Cryptographic container security system
First Claim
1. A method for aiding in the secure transportation of a container used to transport at least one item therein, the method comprising the steps of:
- producing pre-transportation data for a container having at least one item present therein at least in part by scanning the container with at least one x-ray beam prior to transportation of the container; and
providing the pre-transportation data to an intended receiver of the container for comparison with post-transportation data for the container produced at least in part by scanning the container with at least one x-ray beam after transportation of the container.
2 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic container security system for enabling the secure transportation of a container from a sender site to a receiver site. The system includes, in the exemplary embodiment, apparatuses and methods for generating pre-transportation and post-transportation fingerprints of a container being transported, for encrypting and decrypting the pre-transportation fingerprint, and for comparing pre-transportation and post-transportation fingerprints, and for comparing the decrypted pre-transportation fingerprint and the pre-transportation fingerprint. The pre-transportation and post-transportation fingerprints are generated from fingerprint data, including, without limitation, the aggregate gamma flux and aggregate effective Z-number determined for the container by multi-energy scanning systems located, respectively, at sender and receiver sites.
-
Citations
31 Claims
-
1. A method for aiding in the secure transportation of a container used to transport at least one item therein, the method comprising the steps of:
-
producing pre-transportation data for a container having at least one item present therein at least in part by scanning the container with at least one x-ray beam prior to transportation of the container; and
providing the pre-transportation data to an intended receiver of the container for comparison with post-transportation data for the container produced at least in part by scanning the container with at least one x-ray beam after transportation of the container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for aiding in the secure transportation of a container used to transport at least one item therein, the method comprising the steps of:
-
producing post-transportation data for a container having at least one item present therein at least in part by scanning the container with at least one x-ray beam after transportation of the container; and
comparing the post-transportation data for the container with pre-transportation data for the container produced at least in part by scanning the container with at least one x-ray beam prior to transportation of the container. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for aiding in the secure transportation of a container used to transport at least one item therein, said apparatus comprising:
-
a scanning subsystem for scanning a container having at least one item therein with at least one x-ray beam, for generating first data representative of a portion of the x-ray beam passing through said container and said at least one item thereof, and for communicating said first data; and
a computer subsystem communicatively connected to said scanning subsystem for receiving said first data communicated from said scanning subsystem and for producing second data based at least in part on said first data, wherein said second data is for subsequent use at least in part to evaluate the probability that said container has not been tampered with during transportation. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification