Method and system for arming a multi-layered security system
First Claim
1. A container security system, the system comprising:
- a sensor configured to be mounted on the container;
an arming device configured to couple with the sensor and to arm the sensor to detect an opening of a door of the container; and
a unique identifier stored in a computer-readable memory of the arming device, wherein the unique identifier is configured to initiate arming of the sensor,wherein the sensor is configured to generate a unique encrypted arming key by combining the unique identifier with a tag key stored in a computer-readable memory of the sensor.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing a container is disclosed. A sensor secures the container and may be configured to detect an opening of a door of the container. The sensor may be a container security device. An arming device may be coupled with the sensor to transmit a unique identifier to the sensor. The arming device may be a remote arming plug. The sensor may combine the unique identifier with a tag key to create an arming key. As part of the arming sequence, the sensor may enter a pre-armed state. After the door of the container is closed, the sensor may count down and change to an armed state when the countdown ends. The arming device may be removably coupled to the container security device. The arming device may also include a bolt. The arming device and/or the bolt may be coupled with a door securing device.
19 Citations
24 Claims
-
1. A container security system, the system comprising:
-
a sensor configured to be mounted on the container; an arming device configured to couple with the sensor and to arm the sensor to detect an opening of a door of the container; and a unique identifier stored in a computer-readable memory of the arming device, wherein the unique identifier is configured to initiate arming of the sensor, wherein the sensor is configured to generate a unique encrypted arming key by combining the unique identifier with a tag key stored in a computer-readable memory of the sensor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An arming device, comprising:
-
a computer-readable memory; and a unique identifier stored in the computer-readable memory, the unique identifier configured to arm a sensor mounted to a container to detect an opening of a door of the container, wherein the unique identifier is further configured to be combined with a tail key stored in the sensor to create an arming key. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method for securing a container, the method comprising:
-
receiving, using a sensor mounted on the container, a unique identifier that is transmitted from an arming device coupled with the sensor; calculating an arming key by combining the transmitted unique identifier with a tag key stored in the sensor; detecting that a door of the container is closed; and activating the arming key to configure the sensor to detect an opening of the door of the container.
-
Specification