US20080018496A1 - Asset management device and method using simplex satellite transmitter augmented with local area transceiver - Google Patents

Asset management device and method using simplex satellite transmitter augmented with local area transceiver Download PDF

Info

Publication number
US20080018496A1
US20080018496A1 US11/480,793 US48079306A US2008018496A1 US 20080018496 A1 US20080018496 A1 US 20080018496A1 US 48079306 A US48079306 A US 48079306A US 2008018496 A1 US2008018496 A1 US 2008018496A1
Authority
US
United States
Prior art keywords
asset management
satellite
monitoring device
data
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/480,793
Inventor
Ronnie Tanner
Scott Quillin
Stephen Schamber
Gary Naden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BNP Paribas SA
Noxa Holdings LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/480,793 priority Critical patent/US20080018496A1/en
Publication of US20080018496A1 publication Critical patent/US20080018496A1/en
Assigned to AXONN, L.L.C. reassignment AXONN, L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NADEN, GARY, TANNER, RONNIE, QUILLIN, SCOTT, SCHAMBER, STEPHEN
Assigned to NOXA HOLDINGS LLC reassignment NOXA HOLDINGS LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: AXOM L.L.C.
Assigned to NOXA HOLDINGS LLC reassignment NOXA HOLDINGS LLC CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA SHOULD READ AXONN L.L.C. PREVIOUSLY RECORDED ON REEL 023957 FRAME 0445. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME. Assignors: AXONN L.L.C.
Assigned to SPOT LLC reassignment SPOT LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOXA HOLDINGS LLC (F/K/A AXONN, L.L.C.)
Assigned to GLOBALSTAR, INC. reassignment GLOBALSTAR, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SPOT LLC
Priority to US12/962,848 priority patent/US20110090041A1/en
Assigned to BNP PARIBAS, AS SECURITY AGENT reassignment BNP PARIBAS, AS SECURITY AGENT SECURITY INTEREST Assignors: GLOBALSTAR, INC.
Assigned to BNP PARIBAS, AS SECURITY AGENT reassignment BNP PARIBAS, AS SECURITY AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNMENT DOCUMENT PREVIOUSLY RECORDED AT REEL: 025609 FRAME: 0048. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: GLOBALSTAR, INC.
Assigned to GLOBALSTAR, INC. reassignment GLOBALSTAR, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BNP PARIBAS
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/0009Transmission of position information to remote stations
    • G01S5/0018Transmission from mobile station to base station
    • G01S5/0027Transmission from mobile station to base station of actual mobile position, i.e. position determined on mobile
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/34Power consumption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/20Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles

Definitions

  • the present invention relates to the monitoring of mobile and remote endpoint devices over a very large area of service.
  • Asset management is a critical part of any business entity engaged in the transfer of raw or finished goods. It is important to carefully manage re-supply of raw materials to ensure that the manufacturing or service element of an industry does not halt and to carefully manage transportation of finished goods to minimize inventory held for sale. Those companies that do not optimize manufacturing and materials handling are at a significant disadvantage.
  • the transportation industry suffers from in-transit cargo theft and loss. Loss of cargo happens in a wide variety of ways, from employee/driver theft to the organized capture of entire fleets of trailers and rail-cars.
  • the transportation industry has been struggling to limit loss through radio communication means.
  • the cellular telephone industry has enabled a host of communications products that are making an impact. These products provide many finctions such as standard voice communication, data services, and real-time position reporting and status of vehicle operations such as speed, temperature, or brake conditions.
  • GSM Global System for Mobile Communication
  • Cellular communication asset management systems are inherently two-way in nature and thus require continuous line power for operation. This type of system does not operate effectively on battery power without periodic reconnection to line power such as an automotive power system.
  • Satellite based communication systems mitigate some of the problems associated with cellular asset management devices. For instance, satellite modems are not limited to the service coverage area of cellular telephone corridors. Instead, the area of service is related to the satellite system selected for use and thereby solves the problem of rural and vessel coverage.
  • Satellite asset management systems are preferred if the communication system can provide adequate information bandwidth to support the application requirements.
  • satellite asset management systems are the successors of cellular systems and offer broadband feature sets such as Internet and voice over Internet-Protocol. Broadband satellite services are typically expensive and generally prone to communication failures due to weather and obstruction. Most asset management systems which utilize broadband satellite must package broadband services such as voice or Internet in order to justify the cost of the data bandwidth, even though the information for asset management is generally low-bandwidth in nature. This drives the cost of satellite-based asset management systems up.
  • the transmit power required to communicate to geo-stationary satellites imposes power system problems for a remote asset management device.
  • Existing satellite asset management systems generally must incorporate transmit power amplifiers of up to 10 Watts to adequately operate.
  • digital communication systems must incorporate linear or nearly linear (Class A or Class AB) power amplifier architectures to prevent spectral re-growth.
  • the transmit device must be designed to produce up to 10 Watts with amplifier architectures which are typically only 40% efficient. This creates difficult design limitations which require sufficient line power or high-density bulky battery systems to function.
  • satellite-based asset management systems use satellite architectures that are duplex in nature.
  • the remote device In order to send data over a satellite, the remote device must generally negotiate a data channel. Even if the data is only one-way in nature, the communication modem must contain both receive and transmit capability to implement this negotiation.
  • Remote asset management devices must both listen and transmit in order to facilitate data transfer to and from a remote device.
  • Rail-car tracking systems generally lag in capability behind truck tracking systems. Since rail-cars remain on class 1 lines, the owners typically know when the rail-cars have passed checkpoints using barcode or visual identification systems. However, once the rail-cars are placed on class 2 or class 3 lines there is generally no real-time tracking. Additionally, customers often use rail-cars as temporary storage to delay offloading goods and maintain an average amount of storage of goods at the cost of the rail-fleet owner. Rail-fleet owners have a difficult time assessing demurrage charges because they may not know if the rail-car has been offloaded on schedule or where the rail-car is currently located. As a result, the only solution generally applied is to add new cars to the fleet to satisfy logistic problems of moving goods.
  • the present invention provides a system and method whereby the introduction of an external interface is extremely power efficient while providing utility of function.
  • the present invention also provides a system and method whereby use of the external interface is extremely power efficient, and does not significantly impair the overall service life of the battery operated remote asset management device.
  • an external interface introduces many new utilities as well as overcomes a significant shortcoming of the prior art. Since a simplex satellite transmitter is one-way, it is dependent on internally or locally initiated stimuli to engage alternate functional modes. For example, since it is not possible to talk to a remote asset management device that is field deployed, it is impossible to instruct such a device to alter a report schedule or initiate an extended low power state. Thus, it is an additional object of the present invention to provide an external interface to provide configuration, sensor monitoring, group detection and control, and long-range detection and control of host satellite asset management devices. The addition of the external interface, operating in a power efficient mode, serves to overcome deficiencies in the art.
  • FIG. 1 is a block diagram of a battery powered remote endpoint asset management device capable of ascertaining its location and relaying the location to an external satellite network.
  • FIG. 2 is a block diagram of a battery powered remote endpoint asset management device with additional functionality including the external interface shown as a short-range radio transceiver interface according to one embodiment of the present invention.
  • FIG. 3 is a block diagram of a battery powered remote endpoint asset management device with the additional functionality of a power efficient mode of operation for the short-range radio transceiver interface of one embodiment of the present invention.
  • FIG. 4 is an operational illustration of the use of a configuration tool enabled with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 5 is an operational illustration of the use of a configuration tool enabled with a short-range radio transceiver interface used to configure one or more remote sensors to be monitored by a host satellite asset management device according to one embodiment of the present invention.
  • FIG. 6 is an operational illustration of the use of a gateway device enabled with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices or one or more remote sensors according to one embodiment of the present invention.
  • FIG. 7 is an operational illustration of the use of a remote controller used to control one or more gateway devices, each with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 8 is an operational illustration of the use of an interrogator device used to initiate a satellite transmission from of one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 9 is an operational illustration of the use of one or more gateway devices to relay data from one or more remote host satellite asset management devices in one embodiment of the present invention.
  • FIG. 10 depicts the communication method for a power efficient short-range radio transceiver interface used in the remote host satellite asset management device of one embodiment of the present invention.
  • FIG. 11 depicts the communications interface between a remote host satellite asset management device and a slave device in one embodiment of the present invention.
  • FIG. 12 further defines the control registers used for managing the interface described in the embodiments of FIGS. 10 and 11 .
  • FIG. 13 depicts operation of the short-range transceiver link using gateway and repeater devices in one embodiment of the present invention.
  • FIG. 1 illustrates the functional blocks of a battery operated endpoint device for remote asset management as described in U.S. Patent Application Publication Number 20050171696, which in turn references U.S. Pat. No. 4,977,577 and U.S. Pat. No. 5,987,058, each assigned to the assignee of the present application, Axonn LLC, and each incorporated by reference herein.
  • Enclosure 102 depicts the physical enclosure of the asset management device. Internal to the enclosure 102 is a battery 107 used to power the location determination device 103 .
  • the location determination device 103 may be any means in the art for ascertaining the location of the endpoint device. For example, the location determination device 103 may derive the location using inertial navigation, barcode scan for waypoints, radio telemetry for fixed waypoints, or satellite data. Once the location has been ascertained by a location determination function, the location information is transmitted using a satellite transmitter 104 to the satellite system 105 . This transmission function may be accomplished using any number of satellite communications means, such as a simplex satellite transmitter.
  • Simplex communication as known in the art is a form of one-way communication that provides for a transmit or a receive path between two network components.
  • the efficiencies of a simplex one-way satellite transmitter may be utilized to send data to a satellite constellation for relay to a ground receiver or network.
  • the data may be distributed from the receiver gateways to end users using a variety of other terrestrial communication networks, such as the Internet.
  • Battery 107 is a power source local to the device and provides power to the remote asset management device.
  • the embodiment of the present invention as shown in FIG. 2 adds several capabilities to the remote asset management device of FIG. 1 .
  • the addition of an external interface having a short-range radio transceiver overcomes many obstacles associated with use of a simplex satellite transmitter to manage assets. While an external interface having a radio frequency transceiver is described in various embodiments of the present invention, one of skill in the art will understand that the external interface can use any wireless frequency.
  • the host controller 307 can be connected to one or more external interfaces, which can be collectively referred to as the “external interface.”
  • the external interface can have one or more wired or wireless interfaces, including a wireless external interface using radio frequency such as the short-range transceiver 308 .
  • the short-range transceiver external interface 308 may be discussed or illustrated as a separate physical or logical unit, such as item 308 in FIG. 3 .
  • the short-range transceiver 308 is simply one type of external interface useable with embodiments of the present invention.
  • the remote asset management device 202 contains a location determination device such as a GPS receiver 203 which receives signals from the GPS satellite constellation 201 . Location determination may also be accomplished in a variety of ways, with GPS employed in various embodiments.
  • the satellite transmitter 204 relays information about the remote asset management device 202 to the satellite constellation 205 .
  • the satellite transmitter can be a two-way transmitter.
  • the current embodiment utilizes a simplex transmitter.
  • the short-range radio transceiver 208 is used by the asset management device 202 to communicate terrestrially to a remote device similarly enabled with a compatible radio transceiver.
  • Remote asset management device 202 includes a host interface controller 206 which performs several functions that add utility to the endpoint device.
  • the primary function of the host interface controller 206 is power management.
  • the host interface controller 206 can contain an algorithmic engine capable of enabling and disabling the functional blocks of the remote asset management device 202 .
  • the host interface controller 206 can therefore connect the battery 207 of the remote asset management device 202 to the GPS receiver 203 , the satellite transmitter 204 , and the short-range transceiver 208 to perform power management functions as necessary, such as disabling all functionality to set the unit 202 into a low power state. While in a low power state, the host interface controller 206 will use a variety of means to resume active power mode to perform the asset management function.
  • FIG. 3 provides another embodiment of the present invention useful for asset management.
  • the present embodiment is contained in an enclosure 302 suitable for numerous applications.
  • the enclosure 302 in the present embodiment is designed to withstand the harsh environment of outdoor use for extended periods of time.
  • the device retains the principal functions of location determination 303 derived from the satellite system 301 , a satellite transmission means 304 , a short-range radio transceiver 308 , a battery 306 , and a host controller 307 .
  • the host controller 307 includes hardware or algorithmic means to accomplish the functions depicted in the controller block.
  • the controller 307 performs power management functions, placing the asset management device in reduced power states and resuming operational functions.
  • the controller 307 may use the timer function to periodically or randomly engage operation.
  • the controller 307 may include alarm detection means to initiate an unscheduled operational function.
  • the controller 307 may include an external interface used by an external device to initiate an unscheduled operational function.
  • the controller 307 may use a motion detection means to initiate an operational function.
  • These controller 307 functions may also be used in various combinations to enable complex operational functions.
  • the controller 307 functions can include a satellite transmission event and a local communication event via the short-range transceiver 308 means.
  • the current embodiment of the present invention can include external interfaces 309 used to bridge the communication between the controller 307 and any combination of external alarms, configuration devices, or communications devices. Additionally, the present invention may also include an optional power input 310 used to extend or replace the internal battery 306 function.
  • the short-range radio transceiver can be power managed to prevent undue degradation of service life through exhaustion of battery 306 .
  • FIG. 3 also depicts a data storage element 311 which provides for data logging of the asset management device 302 . Data may be generated by the controller or received from remote sensors or data interfaces via the wired serial interface or over the wireless short-range transceiver interface 308 .
  • FIG. 4 shows one embodiment of the present invention which does not require physical connection to an asset management device 403 for configuration.
  • FIG. 4 depicts this function where the asset management device 403 incorporates the internal means and functions enclosed in 302 .
  • the short-range radio transceiver function 403 can be used to communicate with a configuration tool 405 .
  • the configuration tool 405 need only be in relative proximity to the asset management device 403 to configure it. Since the radio link is bidirectional, the configuration tool 405 can query the asset management device identification information to determine the precise device being configured. Similarly, the configuration tool 405 can communicate with one or more asset management devices 403 , 404 within range of the short-range radio transceiver link. The configuration tool 405 can query each unique identification term and present them to the operator for individual or group selection.
  • each unit resumes the operational finctions of asset management as before, using the GPS satellite network 401 to determine location and relaying long-range data over the data satellite network 402 .
  • the present embodiment can use a LEO Data Satellite network.
  • FIG. 5 depicts both the use of wireless sensors 506 and 507 with asset management devices 503 and 504 as well as the use of the configuration tool 505 to properly configure each device.
  • the sensors 506 and 507 may be any one of a variety of sensors including door switches, temperature, pressure, volume, dry contact closure, data logger sensors, and the like. These sensors operate on their own power, and upon determination of need to relay data to the asset management device 503 or the system, the sensors pass sensor data to the asset management device 503 .
  • the sensor may be tightly bound to a specific asset management device using identification data for each sensor and the asset management device. Tightly bound sensors send their data only to one asset management device.
  • the senor may be loosely bound, enabled to communicate to any asset management device 503 , 504 in range of the transceiver link 506 , 507 .
  • the sensor may be portable between asset management devices 503 , 504 .
  • Examples of the utility provided would be a sensor affixed to a palette or mobile load that is transferred between trailers, each tagged with an asset management device 503 .
  • the portable sensor would therefore acquire any suitable asset management device 503 and thus relay data to the data satellite 502 while in transit.
  • the asset management device 503 may also support a multiplicity of wireless sensors.
  • the current embodiment can support many wireless sensors as each sensor can contain a unique identification data term.
  • the protocol implemented in one embodiment of the present invention supports up to 32 unique sensors, allowing for many palettes of cargo tagged with portable sensors to be monitored by one asset management device 503 .
  • Each sensor such as 506 or 507 would logically connect to a given asset management device 503 and use that device 503 to relay sensor data to the data satellite network 502 .
  • the configuration tool 505 can be used to configure the sensors 506 , 507 for operation either at time of deployment or subsequently in field use.
  • the configuration tool 505 can configure an asset management device 503 as described previously by initiating a communication link and acting as a slave device.
  • the configuration tool 505 can configure a sensor 506 , 507 by initiating a communication link while acting as a master device with a reserved identification code that the sensors detect. Under normal operation the sensor monitors the master communications node of the asset management device, but can also detect the presence of the unique identification code of the configuration tool 505 , and upon determining a tool is present could slave to the configuration tool 505 .
  • the configuration tool 505 could then configure the operational setting of each sensor 506 , 507 and then release them to re-acquire the asset management device serving as the master communications node for that sensor network.
  • a local stimulus to the sensor such as a switch or magnet activated relay switch could trigger the sensor 506 to engage configuration mode with the configuration tool 505 .
  • Another object of an embodiment of the present invention is to provide for automated monitoring and configuration of asset management devices and sensors through the use of a gateway device 605 as depicted in FIG. 6 .
  • the gateway device 605 can be a fixed asset used to monitor a specific region for the presence of assets that are equipped with the asset management device 603 or 604 .
  • the gateway device 605 can also be mobile.
  • a single gateway device 605 can monitor one or more asset management devices and also the sensors 606 , 607 that are bound to them.
  • the gateway device 605 can be an asset management device with an external interface in various embodiments of the present invention.
  • the gateway device 605 may be configured to locally monitor a region, such as a depot service yard, and to detect the presence of assets as they arrive in the yard. Upon such detection, the gateway device 605 can alter the configuration of any or all detected assets. Such configuration changes may be a change in reporting, internal functions such as motion detection, mapping, frequency, or any other operational function local to the asset management device 603 . It may also instruct the asset management device 603 to enter a low power state, thus reducing the power utilization and data messaging to the data satellite network 602 . The gateway device 605 may also instruct the asset management device 603 to engage a low power state while in the presence of the gateway communications link, and then automatically resume operation upon detection of removal from the gateway device 605 . In this way, the asset management device 603 can engage a low power mode and then resume normal reporting functions when the asset management device is relocated away from the gateway device 605 .
  • the gateway device 605 may be used in a stand alone operation for managing short-range transceiver equipped assets 603 within a local region.
  • the gateway device 605 could include a long-range communications function 608 to enable remote communications between the gateway device 605 and a remote controller.
  • a gateway device 605 equipped with a long-range communications means may be connected to a local network containing local controllers or other gateway devices. In such a way, the effective range of the short-range transceiver could be extended through the use of a multiplicity of gateway devices communicating over a local network in order to more effectively provide short-range transceiver capability over an expanded range of service.
  • a local controller function also connected to the network could manage each gateway device 605 to properly manage the remote asset management devices 603 , 604 and sensors 606 , 607 within range of the collective gateway devices.
  • This controller function could reside in either a stand alone controller, or in one or more of the gateway devices 605 themselves acting as a network master.
  • the long-range communications interface 608 could interface to a distant network, interfacing the gateway device 605 to a distant controller or network of controllers.
  • the long-range communications interface can be a dedicated hard-wired line, public or private telephone, Internet, long-range wireless such as cellular, RF data link, satellite, or other similar means.
  • the gateway device 605 can be controlled by a distant controller monitoring and controlling the operations of the asset management devices 603 , 604 in range of the gateway device 605 .
  • the distant controller can be an asset management device with an external interface in various embodiments of the present invention.
  • FIG. 7 depicts an embodiment of the present invention for using local and distant networks and controllers to better manage and control widely distributed assets tagged with asset management devices enabled with short-range wireless transceivers.
  • the long-range communications means of the gateway 705 can enable a private network where an asset manager could remotely monitor and control assets abroad.
  • the network 708 can be the public telephone network, the Internet, or other means to connect the distant controller 709 to a local network of asset management devices 703 , 704 within the short-range transceiver operational range 706 .
  • the distant controller 709 can operate on multiple private and local networks 706 , 707 .
  • Another embodiment of the present invention provides for public or shared use of widely distributed gateway devices 705 , each networked using the long-range communications means of each gateway device 705 in each gateway region 706 , 707 over a long-range network 708 to a distant controller 709 .
  • an asset manager could distribute posted commands for specific assets to a multiplicity of widely distributed gateway devices 705 .
  • the gateway device 705 can effect a change of configuration in the remote asset, and subsequently report the change to the central controller and asset manager.
  • gateway devices 705 could be used to gain widely distributed access to mobile assets.
  • gateway devices 705 widely distributed but networked using their intrinsic long-range communications means could act as a back-channel communications means not present in simplex communications.
  • the asset management device of the present invention becomes capable of receiving reconfiguration commands abroad for the majority of operating devices of a fleet.
  • Gateway regions may be established and connected into a central network controller for use by a multiplicity of separate users or companies to collectively gain broader regional coverage than attainable using privately installed networks.
  • Gateways 705 that are used in this manner can use the encryption keys tied to specific master identifications to access their own local master networks over any installed public gateway device 705 .
  • gateway devices 705 may connect to a public network accessible through a web-site over the Internet.
  • Other companies similarly enrolling in the approach could add their gateway regions to the public network, such as interstate weigh stations and truck stops. Both companies may post commands at all connected gateway devices to perform specific functions for a unique master identification device upon detection.
  • the gateway Once the local network master is in range of any of the public gateway devices, the gateway will use the customer supplied encryption key, secured by the network controller as private to the customer, and access the local network master to perform the specified function. In this way, the introduction of other gateway devices to the public network enables broader and broader control access to mobile asset management devices.
  • the same architecture discussed as private using FIG. 7 applies to public use of gateways 705 .
  • the controller depicted has broad public use, such as a user login with security, the users may access all gateways 705 connected to the network independent of the location or real ownership of the hardware box.
  • the controller and gateways 705 would safeguard the encryption keys for each user and each local network master identification using standard user access control.
  • FIG. 8 depicts the use of an interrogator device 801 which is a device enabled with a compatible short-range transceiver suitable for engaging a compatible asset management device 803 .
  • the interrogator device 801 operates within the effective range of the short-range transceiver 802 .
  • Assets 803 that enter this effective range are detected by the interrogation device 801 , which in turn establishes a slave communication link to the asset management device 803 .
  • the interrogator 801 can collect data from the asset management device 803 or trigger it to initiate a satellite function, such as transmit data to the data satellite 807 or ascertain location using the GPS satellite 806 and relay that information to the data satellite 807 .
  • the interrogation device 801 therefore functions as a local alarm input upon detection of an asset management device.
  • the interrogation device 801 can also contain some history record to determine if the device in range is a new arrival.
  • One mode of operation can use the history information to initiate an interrogation function upon new detection of an asset management device 803 .
  • Another mode of operation would be to interrogate periodically while an asset 803 is in range 802 .
  • Still another mode of operation would be to interrogate at a range of input power level or a range based on GPS location to make an entry and exit interrogation.
  • the interrogator can be an asset management device with an external interface in various embodiments of the present invention.
  • the in-range asset management device 803 can be mobile, traveling down a path such as a road 805 .
  • the interrogation device 801 can be a roadside mounted device, detecting and initiating a GPS location message to the data satellite network 807 .
  • An out of range asset management device 804 would only perform a similar function upon entry into the range 802 of the interrogation device 801 .
  • a system as described here would provide a location and time tag for assets passing a fixed gate or checkpoint.
  • FIG. 9 depicts a gateway device 905 functioning in a repeater mode and relaying data between a multiplicity of asset management devices 903 , 904 and the gateway device 906 .
  • the gateway device 906 may be able to access a wider distribution of asset management devices than is provided for by the range of the short-range transceiver function.
  • This capability provides utility for assets that are disadvantageously positioned, such as stacked or loaded in the holds of ships or strung in lines such as loaded on a train.
  • the repeater capability allows for a gateway device 906 or devices to stay in positive communications contact with the distributed asset 903 , 904 management devices.
  • the protocol of the short-range transceiver function incorporates repeat level data to ensure that repeated messages eventually terminate and thus a repeater will not continue to repeat a repeated message.
  • multiple repeaters can be used to further extend the effective range and provide multiple paths for data flow to provide better network integrity.
  • the addition of a wireless interface to the short-range transceiver of the asset management tool provides powerful enhancements to existing functions and enables new capabilities.
  • the short-range transceiver function In order for the short-range transceiver function to work properly, it is necessary for the power utilization to be minimized in order to preserve the service life of the battery operated endpoint asset management devices and sensors.
  • An efficient and innovative protocol is implemented in the present invention that enables the functions described herein while minimally impacting the battery life of the asset management device.
  • the protocol described below causes a degradation of the product life of a few months over 8 years of service and requires approximately 10 uA of average current draw on the primary battery.
  • FIGS. 10, 11 , and 12 disclose embodiments of the protocol in use.
  • the protocol and method provide for the creation of local networks, coexisting open local networks, coexisting closed local networks, distributed local and closed networks, bound and unbound sensors, configuration tools, interrogation, repeater, and gateway devices.
  • a key aspect for each local network is that all devices on the network may operate predominately in the dormant or off mode.
  • Each local network is managed by a network master.
  • the asset management device serves as the local network master in one embodiment of the present invention.
  • Network slaves are devices that communicate only with the network master.
  • Slave devices in the present invention are typically sensors, but can be asset management devices in various embodiments of the present invention.
  • a key aspect in the present invention is that sensors are intelligent, performing the prescribed sensing function and using the network master most often as a communications conduit to the data system, which is a satellite system in one embodiment of the present invention.
  • the network master predominately provides for the easy acquisition of slave devices.
  • Each Network Master Idle Message 1004 contains one or more of the following data terms:
  • LEADER data term used by the receiving device (network slave) to detect a message start.
  • MASTER ID data term specific and unique to a network master device. This is the electronic serial number (ESN) of the asset management device.
  • CONTROL REGISTER contains a set of data terms used to manage the local network.
  • the Network Master Idle Message Control Register 1202 is further described in FIG. 12 where the specific terms contained include one or more of the following:
  • CNTRL/Type a term denoting the device type acting as a network master.
  • CNTRL/Carton Manifest a term denoting the network master holds a shipping carton data manifest in memory (used in product manufacturing packaging and shipping).
  • CNTRL/D a term denoting the network master holds data in a local data store for collection by external network controller such as a repeater or gateway device.
  • RF Sequence Number a term that enumerates the specific time window allocated to the Network Master Idle Message.
  • the network master increments this sequence number between 0 to 31 and then repeats the sequence indefinitely.
  • the range of sequence numbers is not critical to the operation of the method.
  • 32 individual time slots can be used in one embodiment of the present invention to facilitate up to 32 different slave devices per network master.
  • Each slave device may seize an available RF sequence number Time Division Multiple Access (TDMA) slot for responding to the master idle message and predominately use this slot for all communications to the network master.
  • TDMA Time Division Multiple Access
  • a slave device may simply attempt to communicate on any channel time slot.
  • DITHER a term that denotes the time period till next Network Master Idle Message.
  • the messages generally occur periodically and are modified slightly with a randomization term to prevent adjacent network masters from locking and jamming each other.
  • ECRC or checksum (CRC) term is a data validation term used to qualify the data integrity of the message for the receiver.
  • the network master repeatedly transmits the Network Master Idle Message, modifying the RF Sequence number. Following transmission of the message, the network master listens for any slave device to send a message as depicted on timeline expansion 1003 . If no slave device message is detected, the network master resumes low power or sleep mode.
  • the typical duty cycle for active versus inactive is 1:1000. The precise duty cycle is a tradeoff between response time for a slave device and battery live of the master device.
  • a slave device monitors the idle messages of the network master. When it needs to communicate to the master, it will respond in the time window immediately following the master idle message as shown in 1003 . Optionally, in one embodiment of the present invention there is a subsequent acknowledgement from the master to the slave immediately following the slave response. If implemented, this acknowledgement confirms the message was received by the master device.
  • the network slave device transmits data to the network master using a Network Slave Response Message 1005 protocol.
  • This message contains one or more of the following data terms:
  • LEADER data term used by the receiving device (network master) to detect a message start.
  • MASTER ID a repeat of the master ID received. This is the electronic serial number (ESN) of the master asset management device.
  • SLAVE ID data term specific and unique to a network slave device. This is the electronic serial number (ESN) of the slave device.
  • CONTROL REGISTER contains a set of data terms used to manage the local network.
  • the Network Slave Response Message Control Register 1204 is further described in FIG. 12 , where the specific terms include one or more of the following:
  • CNTRL/TX a term instructing the network master to relay the information in a subsequent transmission to the data satellite network or short-range transceiver interface. This term is set to no-transmit for supervisory and data log type messages.
  • CNTRL/DEV TYPE a term denoting the device type acting as a network slave.
  • CNTRL/GPS a term that instructs the network master to perform a GPS function, and/or pass payload verbatim, and/or then replace a specific field of data in the payload with location data prior to transmission or data store.
  • CNTRL/D a term instructing the network master to store data for collection by an external network controller such as a repeater or gateway device.
  • RF Sequence Number a term that enumerates the specific time window allocated to the Network Master Idle Message.
  • the network master increments this sequence number between 0 to 31 and then repeats the sequence one or more times.
  • the range of sequence numbers is not critical to the operation of the method.
  • 32 individual time slots were chosen for the present embodiment to facilitate up to 32 different slave devices per network master.
  • Each Slave device may seize an available RF sequence number Time Division Multiple Access (TDMA) slot for responding to the master idle message and predominately use this slot for all communications to the network master, or alternatively simply attempt communication on any time receive window of the master device.
  • TDMA Time Division Multiple Access
  • the method for timeslot selection can be established during Slave setup mode.
  • Payload a term that contains sensor or remote slave data to be acted upon by the network master.
  • the payload field is further defined for use in the asset management device to include specific sensor types, data logging fimctions, data relay, and location determination commands.
  • CRC Cyclic Redundancy Checksum
  • a slave device can operate in one of three modes, acquire, track, and alarm. In acquire mode, the slave device listens for all Network Master Idle Messages observable.
  • a bound sensor in acquire mode detects and decodes the message, it will confirm that the Master ID matches the master ID configured in the sensor, and thus the sensor has found the master it is logically bound with. If the Master ID does not match the configured term, it ignores the message and continues monitoring additional messages.
  • the slave Upon detection of the appropriate Network Master Idle Message, the slave will transmit to the network master with a Network Slave Response Message 1005 time coincident to the network master listen interval. The slave device can then transition from acquire mode to track mode.
  • the network master may optionally be configured to engage a function upon determination of a lost sensor or slave device that fails to report in a specified period of time. For example, the network master may send a data message to the satellite data network notifying the detection of a lost sensor. This enables a security notification for a locally disabled sensor such as a door switch.
  • the sensor In track mode, the sensor will resume a low power state coincident with the master low power state and awaken each master sync message to track and stay in sync with the network master.
  • the slave need not transmit each wake interval, but merely track to follow the randomized Dither parameters. If the slave misses a sync message, it merely resumes acquire mode.
  • the slave will periodically transmit a supervisory message to the network master to keep the master from timing out and transmitting a lost sensor message, if the function is enabled.
  • a sensor determines it is time to perform the designed function, such as detection of an door open, a temperature alarm, or a wired input alarm, the sensor will engage alarm mode. In this mode the sensor will initiate a Network Slave Response Message on the next TDMA window coincident with the RF Sequence number detected when the unit engaged tracking mode, or alternatively simply transmit in the receive time window following any master idle message.
  • Unbound sensors operate as slave devices that can relay sensor data through any conduit available, generally with the purpose of relaying to the satellite data network the sensor data independent of the asset management device used. Examples of use for unbound sensors include cargo tags, security switches, industrial data sensors etc. In each of these cases, the sensor data itself is the valuable item, and the asset management device used to relay this data is relatively unimportant.
  • the data may be relayed to the satellite data network or a local recipient via the short-range transceiver interface. Additionally, the data may be logged to local data storage 311 of the asset management device.
  • a sensor may remain in track mode until it is time to perform a transmit function and then wait until the desired RF Sequence number occurs, or it may remain totally dormant, then engage acquire mode to initiate a data transmission. If a sensor is logging or monitoring data or is monitored by the system for a lost sensor, it is usually configured to remain in track mode, generating periodic supervisory messages to the network master. If a sensor is very infrequently used, it is probably dormant, and will acquire only upon sensor event. In this case the acquisition cycle would appear as depicted in the embodiment of FIG. 11 .
  • the sensor engages listen mode waiting to hear the next master idle message 1101 with an embedded RF sequence number (4 in the case of the diagram). Decoding the transmitted master idle message, the sensor may notice another sensor transmitting in the slot or simply not successfully complete the communication link through active acknowledgement on the Slave Response fail. The sensor may reschedule a second attempt, noting the DITHER term, denoting the next event window and resuming low power mode to awaken at the end of the sleep interval. On waking, the sensor may again fail to finish the communication exchange as depicted, and again reschedule for the next time window. The sensor would continue this process until it successfully communicates 1104 with the network master with the successful slave response message 1105 .
