Continuous security state tracking for intermodal containers transported through a global supply chain
First Claim
1. A method of tracking a security state for an intermodal container through a global supply chain, comprising:
- receiving a credential from a first trusted agent confirming the first trusted agent has trusted status;
receiving a required body of information concerning an intermodal container from the first trusted agent located at a first checkpoint;
initiating a security state for the intermodal container with the required body of information;
monitoring the security state of the container during transport between the first checkpoint and a second checkpoint, the security state adapted to change responsive a security breach;
receiving a credential from a second trusted agent confirming the second trusted agent has trusted status; and
sending the security state to the second trusted agent located at the second checkpoint for validation.
1 Assignment
0 Petitions
Accused Products
Abstract
A control center continuously monitors a security state of a container through an extended network spanning from a shipper to a consignee. The control center changes the security state responsive to explicit information received from a trusted agent, or implicit information deducted from business logic. A trusted shipper agent sends manifest information from a shipper checkpoint to the data center that includes, for example, container information, shipping route information, and other security information. Trusted monitor agents continuously track the security state from the shipper checkpoint to the origin checkpoint, from the origin checkpoint to a destination checkpoint, and from the destination checkpoint to a consignee checkpoint. A trusted consignee agent sends termination information from the consignee checkpoint to the data center. The checkpoints further comprise site managers to communicate information, gathered by RFID (Radio Frequency IDentification) readers from RFID tags on containers, to the control center.
-
Citations
36 Claims
-
1. A method of tracking a security state for an intermodal container through a global supply chain, comprising:
-
receiving a credential from a first trusted agent confirming the first trusted agent has trusted status; receiving a required body of information concerning an intermodal container from the first trusted agent located at a first checkpoint; initiating a security state for the intermodal container with the required body of information; monitoring the security state of the container during transport between the first checkpoint and a second checkpoint, the security state adapted to change responsive a security breach; receiving a credential from a second trusted agent confirming the second trusted agent has trusted status; and sending the security state to the second trusted agent located at the second checkpoint for validation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A security state system for tracking a container through a global supply chain, comprising:
-
a first receiving module for receiving a credential from a first trusted agent confirming the first trusted agent has trusted status; a second receiving module for receiving a required body of information concerning a container submitted by the first trusted agent located at a first checkpoint, the second receiving module coupled to the first receiving module; a required body of information module to store the required body of information-submitted by the first trusted agent, the required body of information module coupled to the second receiving module; a third receiving module for receiving a credential from a second trusted agent confirming the second trusted agent has trusted status; and a security state module, coupled to the required body of information module and the third receiving module, the security state module initiating the security state based on the required body of information, the security state module monitoring the security state between the first checkpoint and a second checkpoint, the security state adapted to change responsive to a security breach, and the security state module sending the security state to a second trusted agent at the second checkpoint for validation. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer product having a computer-readable medium having computer program instructions embodied thereon capable of causing a computer to perform a method of tracking a security state for an intermodal container through a global supply chain, the method comprising:
-
receiving a credential from a first trusted agent confirming the first trusted agent has trusted status; receiving a required body of information concerning an intermodal container from the first trusted agent located at a first checkpoint; initiating a security state for the intermodal container with the required body of information; monitoring the security state of the container during transport between the first checkpoint and a second checkpoint, the security state adapted to change responsive a security breach; receiving a credential from a second trusted agent confirming the second trusted agent has trusted status; and sending the security state to the second trusted agent located at the second checkpoint for validation. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
Specification