|Publication number||USRE43415 E1|
|Application number||US 12/038,473|
|Publication date||May 29, 2012|
|Filing date||Feb 27, 2008|
|Priority date||Jul 27, 1992|
|Also published as||US5406263, US5646592|
|Publication number||038473, 12038473, US RE43415 E1, US RE43415E1, US-E1-RE43415, USRE43415 E1, USRE43415E1|
|Inventors||John R. Tuttle|
|Original Assignee||Round Rock Research, Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (17), Non-Patent Citations (7), Referenced by (3), Classifications (23), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This applicationMore than one reissue application has been filed for the reissue of U.S. Pat. No. 5,831,531, which reissue applications are the present reissue application Ser. No. 12/038,473, filed Feb. 27, 2008, and a reissue continuation application Ser. No. 12/057,270, filed Mar. 27, 2008, which is a continuation application of the present reissue application, which is a reissue of U.S. Pat. No. 5,831,531, granted from U.S. patent application Ser. No. 08/827,037 filed Mar. 25, 1997, which is a continuation of application of U.S. patent application Ser. No. 08/421,571 filed Apr. 11, 1995, now U.S. Pat. No. 5,646,592, which is a continuation application of U.S. Pat. application Ser. No. 08/151,599 filed Nov. 12, 1993, now U.S. Pat. No. 5,406,263, which is a continuation-in-part of application Ser. No. 07/921,037 filed Jul. 27, 1992, now abandoned.
This invention relates generally to anti-theft devices and in particular to a method for detecting unauthorized opening of containers and baggage.
Protecting personal property has become a major industry from a security system standpoint. Security systems today can be as elaborate as those installed to protect banking institutions, equipped with video cameras, hooked-up as alarms to the local police station and security guards, or be as simple as a car alarm that is sounded when the door is forced open.
Likewise, the shipping industry is faced with an increasingly growing security problem in that containers, packages, baggage, luggage and mail (all of which may be referred to as simply “shipping container” hereinafter) are vulnerable to being opened by unauthorized personnel, who might steal the contents. As this problem increases it becomes necessary to protect these articles in order to protect the customer's property.
Due to the smaller size and larger quantity of the shipping articles mentioned above, the protection system used must be compact for concealment purposes, and somewhat simple in operation, thereby making them easy to produce and install in mass quantities while being fairly easy to monitor and operate.
The anti-theft method of the present invention conveniently addresses all of these issues to provide a workable and fairly inexpensive solution to securing safe transportation of articles shipped in some type of enclosed shipping container.
The present invention introduces a method for protecting against the unauthorized opening of shipping containers which is disclosed in the several embodiments following.
A first embodiment comprises a simple trip-wire or magnetic circuit that provides continuity, which is detected electrically. Simply, if continuity is disabled by a forced entry of the container, electrical detection means, such as a radio-frequency-identification (RFID) transceiver tag (or simply RFID tag), will alert the owner or monitoring station. The trip-wire concept would require the replacing of a broken trip wire (resulting from forced entry), while the magnetic circuit concept can be reused repetitively.
A second embodiment comprises the magnetic circuit approach of the first embodiment by having the magnetic circuit and the detection device embedded into the shipping article during manufacturing. The preferred detection device, and RFID tag, could also be a battery backed transceiver type on which a replaceable or rechargeable battery could be mounted on the inside of the shipping container during manufacturing. The RFID tag would communicate with an interrogator unit, which could be connected to a host computer. The interrogator and/or the host computer would then monitor the shipping container's status (opened or closed) . The RPID tag could also have an output that changes state upon alarm, so that another device could be connected to indicate the alarm via sound, flashing lights or other means.
Implementation of the present invention will become readily understandable to one skilled in the art in the detailed descriptions that follow.
Referring now to
In the next step, the rear battery epoxy is applied in station 20 before adding a stiffener and then folding the polymer base over onto the top cover as indicated in station 22. The epoxy material is then cured in station 24 before providing a final sealing step in stage 26 to complete the package as described in more detail below.
Referring now to
A pair of rectangular shaped batteries 38 and 40 are positioned as shown adjacent to the IC chip 32 and are also disposed on the upper surface of the base support member 30. The two rectangular batteries 38 and 40 are electrically connected in series to power the IC chip 32 in a manner more particularly described below. The device or package shown in
Referring now to
Referring now to
Referring now to
Referring now to
Next, a conductive epoxy is applied to the upper surfaces of the two batteries 38 and 40, and then the polymer base material 30 with the batteries thereon are folded over onto the cover member 42 to thus complete and seal the package in the configuration shown in
Referring now to
By using the communication approach taken in
Expanded view of
Both attaching methods serve as examples of how the opening detection unit may be attached to containers or doors that open. It would be preferred to have the wire attached so that it is not easily detected by casual observance and not easily broken by accident. Tag 67 could be affixed to label 66 with tag 67 itself being adhered to a self-adhesive paper, such as stamp, and then applied to the label.
A second embodiment of an “unauthorized opening detection device” is shown in
Referring now to
The detection device of
The methods of the embodiments discussed above, can easily be implemented into security systems. For example, by attaching the RFID tag and continuity completing circuitry to span between an entry/exit door and the framework supporting the door, unauthorized entry can now be monitored by activating the system when the door is to remain closed. Other such security schemes could also use the monitoring methods of the present invention.
It is to be understood that although the present invention has been described in several embodiments, various modifications known to those skilled in the art, such as applying these techniques to any kind of containers (mail, freight, etc.) or by various methods of attaching the detection device to the container, may be made without departing from the invention as recited in the several claims appended hereto.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3426166||Jun 9, 1966||Feb 4, 1969||Int Standard Electric Corp||Magnetic closure and switch for doors and similar devices|
|US4117468||Mar 15, 1977||Sep 26, 1978||Tulio Vasquez||Sound alarm for protecting briefcases and the like|
|US4155079 *||Nov 2, 1976||May 15, 1979||Hui-Lang Shieh||Theft-proof suitcase|
|US4262284||Jun 26, 1978||Apr 14, 1981||Stieff Lorin R||Self-monitoring seal|
|US4591835 *||Mar 22, 1984||May 27, 1986||Sharp Graham D F||Remotely activatable alarm system|
|US4684929||Oct 17, 1985||Aug 4, 1987||Ball Corporation||Microwave/seismic security system|
|US4908606 *||Dec 28, 1987||Mar 13, 1990||Raffi Kevonian||Theft resistant security containers using shocking wires and audio alarm|
|US5099228 *||Feb 21, 1990||Mar 24, 1992||Marcia Israel||Electronic anti-theft merchandise tag having means for activating an alarm in response to an attempt to remove the tag from the merchandise|
|US5111184||Feb 25, 1991||May 5, 1992||Atlantic Research Corporation||Tamper-proof device for detecting opening and closing of a secure container|
|US5126719||May 23, 1990||Jun 30, 1992||Desorbo John||Remotely armed alarm system|
|US5169188||Aug 19, 1991||Dec 8, 1992||The United States Of America As Represented By The United States Department Of Energy||Ceramic tamper-revealing seals|
|US5189396||Jun 6, 1991||Feb 23, 1993||Anatoli Stobbe||Electronic seal|
|US5396218||Jul 23, 1993||Mar 7, 1995||Olah; George||Portable security system using communicating cards|
|US5406263||Nov 12, 1993||Apr 11, 1995||Micron Communications, Inc.||Anti-theft method for detecting the unauthorized opening of containers and baggage|
|US5510768 *||Oct 11, 1994||Apr 23, 1996||Mann; Glenn E.||Alarm strap for luggage|
|US5646592||Apr 11, 1995||Jul 8, 1997||Micron Communications, Inc.||Anti-theft method for detecting the unauthorized opening of containers and baggage|
|US5831531||Mar 25, 1997||Nov 3, 1998||Micron Communications, Inc.||Anti-theft method for detecting the unauthorized opening of containers and baggage|
|1||Tuttle, John, U.S. Appl. No. 07/921,037; "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage", filed Jul. 27, 1992, now abandoned.|
|2||Tuttle, John, U.S. Appl. No. 12/057,270; "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage", filed Mar. 27, 2008.|
|3||USPTO Transaction History of U.S. Appl. No. 07/921,037, filed Jul. 27, 1992, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now abandoned.|
|4||USPTO Transaction History of U.S. Appl. No. 08/151,599, filed Nov. 12, 1993, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,406,263.|
|5||USPTO Transaction History of U.S. Appl. No. 08/421,571, filed Apr. 11, 1995, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,646,592.|
|6||USPTO Transaction History of U.S. Appl. No. 08/827,037, filed Mar. 25, 1997, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage," now U.S. Pat. No. 5,831,531.|
|7||USPTO Transaction History of U.S. Appl. No. 12/057,270, filed Mar. 27, 2008, entitled "Anti-Theft Method for Detecting the Unauthorized Opening of Containers and Baggage."|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8698627||Dec 22, 2010||Apr 15, 2014||Meadwestvaco Corporation||Security packaging|
|US20140218196 *||Apr 10, 2014||Aug 7, 2014||Meadwestvaco Corporation||Security packaging|
|US20140283565 *||Mar 20, 2013||Sep 25, 2014||Joseph Edwards||Luggage Locking Apparatus and Method|
|U.S. Classification||340/572.1, 190/101, 340/540, 340/541, 190/120, 340/652, 340/572.7, 340/686.1|
|International Classification||A45C13/18, G08B13/14, G08B21/00, A45C13/10, G08B13/12|
|Cooperative Classification||G08B21/0286, G08B13/149, G06K19/07798, G08B13/126, G08B13/1427|
|European Classification||G08B13/14P, G08B21/02A26, G08B13/14D, G08B13/12H, G06K19/077T9|
|Jan 4, 2010||AS||Assignment|
Effective date: 20091223
Owner name: ROUND ROCK RESEARCH, LLC, NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:023786/0416
|Jan 26, 2010||AS||Assignment|
Owner name: MICRON TECHNOLOGY, INC., IDAHO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KEYSTONE TECHNOLOGY SOLUTIONS, LLC;REEL/FRAME:023839/0881
Effective date: 20091222