US20150179041A1 - Protection module for monitoring the position of objects - Google Patents

Protection module for monitoring the position of objects Download PDF

Info

Publication number
US20150179041A1
US20150179041A1 US14/632,059 US201514632059A US2015179041A1 US 20150179041 A1 US20150179041 A1 US 20150179041A1 US 201514632059 A US201514632059 A US 201514632059A US 2015179041 A1 US2015179041 A1 US 2015179041A1
Authority
US
United States
Prior art keywords
monitoring device
position data
protection module
alarm
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/632,059
Inventor
Jean Blaufuß
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CARGOGUARD GmbH
Original Assignee
CARGOGUARD GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CARGOGUARD GmbH filed Critical CARGOGUARD GmbH
Priority to US14/632,059 priority Critical patent/US20150179041A1/en
Assigned to CARGOGUARD GMBH reassignment CARGOGUARD GMBH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Blaufuß, Jean
Publication of US20150179041A1 publication Critical patent/US20150179041A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/20Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
    • G08G1/205Indicating the location of the monitored vehicles as destination, e.g. accidents, stolen, rental

Definitions

  • the invention relates to a protection module, a system and a method for monitoring objects.
  • a protection module By means of the present invention, especially the position of objects can be monitored.
  • transport containers such as, for example, containers are used in which the objects are transported.
  • a locking device such as, for example, an electrical or mechanical security lock. This is intended to prevent that the objects can be stolen from the transport container.
  • a locking device is broken open or the entire transport container is stolen, the objects are often lost irretrievably. It is especially in the case of widely used objects, that it is difficult to retrieve a stolen object or to track and convict the thief, respectively. Even if serial numbers of the objects are registered before transportation, all objects of the same type would then have to be checked for these.
  • DE 10 2008 033 731 describes a security lock which can be equipped with a position sensor and conveys its position to a server at fixed times. However, the position is conveyed only for as long as there is sufficient battery capacity. In addition, when the transport container is emptied, only its position can be ascertained but not the position of the object removed from the transport container.
  • the invention is based on the concept of allocating or adding a protection module to one or more objects to be monitored so that it cannot be easily recognized.
  • the protection module comprises a locating module for determining position data and a communication unit by means of which the position data can be sent to a monitoring device.
  • the protection module can be placed into an alarm state by an alarm signal supplied, in which state it transmits the position data to the monitoring device either continuously or in a so-called alarm interval.
  • the protection module is preferably switched into an active state before the beginning of the monitoring so that it is ready for reception and can receive an alarm signal. This can be effected by the user by means of an on button.
  • the alarm signal can be sent to the protection module either by the monitoring device or by other protection devices which are allocated to the same object or objects to be monitored, e.g. by security locks or other protection modules.
  • this protection module sends data to the monitoring device only in the alarm state. Position data are preferably also determined only in this alarm state. This is advantageous especially with regard to the power consumption and a limited voltage supply. However, it is preferred that the protection module sends determined position data and/or other data to the monitoring device at regular time intervals also in the normal monitoring state or in the active state.
  • the transmitting interval is preferably greater in the active state than the alarm interval. By this means, it is possible to check the operability of the protection module or the existence of a communicative link between the protection module and the monitoring device, respectively.
  • the transmitting interval can preferably be adapted to external situations. For example, the alarm interval can be adapted to a battery charging state of the protection module.
  • the transmitting interval can be adjusted by the user via the monitoring device in the active state or alarm state.
  • the protection module can also be preset in such a manner that the transmitting interval is matched to the embodiment and its intended use.
  • the protection module in the alarm state, firstly sends position data continuously to the monitoring device until a supply voltage or a battery charging state has dropped to a predetermined value, and then sends position data to the monitoring device in an adjustable or predetermined alarm interval.
  • continuous position finding with high temporal resolution can firstly be performed until the supply voltage has dropped to a critical value. At a low remaining supply voltage, a certain basic locating capability or a minimum locating time, respectively, is ensured by switching to discontinuous data transmission.
  • the locating module can determine the position of the protection module, for example, via GPS-based locating or radio cell locating. However, any other locating technology can be used. However, locating at sea or in remote regions should preferably also be possible.
  • Position data can be two- or three-dimensional position data and comprise both static and time-variable position data when the object is moved. In consequence, the locating module can be capable of determining the track of an object, i.e. the movement of an object over a number of locations.
  • the position data do not necessarily need to be absolute position data. If a reference point is specified, relative position data can also be determined. A reference point which may also be moved can have a further locating module.
  • the communication unit of the protection module can send data, especially position data, to the monitoring device.
  • the communication is preferably wireless but can also take place by means of wire-based technologies.
  • the protection module and the monitoring device can thus be connected to one another wirelessly or in a wire-connected manner and can communicate with one another not only unidirectionally but also bidirectionally.
  • the communication unit of the protection module has the required means for USB/GSM/GPRS/UMTS- and/or WLAN-based data exchange such as, for example, corresponding transmitting and receiving devices and connections.
  • data are understood to be any type of information, e.g. position data, sensor data, identification data, alarm signals, instructions, etc.
  • the protection module is constructed in such a manner that it is adapted to the object to be monitored in its design and/or in its extent.
  • the protection module can be mixed inconspicuously among the objects to monitored.
  • the protection module can possibly also be hidden in a product packaging or in the product itself.
  • the protection module can be attached inconspicuously to a product or camouflaged as a part of the latter. If it is intended, for example, to monitor a transportation of cigarettes, the protection module can be of such a size that it can be hidden in a cigarette packet of a carton of cigarettes which, in turn, is located among many cartons, for example on a pallet.
  • a system for monitoring one or more objects which comprises at least one protection module and at least one monitoring device.
  • the monitoring device can comprise a computer, a server, a server network, a PDA or a mobile telephone etc.
  • the protection module can be designed in accordance with one of the embodiments described above and can be placed into an alarm state by an alarm signal, in which state it sends data to the monitoring device.
  • This data preferably comprise position data which are determined by the locating module of the protection module.
  • the monitoring device can compare the received position data with one another or with predetermined position data.
  • Predetermined position data can comprise, for example, position data sent by other protection devices, stored in the monitoring device and/or predetermined by a user. In the case of a deviation by more than a predetermined value, an alarm signal is then sent to at least one of the protection modules and the protection module, as a result, is placed into the alarm state.
  • the system can have further protection devices.
  • the system can also be embedded or integrated in another conventional monitoring system.
  • several protection modules can be mounted on the object to be monitored or on several objects to be monitored, each of these protection modules sending position data to the monitoring device in an active state.
  • the transmitting interval can be greater in the active state than the alarm interval in the alarm state. This reduces the amount of data to be sent and to be processed, on the one hand, and makes it possible to save power, on the other hand.
  • This exemplary embodiment is especially advantageous if a transportation of a multiplicity of objects is involved which have the same destination. These can also be objects which belong together in some form but which are transported packaged separately from one another. This makes it possible to ensure that neither one nor the other generic type is lost.
  • a particularly secure embodiment of the system according to the invention also comprises a security lock by means of which a room can be closed in which the at least one object to be monitored is stored, which is additionally provided with at least one protection module.
  • the security lock is preferably suitable for conveying at least one alarm state to the monitoring device and/or to the at least one protection module.
  • the room, which can be closed by means of this security lock can be, for example, a transport container, a container, a truck superstructure, a box or the like.
  • the room also includes immobile warehouses, strong rooms and other security storage rooms.
  • the security lock is preferably connected wirelessly or in a wire-connected manner to the protection module and/or to the monitoring device for uni- or bidirectional communication.
  • each element of the system i.e. the security lock, the at least one protection module and the monitoring device can exchange data with any other element.
  • the security lock is connected communicatively to the protection module and can place the protection module into the alarm state due to an alarm signal. If the security lock detects manipulation or alerting sensor values of any sensors of the security lock or of the container, the security lock can transmit an alarm signal to the monitoring device and from there to the protection module and/or directly to the protection module. A redundant signal transmission via the monitoring device and directly to the protection module ensures that no alarm signal is lost e.g. due to connection disturbances.
  • the security lock can also be capable of being placed into an alarm state.
  • the monitoring device can place the protection module and/or the security lock into the alarm state due to an alarm signal when the monitoring device detects a contingency or a contingency is defined by a user.
  • the security lock also has a locating module.
  • the security lock and the protection module can thus send their respective position data to the monitoring device in an active state.
  • the same transmitting interval is preferably used and/or transmission is simultaneous.
  • the security lock or the protection module has sensors, e.g. temperature, humidity, acceleration, pressure, filling level, gas, light or inclination sensors, the corresponding sensor data, a clock time and/or the date can be sent to the monitoring device instead or in addition to the position data.
  • the transmitting intervals can be adjustable or adapted to external conditions in the active state and in the alarm state via the monitoring device.
  • the monitoring device can compare the received position data with one another or with predetermined position data. In the case of a deviation which exceeds a critical value, at least the protection module, but preferably also the security lock can then be placed into the alarm state.
  • the collocating of the protection module attached to the objects and the security lock mounted at the room is monitored, for example, so that the objects to be monitored cannot be removed unnoticed out of the room closed by the security lock. This means that even if the room or the security lock is opened without triggering an alarm, e.g. by an authorized person, the objects are additionally protected by the condition of collocating or by coupling the position of protection module and security lock.
  • a method for monitoring an object provided with a protection module comprises the following steps: when the protection module receives an alarm signal, it is placed into an alarm state. In this alarm state, the protection module sends position data which are determined by a locating module of the protection module, to a monitoring device.
  • the position data are preferably transmitted continuously in a type of continuous locating mode. As an alternative, the position data can also be transmitted in an alarm interval.
  • the protection module like the monitoring device, can be designed in accordance with one of the embodiments described above.
  • FIG. 1 shows the structure of a protection module according to the invention.
  • FIG. 2A shows possible transmission paths of data between a protection module and a monitoring device in an active state.
  • FIG. 2B shows possible transmission paths of data between a protection module and a monitoring device in an alarm state of the protection module.
  • FIG. 3 shows a flow chart for the use of a protection module.
  • FIG. 4 shows a protection module which is hidden in a room locked by a security lock.
  • FIG. 5 shows a system for monitoring an object with a protection module, a monitoring device and a security lock.
  • FIG. 6A shows possible transmission paths in the case of an alarm of the security lock.
  • FIG. 6B shows a flow chart for the situation shown in FIG. 6A .
  • FIG. 7A shows alternative transmission paths in the case of an alarm of the security lock.
  • FIG. 7B shows a flow chart for the situation shown in FIG. 7A .
  • FIG. 8A shows further alternative transmission paths in the case of an alarm of the security lock.
  • FIG. 8B shows a flow chart for the situation shown in FIG. 8A .
  • FIG. 9A shows possible transmission paths in the case of an alarm of the monitoring device.
  • FIG. 9B shows a flow chart with respect to the situation shown in 9 A.
  • FIG. 10 shows a detailed flow chart with respect to operating a protection module according to the invention.
  • FIG. 1 shows the structure of a protection module according to the invention.
  • the protection module 1 comprises at least one locating module 11 and one communication unit 12 .
  • the locating module 11 can be, for example, a Telit locating module with GSM communication, antenna and battery and is suitable for determining a position and generating position data from this.
  • the position data can be two-dimensional position data which specify the position on the earth's surface, or three-dimensional position data which additionally also specify the height above the earth's surface.
  • the locating can be done via GPS or radio cell location, but it may also be possible to switch between both locating methods.
  • the communication unit 12 is suitable for transmitting or receiving data on the basis of USB, GSM, GPRS, UMTS and/or WLAN.
  • the communication unit 12 has, for example, a mobile radio antenna.
  • the protection module 1 advantageously also has a USB connection via which data can be exchanged and electrical power be supplied.
  • the firmware of the protection module 1 can be updated via the USB interface and other adjustments, for example the activation, can be performed.
  • the protection module 1 can have a voltage supply 14 such as an accumulator or a battery which can be charged without removal via the USB interface.
  • a voltage supply 14 such as an accumulator or a battery which can be charged without removal via the USB interface.
  • an external voltage source can be connected to the protection module 1 .
  • the charging state of the voltage source 14 can be indicated, for example, by means of an LED.
  • the autonomous voltage supply 14 of the protection module 1 is advantageously sufficient for at least 5 days with continuous locating (continuous position data transmission to the monitoring device 2 ).
  • the protection module 1 can also have a key switch for testing the supply voltage. When the key switch is pressed for the supply voltage test, a charging state of the voltage source can be indicated, for example, by means of an LED display.
  • the protection module 1 can also have a control unit 13 which is suitable for controlling the locating module 11 and the communication unit 12 and any sensors 15 .
  • the control unit 13 can comprise a microprocessor or a microcontroller 131 .
  • a sensor 15 can be provided for testing the state of charge.
  • Other sensors 15 are also conceivable such as, for example, temperature, humidity, motion, acceleration, pressure and gas sensors.
  • the sensor data can be interrogated preferably via the communication unit 12 by a user or a monitoring device 2 or are automatically transmitted via the protection module.
  • a security chip 134 can be provided in the control unit in order to encrypt data to be transmitted or to decrypt received encrypted data.
  • a suitable software-based encryption or protection increases the security of the communication between the protection module 1 and the monitoring device 2 .
  • a real-time clock 132 in order to add a time stamp to data to be sent out.
  • Such a time stamp preferably comprises both the date and the clock time.
  • Such a memory 133 can be implemented by any type of memories, for example ROM, FLASH, EPROM, EEPROM etc.
  • the protection module 1 also has a housing 10 , preferably of plastic which encloses most of the other components of the protection module 1 virtually completely and can be adapted in its design to the objects to be monitored.
  • the protection module can be accommodated in a housing, camouflaged
  • the housing 10 should be inconspicuous and as small as possible so that the protection module 1 can be easily hidden at or in or in the vicinity of the objects to be monitored.
  • the protection module 1 can also have a similar or identical size as the products to be monitored and hidden in a product package.
  • the protection module 1 can be activated via a user interface (e.g. on button, display, pin pad, etc.) or via a device connected to the protection module 1 via the USB interface. In the active state, the protection module 1 is ready to receive and to transmit. There is possibly also a pilot lamp, e.g. an LED for indicating the operating status of the protection module 1 . However, it may also be advantageous to omit any type of noticeable displays and switches on the housing 10 of the protection module 1 in order to be able to better camouflage the protection module 1 .
  • FIG. 2A shows the protection module 1 in the active state and a monitoring device 2 .
  • the arrows indicate a possible connection set up for a data transmission.
  • the protection module 1 can send data to the monitoring device 2 such as, for example, position data or sensor data. This can take place either at regular time intervals, continuously or incrementally.
  • the protection module preferably transmits regularly within large transmitting intervals.
  • the data connection is preferably bidirectional so that the monitoring device 2 can also send commands or information to the protection module 1 . Possible connections are indicated by dashed arrows, absolutely necessary connections are indicated by continuous arrows.
  • FIG. 2B shows the exchange of data between the protection module 1 in the alarm state and the monitoring device 2 .
  • the protection module 1 sends data either continuously or within an alarm interval to the monitoring device 2 .
  • position data of the protection module 1 are sent to the monitoring device 2 in the alarm state.
  • identification data for identifying the protection module 1 , time and/or sensor data can also be transmitted.
  • the protection module 1 preferably first sends data continuously to the monitoring device 2 until the state of charge of the voltage supply 14 of the protection module 1 has dropped to a critical value. After that, the protection module 1 switches to a power-saving transmit mode in which the data are now only sent to the monitoring device 2 within a predetermined alarm interval.
  • the transmit interval in the alarm state is preferably shorter than the transmit interval in the active state.
  • the protection module 1 sends position data to the monitoring device 2 also in the active state, the monitoring device 2 can compare the received position data with predetermined position data.
  • predetermined position data can either be stored in the monitoring device 2 or other position data supplied to the monitoring device.
  • the position data can relate to a relative location in which the position of the protection module 1 is specified with respect to a reference point.
  • a user can predetermine position data for the transportation of an object in the monitoring device 2 so that the position data correspond to time-variable position data.
  • the protection module 1 according to the invention can thus be used for monitoring in transportation, during storage and protective safe keeping.
  • the configuration of the protection module 1 can be adapted by a user via the monitoring device 2 also during the operation of the protection module 1 .
  • the transmitting interval can be adapted in the alarm state or in the active state.
  • Sensor data may also be selectively requested from sensors 15 of the protection module 1 .
  • control and request functions can also be exercised by an authorized user via other devices.
  • FIG. 3 shows a possible use of a protection module 1 for monitoring a transport.
  • the protection module 1 is hidden in a product package 4 .
  • a multiplicity of such product packages 4 are stored in a container 5 which can be locked with a security lock 3 . In this manner, the fake or the marked product package, respectively, is not noticeable and cannot be easily discovered.
  • FIG. 4 shows a flow chart for the operation of a protection module according to the invention.
  • the user adds the protection module 1 to one or to a multiplicity of objects to be monitored and activates (S 42 ) the protection module 1 .
  • the protection module 1 can be hidden in one of the objects or in the packaging of the objects, mounted inconspicuously on the objects or attached to the packaging of the objects.
