Patent classifications
G08B13/126
Wireless mechanism for detecting an open or closed container, and methods of making and using the same
An electronic device including a continuity sensor and electrical circuitry configured to detect and report the continuity state of an article, container or product packaging is disclosed. The continuity sensor includes a first substrate with first and second coils thereon, and a second substrate with a third coil thereon. The first coil has an integrated circuit electrically connected thereto. The first substrate is part of, or is attached or secured to a part of the article, container or packaging. The second substrate is another part of, or is attached or secured to another part of the article, container or packaging. One of the article, container or packaging parts is (re)movable with respect to the other part. The first and second coils have one coupling when the article, container or packaging is closed or sealed, and a different coupling when the article, container or packaging is open or unsealed.
ROLLER SHUTTER FOR SECURING A PHYSICAL SPACE WITHIN A VEHICLE
It is provided a roller shutter for securing a physical space within a vehicle. The roller shutter comprises: a protective barrier configured to be in a rolled up, open, state, and in a rolled down, protective state; a mesh of conductors being attached to the protective barrier; a processor; and a memory storing instructions that, when executed by the processor, cause the roller shutter to: detect a physical break in the mesh of conductors; when a break in the mesh of conductors is connected, signal that a break-in is detected, determine a valid open request; open the roller shutter when the valid open request is determined; determine when a user has exited the vehicle; and close the roller shutter when the user exit has been determined.
ASSET TRACKING AND NOTIFICATION PROCESSING
An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
ANTI-TAMPERING ASSEMBLY AND SYSTEM
It is disclosed an anti-tampering assembly for the transportation and storage of a package, the anti-tampering assembly being configured to be associated with the package. the anti-tampering assembly comprises: a tampering detection unit comprising a RFID passive tag and a tampering track of a conductive material configured to be connected to said RFID tag upon dispatching the package so as to inhibit the operation of the RFID tag, wherein the tampering track is configured to be interrupted in case of tampering of the package; an actuating unit configured to detect the interruption of the tampering track in case of tampering of the package and, upon detection, actuate an alarm unit; and the alarm unit comprising a radio module configured to, upon actuation, transmit an alarm message over a long range wireless communication network.
System and method for two-level protection for accessing closed and semi-closed enclosures
The system is constituted by physical and electrical barriers, with components of sensing and alarm of the first and of connection and activation of the last, all connected to the internal source constituted by set of batteries or conventional electrical system, the last one provided of batteries pack, for coverage of eventual electrical supply failures, for the length of time considered more convenient by the user. The system prevents access to closed or semi-closed enclosures, so that the detection by the sensing and alarm component of the simple approach of intrusion agent at a distance below that established activates the electrical barrier connection and activation component fed by its own sources or conventional, substitutable by the own sources in case of external supply drop, making the entire energized electric barrier practically impregnable to burglary, due to the discharge of high voltage and low amperage, as appropriate.
SMART TRAILER SYSTEM
A smart trailer system coupled to a trailer of a vehicle includes a sensor configured to measure a parameter of the trailer, a sensor interface board electrically coupled to the sensor and configured to retrieve the measured parameter, and a master controller communicatively coupled to the sensor interface board via a data bus.
SMART TRAILER SYSTEM
A smart trailer system coupled to a trailer of a vehicle includes a sensor configured to measure a parameter of the trailer, a sensor interface board electrically coupled to the sensor and configured to retrieve the measured parameter, and a master controller communicatively coupled to the sensor interface board via a data bus.
APPARATUS FOR SECURING A PACKAGE
An apparatus for securing a package includes a flexible tear-resistant bag and an anchor system for securing the bag to a substrate. The bag includes a receptacle defining a package receiving space and a closure mechanism connected to the receptacle for selectively closing the receptacle. The anchor assembly includes a housing, a fastener, and an anchor securable to the substrate. The housing may be positioned in the package receiving space with the fastener extending through the housing and the receptacle and matingly received in the anchor. A door of the housing may be secured in a closed position to limit access to the fastener. In some embodiments, the bag of the apparatus may also be provided with an alarm system so if an unauthorized entry is attempted by cutting the tear-resistant bag the alarm system will emit an alerting signal.
Intrustion detection and notification device
Software intrusion protection systems to prevent remote access to sensitive data are very prevalent. In some cases, additional physical access protection may also be desired. By preventing physical access to a system an intruder may not be able to physically steal component parts of the system and then obtain their contents (or design criteria) at a remote site (e.g., after the physical theft). Monitors are provided to detect potential access to a secure computer system and identify if inappropriate access to the secure computer system is obtained (or is imminent). In a case where unauthorized access is predicted, warnings and alerts may be sent prior to an actual breach. Upon determination that a breach may be likely to occur, techniques to protect data (e.g., erasure, destruction, etc.) and component parts may be initiated. Sensors monitor internal and external physical environmental conditions to assist in detection of intrusion.
Medication Counterfeit Detection
A device for detecting a tampering of a product in a product packaging material. The device comprises a network of sensors integrated into the product packaging material; a microcontroller, the microcontroller configured to detect, by accessing the sensors of the sensor network, the tampering of the product packaging material; and a communication device for relaying information regarding a status of the product packaging material.