SYSTEM AND METHOD FOR CREATING AND VERIFYING A COMPOSITE ONBOARD IDENTITY (COBI) FOR A MOBILE ENTITY
First Claim
1. A system for detecting unauthorized alteration, tampering, or sabotage of a mobile entity during a trip from a point of origin to a destination, the system comprising:
- a plurality of identification mechanisms cooperative with a plurality of elements of the mobile entity, each of the plurality of elements being cooperative with at least one of the identification mechanisms, the identification mechanisms being configured to provide identifying information which can be used to verify at least one of an identity and a status of each of the plurality of elements of the mobile entity;
a control system configured for obtaining initial identifying information from the identification mechanisms when the mobile entity is at the point of origin, the control system being further configured for assigning to the mobile entity an identifying composite onboard identity signature, herein referred to as a “
COBI”
; and
a verification system configured for obtaining final identifying information from the identification mechanisms when the mobile entity is at the destination, the verification system also being configured to employ the COBI to obtain the initial identifying information, and to compare the initial identifying information with the final identifying information so as to detect unauthorized alteration, tampering, or sabotage of any of the plurality of elements of the mobile entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for detecting tampering and/or sabotage of a mobile entity obtains initial identity identifying information from a plurality of elements, such as a driver, a vehicle, an item of cargo, and a travel route and/or schedule. A composite onboard identity (“COBI”) is assigned to the mobile entity and is used to retrieve the initial identifying information after the entity arrives at a destination. Final identifying information is then obtained and compared with the initial information, thereby detecting unauthorized changes which indicate tampering or sabotage. Identifying information can also be compared at checkpoints en route. The identifying information can be manually or automatically supplied, and can be wirelessly communicated to a verifying authority. In some embodiments, upon verification failure, an onboard electronic unit can disable the vehicle by stopping the motor, locking the steering wheel, sounding the horn, flashing the lights, and/or applying the brakes.
38 Citations
18 Claims
-
1. A system for detecting unauthorized alteration, tampering, or sabotage of a mobile entity during a trip from a point of origin to a destination, the system comprising:
-
a plurality of identification mechanisms cooperative with a plurality of elements of the mobile entity, each of the plurality of elements being cooperative with at least one of the identification mechanisms, the identification mechanisms being configured to provide identifying information which can be used to verify at least one of an identity and a status of each of the plurality of elements of the mobile entity; a control system configured for obtaining initial identifying information from the identification mechanisms when the mobile entity is at the point of origin, the control system being further configured for assigning to the mobile entity an identifying composite onboard identity signature, herein referred to as a “
COBI”
; anda verification system configured for obtaining final identifying information from the identification mechanisms when the mobile entity is at the destination, the verification system also being configured to employ the COBI to obtain the initial identifying information, and to compare the initial identifying information with the final identifying information so as to detect unauthorized alteration, tampering, or sabotage of any of the plurality of elements of the mobile entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for detecting unauthorized alteration, tampering, or sabotage of a mobile entity during a trip from a point of origin to a destination, the method comprising:
-
while the mobile entity is at the point of origin, obtaining initial identifying information which can be used to verify at least one of an identity and a status of each of a plurality of elements of the mobile entity; assigning to the mobile entity an identifying composite onboard identity signature, herein referred to as a “
COBI”
;after arrival of the mobile entity at the destination, obtaining final identifying information which can be used to verify at least one of an identity and a status of each of the plurality of elements of the mobile entity; using the COBI, retrieving the initial identifying information; and comparing the initial identifying information with the final identifying information so as to detect unauthorized alteration, tampering, or sabotage of any of the plurality of elements of the mobile entity. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification