Products in this category
RMSA Remotely Monitored Sealing Array
The ‘Remotely Monitored Sealing Array’ or RMSA system is a versatile, low-power active sealing solution that can support multiple sealing and containment verification disciplines. The RMSA system introduces an electronics platform that is designed to monitor a fiber optic loop seal and to communicate the results to a data consolidation Translator via secure radio frequency communication. At the Translator station, data can be stored locally or retrieve from a remote host computer for analysis.
Based upon the Secure Sensor Platform (SSP) technology developed by Sandia National Laboratories (SNL), the RMSA Fiber Optic Seal is a low-cost active fiber optic loop seal that stores, forwards and communicates data (tamper events, open/close events, seal status) via a customized data communication protocol over a no-license, low power RF link. The data can be stored and transferred remotely and securely (authenticated and encrypted) to the RMSA Translator that collects data from all the RMSA seals in a particular location. The data is made available on the RMSA Translator in an easily accessible format either for data retrieval by an authorized inspector (SD Card) or for remote data communication via Ethernet and VPN link. The data collected by the RMSA seals can then be verified and analyzed on-site or worldwide with the RMSA Review Software. The RMSA Programmer serves as the tool for initial set up of the RMSA seals (loading keys).
The RMSA Fiber Optic Seal is rugged and resistant to tampering. Its electronics are in a tamper indicating anodized aluminum or plastic housing. A pair of tamper switches is used to detect any opening of the Seal housing. The seal can be easily installed and reused indefinitely with no external power required; the Seal housing may be opened to replace the internal batteries. Openings are recorded as tamper events. The Seal is contained in an overlapping two piece case that contains an O-ring Sealing system for environmental protection. The Seal stores data and then forwards this data securely to a local Translator via a low power RF communication. Thousands of normal State of Health messages are stored locally in the Seal in a non-volatile circular memory buffer. This locally stored Seal data can be retrieved by the user when following the Send Message Protocol should RF transmission be interrupted during normal operation. Three versions of the seal are available: Aluminum enclosure with external antenna, plastic enclosure with external antenna and plastic enclosure with internal antenna.
The RMSA Translator is the device used to initialize the Seal. Only one translator is needed per location. The Translator collects, stores, and then forwards data from the Seals, local or remote. All data is encrypted by the Seals before transmission, though some portions of the data frame such as Seal ID is sent in the clear (no encryption). An authentication signature is part of the overall Seal message. The Translator sends on the encrypted Seal messages as well as non-encrypted information regarding the Seal address, the number of bytes in the encrypted messages, received signal strength as seen by the Translator, and other information.
The RMSA Review Software Application includes the ability to decrypt and authenticate Seal data and facilitates review of data both in a batch processing mode and in a live update mode. Review Software can be run on any PC so that data can verified and analyzed at the installation site or remotely. A TCP/IP (Ethernet) connection between the Translator and the Remote Review Application host facilitates the transfer of data from the Translator to the Review Software Application. In addition to remote review, this network connection is used to allow the inspector to interrogate specific Seals for state-of-health or to request re-send of a specific Seal message.
The RMSA Programmer is used to program the microcontroller code and Seal personality information that is unique to each Seal. It also provides the interface between an external USB device, such as a PC, and the UART on the Seal, for personality programming and debugging.
Modes of Operation
The RMSA system is capable of supporting three configuration modes of operation: standalone mode, local host supported mode and remote monitoring mode. In the standalone configuration, the system hardware may consist of many active RMSA Fiber Optic Seals and one RMSA Translator, which sits unmonitored for long periods of time. The local host supported configuration is via an Ethernet interface connected directly to a local host computer. The remote monitoring mode is similar to the local host mode but is via the internet to allow monitoring by a host computer of the RMSA system over the internet.
- Portable, active and reusable sealing system
- Monitors and records tamper events, inspection data and seal status
- Provides requested or periodic State of Health updates
- Provides intrinsic tamper indication
- No external power required, battery operated
- 4+ years surveillance between battery replacement
- Secures Seal data with encryption and authentication techniques
- Communicates all relevant data to a data Translator station via RF communication link
- Requires no license for its low power 900 MHz ISM band RF communication
- Many seals (hundreds) can be linked to a single translator station
- Allows remote transmission of Seals and Seals events for off-site review
- Efficiency – Less time needed to inspect and interrogate seal in the field. No more need to visit and check each individual seal.
- Security/Reliability – Fulfill IAEA Safeguards standards to provide a platform with authenticated and encrypted communication channels, tamper indications and sealing capabilities.
- Versatile – Easily installed and maintained with two types of seal antennas available, large (hundreds) number of seals deployed at one location and manageable remotely. No special tooling to terminate sealing cable required.
Electronic Optical Sealing System (EOSS)
The Electronic Optical Sealing System (EOSS) is a re-usable mechanical locking seal for long-term surveillance. The EOSS seal employs an active fiber optic light source and light sensor to record any open/close events. Source and sensor are connected outside the seal housing through a fiber optic cable, which takes the place of the sealing wire used in a typical non-electronic seal. The EOSS seal does not prevent opening and closing; instead, it monitors the FO cable and records any attempt to open, cut, or manipulate the FO cable. In addition, the EOSS seal includes built-in provisions to report any attempt to tamper with the seal body (e.g. trying to drill a hole in the seal body to gain unauthorized access to the seal data or to switch off essential functions). Any attempt to open the seal's case is stored in the seal's memory.
Sealing is achieved by sending light pulses through the fiber optic cable and monitoring the received signal. If the cable is closed, the light pulses are immediately received. If no pulse is received, the seal is considered opened. The seal timestamps all open/close events and stores them in an event log, which is also capable of storing other information including operator activities or state of health information.
The EOSS seal delivers three types of information to the seal reader: status data, event log data, and inspection data. The status data includes information on the current state of the seal such as the state of the seal wire, housing switch, battery voltage and remaining capacity, and hardware failures. The event log stores all openings and closings of the seal wire, certain operator activities (i.e. logon/logoff), and security-relevant data such as battery compartment openings and attacks on the seal electronics and cryptosystem. The event log is secured through a message authentication code that makes it possible to verify that each entry is complete and genuine.
While the seal status and event log are read-only, the inspection data can be read and written to. Here, the seal can store additional information such as seal location or cargo contents. Data is automatically stored in an encrypted database file which can be viewed and analyzed off-line (without connecting to the seal). Data can be exported to a customized XML document, which in turn can be distributed and processed across various computer platforms and database systems.
- Portable, active reusable seal
- Logs tamper events, open/close events, inspection data, and seal status
- Tamper proof enclosure
- Encrypted data storage