  • the object to be monitored or the multiplicity of objects is possibly subsequently packaged with one or more hidden active protection modules 1 in a container 5 (S 43 ) which may be locked by a security lock 3 (S 44 ). If an electronic security lock 3 is used, the security lock 3 may also have to be activated.
  • the protection module 1 is allocated to a transport and/or to a security lock 3 (S 45 ). This can be done via a user interface in an interne portal which is connected to the monitoring device 2 . The user must previously identify himself and can configure the protection module 1 or the process only with authorization by the monitoring device 2 . Each protection module 1 can have an identification number by means of which the protection module 1 can be unambiguously allocated. Furthermore, SIM-PIN or/and SIM-PUK can be used. The protection module 1 can be allocated via the monitoring device 2 to a particular process which is defined by the user. For example, the user can predetermine a particular transport route or a particular location from which the object to be monitored must not be removed.
  • the relative position data or maximum distances between these protection devices can also be specified so that the monitoring device 2 compares the position data received by the protection devices with one another and, if the maximum distance is exceeded, triggers an alarm.
  • the object to be monitored which is provided with the protection module 1 , must not leave the container 5 locked with the security lock 3 .
  • transmitting intervals or sensor data interrogations can be configured.
  • the protection module 1 preferably sends (S 46 ) position data to the monitoring device 2 already in the active state so that rough locating always takes place. If then an alarm is triggered (S 47 ), the protection module 1 receives an alarm signal and is placed into the alarm state. The protection module 1 can receive an alarm signal from the monitoring device 2 and/or also from other protection devices which are authorized for this. In the alarm state, the protection module 1 sends position data continuously or at regular intervals (alarm intervals) to the monitoring device 2 . By this means, the object marked by the protection module 1 can be located (S 48 ). If an electronic security lock 3 is used additionally which also has a locating module 11 , the container 5 can also be located.
  • the monitoring device 2 receives the locating data from the protection modules 1 and/or from the security lock 3 and can represent these with symbols or various colors on a map.
  • the monitoring device 2 is preferably connected to an alarm system so that responsible persons are immediately notified and/or counter measures are initiated.
  • Such a protection system consisting of a protection module 1 and a monitoring device 2 has the advantage that a thief can be tracked unnoticed. It is important, therefore, to attach the protection module 1 as inconspicuously as possible to the objects to be monitored.
  • FIG. 5 shows possible connections of a protection system in the active state which comprises a protection module 1 , a monitoring device 2 and a security lock 3 .
  • the active state of the protection module 1 or of the security lock 3 respectively, data do not necessarily need to be transmitted.
  • the protection module 1 and/or the security lock 3 sends the respective position data to the monitoring device 2 also in the active state.
  • the monitoring device 2 can then compare the received position data with predetermined data and monitor the location of the object to be monitored and of the container 5 provided with the security lock 3 .
  • the predetermined data can be position data which a user has stored in the monitoring device 2 when configuring the monitoring.
  • a user can predetermine a transportation route or specify location points which must be reached at a predetermined point in time.
  • a particular area can be predetermined which must not be left by the object to be monitored or by the container 5 , respectively. For example, this triggers an alarm when a truck is stolen which transports the objects to be monitored or when the container 5 with the objects to be monitored is stolen from the truck.
  • a missing changing location can also generate a position signal deviating from predetermined position data and trigger an alarm. It is thus possible to perform any type of geofencing.
  • FIGS. 6A and 6B various alarm situations of the system are described.
  • an alarm is triggered in the security lock 3 (S 61 ).
  • the security lock 3 transmits (S 62 ) the alarm signal to the monitoring device 2 .
  • the monitoring device 2 thereupon sends (S 63 ) an alarm signal to the at least one protection module 1 which is allocated to the security lock 3 or the same monitoring process, respectively.
  • the protection module 1 is placed into the alarm state and then sends (S 64 ) its position data to the monitoring device 2 in the alarm interval or continuously.
  • the monitoring device 2 may also receive data from the security lock 3 .
  • the monitoring device 2 can indicate the received position data on a map or represent them in a table.
  • the movement of the object to be monitored or of the container 5 , respectively, is preferably stored in a memory of the monitoring device 2 .
  • Other possible data transmission connections are indicated by dashed arrows between the individual elements of the system.
  • FIGS. 7A and 7B A further possibility for data transmission in an alarm situation is shown in FIGS. 7A and 7B .
  • An alarm is again triggered in the security lock 3 (S 71 ).
  • the security lock 3 sends (S 72 ) the alarm signal directly at least to the protection module 1 and places it into the alarm state.
  • the protection module 1 thereupon sends (S 73 ) its position data to the monitoring device 2 continuously or in the alarm interval.
  • the monitoring device 2 is preferably informed about the alarm state by the data transmission from the protection module 1 and initiates predefined measures.
  • the monitoring device 2 can display, store and/or send out to various addressees the received position data.
  • FIGS. 8A and 8B A further possibility with increased security due to redundant signal transmission is shown in FIGS. 8A and 8B .
  • the security lock 3 on triggering (S 81 ) an alarm, sends (S 82 ) the alarm signal both to the protection module 1 and to the monitoring device 2 .
  • the protection module 1 is placed into the alarm state and sends (S 84 ) at least position data to the monitoring device 2 continuously or in the alarm interval.
  • the monitoring device 2 may transmit a (S 83 ) a further alarm signal to the protection module 1 for the sake of security.
  • the redundant signal transmission ensures that no alarm signal is lost and possible problems of connection, for example between security lock 3 and monitoring device 2 or security lock 3 and protection module 1 remain without consequences.
  • FIGS. 9A and 9B A further alarm situation is shown in FIGS. 9A and 9B .
  • the alarm is triggered here in the monitoring device 2 .
  • the monitoring device 2 has received (S 91 ) position data from the protection module 1 and/or from the security lock 3 which, on comparison (S 92 ), deviate from predetermined data.
  • the alarm can also be triggered by a user via the monitoring device 2 .
  • the monitoring device 2 sends (S 93 ) an alarm signal at least to the protection module 1 but possibly also to the security lock 3 as a result of which an alarm state is activated in each case.
  • the protection module 1 again sends (S 94 ) position data to the monitoring device 2 so that locating can take place and counter measures initiated.
  • FIG. 10 shows a detailed flow chart of a protection module 1 according to the invention.
  • the protection module 1 is initially switched off (S 100 ) and is activated by the user via an on button (S 101 ) before packaging.
  • the protection module 1 can then send (S 102 ) readiness for reception to the monitoring device 2 .
  • This signal can also contain identification data of the protection module 1 such as, for example, an identification number.
  • the protection module 1 may receive (S 103 ) configuration data from the monitoring device 2 such as, for example, user-defined transmit intervals for the active state and the alarm state.
  • the protection module 1 preferably sends (S 104 ) its position or locating data to the monitoring device 2 already in the active state, the transmitting interval being preferably greater in the active state than in the alarm state.
  • the monitoring device 2 can also request data e.g. position data or sensor data from the protection module 1 in user-defined intervals. If, for example, the position data sent by the protection module 1 to the monitoring device 2 in the active state deviate from predetermined data by a certain value, an alarm is triggered. As an alternative, an alarm can be triggered when sensor data deviate from predetermined values or when the monitoring device 2 finds that the protection module 1 is moving out of the geofencing area (S 105 ).
  • triggering an alarm would be that a security lock 3 reports an alarm to the monitoring device 2 which forwards the alarm signal to the protection module 1 , or that a user-defined alarm is detected in the monitoring device 2 or that the protection module 1 is moving away from a security lock 3 (S 106 ). If then an alarm is triggered, the protection module 1 receives an alarm signal. After receiving the alarm signal, the protection module 1 sends (S 109 ) its position data preferably continuously to the monitoring device 2 . If the supply voltage of the protection module 1 is monitored, it is possible to switch from continuous locating to interval locating (S 110 ) at a lower supply voltage. In the case of interval locating, the protection module 1 sends to the monitoring device 2 only in the predetermined alarm interval.
  • the authorized user can deactivate the protection module 1 via the monitoring device 2 (S 112 ), the monitoring device 2 sending a deactivate command to the protection module 1 .
  • the protection module 1 is switched off completely immediately or after a predetermined latency period.
  • the protection module 1 provides for protection against misuse, manipulation and theft with comparatively advantageous costs.
  • the protection module 1 is suitable both for transportation on land and at sea and only mobile radio or GPS reception is needed.
  • culprit tracking is more successful since the stolen goods can be located.
  • Discovery by the unauthorized person is very improbable especially due to the fact that a protection module 1 can be camouflaged as a product so that it can be tracked unnoticed.
  • the monitoring can be adapted to individual requirements, for example sensors can be monitored, continuous locating can be selected, the protection module can be combined with other security devices etc.
  • a two-stage security and locating solution can be implemented by combining the protection module 1 according to the invention with an intelligent electronic security lock 3 : if the security lock 3 is prized open, an alarm is triggered (so-called real-time alarm function) and first intervention steps are triggered, e.g. alerting the police. Following this, the protection module 1 , now placed into the alarm state, leads directly to the thief or to the stolen goods. As a result, the high costs of an accompanying security transport can be saved. In addition, the efficient and reliable tracking will discourage future transgressions.

