Advanced VMS and Analytics

Improving blockchain workflows for the shipping industry

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.

To help alleviate these issues, new VMS solutions with intelligent analytics specifically designed for the shipping and logistics industries have been developed to provide invaluable data to fuel the relatively new blockchain trend. Blockchain is essentially an information filing system that stores encrypted data.

Wikipedia defines a blockchain as a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, a blockchain is resistant to modification of data. It is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.”

A blockchain is managed by a peer-to-peer network collectively, and the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, requiring consensus of the network majority. Although blockchain records are not unalterable, blockchains may be considered secure by design.

Given the nature of its design, blockchain enables the creation of tamper-proof, highly robust databases which can be read and updated only by those with permission. This provides the shipping industry with a very precise, secure and comprehensive means of tracking and managing shipments from their point of origination through delivery to a final destination.

Intelligent Security Systems (ISS) is developing advanced VMS and analytics solutions specifically designed to supplement blockchain technology for the shipping and logistics industries.

The benefits include the accurate recognition of shipping container ISO codes to verify ownership, points of origin, intended destination and contents; as well as visual inspection of shipping containers to monitor for damage. With the ability to recognize license plate numbers and characters on shipping containers as well as train cars, analytics can accurately allow this data to be captured and merged together to ensure the selected transportation mode can be easily tracked and located in the event of a missing container.

It is important to ensure that when handling sensitive information or data there are robust cybersecurity measures being used. Logistic managers or custom officials can use a variety of technologies to ensure secure data processing:

  • Secure HTTPS connection to all cameras with tunneling both video and audio
  • Digital signature of all exported files using digital certificates to verify the authenticity and source of exported files
  • Encryption of all data stored on a secure server’s hard drives

Advanced visual inspection and analytics solutions help to eliminate manual errors through seamless integration with Terminal Operation Systems, facilitating data flow processing for seaport operations with blockchain backbone. They are also ideally suited for implementation at other critical shipment points including: weigh stations to link the weight of the cargo, streamlining gate operations; border and customs control points to provide visual inspection and automation of container processing, saving time and resources; and for general loss prevention along shipment routes to detect container tampering and prevent theft, helping to document and limit shipping companies’ liability claims.

ISS developed its innovative SecurOS Cargo Terminal Solution to enhance security at critical shipping locations and supplement data collection by providing remote visual inspection of cargo containers and control of vehicles which carry containers. The solution is built around a highly specialized video analytics module designed to recognize ISO codes on cargo containers, and is capable of capturing codes printed horizontally or vertically from above, back and either side of a container to take advantage of existing surveillance and IP infrastructure.

To satisfy the demands of the shipping and logistics community, the cargo container number recognition functionality incorporates a host of powerful features. One of the most utilitarian features is the ability to integrate with existing logistics and terminal management systems to automate gate operations and truck, train and crane container handling, which further improves workflows and enhances personnel efficiencies. It also supports a number of different recognition environments where trucks, cranes and forklifts are typically deployed, as well as hand-held devices for staff working in these areas. The system can read ISO codes, in addition to other special coding methods such as ILU, Kemler and ADR, from different angles. The multiple video sources are then coordinated internally in the system to ensure high levels of accuracy. Video from these cameras can also be exported for documentation and forensic analysis.

Container number recognition solutions employing advanced analytics will continue to grow in intelligence with emerging advancements in neural network technology, which provide the framework for different machine learning algorithms to work together and process complex data inputs. For example, an intelligent container number recognition and management solution can be trained to identify images that contain specific symbols such as company logos by analyzing images from a dataset of examples.

This article originally appeared in the July/August 2019 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3