in more detail below.
- the microcontroller 363 receives the status signals from the sensors 270 and the position signals from the transceiver 364.
- the received signals are converted to digital state data with an analog-to-digital converter and sent to the control unit 230, which writes them into its memory 231.
- these status data may also be provided to the transceiver 364, which may send the status data to the security server 140.
- the transmission is wireless because it allows a completely independent transmission of the measurement data from any infrastructure.
- the transceiver 364 does not need to be additionally expanded in the data transmission over the mobile network, since the mobile radio unit 320 is already present in the transceiver 364 for position determination.
- the mobile unit 320 may send a short message service (SMS) to the security server 140, which contains the status data.
- SMS short message service
- a telephone connection may be established, with the mobile radio unit 320 operating as a modem.
- the transceiver 364 may be connected to a network or computer at predetermined waypoints on its transport with a cable and thus transmit the condition data.
- the sensors 270 may include a plurality of different individual sensors 371, 372. These may be the surface protection, temperature and / or humidity sensors for the safety container already described. For example, it is also possible to use sensors which monitor the lock 120 and detect mechanical access attempts such as sawing the lock 120.
- the sensors do not necessarily have to be mounted on the security container 110, but may also be present in the lock 120.
- the alarm unit which can also be accommodated in the lock 120.
- Fig. 4 shows a structural image of the security server 140. This can be two-tiered be constructed.
- An ordinary personal computer 510 serves to execute certain applications, which will be described later.
- Connected to the personal computer 510 is a hardware copy 520 of a lock 120 according to the invention.
- This hardware copy 520 is needed to copy the functionality of the security chip 235 of the lock 120 and to ensure the encryption and decryption of the message traffic between security server 140 and lock 120.
- the security chip 235 of the lock 120 is an electronic circuit which is firmly embedded in a housing of the security chip 235.
- the functionality of the circuit of the security chip 235 can not be understood in a normal technical way. Therefore, it is particularly easy for the security server 140 if the functionality of the security chip 235 of the lock 120 is incorporated as a hardware copy into the security server 140 architecture.
- the encryption of the message traffic between security server 140 and lock 120 can not be reconstructed even if the security server is attacked by hackers.
- the hardware copy 520 of the lock 120 does not have to realize any further functions of the lock 120, it only has an interface 521 and a control unit 522.
- the control unit 522 includes a controller 524 for receiving data via the interface 521 and the security chip copy 525, which is powered by a voltage converter 523.
- the elements work together in exactly the same way as in the lock 120.
- the personal computer 510 of the security server 140 further includes an Internet interface 511, a message filter 512, a server application 513, a database 514, and a network interface 515.
- the Internet interface 511 receives data from the first computer 130, which data may be provided for logging on the user at the security server or requesting control data.
- the received Data is supplied to the message filter 512, which checks whether the data is really from the first computer 130. Thus, a preliminary test is already undertaken to detect possible manipulation attempts at an early stage. Data to be sent can also be saved by the message filter 512 so that the first computer 130 can verify that the data was sent from the security server 140.
- the message filter 512 sends the receive data to the server application 513 and receives data to be sent therefrom.
- the server application 513 now distinguishes whether it is data that a user wants to log in to the security server 140 or whether it is a control data request.
- the server application 513 checks the state of the respective lock 120 and / or security container 110.
- the state can be retrieved from the memory 231 of the lock 120 by the security server 140 sending a corresponding request for the state data via the first computer 130.
- the status data can also be transmitted to the security server 140 immediately upon the user's login.
- the security server has already stored them internally, since the lock 120 and / or the security container 110 has transmitted this data via the transceiver 364.
- the server application 513 Based on the security data, the server application 513 creates a security seal.
- This security seal is data indicating how the security state of the lock 120 and / or the containment 110 is to be displayed on a screen. For example, this data may contain a specific image or color.
- the security seal is then sent via the Internet interface 511 to the first computer 130 and displayed by the latter in the user interface 131. This gives users a quick overview of the security status of the security container 110 and / or the lock 120.
- the server application 513 compares the user data with the user data that it has stored in its database 514 and, based on this comparison, logs the user on to the security server.
- the server application 513 If the server application 513 receives a control data request, it first checks whether the corresponding user is logged on. If this is not the case, it can either provide a negative answer or simply store only the control data request as a tamper attempt in database 514.
- the server application 513 forwards the control data request to the hardware copy 520 in order to decrypt it. This is done in the same way as the encryption and decryption in the lock 120.
- the decrypted control data request is then returned to the server application 513, which generates the corresponding control data based on a predetermined number of comparisons.
- the comparisons may be an authorization comparison of whether the corresponding logged in user who forwarded the control data request is authorized to execute the corresponding command.
- This authorization can also be issued, for example, from the second computer 150.
- the server application 513 on the one hand send a query to the second computer 150 with a user of the second computer 150 can release the generation of the control data.
- this release can also be carried out in advance by the second computer 150 and stored in the database 514 of the security server 140. In either case, when a second or more users need to release the generation of the control data from a computer other than the first computer 130, it is called a distance opening.
- the server application 513 may also check if at least two users have logged on to the first computer 130 and / or if at least two logged in users have each received a valid control data request before the control data is generated. In this case, one speaks of the four-eyes principle. It can also be combined with the distance opening.
- Further possible comparisons prior to the generation of the control data may be the calibration of the security state of the container or a time comparison which determines at which time the user at the first computer 130 can open the security container. This is particularly relevant when a sender of the security container 110 wants to grant a recipient access to the cargo only in a very specific time window.
- a confirmation is sent from the lock 120 after executing the respective command.
- This confirmation includes a state of the lock 120 that is unique for the time of transmission from the lock 120 to the security server 140.
- the confirmation contains a transmission time, a random number and identification data of the lock 120.
- the contents of the confirmation store lock 120 and security server 140 in the memory 231 and in the database 514, respectively. At the next connection between lock 120 and security server 140 via any computer, the content of that acknowledgment can be retrieved and compared. If the airtime, random number and identification data are unchanged, a tamper-free lock can be assumed.
- Fig. 5 12 shows a structure image of the database 514 in the security server 140. Thereafter, the database 514 has various structures 610-690 with which various variables 611-613, 641-643 can be stored.
- the structure user 610 uniquely identifies a user of the lock by, for example, storing his name 611 and his address 612. Furthermore, it can also be stored which rights 613 the user possesses. These rights 613 may be administrative rights to set up the security server 140, rights to set up the lock 120, or application rights to lock and / or unlock the lock.
- the structure user group 620 may allow easier management of different user groups to manage unified rights for these user groups. For example, employees of an entire department in a large corporation may be given the right to unlock the lock 120 of the containment, for example, if a particular employee of that department is designated as the recipient.
- the server log 630 and bin log 650 structure may be used to time log the status data of the lock 120 or the security server 140 to understand any problems such as tampering attempts.
- the structure container 640 may store the identification data 641 of the lock, such as a particular lock number.
- the variable receiver 642 for example, when sending the security container 110 with the lock 120 a user from the structure user 610 can be deposited as a receiver, so that upon receipt of a control data request a quick comparison is possible, whether the user who has sent the control data request to unlock the lock 120 is also entitled to unlock the lock 120. Further, in the variable state 643, the security state of the lock 120 may be stored after execution of control data.
- the security status for all Locks 120 can be clearly managed. This can then be referenced by the variable state 643 in the structure container 640 to the structure VSeal 660.
- the structures transactions 670 and logs 680 also provide an overview of certain operations that have expired at the security server 140 or between the security server 140 and the lock 120.
- a method of locking the lock 120 is shown.
- the locking takes place at the location of the second computer 150, which is connected to the security server via the Internet.
- a user prepares the containment 110 by filling the cargo into the containment 110.
- step S720 it connects the lock 120 to the computer 150 via a USB connection.
- step S730 all data is then automatically transferred from lock 120 to computer 150 necessary to present a user interface, computer 150 automatically presenting that user interface to the screen upon receipt.
- the user logs on to the security server 140.
- step S750 he selects a security configuration with which the lock is to be closed. As shown, this configuration can be very diverse.
- step S760 If the security configuration is selected, the user commands the lock 120 to "lock” in step S760.
- the lock authenticates the instruction in step S770 as already described.
- that command belongs to the lock 120 in step S771 that the lock 120 sends a control data request to the security server 140 in step S772
- the security server checks the request in step S773 and sends control data to the lock 120 based on the check in step S774, with which the lock 120 in step S775 can lock.
- step S780 the lock 120 generates state data that is sent to the security server 140 to generate the security seal. This also runs in the manner already described.
- step S781 the lock 120 sends its status data to the security server 140.
- the security server 140 updates its status data in step S782 and additionally checks whether the status data indicates, for example, a physical manipulation of the security container 110 and / or the lock 120. From the updated state data, the security server generates a security seal in step S783 and sends it in step S784 to the computer 150, which displays it in step S785 with the user interface. If the security seal is free from warnings or errors, the user sends the security container 110, for example, to the location of the first computer 130 in step S780.
- Fig. 7 shows a flow diagram of a method when unlocking the lock on the security container.
- the lock 120 is connected to the computer 130 in the manner already described and the user interface is displayed thereon.
- step S840 a state comparison of the lock 120 with the security server now takes place again.
- step S841 the status data of the lock 120 is transmitted to the security server.
- the state data from the lock 120 is completely compared with the state data in the security server 140 in step S842. Based on this comparison, then, in step S843, the security seal is generated, which indicates whether the compared states are the same.
- the security seal is finally transferred to the computer 130 in steps S844, S845, as already indicated, and displayed thereon.
- the recipient may log on to security server 140 with his user data via computer 130.
- the receiver may command the lock 120 to unlock the lock 120 in step S860.
- the execution of the command takes place in step S870 in the same manner as in the lock in step S770.
- the receiver can check the transported goods in step S880 and confirm receipt in step S890. This completes the transport.
- step S920 the control unit 230 of the lock 120 checks all states of the switches 210 and the sensors 270.
- step S910 the control unit 230 of the lock 120 checks all states of the switches 210 and the sensors 270.
- step S940 the position of the lock 120 and thus of the security container 110 is determined in step S940.
- step S950 the position of the lock 120 and thus of the security container 110 is determined in step S940.
- step S950 the lock goes to stand-by for a predetermined time before restarting the routine in step S920.
- FIG. 12 shows a flowchart of the method for the security server 140 monitoring the status data during the transportation of the containment 110.
- the security server 140 receives the data from the lock 120 at step S1010, it updates its position at step S1020. Thereafter, it checks the switch and sensor states in step S1030 and decides in step S1040 whether the check has revealed a suspected manipulation. If not, then the security server ends the routine in step S1050. wherein optionally the state data can still deposit in the structure container log 650. If a suspicion of manipulation arises, then a prevention routine can be started in step S1060. This may be, for example, that the security server 140 informs all administrators, the recipient and the sender of the security container by e-mail from this suspected manipulation.
- the interface (240) is for receiving command data from the connected computer (130), and the control unit (230) is for requesting the control data via the interface (240) based on the received command data.
- closure device (220) can be opened or closed based on the control data.
- the interface (240) may be provided for receiving a first emergency access code, wherein a second emergency access code is stored in the memory (231) is stored and the locking device (220) can be opened in accordance with the first Notanzangcode with the second.
- the lock may in an advantageous embodiment, an encryption unit (235) for encrypting the request of the control data based on the command data, the identification data and / or security status data before sending and decrypting the control data after receiving via the interface (240).
- an encryption unit (235) for encrypting the request of the control data based on the command data, the identification data and / or security status data before sending and decrypting the control data after receiving via the interface (240).
- the interface (240) may be a USB interface, wherein at least one of the components (220, 230, 231, 235) of the lock via the USB interface from a connected computer (130) can be supplied with energy.
- the lock may be provided with a location system (310, 330) for detecting a position of the lock (120), preferably at predetermined times or events.
- the lock may be equipped with a transmitter (310, 320) for wirelessly transmitting the position data and / or security status data (660).
- Vorzusgweise the lock on an accumulator (250) for storing electrical energy for powering components (220, 230, 231, 235) of the lock and / or the location system (310, 330).
- the location system (310-330) is provided for determining the position of the lock (120) based on information from a mobile radio network.
- the location system (310-330) is provided for determining the position of the lock (120) based on information from a WLAN network or determining the position of the lock (120) based on a GPS signal.
- the memory (231) may be provided for storing security status data (660) indicating electronic and / or physical manipulation of the lock (120).
- the transmitter (310, 320) and / or the interface (240) may be provided for transmitting the security state data (660).
- the security state data (660) includes at least one random number received with the command data and / or a physical state of the lock or container, particularly the closure device (220), and / or provisions for controlling the closure device (220).
- the lock can be used with a clock (234) to create and insert a Timestamp in the security state data (660).
- the security state data (660) together with the identification data (640) is transferable via the interface (240).
- At least one sensor (210) is provided for detecting at least one physical condition of the lock, the container, the closing device (220) and / or the control unit (230).
- the embodiment of the containment may include a sensor (270) for detecting a physical condition of the interior of the containment (110) and / or a physical condition of at least one wall and / or the containment of the containment (110), preferably at least one sensed physical condition can be combined with the security state data (660) and / or stored in the memory (231) of the lock (120).
- a sensor for detecting a physical condition of the interior of the containment (110) and / or a physical condition of at least one wall and / or the containment of the containment (110), preferably at least one sensed physical condition can be combined with the security state data (660) and / or stored in the memory (231) of the lock (120).
- the senor (270) may be at least one of the following sensor types: a motion sensor for detecting a movement of the safety container (110); a temperature sensor for detecting an ambient temperature and / or an interior temperature of the containment vessel (110); a humidity sensor for detecting moisture within and / or outside of the containment (100); and / or a surface protection sensor for detecting damage to a sheath of the containment (100), wherein the surface protection sensor is a capacitive sensor or a resistance sensor.
- the lock (120) may be provided for sending a control data request based on the command data to the computer (130) and / or the security server (140), preferably the computer (130) is provided for forwarding the control data request to the security server (140).
- the security server (140) may generate the control data based on the control data request, and / or the identification data (640), and / or the user data (610) and / or a timestamp sent from the lock (120), and / or to be stored in a database (514) information stored (610-490).
- control data user (610) input from one, two, or more users may be required, with the number of required inputs of user data stored in the security server (140).
- the security server (140) for receiving further user data (610) from another computer (150) connected to the security server (140), the security server (140) generating the control data based on the user data (610) from the user at the local computer (120) and at further user data ( 610) from another user at the other computer (150).
- the security server (140) may be provided for generating seal data based on security state data (660) and for sending the seal data to the computer (120), the computer (120) being for displaying the seal data, the seal data being color data for color Indicating a manipulation of the lock included.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102008033731A DE102008033731A1 (de) | 2008-07-18 | 2008-07-18 | Schloss zur Sicherung eines Sicherungsbehälters oder Sicherheitsraumes und Verfahren zur Sicherung des Transports eines Sicherungsbehälters |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP2146328A2 true EP2146328A2 (fr) | 2010-01-20 |
| EP2146328A3 EP2146328A3 (fr) | 2012-04-04 |
Family
ID=41130206
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP09009349A Withdrawn EP2146328A3 (fr) | 2008-07-18 | 2009-07-17 | Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP2146328A3 (fr) |
| DE (1) | DE102008033731A1 (fr) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013023794A3 (fr) * | 2011-08-18 | 2013-11-21 | Cargoguard Gmbh | Dispositif de verrouillage |
| US20130335193A1 (en) * | 2011-11-29 | 2013-12-19 | 1556053 Alberta Ltd. | Electronic wireless lock |
| WO2014140419A1 (fr) * | 2013-03-14 | 2014-09-18 | Coreorient Oy | Système et procédé pour gérer le transport et le stockage d'articles |
| WO2014147082A3 (fr) * | 2013-03-18 | 2014-12-11 | Serle Espig | Procédé de transfert de marchandise à transporter dans un récipient de transport pouvant être fermé, récipient de transport pouvant être fermé et système de transport |
| AT17202U3 (de) * | 2021-03-12 | 2021-12-15 | Storebox Holding Gmbh | Schließsystem |
| CN114219411A (zh) * | 2022-02-22 | 2022-03-22 | 浙江原数科技有限公司 | 送检设备的物品配送方法和电子设备 |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102010029671B4 (de) | 2010-06-02 | 2012-03-01 | Cargoguard Gmbh | Sicherungsmodul zur Positionsüberwachung von Objekten |
| CN110782193B (zh) * | 2018-12-04 | 2022-11-29 | 北京嘀嘀无限科技发展有限公司 | 用于管理对象配送的方法、设备和计算机可读介质 |
| CN109961255B (zh) * | 2019-02-18 | 2021-03-23 | 深圳大学 | 一种结合区块链的物流保障系统和方法 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1391579A1 (fr) | 2002-08-13 | 2004-02-25 | Myspace Llp | Coffre de securité portatif |
| WO2006136662A1 (fr) | 2005-06-23 | 2006-12-28 | Mohinet Oy | Procede de communication d'un systeme de commande d'acces |
| US20070227913A1 (en) | 2007-01-16 | 2007-10-04 | S&S X-Ray Products, Inc. | Secure pharmacy shipping crate with temperature and humidity monitoring |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU5618000A (en) * | 1999-06-16 | 2001-01-02 | Reinhold Holtkamp | Network connected delivery box using access codes and methods for providing same |
| NL1014939C2 (nl) * | 2000-04-13 | 2001-10-16 | Hendrikus Johannes Roeland | Werkwijze voor het sluiten en openen van een container. |
| GB2365606A (en) * | 2000-08-04 | 2002-02-20 | Something4 Ltd | Selective (goods) storage access |
| US7734068B2 (en) * | 2005-10-26 | 2010-06-08 | Sentrilock, Inc. | Electronic lock box using a biometric identification device |
-
2008
- 2008-07-18 DE DE102008033731A patent/DE102008033731A1/de not_active Withdrawn
-
2009
- 2009-07-17 EP EP09009349A patent/EP2146328A3/fr not_active Withdrawn
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1391579A1 (fr) | 2002-08-13 | 2004-02-25 | Myspace Llp | Coffre de securité portatif |
| WO2006136662A1 (fr) | 2005-06-23 | 2006-12-28 | Mohinet Oy | Procede de communication d'un systeme de commande d'acces |
| US20070227913A1 (en) | 2007-01-16 | 2007-10-04 | S&S X-Ray Products, Inc. | Secure pharmacy shipping crate with temperature and humidity monitoring |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013023794A3 (fr) * | 2011-08-18 | 2013-11-21 | Cargoguard Gmbh | Dispositif de verrouillage |
| US20130335193A1 (en) * | 2011-11-29 | 2013-12-19 | 1556053 Alberta Ltd. | Electronic wireless lock |
| WO2014140419A1 (fr) * | 2013-03-14 | 2014-09-18 | Coreorient Oy | Système et procédé pour gérer le transport et le stockage d'articles |
| US9721224B2 (en) | 2013-03-14 | 2017-08-01 | Coreorient Oy | System and method for managing transportation and storage of goods |
| US10699239B2 (en) | 2013-03-14 | 2020-06-30 | Coreorient Oy | System and method for managing transportation and storage of goods |
| US11829922B2 (en) | 2013-03-14 | 2023-11-28 | Coreorient Oy | System and method for managing transportation and storage of goods |
| WO2014147082A3 (fr) * | 2013-03-18 | 2014-12-11 | Serle Espig | Procédé de transfert de marchandise à transporter dans un récipient de transport pouvant être fermé, récipient de transport pouvant être fermé et système de transport |
| US10438432B2 (en) | 2013-03-18 | 2019-10-08 | SEs Solutions GmbH | Method for transferring transport goods in a lockable transport container, lockable transport container, and transport system |
| AT17202U3 (de) * | 2021-03-12 | 2021-12-15 | Storebox Holding Gmbh | Schließsystem |
| CN114219411A (zh) * | 2022-02-22 | 2022-03-22 | 浙江原数科技有限公司 | 送检设备的物品配送方法和电子设备 |
Also Published As
| Publication number | Publication date |
|---|---|
| DE102008033731A1 (de) | 2010-01-21 |
| EP2146328A3 (fr) | 2012-04-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2146328A2 (fr) | Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité | |
| EP2622527B1 (fr) | Procédé et dispositif pour fournir une clé cryptographique pour un appareil de terrain | |
| DE19532067C1 (de) | Verfahren und Einrichtung zur Einprogrammierung von Betriebsdaten in Fahrzeugbauteile | |
| EP2991045B1 (fr) | Système de distribution intelligent | |
| AT506344A1 (de) | Verfahren und vorrichtung zur steuerung der zutrittskontrolle | |
| US20180108196A1 (en) | Network connectivity module for electro-mechanical locks | |
| DE102012008395A1 (de) | Verfahren und System für eine gesicherteSchlüssel-Übergabe | |
| DE10124800A1 (de) | Prozessautomatisierungssystem und Prozessgerät für ein Prozessautomatisierungssystem | |
| CN104318650A (zh) | 一种动态密码锁管控系统 | |
| WO2020151987A1 (fr) | Récipient, procédé et système permettant un contrôle d'accès hors ligne et permettant une transmission de données de détection hors ligne | |
| EP2745275A2 (fr) | Dispositif de verrouillage | |
| EP1321901B1 (fr) | Méthode pour contrôler les droits d'accès à un objet | |
| DE102014217903A1 (de) | Portabler Transportbehälter und Verfahren zum Transport von Wertsachen, vertraulichen Dokumenten oder dgl. | |
| EP0877331A2 (fr) | Système de communication sans fil | |
| EP1586079A1 (fr) | Procede et dispositif de transmission de donnees mobiles | |
| EP3567557A1 (fr) | Système de fermeture | |
| EP3027827B1 (fr) | Poignée de fenêtre, verrouillable de façon électromagnétique | |
| EP3582192B1 (fr) | Procédé de régulation d'un régime d'accès à un objet, unité de fermeture et système de fermeture | |
| DE19609319A1 (de) | Elektronisches Zugangskontroll- und Sicherheitssystem | |
| EP3096298A1 (fr) | Installation de fermeture | |
| WO2018077524A1 (fr) | Système et procédé de protection d'un appareil | |
| DE10044658A1 (de) | Einrichtung zur Überwachung und Registrierung von System- und Umgebungszuständen | |
| CN108961476A (zh) | 应用于智慧路灯的控制箱及其解锁方法 | |
| DE10350647A1 (de) | Verfahren und Anordnung zur mobilen Datenübertragung | |
| EP3314844A1 (fr) | Dispositif de traitement de données et procédé de fonctionnement dudit dispositif de traitement de données |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
| PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
| AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07C 9/00 20060101AFI20120228BHEP |
|
| 17P | Request for examination filed |
Effective date: 20121004 |
|
| 17Q | First examination report despatched |
Effective date: 20130205 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20150127 |