[go: up one dir, main page]

WO2013059839A2 - Container seal security device - Google Patents

Container seal security device Download PDF

Info

Publication number
WO2013059839A2
WO2013059839A2 PCT/ZA2012/000064 ZA2012000064W WO2013059839A2 WO 2013059839 A2 WO2013059839 A2 WO 2013059839A2 ZA 2012000064 W ZA2012000064 W ZA 2012000064W WO 2013059839 A2 WO2013059839 A2 WO 2013059839A2
Authority
WO
WIPO (PCT)
Prior art keywords
tamper indicating
container seal
indicating device
rfid
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/ZA2012/000064
Other languages
French (fr)
Other versions
WO2013059839A3 (en
Inventor
Harry JOLLIFFE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2013059839A2 publication Critical patent/WO2013059839A2/en
Publication of WO2013059839A3 publication Critical patent/WO2013059839A3/en
Anticipated expiration legal-status Critical
Priority to ZA2014/02946A priority Critical patent/ZA201402946B/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0329Forms or constructions of security seals characterised by the type of seal used having electronic sealing means
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0329Forms or constructions of security seals characterised by the type of seal used having electronic sealing means
    • G09F3/0335Forms or constructions of security seals characterised by the type of seal used having electronic sealing means using RFID tags
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2203/00Decoration means, markings, information elements, contents indicators
    • B65D2203/10Transponders

Definitions

  • This invention relates to a tamper indicating device for the management of assets including containers.
  • a container in USP 7019683 includes a system that senses an intrusion into the container. The sensing is provided by range-gated micro- impulse radar that generates microwave pulses that bounce around the interior of the container and the reflected signals are measured at the exit gate.
  • the system relies on the Doppler Effect and is complicated and, as far as the applicant is aware, has not been used extensively if at all.
  • Terminal management systems used at present includes a camera-captured photograph of the container ID and of the truck ID.
  • the camera cannot capture the locking bolt seal ID number because of its small size, and this requires a close-up visual inspection and recordal. This adds time to the clearing facility of the check point and, in instances in which there are two containers on the same truck and their doors are facing each other, the visual inspection is very difficult if not impossible. This means that it is extremely difficult to confirm whether or not the locking bolt seal has been replaced or tampered with.
  • a tamper indicating device for a seal for a container includes a locking unit adapted to span a conventional locking bolt (or other container seal), and having a RFID facility linked electronically with at least one identity code associated with the locking bolt and/or the container number .
  • the device may have a unique secure encrypted electronic ID embedded in the RFID microchip or the like that may also be embossed on the unit for visual purposes, if necessary.
  • the device ID along with other information may be linked to the locking bolt identity code on a backend operating platform
  • the device has at least one RFID component having an ID code readable by a RFID reader.
  • the device includes a zone that is fracturable whereupon the ID code becomes unreadable on attempts to tamper with the device.
  • the system may be immobilised for "No Read” by the reader to indicate an unauthorised fracture of the device.
  • the device of the invention effectively shields the locking bolt or other seal and obviates the previous requirement for a visual inspection.
  • the device may be self-locking so that it can only be removed by cutting or other force, and thereby fracturing it.
  • the device of the invention may be used with most systems worldwide thereby providing adequate security for intercontinental movement.
  • the RFID may comprise or include a 32- bit authentication identifier, with an extensible EPC memory bank, a scalable user memory bank and a password-protected read and write support capabilities.
  • the device of the invention is preferably supplied and affixed by the packer of the particular container.
  • Check points such as harbour or yard terminals will be equipped for reading the devices, and it will be appreciated that it is not possible to counterfeit any device because of the use of a large number, for example 32 bit codes.
  • the RF communication interface and reader commanded functionality requirements are preferably for Class 1 RFID tag operating in the frequency range of 860-930 MHz.
  • a Class 1 tag is designed to communicate only its unique identifier and other information required to obtain the unique identifier during the communication process.
  • a fixed RFID reader is located at strategic points, such as a port entrance, exit, yard entrance and exit as well as boundary or customs posts.
  • the device data may be relayed to a central point which preferably has an interface with the Terminal Management System, Customs, SARS. BRIEF DESCRIPTION OF THE DRAWINGS
  • Figure 1 is an exploded view of the device according to the invention.
  • Figure 2 is a view of an adapter for use with different shaped locking bolts
  • Figure 3 is a view of the RFID chip located on the slidable insert
  • Figure 4 is an isometric view showing the device in position of use.
  • the device 10 includes a holder 12 for the tag 20 of a locking bolt 22 and a slidable insert 14, receivable in the holder 12, for lockingjhe tag of the locking bolt 22 in position.
  • the slidable insert 14 includes ratchet formations 16 engagable with complimentary ratchet formations 18 on the holder 12 thus forming a locking engagement with the holder 12.
  • the slidable insert 14 additionally includes a fracturable zone 24.
  • the device 10 is intended for a single use, and once locked in place, must be broken to be removed.
  • the circuitry 30 of the device 10 is contained within the slidable insert 14.
  • the circuitry 30 includes an RFID microchip, having a unique secure encrypted electronic ID.
  • the RFID microchip is a Class 1 tag and includes a 32-bit authentication identifier, with an extensible EPC memory bank, a scalable user memory bank and password-protected read and write support capabilities.
  • a Class 1 tag is designed to communicate only its unique identifier and other information required to obtain the unique identifier during the communication process. Any attempt to tamper with the device 10 to obtain access to the locking bolt 20, 22 will result in the insert 14 being broken along its fracturable zone 24, subsequently causing the circuitry 30 of the device to be broken.
  • an adapter 38 is available for those locking bolts 20, 22 that are shaped slightly differently to the device holder.
  • the locking bolt 22 is used to lock the security bar of the container (not shown), and is then secured in the holder 12.
  • the identity number of the bolt is shown at 36.
  • the ID number of the device is also printed onto the device at 32.
  • the device 10 is supplied and affixed by the packer of the particular container.
  • the packer will then load information about the container onto a user platform, including the device ID number, the locking bolt ID 26 and the container number.
  • a fixed RFID reader is located at strategic points, such as a port entrance, exit, yard entrance and exit as well as boundary or customs posts. When the device is in the range of a reader, it will be prompted for an ID.
  • the ID will not read, and information will be transmitted to the reader, alerting the relevant persons that the device has been tampered with.
  • an RFID user may be possible to use a WAP/internet enabled cell phone to match the information.
  • This information may then be transmitted to the backend user platform.
  • the backend user platform will then send a response back to the phone providing the original locking bolt 20 ID number 26 and the original container number. These numbers can then be checked against the actual locking bolt 20, 22 ID number 26 and the container number present. Any discrepancies between what is recorded on the back end user platform, and what is actually present on the device will indicate that the container has been tampered with and a new device applied.
  • the RFID chip has a unique number which can be linked to the bolt seal as well as container via the operating platform. This data may be relayed to a central point which preferably has an interface with the Terminal Management System, Customs, SARS.
  • the invention therefore provides for a unique tamper indicating device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Electromagnetism (AREA)
  • Closures For Containers (AREA)

Abstract

ABSTRACT A tamper indicating device 10 for a seal for a container includes a locking unit comprising a holder 12 which spans a conventional locking bolt 22 and receives an insert 14 for securing the tag 20 of the locking bolt in position. The device has an RFID facility electronically linked with at least one identity code associated with the locking bolt 22 and/or the container number. The device 10 is for single - use and once locked in place is required to be broken to be removed.

Description

CONTAINER SEAL SECURITY DEVICE
TECHNICAL FIELD OF THE INVENTION
This invention relates to a tamper indicating device for the management of assets including containers.
BACKGROUND ART
The integrity of a container is of paramount importance having regard to theft or the importation of dangerous matter such as explosives, poisons, radioactive material and the like. Many ideas have been propounded to eliminate or at least reduce the risk of containers and trucks having their contents stolen or bearing illicit goods without an indication, or only a delayed indication, of the breakage of the seal or seals of the container. It is often a situation of locking the door after the horse has bolted.
In USP 6331022 a cable seal is provided that seals the container and locks the security bar. In US 6536815 the bar and bracket are covered in a textured baked-on powder coat. A thief may cut the bar and try to weld it together again to disguise the fact that the bar had been cut. Both of these patents rely on a visual check and therefore to human error.
In USP 7019683 a container includes a system that senses an intrusion into the container. The sensing is provided by range-gated micro- impulse radar that generates microwave pulses that bounce around the interior of the container and the reflected signals are measured at the exit gate. The system relies on the Doppler Effect and is complicated and, as far as the applicant is aware, has not been used extensively if at all.
Terminal management systems (TMS) used at present includes a camera-captured photograph of the container ID and of the truck ID. Unfortunately, the camera cannot capture the locking bolt seal ID number because of its small size, and this requires a close-up visual inspection and recordal. This adds time to the clearing facility of the check point and, in instances in which there are two containers on the same truck and their doors are facing each other, the visual inspection is very difficult if not impossible. This means that it is extremely difficult to confirm whether or not the locking bolt seal has been replaced or tampered with.
It is an object of the present invention to provide a system that avoids or at least greatly minimises the difficulties and problems outlined above.
DISCLOSURE OF THE INVENTION
According to the invention a tamper indicating device for a seal for a container includes a locking unit adapted to span a conventional locking bolt (or other container seal), and having a RFID facility linked electronically with at least one identity code associated with the locking bolt and/or the container number .
The device may have a unique secure encrypted electronic ID embedded in the RFID microchip or the like that may also be embossed on the unit for visual purposes, if necessary.
The device ID along with other information may be linked to the locking bolt identity code on a backend operating platform
In a preferred form of the invention the device has at least one RFID component having an ID code readable by a RFID reader.
The device includes a zone that is fracturable whereupon the ID code becomes unreadable on attempts to tamper with the device.
In the event that the ID becomes unreadable, the system may be immobilised for "No Read" by the reader to indicate an unauthorised fracture of the device. The device of the invention effectively shields the locking bolt or other seal and obviates the previous requirement for a visual inspection.
The device may be self-locking so that it can only be removed by cutting or other force, and thereby fracturing it.
The device of the invention may be used with most systems worldwide thereby providing adequate security for intercontinental movement.
In an example of the invention the RFID may comprise or include a 32- bit authentication identifier, with an extensible EPC memory bank, a scalable user memory bank and a password-protected read and write support capabilities.
The device of the invention is preferably supplied and affixed by the packer of the particular container. Check points, such as harbour or yard terminals will be equipped for reading the devices, and it will be appreciated that it is not possible to counterfeit any device because of the use of a large number, for example 32 bit codes.
The RF communication interface and reader commanded functionality requirements are preferably for Class 1 RFID tag operating in the frequency range of 860-930 MHz. A Class 1 tag is designed to communicate only its unique identifier and other information required to obtain the unique identifier during the communication process.
In use a fixed RFID reader is located at strategic points, such as a port entrance, exit, yard entrance and exit as well as boundary or customs posts.
The device data may be relayed to a central point which preferably has an interface with the Terminal Management System, Customs, SARS. BRIEF DESCRIPTION OF THE DRAWINGS
An embodiment of the invention is described below with reference to the accompanying drawings, in which:
Figure 1 is an exploded view of the device according to the invention;
Figure 2 is a view of an adapter for use with different shaped locking bolts; Figure 3 is a view of the RFID chip located on the slidable insert;
Figure 4 is an isometric view showing the device in position of use.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Referring to figures 1 to 4 the device 10 includes a holder 12 for the tag 20 of a locking bolt 22 and a slidable insert 14, receivable in the holder 12, for lockingjhe tag of the locking bolt 22 in position.
Referring to figure 1 , the slidable insert 14 includes ratchet formations 16 engagable with complimentary ratchet formations 18 on the holder 12 thus forming a locking engagement with the holder 12.
The slidable insert 14 additionally includes a fracturable zone 24.
The device 10 is intended for a single use, and once locked in place, must be broken to be removed.
Referring to Figures 1 and 3, the circuitry 30 of the device 10 is contained within the slidable insert 14. The circuitry 30 includes an RFID microchip, having a unique secure encrypted electronic ID. The RFID microchip is a Class 1 tag and includes a 32-bit authentication identifier, with an extensible EPC memory bank, a scalable user memory bank and password-protected read and write support capabilities. A Class 1 tag is designed to communicate only its unique identifier and other information required to obtain the unique identifier during the communication process. Any attempt to tamper with the device 10 to obtain access to the locking bolt 20, 22 will result in the insert 14 being broken along its fracturable zone 24, subsequently causing the circuitry 30 of the device to be broken.
Referring to figure 2, an adapter 38 is available for those locking bolts 20, 22 that are shaped slightly differently to the device holder.
Referring to figure 4, the locking bolt 22 is used to lock the security bar of the container (not shown), and is then secured in the holder 12. The identity number of the bolt is shown at 36. The ID number of the device is also printed onto the device at 32.
In use the device 10 is supplied and affixed by the packer of the particular container.
The packer will then load information about the container onto a user platform, including the device ID number, the locking bolt ID 26 and the container number.
A fixed RFID reader is located at strategic points, such as a port entrance, exit, yard entrance and exit as well as boundary or customs posts. When the device is in the range of a reader, it will be prompted for an ID.
If the device is damaged or not present, the ID will not read, and information will be transmitted to the reader, alerting the relevant persons that the device has been tampered with.
Where an RFID user is not present, it may be possible to use a WAP/internet enabled cell phone to match the information. This information may then be transmitted to the backend user platform. The backend user platform will then send a response back to the phone providing the original locking bolt 20 ID number 26 and the original container number. These numbers can then be checked against the actual locking bolt 20, 22 ID number 26 and the container number present. Any discrepancies between what is recorded on the back end user platform, and what is actually present on the device will indicate that the container has been tampered with and a new device applied.
The RFID chip has a unique number which can be linked to the bolt seal as well as container via the operating platform. This data may be relayed to a central point which preferably has an interface with the Terminal Management System, Customs, SARS.
The invention therefore provides for a unique tamper indicating device.

Claims

1. A tamper indicating device 10 for a seal for a container characterised in that the device comprises a locking unit adapted to span a conventional locking bolt 22 (or other container seal), and having a RFID facility linked electronically with at least one identity code associated with the locking bolt 22 and/or the container.
2. A tamper indicating device as claimed in claim 1 characterised in that the device 10 has a unique secure encrypted electronic identity code 36 embedded in the RFID microchip or the like.
3. A tamper indicating device for a container seal as claimed in claim 2 characterised in that the identity code is stored in the database of the device during manufacture.
4. A tamper indicating device for a container seal as claimed in either of claims 2 or 3 characterised in that the identity code is embossed on the unit for visual purposes.
5. A tamper indicating device for a container seal as claimed in any of claims 2 to 4 characterised in that the device identity code and other relevant information is linked to the locking bolt identity code on a backend operating platform.
6. A tamper indicating device for a container seal as claimed in any of claims 1 to 5 characterised in that the device identity code is stored on at least one RFID component readable by a RFID reader.
7. A tamper indicating device for a container seal as claimed in any of claims 1 to 6 characterised in that the device includes a zone 24 that is fracturable on attempts to tamper with the device whereupon the RFID component containing the identity code of the device becomes unreadable.
8. A tamper indicating device for a container seal as claimed in claim 7 characterised in that when the RFID component becomes unreadable the RFID reader will display a "No Read" to indicate an unauthorised fracture of the device.
9. A tamper indicating device for a container seal as claimed in any of claims 1 to 8 characterised in that the device is self-locking such that it can only be removed by cutting or other force, thereby breaking it.
10. A tamper indicating device for a container seal as claimed in any of claims 1 to 9 characterised in that the RFID facility comprises a 32-bit authentication identifier, with an extensible EPC memory bank, a scalable user memory bank and a password-protected read and write support capabilities.
11. A tamper indicating device for a container seal as claimed claim 0 characterised in that the RF communication interface and reader commanded functionality is a Class 1 RFID tag operating in the frequency range of 860-930 MHz.
12. A tamper indicating device for a container seal as claimed in any of claims 1 to 11 characterised in that the device includes additional data relating to location, date/time and any other pertinent information.
13. A tamper indicating device for a container seal as claimed in claim 12 characterised in that the data read off the RFID component is relayed to a central point which preferably has an interface with the Terminal Management System, Customs, SARS.
14. A tamper indicating device for a container seal as claimed in any of claims 1 to 13 characterised in that check points, such as harbour or yard terminals are equipped with RFID readers for reading the RFID component on the device.
PCT/ZA2012/000064 2011-10-20 2012-10-04 Container seal security device Ceased WO2013059839A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
ZA2014/02946A ZA201402946B (en) 2011-10-20 2014-04-23 Container seal security device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2011/07677 2011-10-20
ZA201107677 2011-10-20

Publications (2)

Publication Number Publication Date
WO2013059839A2 true WO2013059839A2 (en) 2013-04-25
WO2013059839A3 WO2013059839A3 (en) 2013-06-13

Family

ID=48141637

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2012/000064 Ceased WO2013059839A2 (en) 2011-10-20 2012-10-04 Container seal security device

Country Status (2)

Country Link
WO (1) WO2013059839A2 (en)
ZA (1) ZA201402946B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614568A (en) * 2019-02-25 2020-09-01 南宁富桂精密工业有限公司 Router and wireless device
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ZA200402317B (en) * 2003-09-15 2004-10-07 Andrew Gerald Lynn Brown "A seal".
US20060202824A1 (en) * 2005-02-04 2006-09-14 Container Security Inc. Electronic seal and method of shipping container tracking
WO2008037645A2 (en) * 2006-09-25 2008-04-03 Siemens Aktiengesellschaft Device for localizing a security device for transportable goods
US7936266B2 (en) * 2006-10-27 2011-05-03 Maritime Container Security, Inc. Shipping container seal monitoring device, system and method
US7800504B2 (en) * 2006-12-19 2010-09-21 Charles Michael Teeter Disposable and tamper-resistant RFID lock
AU2008261557A1 (en) * 2007-06-15 2008-12-18 Matthew Henderson A transponder bolt seal and a housing for a transponder
US20090072554A1 (en) * 2007-09-13 2009-03-19 United Security Applications Id. Inc. Pin-style cargo seal with removable tracking module
TW200936866A (en) * 2008-02-26 2009-09-01 Jin-Hao Chaocheng RFID electronic lock

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
CN111614568A (en) * 2019-02-25 2020-09-01 南宁富桂精密工业有限公司 Router and wireless device
CN111614568B (en) * 2019-02-25 2022-08-05 南宁富联富桂精密工业有限公司 Router and wireless device

Also Published As

Publication number Publication date
WO2013059839A3 (en) 2013-06-13
ZA201402946B (en) 2015-03-25

Similar Documents

Publication Publication Date Title
US7646292B2 (en) Methods and systems for verifying the position and status of hierarchically arranged objects
TWI374406B (en) Method and system for monitoring containers to maintain the security thereof
US8058985B2 (en) Locking apparatus for shipping containers
JP4663650B2 (en) Method and system for monitoring containers and maintaining container safety
TWI305633B (en) Method and system for arming a multi-layered security system
US20110018707A1 (en) Shipping container having integral geoclock system
US20080073422A1 (en) Method and system for tracking and managing cargo containers
TW200417848A (en) Method and system for monitoring containers to maintain the security thereof
KR20180029820A (en) Padlock
US9972154B1 (en) Method and apparatus for biometric access for E-seals
CA2529186A1 (en) Electronic security system for monitoring and recording activity and data relating to cargo
US20100283580A1 (en) Device and method for detecting the opening of a vessel
EP3747317A1 (en) A package locking apparatus and a system therefor
KR20070017375A (en) Method and system for monitoring the health of containers
EP2092143A1 (en) Security device for mobile retail cart
US20040246097A1 (en) Secure electronic compartment identifier system
KR102034708B1 (en) Container anti-counterfeit protection by using printed fiber optic manufacturing and integrated sensors
WO2013059839A2 (en) Container seal security device
WO2006081660A1 (en) Security device for luggage and system and method therefor
CA2997345A1 (en) Secure delivery system, logging module and access controlled container
CN101790734A (en) A method for verifying the integrity of a container
CN102390635A (en) Electronic lock system for container
WO2025173040A2 (en) Tamper evident container and method of manufacturing thereof
HK1106842B (en) Methods and systems for verifying the position and status of hierarchically arranged objects
MX2007014061A (en) Method and apparatus for arming a multi-layered security system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12842064

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 12842064

Country of ref document: EP

Kind code of ref document: A2