System and method for container monitoring, real time authentication, anomaly detection, and alerts
First Claim
1. A system for monitoring an item, comprising:
- a computer in communication with a receiver, wherein the receiver receives signals from a remote source;
a transmitter in communication with the computer, wherein the transmitter receives values from the computer based on the signals received from the remote source; and
a security device associated with an item and capable of receiving signals from the transmitter, the security device having an authentication table comprising a plurality of initial values, wherein the security device records values transmitted from the transmitter.
1 Assignment
0 Petitions
Accused Products
Abstract
An invention is provided for monitoring an item, such as a container. The invention includes a computer in communication with a receiver that receives signals from a remote source. A transmitter in communication with the computer receives values from the computer based on the signals received from the remote source. These values are then transmitted to a security device associated with the item, which includes an authentication table comprising a plurality of initial values. The security device then records values transmitted from the transmitter. The values can be jitter values, with each jitter value being a difference in arrival times of at least two timing signals from the same remote source.
-
Citations
20 Claims
-
1. A system for monitoring an item, comprising:
-
a computer in communication with a receiver, wherein the receiver receives signals from a remote source;
a transmitter in communication with the computer, wherein the transmitter receives values from the computer based on the signals received from the remote source; and
a security device associated with an item and capable of receiving signals from the transmitter, the security device having an authentication table comprising a plurality of initial values, wherein the security device records values transmitted from the transmitter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for monitoring an item, comprising the operations of:
-
receiving timing signals from a remote source at a computer;
sending values from the computer to a transmitter, the values being based on the timing signals received from the remote source;
transmitting the values from the transmitter to a security device associated with an item, the security device including an authentication table having a plurality of initial values; and
recording the values received from the transmitter in the authentication table. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A security device for monitoring an item, comprising:
-
a memory;
a processor in communication with the memory;
a receiver in communication with the processor, the receiver capable of receiving signals from a transmitter; and
an authentication table stored in the memory, the authentication table comprising a plurality of initial values, wherein the security device records values received via the receiver in the authentication table. - View Dependent Claims (17, 18, 19, 20)
-
Specification