Abstract

A protection module, a system and a method for monitoring objects, wherein a protection module includes, for attachment to an object to be monitored, a locating module for acquiring position data of the protection module and a communication unit which can send data to a monitoring device. The protection module is suitable for being placed into an alarm state by an alarm signal and in the alarm state, sending position data to the monitoring device in a particular alarm interval or continuously.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a divisional application of U.S. patent application Ser. No. 13/700,870, filed Feb. 1, 2013, which is a U.S. national stage application of PCT/EP2011/002470, filed Jun. 3, 2011, which claims the benefit and priority of German Patent Application Serial Number DE-10-2010-029 671.6, filed Jun. 2, 2010. The entire contents of each of the above-noted applications are hereby incorporated by reference.
  • TECHNICAL FIELD
  • The invention relates to a protection module, a system and a method for monitoring objects. By means of the present invention, especially the position of objects can be monitored.
  • BACKGROUND
  • In the shipping industry, goods or objects to be transported are sent from a sender to a receiver. To protect the objects against theft during the transportation, transport containers such as, for example, containers are used in which the objects are transported. These can be provided with a locking device such as, for example, an electrical or mechanical security lock. This is intended to prevent that the objects can be stolen from the transport container. However, if such a locking device is broken open or the entire transport container is stolen, the objects are often lost irretrievably. It is especially in the case of widely used objects, that it is difficult to retrieve a stolen object or to track and convict the thief, respectively. Even if serial numbers of the objects are registered before transportation, all objects of the same type would then have to be checked for these. It is especially in the case of transportations of valuables that, therefore, a great effort is frequently made in order to prevent unauthorized access or theft, for example by employing security personnel and armored vehicles. However, this is extremely complex and expensive. In addition, these conventional security provisions only represent preventative measures and do not offer any additional protection if there is a contingency, nevertheless. In addition, this will not prevent theft of the transported objects by the security personnel.
  • DE 10 2008 033 731 describes a security lock which can be equipped with a position sensor and conveys its position to a server at fixed times. However, the position is conveyed only for as long as there is sufficient battery capacity. In addition, when the transport container is emptied, only its position can be ascertained but not the position of the object removed from the transport container.
  • SUMMARY
  • It is an object of the present invention, therefore, to provide a system and a method for monitoring objects with increased security, wherein protection against misuse, manipulation and theft is implemented cost-effectively and stolen property can be found again.
  • This object is achieved by the features of the independent claims. The invention is based on the concept of allocating or adding a protection module to one or more objects to be monitored so that it cannot be easily recognized. The protection module comprises a locating module for determining position data and a communication unit by means of which the position data can be sent to a monitoring device. The protection module can be placed into an alarm state by an alarm signal supplied, in which state it transmits the position data to the monitoring device either continuously or in a so-called alarm interval. The protection module is preferably switched into an active state before the beginning of the monitoring so that it is ready for reception and can receive an alarm signal. This can be effected by the user by means of an on button. The alarm signal can be sent to the protection module either by the monitoring device or by other protection devices which are allocated to the same object or objects to be monitored, e.g. by security locks or other protection modules.
  • In one exemplary embodiment, this protection module sends data to the monitoring device only in the alarm state. Position data are preferably also determined only in this alarm state. This is advantageous especially with regard to the power consumption and a limited voltage supply. However, it is preferred that the protection module sends determined position data and/or other data to the monitoring device at regular time intervals also in the normal monitoring state or in the active state. The transmitting interval is preferably greater in the active state than the alarm interval. By this means, it is possible to check the operability of the protection module or the existence of a communicative link between the protection module and the monitoring device, respectively. The transmitting interval can preferably be adapted to external situations. For example, the alarm interval can be adapted to a battery charging state of the protection module. As an alternative or additionally, the transmitting interval can be adjusted by the user via the monitoring device in the active state or alarm state. The protection module can also be preset in such a manner that the transmitting interval is matched to the embodiment and its intended use. In particular, it is advantageous if the protection module, in the alarm state, firstly sends position data continuously to the monitoring device until a supply voltage or a battery charging state has dropped to a predetermined value, and then sends position data to the monitoring device in an adjustable or predetermined alarm interval. In this embodiment, continuous position finding with high temporal resolution can firstly be performed until the supply voltage has dropped to a critical value. At a low remaining supply voltage, a certain basic locating capability or a minimum locating time, respectively, is ensured by switching to discontinuous data transmission.
  • The locating module can determine the position of the protection module, for example, via GPS-based locating or radio cell locating. However, any other locating technology can be used. However, locating at sea or in remote regions should preferably also be possible. Position data can be two- or three-dimensional position data and comprise both static and time-variable position data when the object is moved. In consequence, the locating module can be capable of determining the track of an object, i.e. the movement of an object over a number of locations. In addition, the position data do not necessarily need to be absolute position data. If a reference point is specified, relative position data can also be determined. A reference point which may also be moved can have a further locating module.
  • The communication unit of the protection module can send data, especially position data, to the monitoring device. The communication is preferably wireless but can also take place by means of wire-based technologies. The protection module and the monitoring device can thus be connected to one another wirelessly or in a wire-connected manner and can communicate with one another not only unidirectionally but also bidirectionally. In an advantageous exemplary embodiment, the communication unit of the protection module has the required means for USB/GSM/GPRS/UMTS- and/or WLAN-based data exchange such as, for example, corresponding transmitting and receiving devices and connections. Incidentally, data are understood to be any type of information, e.g. position data, sensor data, identification data, alarm signals, instructions, etc.
  • In one preferred embodiment, the protection module is constructed in such a manner that it is adapted to the object to be monitored in its design and/or in its extent. By this means, the protection module can be mixed inconspicuously among the objects to monitored. The protection module can possibly also be hidden in a product packaging or in the product itself. As an alternative the protection module can be attached inconspicuously to a product or camouflaged as a part of the latter. If it is intended, for example, to monitor a transportation of cigarettes, the protection module can be of such a size that it can be hidden in a cigarette packet of a carton of cigarettes which, in turn, is located among many cartons, for example on a pallet.
  • Furthermore, a system for monitoring one or more objects is proposed which comprises at least one protection module and at least one monitoring device. The monitoring device can comprise a computer, a server, a server network, a PDA or a mobile telephone etc. The protection module can be designed in accordance with one of the embodiments described above and can be placed into an alarm state by an alarm signal, in which state it sends data to the monitoring device. This data preferably comprise position data which are determined by the locating module of the protection module. The monitoring device can compare the received position data with one another or with predetermined position data. Predetermined position data can comprise, for example, position data sent by other protection devices, stored in the monitoring device and/or predetermined by a user. In the case of a deviation by more than a predetermined value, an alarm signal is then sent to at least one of the protection modules and the protection module, as a result, is placed into the alarm state.
  • Additionally, it is preferably possible, via the or by the monitoring device, to adapt a transmitting interval, perform configuration changes of the protection module and request data from the protection module such as position data or data from any sensors of the protection module.
  • In a preferred exemplary embodiment, the system can have further protection devices. For example, the system can also be embedded or integrated in another conventional monitoring system. Preferably, several protection modules can be mounted on the object to be monitored or on several objects to be monitored, each of these protection modules sending position data to the monitoring device in an active state. In this context, the transmitting interval can be greater in the active state than the alarm interval in the alarm state. This reduces the amount of data to be sent and to be processed, on the one hand, and makes it possible to save power, on the other hand. This exemplary embodiment is especially advantageous if a transportation of a multiplicity of objects is involved which have the same destination. These can also be objects which belong together in some form but which are transported packaged separately from one another. This makes it possible to ensure that neither one nor the other generic type is lost.
  • A particularly secure embodiment of the system according to the invention also comprises a security lock by means of which a room can be closed in which the at least one object to be monitored is stored, which is additionally provided with at least one protection module. The security lock is preferably suitable for conveying at least one alarm state to the monitoring device and/or to the at least one protection module. The room, which can be closed by means of this security lock can be, for example, a transport container, a container, a truck superstructure, a box or the like. However, in addition to the mobile containers, the room also includes immobile warehouses, strong rooms and other security storage rooms.
  • The security lock is preferably connected wirelessly or in a wire-connected manner to the protection module and/or to the monitoring device for uni- or bidirectional communication. In a particularly flexible and secure embodiment, each element of the system, i.e. the security lock, the at least one protection module and the monitoring device can exchange data with any other element. In some embodiments, it may be advantageous, however, not to implement some of these possible connections.
  • In a preferred embodiment of the system, the security lock is connected communicatively to the protection module and can place the protection module into the alarm state due to an alarm signal. If the security lock detects manipulation or alerting sensor values of any sensors of the security lock or of the container, the security lock can transmit an alarm signal to the monitoring device and from there to the protection module and/or directly to the protection module. A redundant signal transmission via the monitoring device and directly to the protection module ensures that no alarm signal is lost e.g. due to connection disturbances.
