METHOD AND SYSTEM FOR MONITORING THE INTEGRITY OF FREIGHT CONTAINERS
First Claim
1. A method for monitoring the integrity of one or more freight containers along a transport route, wherein at least one freight container has a monitoring device (10) associated therewith that has at least one monitoring sensor (12) monitoring the integrity of the freight container, wherein the sensing of an event violating the freight container integrity by the monitoring sensor (12) is followed by event data, representing the integrity violation, being transmitted to a remote analysis center (14), particularly an analysis device (18) associated with the analysis center (14), wherein the analysis center (14), particularly the analysis device (18) associated therewith, rates the transmitted event data using predetermined criteria in respect of either a sanctioned—
- authorized—
or an unsanctioned—
unauthorized—
integrity violation of the freight container, and wherein opening or closing of the freight container is rated as a sanctioned or authorized integrity violation if an electronic authorization code representing the sanction for the opening operation or the closing operation is sent to the analysis center (14) for the event data representing this integrity violation, characterized in that different types of opening operations and/or different types of closing operations are distinguished by using respective authorization codes from different function groups—
function codes—
, as result of which the analysis center (14) can use the type of respectively received function code to determine what type of opening operation and/or what type of closing operation has taken place or is meant to take place.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for monitoring the integrity of a freight container along a transport route, the container having a sensor monitoring the container integrity, wherein the sensing of an event violating the container integrity is followed by event data representing the integrity violation being transmitted to an analysis center, wherein the event data is rated using predetermined criteria in respect of either a sanctioned or an unsanctioned integrity violation, and wherein opening or closing of the container is rated as a sanctioned integrity violation if an electronic authorization code representing the sanction is sent to the analysis center for the event data representing this integrity violation. Different types of opening and/or closing operations are distinguished by using authorization codes from different function groups, and the analysis center uses the type of function code to determine what type of opening operation and/or closing operation has taken, or is meant to take, place.
-
Citations
11 Claims
-
1. A method for monitoring the integrity of one or more freight containers along a transport route, wherein at least one freight container has a monitoring device (10) associated therewith that has at least one monitoring sensor (12) monitoring the integrity of the freight container, wherein the sensing of an event violating the freight container integrity by the monitoring sensor (12) is followed by event data, representing the integrity violation, being transmitted to a remote analysis center (14), particularly an analysis device (18) associated with the analysis center (14), wherein the analysis center (14), particularly the analysis device (18) associated therewith, rates the transmitted event data using predetermined criteria in respect of either a sanctioned—
- authorized—
or an unsanctioned—
unauthorized—
integrity violation of the freight container, and wherein opening or closing of the freight container is rated as a sanctioned or authorized integrity violation if an electronic authorization code representing the sanction for the opening operation or the closing operation is sent to the analysis center (14) for the event data representing this integrity violation, characterized in that different types of opening operations and/or different types of closing operations are distinguished by using respective authorization codes from different function groups—
function codes—
, as result of which the analysis center (14) can use the type of respectively received function code to determine what type of opening operation and/or what type of closing operation has taken place or is meant to take place. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- authorized—
Specification