Sign In to Follow Application
View All Documents & Correspondence

A System And A Method For Verifying Thelocation Of Sealing A Container

Abstract: The present disclosure relates to the field of container security systems and discloses a system (100) and a method (300) for verifying the location of sealing a container (102). The system (100) includes an electronic seal (e-seal) (104), a database server (106), and an e-seal verification tool (110). The e-seal (104) is assigned to a first registered user for sealing the container (102) and has a unique identification number (UID). The database server (106) stores details of first registered users and UID of e-seals (104) assigned to the first registered users in the form of lookup tables. The e-seal verification tool (110) detects the location of scanning/installing the e-seal (104). If the detected location is outside the user’s factory premises, the tool (110) generates an alert message and passes it on to a second registered user via the database server (106), thereby indicating unsecure transit of the containers (102).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 September 2019
Publication Number
11/2021
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
dewan@rkdewanmail.com
Parent Application

Applicants

SEPIO PRODUCTS PRIVATE LIMITED
037, Akshay Ind. Premises Co-op.Society Ltd. Navghar, Vasi (E), Palghar-401 210, Maharashtra, India

Inventors

1. NORONHA Paul Abner
301 Seville 3rd Domnic Colony, Orlem, Malad West Mumbai-400064 Maharashtra, India
2. GANDHI, Darshan Dhruman
105 Woodstock building JP Road, Seven bungalows, Andheri West Mumbai 400061 Maharashtra India
3. KAMAT, Dattaprasad Narayan
102 Trimbak Sadan 5 Ajmal Road, Vileparle East Mumbai 400057 Maharashtra India
4. NATHANI, Murad
Ashiana Bullock Road, Bandstand. Bandra Mumbai 400050 Maharashtra India

Specification

Claims:
WE CLAIM:
1. A system (100) for verifying the location of sealing a container (102), said system (100) comprising:
i. an electronic seal (e-seal) (104) assigned to a first registered user for sealing the container (102), said e-seal (104) associated with a unique identification number (UID);
ii. a database server (106) configured to store:
i. a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of said first registered users; and
ii. a second look up take having a list of UID's associated with e-seals (104) and IEC code of a first registered user corresponding to each of said UID’s,
iii. an e-seal verification tool (110) installable in a user device (108) associated with said first registered user, said e-seal verification tool (110) comprising:
• a short range communication module (202) to communicate with said e-seal (104) to receive a scanning information;
• a validation module (204) to validate said e-seal (104) based on said scanning information;
• a location verification module (208) to verify the location of sealing said container (102); and
• a tamper checking module (206) to facilitate entry of shipping information related to said container (102) within a pre-defined time frame and subsequently transmit said scanning information and said shipping information to said database server (106) upon successful validation and location verification,
wherein said e-seal verification tool (110) is implemented using one or more processor(s).
2. The system as claimed in claim 1, wherein said scanning information includes UID associated with said e-seal (104) and location, date and time of scanning said e-seal (104).
3. The system as claimed in claim 1, wherein said e-seal (104) includes a tamper loop for facilitating detection of tampering.
4. The system as claimed in claim 3, wherein said e-seal (104) is a bolt seal including a bolt member having a half portion of said tamper loop and a receiving member having the other half portion of said tamper loop, said bolt seal configured to be locked when said bolt member is fitted inside said receiving member.
5. The system as claimed in claim 4, wherein said tamper loop is closed when said e-seal (104) is locked.
6. The system as claimed in claim 1, wherein said e-seal (104) is a cable seal including a cable and a receiving member, said cable seal configured to be locked when said cable is fitted inside said receiving member.
7. The system as claimed in claim 5, wherein said e-seal verification tool (110) receives said scanning information from said e-seal (104) only when said tamper loop is closed.
8. The system as claimed in claim 6, wherein said e-seal verification tool (110) receives said scanning information from said e-seal (104) only when said e-seal (104) is locked.
9. The system as claimed in claim 2, wherein said validation module (204) is configured to cooperate with said short range communication module (202) to receive said scanning information, said validation module (204) including:
i. an extractor module (212) configured to extract UID code of said scanned e-seal (104) from said received scanning information;
ii. a first crawler and extractor module (214) configured to cooperate with said database server (106) to crawl through said first lookup table to extract IEC code of first registered user using said e-seal verification tool (110) from said first lookup table;
iii. a second crawler and extractor module (216) configured to cooperate said extractor module (212) to receive said extracted UID code, and further configured to cooperate with said database server (106) to crawl through said second lookup table to extract IEC code of first registered user corresponding to said received UID code; and
iv. a comparator module (218) configured to cooperate with said first crawler and extractor module (214) and said second crawler and extractor module (216) to compare IEC code obtained from said first lookup table with the IEC code obtained from said second lookup table to validate said e-seal (104).
10. The system as claimed in claim 7, wherein said tamper checking module (206) is configured to cooperate with said validation module (204) to activate said tamper loop upon successful validation of said e-seal (104).
11. The system as claimed in claim 1, wherein said location verification module (208) comprises:
i. a geo-fencing module (210) configured to cooperate with said database server (106) to receive said pre-set location details pertaining to said first registered user, and further configured to generate a virtual fence of a pre-defined radius around said received location; and
ii. a verification module (226) configured to cooperate with said short range communication module (202) to receive said scanning information and extract location of scanning said e-seal (104) from said received scanning information, said verification module (226) further configured to cooperate with said geo-fencing module (210) to verify the sealing location of said container (102), said verification module (226) configured to generate an alert event when said extracted scanning location is not within said pre-defined radius.
12. The system as claimed in claim 11, wherein said e-seal verification tool (110) includes a warning generator module (224) configured to cooperate with said location verification module (208) to receive said alert event, and further configured to generate an alert message and display said alert message, said scanning location and said virtual fence on the display screen of said user device (108).
13. The system as claimed in claim 12, wherein said warning generator module (224) is configured to facilitate said first registered user to provide an input to either proceed with data uploading or abort sealing of said container (102), upon receiving said alert event, said warning generator module (224) is further configured to generate corresponding data uploading signal or abort signal based on said received input.
14. The system as claimed in claim 12, wherein said warning generator module (224) is configured to generate a blocking signal to block said first registered user from uploading data to said database server (106) upon receiving said alert event.
15. The system as claimed in claim 13, wherein said tamper checking module (206) includes:
i. a processing module (220) configured to cooperate with said validation module (204), said location verification module (208), and said warning generator module (224) to detect tamper status of said e-seal (104) when either:
• said e-seal (104) is successfully validated and said scanning location is within said pre-defined radius; or
• said e-seal (104) is successfully validated and said data uploading signal is received from said warning generator module (224); and
ii. a data uploading module (222) configured to cooperate with said processing module (220) to populate said scanning information on a display screen of said user device (108) and facilitate said first registered user to enter shipping information related to said container (102) within said pre-defined time frame, if the detected tamper status corresponds to “sealed”.
16. The system as claimed in claim 15, wherein said data uploading module (222) is configured to transmit said scanning information and said received shipping information to said database server (106) upon subsequent communication between said e-seal (104) and said e-seal verification tool (110) using said short range communication module (202).
17. The system as claimed in claim 15, wherein said data uploading module (222) is configured to transmit said scanning information and said received shipping information to said database server (106) when said first registered user submits the entered shipping information within said pre-determined time frame.
18. The system as claimed in claim 11, wherein said e-seal verification tool (110) is configured to transmit said alert event to said database server (106) for storing.
19. The system as claimed in claim 18, wherein said database server (106) is configured to send the scanning information, said shipping information, and said alert event to a scanning device (112) associated with a second registered user, when said second registered user scans said e-seal (104) using said scanning device (112).
20. The system as claimed in claims 19, wherein said scanning device (112) is configured to display said alert message, said scanning location and said virtual fence on its display screen upon receiving said alert event.
21. The system as claimed in claim 1, wherein said e-seal (104) is a passive tamper indicating electronic seal.
22. The system as claimed in claim 1, wherein said e-seal (104) is a passive electronic seal that cannot be scanned if tampered with, thus indicating a tamper attempt.
23. The system as claimed in claim 1, wherein said e-seal (104) is an active tamper indicating electronic seal.
24. The system as claimed in claim 5, wherein said e-seal (104) is an active tamper indicating electronic seal having a counter, said counter being configured to record the number of times said tamper loop is opened and closed.
25. The system as claimed in claim 1, wherein said short range communication module (202) is selected from a group consisting of an NFC module, a Bluetooth module, a Zigbee module, and a Z-Wave module.
26. The system as claimed in claim 1, wherein said shipping information includes IEC code of said first registered user, shipping bill number, shipping date, container number, destination customs station for export, container number, and trailer truck number.
27. The system as claimed in claim 19, wherein said scanning device (112) is configured to facilitate the second registered user to generate a request for uploading picture of said locked e-seal (104), and is further configured to send said generated request to the user device (108) of associated first registered user via said database server (106).
28. The system as claimed in claim 27, wherein said e-seal verification tool (110) is configured to receive said generated request, and is further configured invoke a camera module to facilitate said user to upload said photo.
29. A method for verifying the location of sealing a container (102), said method (300) comprising:
i. providing, an electronic seal (e-seal) (104) to a first registered user for sealing the container (102), said e-seal (104) associated with a unique identification number (UID);
ii. providing, an e-seal verification tool (110), installable in a user device (108) associated with said first registered user;
iii. storing, in a database server (106):
i. a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of said first registered users; and
ii. a second look up take having a list of UID's associated with e-seals (104) and IEC code of a first registered user corresponding to each of said UID’s,
iv. receiving, by a short range communication module (202) of said e-seal verification tool (110), a scanning information from said e-seal (104);
v. validating, by a validation module (204) of said e-seal verification tool (110), said e-seal (104) based on said scanning information;
vi. verifying, by a location verification module (208) of said e-seal verification tool (110), the location of sealing said container (102);
vii. facilitating, by said tamper checking module (206), entry of shipping information related to said container (102), within a pre-defined time frame; and
viii. transmitting, by said tamper checking module (206), said scanning information and said shipping information to said database server (106),
wherein said e-seal verification tool (110) is implemented using one or more processor(s).
30. The method as claimed in claim 29, wherein said step of validating said e-seal (104) based on said scanning information includes:
i. extracting, by an extractor module (212), UID code of said scanned e-seal (104) from said received scanning information;
ii. extracting, by a first crawler and extractor module (214), IEC code of first registered user using said e-seal verification tool (110), from said first lookup table by crawling through said first lookup table;
iii. receiving, by a second crawler and extractor module (216), said extracted UID code from said extractor module (212);
iv. extracting, by said second crawler and extractor module (216), IEC code of first registered user corresponding to said received UID from said second lookup table by crawling through said second lookup table; and
v. comparing, by a comparator module (218), IEC code obtained from said first lookup table with the IEC code obtained from said second lookup table to validate said e-seal (104).
31. The method as claimed in claim 29, wherein said step of verifying the location of sealing said container (102) includes:
i. receiving, by a geo-fencing module (210) of said location verification module (208), said pre-set location details pertaining to said first registered user from said database server (106);
ii. generating, by said geo-fencing module (210), a virtual fence of a pre-defined radius around said received location;
iii. receiving, by a verification module (226) of said location verification module (208), said scanning information from said short range communication module (202);
iv. extracting, by said verification module (226), location of scanning said e-seal (104) from said received scanning information; and
v. generating, by said verification module (226), an alert event when said extracted scanning location is not within said pre-defined radius.

32. The method as claimed in claim 31, wherein said method (300) includes the step of receiving, by a warning generator module (224) of said e-seal verification tool (110), said alert event from said location verification module (208), and further displaying, an alert message, said scanning location and said virtual fence on the display screen of said user device (108) upon receiving said alert event.
Dated this 11th Day of September, 2019

_______________________________
MOHAN DEWAN, IN/PA - 25
of R.K.DEWAN & CO.
Authorized Agent of Applicant

TO,
THE CONTROLLER OF PATENTS
THE PATENT OFFICE, AT MUMBAI
, Description:


FIELD
The present disclosure generally relates to shipping container security systems. More particularly, the present disclosure relates to a system and a method for verifying the location of sealing a shipping container.
DEFINITIONS
As used in the present disclosure, the following terms are generally intended to have the meaning as set forth below, except to the extent that the context in which they are used indicate otherwise.
First registered user – The term “first registered user” hereinafter refers to an Authorized Economic Operator (AEO), an Exporter having self-sealing permission, an Exporter availing the facility of sealing in the presence of a central excise officer, or a Status Holder recognized by Director General of Foreign Trade (DGFT) holding a valid status holder certificate.
Second registered user – The term “Second registered user” hereinafter refers to a buyer, a customs officer, or an end user.
BACKGROUND
The background information herein below relates to the present disclosure but is not necessarily prior art.
Container Security systems play an important role in ensuring the security of the containers along the supply chain. Conventionally, the containers are sealed using electronic seals (e-seals) which act as barriers against theft and sabotage of cargo within the containers. Each electronic seal has a unique identification number (ID). The electronic seal is manually associated with a particular container. For example, when the seal is affixed and activated, an operator reads the seal identification number, either visually from the tag itself or by using an electronic reader and enters the container identification markings and the seal identification number into a database that is accessible to authorized people (for e.g. customs officer who needs to understand the location and seal status of the particular container). The sealing of containers is supposed to be done at factory locations. Once a container is loaded with cargo at a point of origin, the container doors are closed and an electronic seal is installed on the door. Upon closing of the electronic seal, the seal can be read. The seal will not work if it is not locked. The seal status can be read by an RFID reader. At the destination point, the seal status is read to check if the seal is broken or tampered. If the ID of the seal cannot be read or the ID number obtained from the seal is different from the one obtained from database, this gives an indication that the container or trailer door might have been opened by an unauthorized person at some point in the transportation route.
To escape from this situation, many exporters seal the containers just before the journey ends rather than before it commences. Further, in some cases, the e-seals are replaced during the journey if there is an issue such as vehicle breakdown. The problem with the conventional security systems is that there is no way to find if the container was locked within the factory premises or outside the factory premises. Sellers or exporters may upload shipping information well after the container has left the factory premises. This practice presents a major security risk, since there is no way to confirm whether the goods were secure during transit or not.
There is, therefore, felt a need to provide a system for verifying the location of sealing a shipping container that eliminates the above-mentioned drawbacks.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies, are as follows:
It is an object of the present disclosure to ameliorate one or more problems of the prior art or to at least provide a useful alternative.
It is an object of the present disclosure to provide a system for verifying the location of sealing a container.
Another object of the present disclosure is to provide a system that detects location of sealing of a container.
Still another object of the present disclosure is to provide a system that generates an alert message if the container is not sealed within the factory premises.
Yet another object of the present disclosure is to provide a system for verifying the location of sealing a container that is reliable.
Still another object of the present disclosure is to provide a system for verifying the location of sealing a container that is simple in design.
Yet another object of the present disclosure is to provide a system that allows a customer or a customs officer to demand a photograph of a locked e-seal before the commencement of transportation.
Still another object of the present disclosure is to provide a system for verifying the location of sealing a container that ensures that shipping information is uploaded within the factory premises.
Yet another object of the present disclosure is to provide a system that allows an exporter to verify the working status of electronic seal before dispatching the container.
Still another object of the present disclosure is to provide a system for verifying the location of sealing a container that makes it mandatory for an exporter to scan the electronic seal after entering the shipping information to ensure that the data uploading page is not preloaded and filled in later.
Yet another object of the present disclosure is to provide a system for verifying the location of sealing a container that is secure.
Still another object of the present disclosure is to provide a system for verifying the location of sealing a container that is compatible with existing container security systems.
Other objects and advantages of the present disclosure will be more apparent from the following description, which is not intended to limit the scope of the present disclosure.
SUMMARY
The present disclosure envisages a system for verifying the location of sealing a container. The system comprises an electronic seal (e-seal), a database server, and an e-seal verification tool. The electronic seal is assigned to a first registered user for sealing the container. The e-seal is associated with a unique identification number (UID). The database server is configured to store a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of the first registered users. The database server is further configured to store a second look up take having a list of UID's associated with e-seals and IEC code of a first registered user corresponding to each of the UID’s. The e-seal verification tool comprises a short range communication module, a validation module, a location verification module, and a tamper checking module. The short range communication module communicates with the e-seal to receive a scanning information. The scanning information includes UID associated with the e-seal and location, date and time of scanning the e-seal. The validation module validates the e-seal based on the scanning information. The location verification module verifies the location of sealing the container of the e-seal. The tamper checking module facilitates entry of shipping information related to the container within a pre-defined time frame and subsequently transmits the scanning information and the shipping information to the database server upon successful validation and location verification. The shipping information includes IEC code of the first registered user, shipping bill number, shipping date, container number, destination customs station for export, container number, and trailer truck number. In an embodiment, the e-seal verification tool is implemented using one or more processor(s).
In an embodiment, the e-seal includes a tamper loop for facilitating detection of tampering. The e-seal is a bolt seal including a bolt member having a half portion of the tamper loop and a receiving member having the other half portion of the tamper loop. The bolt seal is configured to be locked when the bolt member is fitted inside the receiving member. The tamper loop is closed when the e-seal is locked. The e-seal verification tool is configured to receive the scanning information from the e-seal only when the tamper loop is closed.
In another embodiment, the e-seal is a cable seal including a cable and a receiving member. The cable seal is configured to be locked when the cable is fitted inside the receiving member. The e-seal verification tool receives the scanning information from the e-seal only when the e-seal is locked.
In an embodiment, the validation module includes an extractor module, a first crawler and extractor module, a second crawler and extractor module, and a comparator module. The validation module is configured to cooperate with the short range communication module to receive the scanning information. The extractor module is configured to extract UID code of the scanned e-seal from the received scanning information. The first crawler and extractor module is configured to cooperate with the database server to crawl through the first lookup table to extract IEC code of first registered user using the e-seal verification tool from the first lookup table. The second crawler and extractor module is configured to cooperate the extractor module to receive the extracted UID code, and is further configured to cooperate with the database server to crawl through the second lookup table to extract IEC code of first registered user corresponding to the received UID code. The comparator module is configured to cooperate with the first crawler and extractor module and the second crawler and extractor module to compare IEC code obtained from the first lookup table with the IEC code obtained from the second lookup table to validate the e-seal.
In an embodiment, the location verification module comprises a geo-fencing module and a verification module. The geo-fencing module is configured to cooperate with the database server to receive the pre-set location details pertaining to the first registered user, and is further configured to generate a virtual fence of a pre-defined radius around the received location. The verification module is configured to cooperate with the short range communication module to receive the scanning information and extract location of scanning the e-seal from the received scanning information. The verification module is further configured to cooperate with the geo-fencing module to verify the location of scanning sealing location of the container. The verification module is configured to generate an alert event when the extracted scanning location is not within the pre-defined radius.
In an embodiment, the e-seal verification tool includes a warning generator module configured to cooperate with the location verification module to receive the alert event, and further configured to generate an alert message and display the alert message, the scanning location and the virtual fence on the display screen of the user device upon receiving the alert event. In an embodiment, the warning generator module is configured to facilitate the first registered user to provide an input to either proceed with data uploading or abort sealing of the container, upon receiving the alert event. The warning generator module is further configured to generate corresponding data uploading signal or abort signal based on the received input. In another embodiment, the warning generator module is configured to generate a blocking signal to block the first registered user from uploading data to the database server upon receiving the alert event.
In an embodiment, the tamper checking module is configured to cooperate with the validation module to activate the tamper loop upon successful validation of the e-seal. In another embodiment, the tamper checking module includes a processing module and a data uploading module. The processing module is configured to cooperate with the validation module, the location verification module, and the warning generator module to detect tamper status of the e-seal when either (i) the e-seal is successfully validated and the scanning location is within the pre-defined radius, or (ii) the e-seal is successfully validated and the data uploading signal is received from the warning generator module. The data uploading module is configured to cooperate with the processing module to populate the scanning information on a display screen of the user device and facilitate the first registered user to enter shipping information related to the container within the pre-defined time frame if the detected tamper status corresponds to sealed. In an embodiment, the data uploading module is further configured to transmit the scanning information and the received shipping information to the database server upon subsequent communication between the e-seal and the e-seal verification tool using the short range communication module. In another embodiment, the data uploading module is configured to transmit the scanning information and the received shipping information to the database server when the first registered user submits the entered shipping information within the pre-determined time frame.
In an embodiment, the e-seal verification tool is configured to transmit the alert event to the database server for storing. The database server is configured to send the scanning information, the shipping information, and the alert event to a scanning device associated with a second registered user, when the second registered user scans the e-seal using the scanning device. The scanning device is configured to display the alert message, the scanning location, and the virtual fence on its display screen upon receiving the alert event.
In an embodiment, the e-seal is a passive tamper indicating electronic seal. In another embodiment, the e-seal is a passive electronic seal that cannot be scanned if tampered with, thus indicating a tamper attempt. In yet another embodiment, the e-seal is an active tamper indicating electronic seal. In still another embodiment, the e-seal is an active tamper indicating electronic seal having a counter, the counter being configured to record the number of times the tamper loop is opened and closed.
Advantageously, the scanning device is configured to facilitate the second registered user to generate a request for uploading picture of the locked e-seal, and is further configured to send the generated request to the user device of associated first registered user via the database server.
The present disclosure also envisages a method for verifying the location of sealing a container. The method comprises:
1. providing, an electronic seal (e-seal) to a first registered user for sealing the container, the e-seal associated with a unique identification number (UID);
2. providing, an e-seal verification tool, installable in a user device associated with the first registered user;
3. storing, in a database server (i) a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of the first registered users and (ii) a second look up take having a list of UID's associated with e-seals and IEC code of a first registered user corresponding to each of the UID’s;
4. receiving, by a short range communication module of the e-seal verification tool, a scanning information from the e-seal;
5. validating, by a validation module of the e-seal verification tool, the e-seal based on the scanning information;
6. verifying, by a location verification module of the e-seal verification tool, the location of sealing the container;
7. facilitating, by the tamper checking module, entry of shipping information related to the container, within a pre-defined time frame; and
8. transmitting, by the tamper checking module, the scanning information and the shipping information to the database server.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING
A system for verifying the location of sealing a container of the present disclosure will now be described with the help of the accompanying drawing, in which:
Figure 1 illustrates a block diagram of a system for verifying the location of sealing a container of the present disclosure;
Figure 2 illustrates a block diagram of an electronic seal verification tool of the system of Figure 1;
Figure 3 illustrates a flow diagram depicting steps involved in a method for verifying the location of sealing a shipping container;
Figure 4 illustrates a flow diagram depicting steps involved in registration of a user in accordance with the method of Figure 3; and
Figure 5 illustrates a flow diagram depicting steps involved in sealing and uploading information in accordance with the method of Figure 3.
LIST OF REFERENCE NUMERALS
100 – System
102 – Container
104 – Electronic Seal
106 – Database Server
108 – User device
110 – E-seal verification tool
112 – Scanning device
202 – Short range communication module
204 – Validation module
206 – Tamper checking module
208 – Location verification module
210 – Geo-fencing module
212 – Extractor module
214 – First crawler and extractor module
216 – Second crawler and extractor module
218 – Comparator module
220 – Processing module
222 – Data uploading module
224 – Warning generator module
226 – Verification module
DETAILED DESCRIPTION
Embodiments, of the present disclosure, will now be described with reference to the accompanying drawing.
Embodiments are provided so as to thoroughly and fully convey the scope of the present disclosure to the person skilled in the art. Numerous details, are set forth, relating to specific components, and methods, to provide a complete understanding of embodiments of the present disclosure. It will be apparent to the person skilled in the art that the details provided in the embodiments should not be construed to limit the scope of the present disclosure. In some embodiments, well-known processes, well-known apparatus structures, and well-known techniques are not described in detail.
The terminology used, in the present disclosure, is only for the purpose of explaining a particular embodiment and such terminology shall not be considered to limit the scope of the present disclosure. As used in the present disclosure, the forms "a,” "an," and "the" may be intended to include the plural forms as well, unless the context clearly suggests otherwise. The terms "comprises," "comprising," “including,” and “having,” are open ended transitional phrases and therefore specify the presence of stated features, integers, steps, operations, elements, modules, units and/or components, but do not forbid the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The particular order of steps disclosed in the method and process of the present disclosure is not to be construed as necessarily requiring their performance as described or illustrated. It is also to be understood that additional or alternative steps may be employed.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed elements.
The terms first, second, third, etc., should not be construed to limit the scope of the present disclosure as the aforementioned terms may be only used to distinguish one element, component, or section from another element, component, or section. Terms such as first, second, third etc., when used herein do not imply a specific sequence or order unless clearly suggested by the present disclosure.
A system for verifying the location of sealing a container (hereinafter referred as “system 100”), of the present disclosure, is now being described with reference to Figure 1 through Figure 5. The system 100 automatically detects the sealing location of a shipping container 102 and checks whether the shipping container 102 was sealed within the factory premises or not.
Referring to Figure 1, the system 100 comprises an electronic seal (e-seal) 104, a database server 106, and an e-seal verification tool 110. An electronic seal (e-seal) 104 is assigned to a first registered user for sealing the container 102. Typically, the e-seals 104 are assigned to registered users at the time of purchase. Each e-seal 104 is associated with a unique identification number (UID). The database server 106 is configured to store (i) a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of the first registered users and (ii) a second look up take having a list of UID's associated with e-seals 104 and IEC code of a first registered user corresponding to each of the UID’s. The pre-set location details include coordinates of the factory location or planned container sealing location of the first registered user. The UID of an e-seal 104 and IEC code of the first registered user associated with the e-seal 104 is registered into the database server 106 in the form of the second lookup table at the time of assignment/purchase of the e-seal 104. In an embodiment, the database server 106 may comprise a memory for storing the first and second lookup tables. The memory may be, for example, a random-access memory (RAM), a memory buffer, a hard drive, a database, an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), a read only memory (ROM), a flash memory, a hard disk, a floppy disk, cloud storage, and/or so forth.
The e-seal verification tool 110 is installable in a user device 108 associated with the first registered user. Referring to Figure 2, the e-seal verification tool 110 comprises a short range communication module 202, a validation module 204, a location verification module 208, and a tamper checking module 206. The short range communication module 202 communicates with the e-seal 104 to receive a scanning information. The scanning information includes UID associated with the e-seal 104 and location, date and time of scanning the e-seal 104. The validation module 204 validates the e-seal 104 based on the received scanning information. The location verification module 208 verifies the location of sealing the container 102. The tamper checking module 206 facilitates entry of shipping information related to the container 102 within a pre-defined time frame and subsequently transmits the scanning information and the shipping information to the database server 106 upon successful validation and location verification. The shipping information includes, but is not limited to, IEC code of the first registered user, shipping bill number, shipping date, container number, destination customs station for export, container number, and trailer truck number.
In an embodiment, the e-seal verification tool 110 includes a registration module. The registration module is configured to receive identity details and IEC code of the first registered users and factory location/planned container sealing location. The e-seal verification tool 110 is configured to register the received identity details, IEC code, and the planned container sealing location in the form of the first lookup table in the database server 106. In an embodiment, the registration module receives the planned location in the form of coordinates manually entered by the first registered user. In another embodiment, the registration module invokes a mapping module (not shown in figures) for displaying a map and facilitating the first registered user to mark the location on the displayed map.
Advantageously, the e-seal verification tool 110 is implemented using one or more processor(s). The processor may be a general-purpose processor, a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), and/or the like.
In an embodiment, the e-seal 104 includes a tamper loop for facilitating detection of tampering. The e-seal 104 may be a bolt seal including a bolt member having a half portion of the tamper loop and a receiving member having the other half portion of the tamper loop. The bolt seal can be configured to be locked when the bolt member is fitted inside the receiving member. The tamper loop is placed such that it closes when the e-seal 104 is locked. The e-seal verification tool 110 receives the scanning information from the e-seal 104 only when the tamper loop is closed.
In another embodiment, the e-seal 104 is a cable seal including a cable and a receiving member. The cable seal is configured to be locked when the cable is fitted inside the receiving member. The e-seal verification tool 110 receives the scanning information from the e-seal 104 only when the e-seal 104 is locked.
In an embodiment, the validation module 204 includes an extractor module 212, a first crawler and extractor module 214, a second crawler and extractor module 216, a comparator module 218. The validation module 204 cooperates with the short range communication module 202 to receive the scanning information. The extractor module 212 is configured to extract UID code of the scanned e-seal 104 from the received scanning information. The first crawler and extractor module 214 is configured to cooperate with the database server 106 to crawl through the first lookup table to extract IEC code of first registered user who is logged in to the e-seal verification tool 110. The second crawler and extractor module 216 is configured to cooperate the extractor module 212 to receive the extracted UID code, and is further configured to cooperate with the database server 106 to crawl through the second lookup table to extract IEC code of first registered user corresponding to the received UID code. The comparator module 218 is configured to cooperate with the first crawler and extractor module 214 and the second crawler and extractor module 216 to compare IEC code obtained from the first lookup table with the IEC code obtained from the second lookup table to validate the e-seal 104.
In an embodiment, the location verification module 208 comprises a geo-fencing module 210 and a verification module 226. The geo-fencing module 210 is configured to cooperate with the database server 106 to receive the pre-set location details pertaining to the first registered user, and is further configured to generate a virtual fence of a pre-defined radius around the received location. The verification module 226 is configured to cooperate with the short range communication module 202 to receive the scanning information and extract location of scanning the e-seal 104 from the received scanning information. The verification module 226 is further configured to cooperate with the geo-fencing module 210 to verify the sealing location of the container 102, the verification module 226 is configured to generate an alert event when the extracted scanning location is not within the pre-defined radius.
In an embodiment, the e-seal verification tool 110 includes a warning generator module 224 configured to cooperate with the location verification module 208 to receive the alert event, and is further configured to generate an alert message and display the alert message saying the scanning location is not within the pre-defined fence on the user device 108. The warning generator module 224 may be further configured to display the scanning location and the virtual fence on the display screen of the user device 108 upon receiving the alert event. In an embodiment, the warning generator module 224 is configured to facilitate the first registered user to provide an input to either proceed with data uploading or abort sealing of the container 102, upon receiving the alert event. The warning generator module 224 is further configured to generate corresponding data uploading signal or abort signal based on the received input. In another embodiment, the warning generator module is configured to generate a blocking signal to block the first registered user from uploading data to the database server upon receiving the alert event.
In an embodiment, the tamper checking module 206 is configured to cooperate with the validation module 204 to activate the tamper loop upon successful validation of the e-seal 104. In another embodiment, the tamper checking module 206 includes a processing module 220 and a data uploading module 222. The processing module 220 is configured to cooperate with the validation module 204, the location verification module 208, and the warning generator module 224. The processing module 220 is further configured to detect tamper status of the e-seal 104 when either (i) the e-seal 104 is successfully validated and the scanning location is within the pre-defined radius, or (ii) the e-seal 104 is successfully validated and the data uploading signal is received from the warning generator module 224. For example, if the count value stored in the memory of the e-seal 104 is zero or is below a pre-determined threshold, the tamper status is “sealed”, otherwise the tamper status is “unsealed”. The data uploading module 222 is configured to cooperate with the processing module 220 to populate the scanning information on a display screen of the user device 108 and facilitate the first registered user to enter shipping information related to the container 102 within the pre-defined time frame if the detected tamper status corresponds to “sealed”. In an embodiment, the data uploading module 222 populates a data uploading page with pre-determined fields to facilitate the first registered user to enter values associated with shipping information against each of the displayed fields. In an embodiment, the data uploading module 222 is further configured to transmit the received scanning information and the received shipping information to the database server 106 upon subsequent communication between the e-seal 104 and the e-seal verification tool 110 using the short range communication module 202. Thus, the shipping information and the scanning information are uploaded into the database server 106 only after the first registered user scans the e-seal 104 for the second time. This ensures that the data uploading page is not pre-loaded on the user device 108 and filled in later by the first registered user. In another embodiment, the data uploading module 222 is configured to transmit the scanning information and the received shipping information to the database server 106 when the first registered user submits the entered shipping information within the pre-determined time frame.
In an embodiment, the data uploading module 222 is configured to transmit the received scanning information only within a fixed time limit of scanning the seal successfully in a locked state for the first time. If the data is not submitted by the user within this stipulated time, the window closes and the seal has to be scanned again to open the window again for the fixed time limit.
The e-seal verification tool 110 is configured to transmit the alert event to the database server 106 for storing. The database server 106 is configured to send the scanning information, the shipping information, and the alert event to a scanning device 112 associated with a second registered user, when the second registered user scans the e-seal 104 using the scanning device 112. The scanning device 112 is configured to display the alert message, the scanning location and the virtual fence on its display screen upon receiving the alert event. The second registered user can thus determine if the scanning location is out of the factory premises. In an embodiment, the scanning device 112 is a radio frequency identification (RFID) reader.
In an embodiment, the e-seal 104 is a passive tamper indicating electronic seal. In another embodiment, the e-seal 104 is a passive electronic seal that cannot be scanned if tampered with, thus indicating a tamper attempt. In yet another embodiment, the e-seal 104 is an active tamper indicating electronic seal. In still another embodiment, the e-seal 104 is an active tamper indicating electronic seal having a counter, the counter being configured to record the number of times the tamper loop is opened and closed.
In an embodiment, the user device 108 is an NFC enabled device such as an NFC enabled mobile phone. Accordingly, the short range communication module 202 may be selected from a group consisting of an NFC module, a Bluetooth module, a Zigbee module, and a Z-Wave module. In an alternate embodiment, the user device 108 is an RFID reader and the e-seal 104 is an RFID e-seal with or without a tamper loop. The e-seal 104 does not read/work unless it is locked. If the e-seal 104 is tampered, it stops reading/working. In this case, the user device 108 does not need to have the short range communication module 202 such as NFC module. The first registered user i.e. the exporter can buy an RFID reader and read the e-seal 104 within the factory premises after locking it. There is no need for tamper loop activation or reading thereof.
In an embodiment, the scanning device 112 is configured to facilitate the second registered user to generate a request for uploading picture of the locked e-seal 104, and is further configured to send the generated request to the user device 108 of associated first registered user via the database server 106. The e-seal verification tool 110 is configured to receive the generated request, and is further configured invoke a camera module to facilitate the first registered user to upload the photo.
The present disclosure also discloses a method 300 for verifying the location of sealing a container 102.
As illustrated in Figure 3, the method 300 includes one or more steps illustrating the process of verifying the location of sealing a container 102.
At step 302, the method 300 includes providing, an electronic seal (e-seal) 104 to a first registered user for sealing the container 102. The e-seal 104 is associated with a unique identification number (UID).
At step 304, the method 300 includes providing, an e-seal verification tool 110. The e-seal verification tool 110 is installable in a user device 108 associated with the first registered user.
At step 306, the method 300 includes storing, in a database server 106 a first lookup table having a list of first registered users, and an IEC code and pre-set location details pertaining to each of the first registered users and a second look up table having a list of UID's associated with e-seals 104 and IEC code of a first registered user corresponding to each of the UID’s. The IEC codes of first registered users are registered against UID of e-seals 104 in the second lookup table at the time of purchase/assigning of the e-seals 104. The details of first registered users (names, IEC code, etc.) and the pre-set location details are stored in the form of first lookup table when the first registered users register or create an account on the e-seal verification tool 110. The pre-set location details correspond to the location coordinates of factory premises where sealing of containers 102 is to be done.
At step 308, the method 300 includes receiving, by a short range communication module 202 of the e-seal verification tool 110, a scanning information from the e-seal. The short range communication module 202 may be an NFC module, a Bluetooth module, a Zigbee module, an RFID module, or any combinations of these modules.
At step 310, the method 300 includes validating, by a validation module 204 of the e-seal verification tool 110, the e-seal 104 based on the scanning information. The step of validating the e-seal 104 based on the scanning information includes (i) extracting, by an extractor module 212, UID code of the scanned e-seal 104 from the received scanning information, (ii) extracting, by a first crawler and extractor module (214), IEC code of the first registered user using the e-seal verification tool 110, from the first lookup table by crawling through the first lookup table, (iii) receiving, by a second crawler and extractor module 216, the extracted UID code from the extractor module 212, (iv) extracting, by the second crawler and extractor module 216, IEC code of the first registered user corresponding to the received UID from the second lookup table by crawling through the second lookup table, and (v) comparing, by a comparator module 218, IEC code obtained from the first lookup table with the IEC code obtained from the second lookup table to validate the e-seal 104.
At step 312, the method 300 includes verifying, by a location verification module 208 of the e-seal verification tool 110, the location of sealing the container 102. The step of verifying the location of sealing the container 102 further includes (i) receiving, by a geo-fencing module 210 of the location verification module 208, the pre-set location details pertaining to the first registered user from the database server 106, (ii) generating, by the geo-fencing module 210, a virtual fence of a pre-defined radius around the received location, (iii) receiving, by a verification module 226 of the location verification module 208, the scanning information from the short range communication module 202, (iv) extracting, by the verification module 226, location of scanning the e-seal 104 from the received scanning information, and generating, by the location verification module 208, an alert event when the extracted scanning location is not within the pre-defined radius. Referring to an embodiment of Figure 4, the e-seal verification tool 110 may be configured to generate the virtual fence (step 404) upon registering the first registered user by receiving IEC code, identity information and pre-set location details pertaining to the first registered user (step 402).
At step 314, the method 300 includes facilitating, by the tamper checking module 206, entry of shipping information related to the container 102, within a pre-defined time frame.
At step 316, the method 300 includes transmitting, by the tamper checking module 206, the scanning information and the shipping information to the database server 106.
In an exemplary embodiment, referring to Figure 5, a first registered user locks a container 102 using an e-seal 104 and then scans the e-seal 104 for its activation. Upon scanning, the e-seal verification tool 110 receives a scanning information which includes date, time, and location of scanning and UID of the scanned e-seal 104 (Step 502). The e-seal verification tool 110 receives the IEC code of the first registered user associated with the UID of scanned e-seal 104 and compares it with the IEC code of logged in first registered user (Steps 504 and 506). If both the IEC codes match, the e-seal verification tool 110 checks if the scanning location of the e-seal 104 is within the factory premises (Step 514). If the scanning location is found to be within the factory premises, the e-seal verification tool 110 checks the tamper status of the e-seal 104 (Step 512). If the tamper status is unsealed, the e-seal verification tool 110 opens a window of a pre-defined time frame and allows the first registered user to enter shipping information related to the container 102 within the pre-defined time frame (Step 508). The shipping information entered by the first registered user is uploaded to the database server 106 along with the scanning information only when the e-seal 104 is scanned again or the shipping information is submitted by the user within the pre-defined time frame. This ensures that the shipping information uploading page is not pre-loaded and filled in later by the first registered user. If the information is successfully uploaded, the seal installation is successful (Steps 510 and 516). If the scanning location of the e-seal 104 is outside the factory premises, the e-seal verification tool 110 generates an alert message on the display screen of the user device 108 showing the actual scanning location and a virtual fence indicating factory premises (Step 520). If the first registered user still wants to proceed with seal installation (Step 522), this alert message is passed on to the second registered user (for e.g. customs officer) via the database server 106, when the second registered user scans the e-seal 104 at a destination point (e.g. port). Thus, the system 100 and method 300 for verifying the location of sealing containers 102 is reliable and can easily detect scanning location of an e-seal 104. By detecting scanning location of the e-seal 104, the system 100 ensures that the container 102 is sealed within the factory premises. This improves security of cargo during transit and does not allow exporters to defraud customs authorities by sealing the container 102 just before the port gate.
The foregoing description of the embodiments has been provided for purposes of illustration and not intended to limit the scope of the present disclosure. Individual components of a particular embodiment are generally not limited to that particular embodiment, but, are interchangeable. Such variations are not to be regarded as a departure from the present disclosure, and all such modifications are considered to be within the scope of the present disclosure.
TECHNICAL ADVANCEMENTS
The present disclosure described herein above has several technical advantages including, but not limited to, the realization of a system for verifying the location of sealing a container that:
• detects location of sealing of a container;
• generates an alert message if the container is not sealed within the factory premises;
• is reliable;
• is easy to use;
• has simple design;
• allows a customer or a customs officer to demand a photograph of a locked e-seal before the commencement of transportation;
• ensures that shipping information is uploaded within the factory premises;
• allows an exporter to verify the working status of electronic seal before dispatching the container;
• makes it mandatory for an exporter to scan the electronic seal after entering shipping information to ensure that the data uploading page is not preloaded and filled in later;
• is secure; and
• is compatible with existing container security systems.
The embodiments herein and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The foregoing description of the specific embodiments so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
The use of the expression “at least” or “at least one” suggests the use of one or more elements or ingredients or quantities, as the use may be in the embodiment of the disclosure to achieve one or more of the desired objects or results.
While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.

Documents

Application Documents

# Name Date
1 201921036588-AbandonedLetter.pdf 2024-01-15
1 201921036588-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2019(online)].pdf 2019-09-11
2 201921036588-PROOF OF RIGHT [11-09-2019(online)].pdf 2019-09-11
2 201921036588-Response to office action [01-08-2022(online)].pdf 2022-08-01
3 201921036588-POWER OF AUTHORITY [11-09-2019(online)].pdf 2019-09-11
3 201921036588-FER.pdf 2021-12-23
4 201921036588-FORM-26 [07-06-2021(online)].pdf 2021-06-07
4 201921036588-FORM FOR STARTUP [11-09-2019(online)].pdf 2019-09-11
5 201921036588-FORM FOR SMALL ENTITY(FORM-28) [11-09-2019(online)].pdf 2019-09-11
5 201921036588-FORM 18 [10-12-2020(online)].pdf 2020-12-10
6 201921036588-ORIGINAL UR 6(1A) FORM 1-131119.pdf 2019-11-15
6 201921036588-FORM 1 [11-09-2019(online)].pdf 2019-09-11
7 201921036588-Proof of Right (MANDATORY) [12-11-2019(online)].pdf 2019-11-12
7 201921036588-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-09-2019(online)].pdf 2019-09-11
8 Abstract1.jpg 2019-09-23
8 201921036588-EVIDENCE FOR REGISTRATION UNDER SSI [11-09-2019(online)].pdf 2019-09-11
9 201921036588-COMPLETE SPECIFICATION [11-09-2019(online)].pdf 2019-09-11
9 201921036588-DRAWINGS [11-09-2019(online)].pdf 2019-09-11
10 201921036588-DECLARATION OF INVENTORSHIP (FORM 5) [11-09-2019(online)].pdf 2019-09-11
11 201921036588-COMPLETE SPECIFICATION [11-09-2019(online)].pdf 2019-09-11
11 201921036588-DRAWINGS [11-09-2019(online)].pdf 2019-09-11
12 201921036588-EVIDENCE FOR REGISTRATION UNDER SSI [11-09-2019(online)].pdf 2019-09-11
12 Abstract1.jpg 2019-09-23
13 201921036588-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-09-2019(online)].pdf 2019-09-11
13 201921036588-Proof of Right (MANDATORY) [12-11-2019(online)].pdf 2019-11-12
14 201921036588-FORM 1 [11-09-2019(online)].pdf 2019-09-11
14 201921036588-ORIGINAL UR 6(1A) FORM 1-131119.pdf 2019-11-15
15 201921036588-FORM 18 [10-12-2020(online)].pdf 2020-12-10
15 201921036588-FORM FOR SMALL ENTITY(FORM-28) [11-09-2019(online)].pdf 2019-09-11
16 201921036588-FORM FOR STARTUP [11-09-2019(online)].pdf 2019-09-11
16 201921036588-FORM-26 [07-06-2021(online)].pdf 2021-06-07
17 201921036588-FER.pdf 2021-12-23
17 201921036588-POWER OF AUTHORITY [11-09-2019(online)].pdf 2019-09-11
18 201921036588-PROOF OF RIGHT [11-09-2019(online)].pdf 2019-09-11
18 201921036588-Response to office action [01-08-2022(online)].pdf 2022-08-01
19 201921036588-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2019(online)].pdf 2019-09-11
19 201921036588-AbandonedLetter.pdf 2024-01-15

Search Strategy

1 ExtensiveSearchhasbeenconductedE_23-12-2021.pdf