  • In addition, the security lock can also be capable of being placed into an alarm state. In this case, the monitoring device can place the protection module and/or the security lock into the alarm state due to an alarm signal when the monitoring device detects a contingency or a contingency is defined by a user.
  • Advantageously, the security lock also has a locating module. The security lock and the protection module can thus send their respective position data to the monitoring device in an active state. When both the security lock and the protection module are sending, the same transmitting interval is preferably used and/or transmission is simultaneous. If the security lock or the protection module has sensors, e.g. temperature, humidity, acceleration, pressure, filling level, gas, light or inclination sensors, the corresponding sensor data, a clock time and/or the date can be sent to the monitoring device instead or in addition to the position data. In addition, the transmitting intervals can be adjustable or adapted to external conditions in the active state and in the alarm state via the monitoring device. If the monitoring device receives position data both from the security lock and from the protection module, the monitoring device can compare the received position data with one another or with predetermined position data. In the case of a deviation which exceeds a critical value, at least the protection module, but preferably also the security lock can then be placed into the alarm state. By means of such an embodiment of the system according to the invention, the collocating of the protection module attached to the objects and the security lock mounted at the room is monitored, for example, so that the objects to be monitored cannot be removed unnoticed out of the room closed by the security lock. This means that even if the room or the security lock is opened without triggering an alarm, e.g. by an authorized person, the objects are additionally protected by the condition of collocating or by coupling the position of protection module and security lock.
  • Furthermore, a method for monitoring an object provided with a protection module is specified which comprises the following steps: when the protection module receives an alarm signal, it is placed into an alarm state. In this alarm state, the protection module sends position data which are determined by a locating module of the protection module, to a monitoring device. The position data are preferably transmitted continuously in a type of continuous locating mode. As an alternative, the position data can also be transmitted in an alarm interval. The protection module, like the monitoring device, can be designed in accordance with one of the embodiments described above.
  • The above features can be implemented in any combination in an exemplary embodiment of a protection module, a system or a method.
  • BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1 shows the structure of a protection module according to the invention.
  • FIG. 2A shows possible transmission paths of data between a protection module and a monitoring device in an active state.
  • FIG. 2B shows possible transmission paths of data between a protection module and a monitoring device in an alarm state of the protection module.
  • FIG. 3 shows a flow chart for the use of a protection module.
  • FIG. 4 shows a protection module which is hidden in a room locked by a security lock.
  • FIG. 5 shows a system for monitoring an object with a protection module, a monitoring device and a security lock.
  • FIG. 6A shows possible transmission paths in the case of an alarm of the security lock.
  • FIG. 6B shows a flow chart for the situation shown in FIG. 6A.
  • FIG. 7A shows alternative transmission paths in the case of an alarm of the security lock.
  • FIG. 7B shows a flow chart for the situation shown in FIG. 7A.
  • FIG. 8A shows further alternative transmission paths in the case of an alarm of the security lock.
  • FIG. 8B shows a flow chart for the situation shown in FIG. 8A.
  • FIG. 9A shows possible transmission paths in the case of an alarm of the monitoring device.
  • FIG. 9B shows a flow chart with respect to the situation shown in 9A.
  • FIG. 10 shows a detailed flow chart with respect to operating a protection module according to the invention.
  • DETAILED DESCRIPTION
  • FIG. 1 shows the structure of a protection module according to the invention. The protection module 1 comprises at least one locating module 11 and one communication unit 12. The locating module 11 can be, for example, a Telit locating module with GSM communication, antenna and battery and is suitable for determining a position and generating position data from this. The position data can be two-dimensional position data which specify the position on the earth's surface, or three-dimensional position data which additionally also specify the height above the earth's surface. The locating can be done via GPS or radio cell location, but it may also be possible to switch between both locating methods.
  • The communication unit 12 is suitable for transmitting or receiving data on the basis of USB, GSM, GPRS, UMTS and/or WLAN. For this purpose, the communication unit 12 has, for example, a mobile radio antenna. The protection module 1 advantageously also has a USB connection via which data can be exchanged and electrical power be supplied. In addition, the firmware of the protection module 1 can be updated via the USB interface and other adjustments, for example the activation, can be performed.
  • The protection module 1 can have a voltage supply 14 such as an accumulator or a battery which can be charged without removal via the USB interface. As an alternative, an external voltage source can be connected to the protection module 1. The charging state of the voltage source 14 can be indicated, for example, by means of an LED. The autonomous voltage supply 14 of the protection module 1 is advantageously sufficient for at least 5 days with continuous locating (continuous position data transmission to the monitoring device 2). The protection module 1 can also have a key switch for testing the supply voltage. When the key switch is pressed for the supply voltage test, a charging state of the voltage source can be indicated, for example, by means of an LED display.
  • The protection module 1 can also have a control unit 13 which is suitable for controlling the locating module 11 and the communication unit 12 and any sensors 15. For this purpose, the control unit 13 can comprise a microprocessor or a microcontroller 131. In particular, a sensor 15 can be provided for testing the state of charge. Other sensors 15 are also conceivable such as, for example, temperature, humidity, motion, acceleration, pressure and gas sensors. The sensor data can be interrogated preferably via the communication unit 12 by a user or a monitoring device 2 or are automatically transmitted via the protection module. In addition, a security chip 134 can be provided in the control unit in order to encrypt data to be transmitted or to decrypt received encrypted data. A suitable software-based encryption or protection (MAC) increases the security of the communication between the protection module 1 and the monitoring device 2. In addition, there can be a real-time clock 132 in order to add a time stamp to data to be sent out. Such a time stamp preferably comprises both the date and the clock time. In a preferred exemplary embodiment, there is also a memory 133 in which identification data, access data, configuration data etc. can be stored for the operation of the protection module 1. Such a memory 133 can be implemented by any type of memories, for example ROM, FLASH, EPROM, EEPROM etc.
  • The protection module 1 also has a housing 10, preferably of plastic which encloses most of the other components of the protection module 1 virtually completely and can be adapted in its design to the objects to be monitored. For example, the protection module can be accommodated in a housing, camouflaged
  • as a cigarette packet. The housing 10 should be inconspicuous and as small as possible so that the protection module 1 can be easily hidden at or in or in the vicinity of the objects to be monitored. The protection module 1 can also have a similar or identical size as the products to be monitored and hidden in a product package.
  • The protection module 1 can be activated via a user interface (e.g. on button, display, pin pad, etc.) or via a device connected to the protection module 1 via the USB interface. In the active state, the protection module 1 is ready to receive and to transmit. There is possibly also a pilot lamp, e.g. an LED for indicating the operating status of the protection module 1. However, it may also be advantageous to omit any type of noticeable displays and switches on the housing 10 of the protection module 1 in order to be able to better camouflage the protection module 1.
  • FIG. 2A shows the protection module 1 in the active state and a monitoring device 2. The arrows indicate a possible connection set up for a data transmission. In the active state, the protection module 1 can send data to the monitoring device 2 such as, for example, position data or sensor data. This can take place either at regular time intervals, continuously or incrementally. In the active state, the protection module preferably transmits regularly within large transmitting intervals. The data connection is preferably bidirectional so that the monitoring device 2 can also send commands or information to the protection module 1. Possible connections are indicated by dashed arrows, absolutely necessary connections are indicated by continuous arrows.
  • FIG. 2B shows the exchange of data between the protection module 1 in the alarm state and the monitoring device 2. In the alarm state of the protection module 1, the protection module 1 sends data either continuously or within an alarm interval to the monitoring device 2. In particular, position data of the protection module 1 are sent to the monitoring device 2 in the alarm state. Additionally, identification data for identifying the protection module 1, time and/or sensor data can also be transmitted. In the alarm state, the protection module 1 preferably first sends data continuously to the monitoring device 2 until the state of charge of the voltage supply 14 of the protection module 1 has dropped to a critical value. After that, the protection module 1 switches to a power-saving transmit mode in which the data are now only sent to the monitoring device 2 within a predetermined alarm interval. If the protection module 1 sends data to the monitoring device 2 also in an active state (normal state), the transmit interval in the alarm state (alarm interval) is preferably shorter than the transmit interval in the active state. If the protection module 1 sends position data to the monitoring device 2 also in the active state, the monitoring device 2 can compare the received position data with predetermined position data. These predetermined position data can either be stored in the monitoring device 2 or other position data supplied to the monitoring device. As well, the position data can relate to a relative location in which the position of the protection module 1 is specified with respect to a reference point. In addition, a user can predetermine position data for the transportation of an object in the monitoring device 2 so that the position data correspond to time-variable position data. As a result, it is possible to monitor both the movement of an object to be monitored from its starting location to its destination and any unauthorized removal of the object to be monitored from a predetermined location. The protection module 1 according to the invention can thus be used for monitoring in transportation, during storage and protective safe keeping.
  • The configuration of the protection module 1 can be adapted by a user via the monitoring device 2 also during the operation of the protection module 1. For example, the transmitting interval can be adapted in the alarm state or in the active state. Sensor data may also be selectively requested from sensors 15 of the protection module 1. As an alternative, such control and request functions can also be exercised by an authorized user via other devices.
  • FIG. 3 shows a possible use of a protection module 1 for monitoring a transport. The protection module 1 is hidden in a product package 4. A multiplicity of such product packages 4 are stored in a container 5 which can be locked with a security lock 3. In this manner, the fake or the marked product package, respectively, is not noticeable and cannot be easily discovered.
  • FIG. 4 shows a flow chart for the operation of a protection module according to the invention. In a first step (S41), the user adds the protection module 1 to one or to a multiplicity of objects to be monitored and activates (S42) the protection module 1. For example, the protection module 1 can be hidden in one of the objects or in the packaging of the objects, mounted inconspicuously on the objects or attached to the packaging of the objects.
  • The object to be monitored or the multiplicity of objects is possibly subsequently packaged with one or more hidden active protection modules 1 in a container 5 (S43) which may be locked by a security lock 3 (S44). If an electronic security lock 3 is used, the security lock 3 may also have to be activated.
  • Following this, the protection module 1 is allocated to a transport and/or to a security lock 3 (S45). This can be done via a user interface in an interne portal which is connected to the monitoring device 2. The user must previously identify himself and can configure the protection module 1 or the process only with authorization by the monitoring device 2. Each protection module 1 can have an identification number by means of which the protection module 1 can be unambiguously allocated. Furthermore, SIM-PIN or/and SIM-PUK can be used. The protection module 1 can be allocated via the monitoring device 2 to a particular process which is defined by the user. For example, the user can predetermine a particular transport route or a particular location from which the object to be monitored must not be removed. When several locatable protection devices are used, the relative position data or maximum distances between these protection devices can also be specified so that the monitoring device 2 compares the position data received by the protection devices with one another and, if the maximum distance is exceeded, triggers an alarm. For example, it can be specified that the object to be monitored, which is provided with the protection module 1, must not leave the container 5 locked with the security lock 3. In addition, transmitting intervals or sensor data interrogations can be configured.
  • The protection module 1 preferably sends (S46) position data to the monitoring device 2 already in the active state so that rough locating always takes place. If then an alarm is triggered (S47), the protection module 1 receives an alarm signal and is placed into the alarm state. The protection module 1 can receive an alarm signal from the monitoring device 2 and/or also from other protection devices which are authorized for this. In the alarm state, the protection module 1 sends position data continuously or at regular intervals (alarm intervals) to the monitoring device 2. By this means, the object marked by the protection module 1 can be located (S48). If an electronic security lock 3 is used additionally which also has a locating module 11, the container 5 can also be located. The monitoring device 2 receives the locating data from the protection modules 1 and/or from the security lock 3 and can represent these with symbols or various colors on a map. The monitoring device 2 is preferably connected to an alarm system so that responsible persons are immediately notified and/or counter measures are initiated. Such a protection system consisting of a protection module 1 and a monitoring device 2 has the advantage that a thief can be tracked unnoticed. It is important, therefore, to attach the protection module 1 as inconspicuously as possible to the objects to be monitored.
  • FIG. 5 shows possible connections of a protection system in the active state which comprises a protection module 1, a monitoring device 2 and a security lock 3. In the active state of the protection module 1 or of the security lock 3, respectively, data do not necessarily need to be transmitted. In a preferred exemplary embodiment, the protection module 1 and/or the security lock 3, however, sends the respective position data to the monitoring device 2 also in the active state. The monitoring device 2 can then compare the received position data with predetermined data and monitor the location of the object to be monitored and of the container 5 provided with the security lock 3. The predetermined data can be position data which a user has stored in the monitoring device 2 when configuring the monitoring. For example, a user can predetermine a transportation route or specify location points which must be reached at a predetermined point in time. As an alternative, a particular area can be predetermined which must not be left by the object to be monitored or by the container 5, respectively. For example, this triggers an alarm when a truck is stolen which transports the objects to be monitored or when the container 5 with the objects to be monitored is stolen from the truck. In this scenario, a missing changing location can also generate a position signal deviating from predetermined position data and trigger an alarm. It is thus possible to perform any type of geofencing.
  • In the text which follows, various alarm situations of the system are described. In FIGS. 6A and 6B, an alarm is triggered in the security lock 3 (S61). The security lock 3 transmits (S62) the alarm signal to the monitoring device 2. The monitoring device 2 thereupon sends (S63) an alarm signal to the at least one protection module 1 which is allocated to the security lock 3 or the same monitoring process, respectively. As a result, the protection module 1 is placed into the alarm state and then sends (S64) its position data to the monitoring device 2 in the alarm interval or continuously. The monitoring device 2 may also receive data from the security lock 3. The monitoring device 2 can indicate the received position data on a map or represent them in a table. The movement of the object to be monitored or of the container 5, respectively, is preferably stored in a memory of the monitoring device 2. Other possible data transmission connections are indicated by dashed arrows between the individual elements of the system.
  • A further possibility for data transmission in an alarm situation is shown in FIGS. 7A and 7B. An alarm is again triggered in the security lock 3 (S71). This time the security lock 3 sends (S72) the alarm signal directly at least to the protection module 1 and places it into the alarm state. The protection module 1 thereupon sends (S73) its position data to the monitoring device 2 continuously or in the alarm interval. The monitoring device 2 is preferably informed about the alarm state by the data transmission from the protection module 1 and initiates predefined measures. In addition, the monitoring device 2 can display, store and/or send out to various addressees the received position data.
  • A further possibility with increased security due to redundant signal transmission is shown in FIGS. 8A and 8B. In this alternative, the security lock 3, on triggering (S81) an alarm, sends (S82) the alarm signal both to the protection module 1 and to the monitoring device 2. The protection module 1 is placed into the alarm state and sends (S84) at least position data to the monitoring device 2 continuously or in the alarm interval. The monitoring device 2 may transmit a (S83) a further alarm signal to the protection module 1 for the sake of security. The redundant signal transmission ensures that no alarm signal is lost and possible problems of connection, for example between security lock 3 and monitoring device 2 or security lock 3 and protection module 1 remain without consequences.
  • A further alarm situation is shown in FIGS. 9A and 9B. The alarm is triggered here in the monitoring device 2. For example, the monitoring device 2 has received (S91) position data from the protection module 1 and/or from the security lock 3 which, on comparison (S92), deviate from predetermined data. As an alternative, the alarm can also be triggered by a user via the monitoring device 2. The monitoring device 2 sends (S93) an alarm signal at least to the protection module 1 but possibly also to the security lock 3 as a result of which an alarm state is activated in each case. In the alarm state, the protection module 1 again sends (S94) position data to the monitoring device 2 so that locating can take place and counter measures initiated.
  • FIG. 10 shows a detailed flow chart of a protection module 1 according to the invention. The protection module 1 is initially switched off (S100) and is activated by the user via an on button (S101) before packaging. The protection module 1 can then send (S102) readiness for reception to the monitoring device 2. This signal can also contain identification data of the protection module 1 such as, for example, an identification number. The protection module 1 may receive (S103) configuration data from the monitoring device 2 such as, for example, user-defined transmit intervals for the active state and the alarm state. The protection module 1 preferably sends (S104) its position or locating data to the monitoring device 2 already in the active state, the transmitting interval being preferably greater in the active state than in the alarm state. As an alternative, the monitoring device 2 can also request data e.g. position data or sensor data from the protection module 1 in user-defined intervals. If, for example, the position data sent by the protection module 1 to the monitoring device 2 in the active state deviate from predetermined data by a certain value, an alarm is triggered. As an alternative, an alarm can be triggered when sensor data deviate from predetermined values or when the monitoring device 2 finds that the protection module 1 is moving out of the geofencing area (S105). Further possibilities for triggering an alarm would be that a security lock 3 reports an alarm to the monitoring device 2 which forwards the alarm signal to the protection module 1, or that a user-defined alarm is detected in the monitoring device 2 or that the protection module 1 is moving away from a security lock 3 (S106). If then an alarm is triggered, the protection module 1 receives an alarm signal. After receiving the alarm signal, the protection module 1 sends (S109) its position data preferably continuously to the monitoring device 2. If the supply voltage of the protection module 1 is monitored, it is possible to switch from continuous locating to interval locating (S110) at a lower supply voltage. In the case of interval locating, the protection module 1 sends to the monitoring device 2 only in the predetermined alarm interval. If no alarm is triggered and the protection module 1 is unpacked by an authorized user (S111), the authorized user can deactivate the protection module 1 via the monitoring device 2 (S112), the monitoring device 2 sending a deactivate command to the protection module 1. By this means, the protection module 1 is switched off completely immediately or after a predetermined latency period.
  • The protection module 1 according to the invention provides for protection against misuse, manipulation and theft with comparatively advantageous costs. The protection module 1 is suitable both for transportation on land and at sea and only mobile radio or GPS reception is needed. In addition, culprit tracking is more successful since the stolen goods can be located. Discovery by the unauthorized person is very improbable especially due to the fact that a protection module 1 can be camouflaged as a product so that it can be tracked unnoticed. In addition, the monitoring can be adapted to individual requirements, for example sensors can be monitored, continuous locating can be selected, the protection module can be combined with other security devices etc. For example, a two-stage security and locating solution can be implemented by combining the protection module 1 according to the invention with an intelligent electronic security lock 3: if the security lock 3 is prized open, an alarm is triggered (so-called real-time alarm function) and first intervention steps are triggered, e.g. alerting the police. Following this, the protection module 1, now placed into the alarm state, leads directly to the thief or to the stolen goods. As a result, the high costs of an accompanying security transport can be saved. In addition, the efficient and reliable tracking will discourage future transgressions.

Claims (19)

1. A system for monitoring at least one object, comprising:
a monitoring device; and
at least two protection modules, each protection module being configured for attachment to at least one object to be monitored, and comprising a location module for determining position data and for transmitting position data to the monitoring device,
wherein the monitoring device places at least one of the protection modules into an alarm state in case of a deviation of at least one of the received position data from each other or from deviation of predetermined position data by more than a predetermined value.
2. The system as claimed in claim 1, wherein at least one of the protection modules can be placed into an alarm state by an alarm signal and is suitable for sending position data to the monitoring device in the alarm state in at least one of a particular alarm interval or continuously.
3. The system as claimed in claim 1, further comprising a security lock, wherein the at least one object which is provided with at least one protection module is located in a room which can be locked by the security lock.
4. The system as claimed in claim 3, wherein the security lock can be communicatively connected to at least one of the protection modules or the monitoring device and in which the communicative connection is either unidirectional or bidirectional and is either wireless or is wire-connected.
5. The system as claimed in claim 3, wherein the security lock is suitable for placing the at least one protection module into the alarm state by outputting an alarm signal.
6. The system as claimed in claim 3, wherein the security lock comprises a locating module, wherein at least one of the security lock or at least one of the protection modules, in an active state, send their respective position data to the monitoring device in one and the same interval.
7. The system as claimed in claim 6, wherein the interval for sending the position data in the active state is greater than the alarm interval.
8. The system as claimed in claim 3, wherein the monitoring device receives position data of the security lock and of the at least one protection module and, after finding a predetermined discrepancy of the position data from one another and/or from predetermined position data by more than a predetermined value places at least the at least one protection module into the alarm state.
9. The system as claimed in claim 1, wherein the protection modules further comprise
a communication unit which is suitable for sending data to the monitoring device and in which at leas one of the protection modules is suitable for being placed into an alarm state by an alarm signal and in the alarm state, sending position data to the monitoring device in at least one of a particular alarm interval or continuously.
10. The system as claimed in claim 1, wherein at least one of the protection modules, in an active state, sends position data to the monitoring device in a predetermined interval which is greater than the alarm interval.
11. The system as claimed in claim 1, wherein at least one of the protection modules receives an alarm signal from the monitoring device when the position data of the at least one protection module deviates by more than a predetermined value from predetermined position data.
12. The system as claimed in claim 1, wherein at least one of the protection modules and the monitoring device can be communicatively connected to one another either bidirectionally or unidirectionally and at least one of wirelessly or in a wire-connected manner.
13. The system as claimed in claim 1, wherein the alarm interval can be at least one of adapted or adjusted by the monitoring device.
14. The system as claimed in claim 1, wherein at least one of the protection modules, in the alarm state, continuously sends position data to the monitoring device until a supply voltage has dropped to a certain value and, after reaching this value, sends the position data to the monitoring device in an alarm interval.
15. The system as claimed in claim 1, wherein the monitoring device receives position data from at least one of the protection modules and displays the received position data of the at least one protection module on a map.
16. The system as claimed in claim 1, wherein the monitoring device is coupled to an alarm system for informing responsible persons.
17. The system as claimed in claim 3, wherein at least one of the security lock or at least one of the protection modules includes at least one sensor for determining at least one of temperature, humidity, acceleration, pressure, filling level, gas, light or inclination, wherein at least one of the corresponding sensor data or a clock time or the date can be sent to the monitoring device instead or in addition to the position data.
18. A system for monitoring at least two objects, comprising:
a monitoring device;
a first protection module for the attachment to a first object to be monitored, wherein the first protection module comprises a location module for determining position data, wherein the first protection module can be set into an alarm state and is adapted to transmit the determined position data to the monitoring device, wherein the first protection module transmits its position data to the monitoring device in either a predetermined alarm interval or continuously; and
a second protection module for the attachment to a second object to be monitored, wherein the second protection module comprises a location module for determining position data, wherein the second protection module can be set into an alarm state and is adapted to transmit the determined position data to the monitoring device, wherein the second protection module transmits its position data to the monitoring device in either a predetermined alarm interval or continuously,
wherein the first object having the first protection module attached and the second object having the second protection module attached are separated from each other, but transported or stored together,
wherein the monitoring device compares the position data from the first and second protection module relative to each other or maximum distances between the first and second protection module and activates an alarm signal if the position data deviates from predetermined position data or from maximum distances and places both the first and second protection modules into an alarm state.
19. A method for monitoring at least one object, wherein the object is provided with at least two protection modules, comprising:
sending position data which are determined by a locating module of each of the at least two protection modules in a particular alarm interval or continuously from each of the protection modules to a monitoring device,
determining by the monitoring device, whether the received position data of the at least two protection modules deviate from each other and/or from predetermined position data by more than a predetermined value, and
activating an alarm state of at least one of the protection modules.
US14/632,059 2010-06-02 2015-02-26 Protection module for monitoring the position of objects Abandoned US20150179041A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/632,059 US20150179041A1 (en) 2010-06-02 2015-02-26 Protection module for monitoring the position of objects

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
DE102010029761.6 2010-06-02
DE102010029671A DE102010029671B4 (en) 2010-06-02 2010-06-02 Backup module for position monitoring of objects
US13/700,870 US8981953B2 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects
PCT/EP2011/002740 WO2011151077A1 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects
US14/632,059 US20150179041A1 (en) 2010-06-02 2015-02-26 Protection module for monitoring the position of objects

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/EP2011/002740 Division WO2011151077A1 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects
US13/700,870 Division US8981953B2 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects

Publications (1)

Publication Number Publication Date
US20150179041A1 true US20150179041A1 (en) 2015-06-25

Family

ID=44628257

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/700,870 Expired - Fee Related US8981953B2 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects
US14/632,059 Abandoned US20150179041A1 (en) 2010-06-02 2015-02-26 Protection module for monitoring the position of objects

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/700,870 Expired - Fee Related US8981953B2 (en) 2010-06-02 2011-06-03 Protection module for monitoring the position of objects

Country Status (4)

Country Link
US (2) US8981953B2 (en)
EP (1) EP2577618A1 (en)
DE (1) DE102010029671B4 (en)
WO (1) WO2011151077A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11041782B2 (en) * 2013-07-09 2021-06-22 Baker Hughes, A Ge Company, Llc Secure systems and methods for machine monitoring
US11361272B2 (en) * 2016-05-31 2022-06-14 Robert Bosch Gmbh Device and method for monitoring a mobile object

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10366552B2 (en) * 2012-12-21 2019-07-30 Nida Tech Sweden Ab Method for locking, unlocking and positioning of a tool
KR102134713B1 (en) * 2012-12-21 2020-07-16 니다 테크 스웨덴 에이비 Method, tool control node, computer-readable recording medium and power tool device, for enabling unlocking and locking of power tool
US10078322B2 (en) * 2016-01-08 2018-09-18 Newfrey Llc Power tool system having in-station verification utilizing radio frequency signal strength
DE102017220704A1 (en) * 2017-11-20 2019-05-23 Robert Bosch Gmbh Method for determining a condition of a product
DE102018201076A1 (en) * 2018-01-24 2019-07-25 Robert Bosch Gmbh System and method for checking the admissibility of at least one tractor-trailer combination
DE102021105826A1 (en) 2021-03-10 2022-09-15 Aco Ahlmann Se & Co. Kg Detection device, detection system and method for detecting the filling level of a container, in particular fine screen and container
CN114098183A (en) * 2021-12-18 2022-03-01 绍兴明思纺织有限公司 Children's garment

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5804810A (en) * 1996-06-26 1998-09-08 Par Government Systems Corporation Communicating with electronic tags
US20030063003A1 (en) * 2001-09-28 2003-04-03 Bero Robert J. Proximity monitoring communication system
US6631271B1 (en) * 2000-08-29 2003-10-07 James D. Logan Rules based methods and apparatus
US20040155775A1 (en) * 2003-01-24 2004-08-12 Masao Kaneko Position movement alarm system
US20040196153A1 (en) * 2003-04-07 2004-10-07 Cockburn John Malcolm Continuous feedback container security system
US20050232747A1 (en) * 2001-12-28 2005-10-20 Brackmann Rogers F Smart pallet-box cargo container
US20060033623A1 (en) * 2004-07-13 2006-02-16 Tony Hines RFID multiple range method and system
US20060176178A1 (en) * 2005-01-27 2006-08-10 Everest A W Device for monitoring and measuring distance
US20080297346A1 (en) * 2001-12-28 2008-12-04 Private Pallet Security Systems, Llc Mini pallet-box moving container
US20090240554A1 (en) * 2008-03-24 2009-09-24 Pinpoint Geotech, Llc System and method for providing identification and location information of certain items
US20100117826A1 (en) * 2008-11-11 2010-05-13 Monster Medic, Inc. Mobile monitoring and alert system
US20100328073A1 (en) * 2009-06-30 2010-12-30 Intermec Ip Corp. Method and system to determine the position, orientation, size, and movement of rfid tagged objects
US20110095882A1 (en) * 2009-10-27 2011-04-28 Tyco Safety Products Canada Ltd. System and method for automatic enrollment of two-way wireless sensors in a security system
US20110121964A1 (en) * 2009-11-24 2011-05-26 Bannard Kenneth R Personnel tracking system
US8154397B2 (en) * 2005-05-04 2012-04-10 Astrin Arthur W Locking mechanism, systems and methods for cargo container transport security

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10152876B2 (en) * 1996-03-27 2018-12-11 Gtj Ventures, Llc Control, monitoring, and/or security apparatus and method
DE19816435C1 (en) * 1998-04-15 1999-06-17 Deutsche Bahn Ag Satellite locating apparatus
US8321124B2 (en) * 1999-03-31 2012-11-27 C2 Global Technologies, Inc. Security and tracking system
US9142109B2 (en) * 2001-01-02 2015-09-22 Global Life-Line, Inc. Panic device with local alarm and distal signaling capability
DE10141539A1 (en) * 2001-08-24 2003-03-13 Audi Ag System for influencing functions in a motor vehicle via a telematics device, has a transmitter/receiver unit in the vehicle and a remote mainframe/central processing unit with a receiver/transmitter
US20040069850A1 (en) * 2002-01-31 2004-04-15 De Wilde Eric D. Truck cargo management rfid tags and interrogators
US7526108B2 (en) * 2003-02-11 2009-04-28 Topaz Systems, Inc. Wireless data management system
US7472296B2 (en) * 2004-02-20 2008-12-30 Semiconductor Energy Laboratory Co., Ltd. Integrated circuit, semiconductor device and ID chip
US7839289B2 (en) * 2004-08-26 2010-11-23 Avante International Technology, Inc. Object monitoring, locating, and tracking system and method employing RFID devices
DE102005001118A1 (en) * 2005-01-06 2006-07-20 Deutsche Post Ag Method for securing and monitoring containers and containers with securing and monitoring means
DE102005003150B4 (en) * 2005-01-21 2007-02-08 OECON Ingenieurgesellschaft für Industrieberatung und Projektmanagement mbh Management Bins
US7526455B2 (en) * 2005-05-03 2009-04-28 Palomar Technology, Llc Trusted decision support system and method
US8284023B2 (en) * 2005-08-24 2012-10-09 Inner Loc, LLC Internal locking apparatus and methods for making and using same
US7825801B2 (en) * 2006-03-09 2010-11-02 Magnasphere Corporation Security switch assemblies for shipping containers and the like
US7978065B2 (en) * 2006-09-13 2011-07-12 Trackpoint Systems, Llc Device, system and method for tracking mobile assets
US20080201076A1 (en) * 2006-11-03 2008-08-21 Jyh-How Huang Witness Based Tracking Systems And Methods
US20080316023A1 (en) * 2007-05-04 2008-12-25 Crowl Ronald W Personal warning system
US20090174548A1 (en) * 2008-01-04 2009-07-09 Musical Electronics Limited Tracking system
US20090251295A1 (en) * 2008-03-07 2009-10-08 Savi Technology, Inc. Method and Apparatus for Tracking and Monitoring Containers
DE102008033731A1 (en) * 2008-07-18 2010-01-21 Cargoguard Gmbh Lock for securing a security container or security room and method for securing the transport of a security container
US8427305B2 (en) * 2008-08-12 2013-04-23 John J. Madsen Global positioning satellite [GPS] based recovery device and risk management system for portable computing devices and data
CA2754561C (en) * 2009-03-06 2017-11-28 Absolute Software Corporation Automatic control of a security protection mode of an electronic device
SG177375A1 (en) * 2009-06-26 2012-02-28 Cubic Corp Sensing a signal to sense security of a container
US8508367B2 (en) * 2009-09-21 2013-08-13 Checkpoint Systems, Inc. Configurable monitoring device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5804810A (en) * 1996-06-26 1998-09-08 Par Government Systems Corporation Communicating with electronic tags
US6631271B1 (en) * 2000-08-29 2003-10-07 James D. Logan Rules based methods and apparatus
US20030063003A1 (en) * 2001-09-28 2003-04-03 Bero Robert J. Proximity monitoring communication system
US20080297346A1 (en) * 2001-12-28 2008-12-04 Private Pallet Security Systems, Llc Mini pallet-box moving container
US20050232747A1 (en) * 2001-12-28 2005-10-20 Brackmann Rogers F Smart pallet-box cargo container
US20040155775A1 (en) * 2003-01-24 2004-08-12 Masao Kaneko Position movement alarm system
US20040196153A1 (en) * 2003-04-07 2004-10-07 Cockburn John Malcolm Continuous feedback container security system
US20060033623A1 (en) * 2004-07-13 2006-02-16 Tony Hines RFID multiple range method and system
US20060176178A1 (en) * 2005-01-27 2006-08-10 Everest A W Device for monitoring and measuring distance
US8154397B2 (en) * 2005-05-04 2012-04-10 Astrin Arthur W Locking mechanism, systems and methods for cargo container transport security
US20090240554A1 (en) * 2008-03-24 2009-09-24 Pinpoint Geotech, Llc System and method for providing identification and location information of certain items
US20100117826A1 (en) * 2008-11-11 2010-05-13 Monster Medic, Inc. Mobile monitoring and alert system
US20100328073A1 (en) * 2009-06-30 2010-12-30 Intermec Ip Corp. Method and system to determine the position, orientation, size, and movement of rfid tagged objects
US20110095882A1 (en) * 2009-10-27 2011-04-28 Tyco Safety Products Canada Ltd. System and method for automatic enrollment of two-way wireless sensors in a security system
US20110121964A1 (en) * 2009-11-24 2011-05-26 Bannard Kenneth R Personnel tracking system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11041782B2 (en) * 2013-07-09 2021-06-22 Baker Hughes, A Ge Company, Llc Secure systems and methods for machine monitoring
US11361272B2 (en) * 2016-05-31 2022-06-14 Robert Bosch Gmbh Device and method for monitoring a mobile object

Also Published As

Publication number Publication date
DE102010029671B4 (en) 2012-03-01
WO2011151077A1 (en) 2011-12-08
US20130127628A1 (en) 2013-05-23
EP2577618A1 (en) 2013-04-10
US8981953B2 (en) 2015-03-17
DE102010029671A1 (en) 2011-12-08

Similar Documents

Publication Publication Date Title
US8981953B2 (en) Protection module for monitoring the position of objects
US10480216B2 (en) Smart security device and system
US7053823B2 (en) System and method for cargo protection
CN101460981B (en) Security device for monitoring integrity of closed objects
US11250652B2 (en) Smart delivery receptacle and related systems and methods
US20080158002A1 (en) Portable object tracking system and security tracking bag or money pack for use therewith
KR101518688B1 (en) Mobile tag local data reporting system
US20050128080A1 (en) Cargo lock and monitoring apparatus and process
US10990922B1 (en) Continuous inventory management
KR20180029820A (en) Padlock
US20220151421A1 (en) Smart delivery receptacle and related systems and methods
US20070241897A1 (en) System and Method for Monitoring the Cargo Space of a Transporation Device
US20140111334A1 (en) Sensor pod
EP1593564A1 (en) Communication method and system for vehicles
GB2496838A (en) Portable locking system
JP2020529577A (en) Active container with data bridge
US6529141B1 (en) System and method for transmitting a triggered alarm
SE528134C2 (en) Seal with transponder
US20220335805A1 (en) Control monitoring using wireless tracking devices
US20090307000A1 (en) Method and system for globally monitoring aircraft components
JP2019053526A (en) Delivered parcel management box and management system
CN204066281U (en) Portable anti-theft device and related anti-theft system
CN203383605U (en) Beidou satellite warning and tracking device
ES2592322B1 (en) Anti-theft system and method of transport cargo
CA3223885A1 (en) Control monitoring using wireless tracking devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: CARGOGUARD GMBH, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLAUFUSS, JEAN;REEL/FRAME:035744/0110

Effective date: 20130109

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION