METHOD FOR PREVENTING THEFT AND FRAUD IN TRANSPORTS
The present invention relates to a method according to the preamble of Claim 1.
It has been observed that theft and fraud in conjunction primarily with the transportation of goods over the boundaries between countries has increased enormously in latter years. In the years from 1993 to 1996 that part of such fraud known to have been perpetuated within the European Union (EU) with respect to unpaid taxes and customs duty corresponds to about 100 billion Swedish kronor.
Such fraud is achieved things, with transport documents carrying forged customs stamps and signatures or by not delivering the transported goods to the intended receiver, or by illegally reloading such goods, or through the medium of corrupt officials, among other things.
Present systems require transport vehicles to be accompanied by a document that declares the goods carried, with certain statutory information. At present, this document is comprised of a set of forms of which various copies shall be used in accordance with fixed rules. One copy is kept, e.g., by the departure customs authority. Certain documents are stamped by the custom authorities when crossing transit borders, etc. The so-called "copy number five" is used to terminate transit transportation, whereby the receiving custom authorities note that the transport has arrived and stamps and signs said copy number five and returns said copy to the departure customs. Transportation is considered to have been terminated when this copy is received and registered by the departure
customs . The problem is that the receiving custom authorities have six months in which to send back the copy and the departure custom authorities have a further few months in which to trace an unsigned transportation slip. This means in practice that the time lapse up to when it is established that transported goods have not arrived at the intended destination renders it impossible to trace the persons or person responsible for the fraud.
In order to expedite the aforesaid procedure, the European custom authorities have introduced a project which incorporates co-operation between the customhouses with the aid of a computer network, so that information concerning the transportation of goods can be sent via electronic mail, so- called "early warning system" .
The object of the present invention is to provide a solution to the aforedescribed problems and to this end provides a method which renders the transport documents forgery-proof, wherewith an alarm is given automatically when a transport vehicle deviates from a given route plan in time or space to an extent which is in excess of an accepted margin, and wherein said alarm function cannot be manipulated and will therefore function continuously without requiring a person to initiate any special control measure.
The method is described below with reference to Figures 1-4 of the accompanying drawing.
The transporter (the principle agent) , (Fig. 1) , enters the transport declaration into his/her computer (a) and reads said declaration onto a passive or active information
carrier, e.g. an optical card, a smart card or the like in continuous text designated "the card" (c) in the following, with the aid of a reader/writer (b) . (It is unnecessary to provide more copies, 1-4-5-7. Copies can be taken subsequently, as they are required) .
The transporter saves a copy in his/her computer and/or on paper.
Data relating to guarantees may also be read into the card (corresponding for instance to a guarantee slip) .
The card is inserted into a card reader (b) mounted in the transport vehicle (Fig. 2) and accompanies the vehicle on its journey.
The driver of the transporting vehicle reports to the departure customs authority (Fig. 3) and the card (c) is inserted into the reader/writer (b) of the customs' computer. The declaration is recorded automatically in the computer network (a) of the customs authority. A route is proposed by the haulage contractor concerned and accepted by the customs authority, which also places margins for permitted deviations from the route plan. All data is read into the card, together with the identification of the issuing custom authority.
The departure customhouse retains a copy in its computer and/or on paper, and will able to send the information to other customs authorities in due course when, for instance, the European customs computer network has come into use.
The card is inserted into the vehicle-mounted card reader and accompanies the vehicle on its journey. The card can only be removed from the reader at those places specified in the route plan, these places being monitored by a position disclosing system, for instance a satellite navigator (s) . Removal of the card at any other position or place will automatically result in an alarm.
When the transporting vehicle arrives at a customhouse (Fig. 4) on a transit border, the card (c) is removed from the vehicle-mounted card reader and inserted into the reader/writer (b) of the customhouse computer. The information is read-off automatically and an information check is carried out automatically, via the network. Deviations revealed by this comparison result in an alarm. The identity of the customhouse concerned is read into the card and the card replaced in the vehicle-mounted reader and continues to accompany the transporting vehicle.
A computer (Fig. 2a) installed in the vehicle can be caused to read the route plan stored in the card at random time intervals during the entire journey. These readings give the position of the vehicle according to the accepted route plan. This control position is compared with the true-position of the vehicle given by the position disclosing system (s) . Any deviation from the accepted margins will automatically result in an alarm being sent to an alarm centre, for instance. The haulage contractor is given a specific time in which to explain the reason for any deviation to the customs authority before an investigation is set in motion.
5
Supervision that the transport document not has been changed can also be executed during the journey. The whole document or parts thereof is mailed to the computer in the vehicle. The computer reads the original document from the card and compares the information. Every deviation indicates that non- authorized changes have been done in the computer network, and an alarm will be sent to e.g. an alarm centre.
Different haulage contractors can have different types of identifications on their cards. So called "approved haulage contractors" with a good reputation can obtain special VIP- cards that admit passage through an unmanned border control station. The card is then inserted by the driver into a reader/writer. A comparison is made automatically between information on the card and information stored in the network. If no deviations are found, the boom, or gate, at the border is raised/opened so that the vehicle can pass through. It is noted that the transporting vehicle has passed and that the card has been re-inserted into the card reader in the vehicle subsequent to having read the identity of the customs station into the card.
When the transporting vehicle arrives at the destination customs, the card is inserted into the reader/writer of the customs computer. The information carried by the card is read and compared with relevant information stored in the computer network. If everything is in order, transportation is terminated when the receiving customs has signed with its identity.
The cards are distributed to haulage contractors by an authorised company under the control of the authorities . Each
6 card is labelled or marked and is provided with a serial number in a manner which can only be achieved in a factory, and which cannot be influenced thereafter by a card reader/writer, for instance. Each card is unique in its way and cannot be replaced with a forgery.
The inventive method, which is preferably based -on identification with the aid of a position disclosing system, enables the inclusion of limitations which will only permit the card to be removed from the vehicle at accepted route positions, for instance at custom-houses stations.
The absence of any message from the vehicle-carried computer over a given time period with respect to the results of comparisons between the true-positions of the vehicle and said control-positions will preferably give cause an alarm to be sent to an alarm centre, for instance.
It will be understood that the inventive method is not limited to transport vehicles that travel between different countries for instance, or solely to long distance transport vehicles, and that the method may, of course, be applied with transport vehicles in general .
It will also be understood that the information carrier is not restricted to optical cards or the like, and that other forgery-proof information carriers can, or course, also be used in the system together with the present invention.
The invention is therefore not restricted to the described and illustrated embodiment, since changes and modifications can be made within the scope of the following Claims.