  • a similar approach is used for sensors that are experiencing difficulty in reliably communicating as determined by a CRC test.
  • the sensor would simply track to the next available slot and operate within that TDMA sequence number slot.
  • high densities of sensors and masters will dynamically adjust to operate correctly, with the network master merely monitoring and collecting data.
  • the network master sets up the structure for sensors to adjust and collects data from any TDMA slot without priority or weight of position. This pushes down the network management to sensors that are equipped with a mechanism to automatically adjust and acquire communication channels of the master.
  • the short-range transceiver interface can incorporate three levels of encryption in the master idle messages 1004 and the network slave response messages 1005 .
  • the encryption is designed to allow for friendly (owner devices) and foreign (other party's devices) cooperation without enabling misuse of the communication link.
  • the lowest level of encryption is disabled. Disabled encryption allows for any person to observe, configure, or copy the communication of a given local network. A network operating without encryption allows for any sensor to operate over any network manager in bound or unbound modes.
  • Moderate encryption uses an encryption key that scrambles the data following the leader.
  • the encryption key is generally provided to a given user of the network hardware. All master and slave devices will use the same key allowing all devices of a given user (friendly) to operate together and ignore any other similar devices (foreign) of another party. This prevents unbound sensors of a user from using a foreign master to relay data over the data satellite network (and also the battery usage associated with the master function).
  • Moderate encryption allows for the detection of communication in a local region but not the interpretation of the communication.
  • the CRC checksum could be redundantly encrypted (ECRC) as shown in 1004 or un-encrypted (CRC) as shown in 1005 .
  • the last level of encryption is high. High encryption scrambles all the data of the message including the leader. As with moderate encryption, only friendly devices have access to the communication network. But unlike moderate encryption, high encryption mode makes it impossible for a foreign observer to detect or intercept communications in a local region. Without the encryption key, the operation of the network is undetectable.
  • the short-range transceiver interface as described above is also suitable for use with other slave devices such as configuration tools, data logging interfaces, gateway, and repeater devices.
  • Configuration tools can initiate a communication link with a master device by connecting as a slave device and then passing a payload command that engages configuration mode.
  • configuration tools can initiate a communication link with a slave device by connecting as a master device with a pre-defined master ID of a configuration tool. Slave devices within range of the configuration tool would receive the configuration master idle message and abort following any previously bound network master and rebind to the configuration tool. The tool then communicates the desired configuration changes and releases the slave to resume operation with the specified network master.
  • Gateway devices can similarly connect to master and slave devices within range of the short-range transceiver link.
  • the embodiment of FIG. 13 depicts the operation of gateways and repeaters retrieving data from a network master.
  • Line 1301 represents a time line for a sensor or slave device connected or bound to a local network master 1302 .
  • the slave device listens to the network master 1305 awaiting his RF Sequence TDMA window to pass sensor data to the master. Once the slave decodes the desired RF Sequence number 1306 , it responds to the master with a slave response message 1307 .
  • the slave response message may command the network master (as a term in the payload field) to send the payload to the data satellite network, short-range transceiver network, store in data storage, or any combination thereof. If the master contains any data in data storage, it sets the CNTRL/S term 1202 which is transmitted in each subsequent master idle message. This is denoted as a solid rectangle on the master timelines of FIG. 13 .
  • a gateway device can link to any network master and effect configuration changes and pass and collect data.
  • the gateway device can connect to a slave device and effect configuration changes and pass and collect data.
  • a repeater is a gateway device that connects to a local network master to relay data from that network to a nearby gateway using a short-range transceiver interface.
  • Time line 1303 represents the operation of a repeater in collecting data from a local network master.
  • the repeater device monitors the master idle messages 1308 and notes the presence of the CNTRL/S flag 1309 indicating the master is holding data that can be collected.
  • the repeater device then delays a randomized time interval 1310 and initiates a dialog with the network master by issuing a slave response message 1311 with the Type field of the Control Register denoting Transparent Modem.
  • the network master and repeater device engage a point-to-point communications link 1312 where the gateway retrieves the held information, clearing the CNTRL/S flag of the network master.
  • the network master resumes sending periodic idle messages 1313 with the CNTRL/S flag cleared.
  • the repeater then changes modes and becomes a new local network master 1314 , transmitting the Idle message with a CNTRL/S flag set.
  • the repeaters also incorporate use of the Repeat Level term to either bit-mask by installed repeater instance or by incrementing count to ensure the message will not be repeated indefinitely. Subsequent repeaters or gateways, can pull the data from the repeater operating as a master. In this way, slave response messages stored in a local network masters may propagate through repeaters to distant gateway devices for collection.
  • a gateway monitors all network masters 1304 , including the repeater operating in slave mode. Upon the detection of a CNTRL/S bit in either a network master or a repeater 1314 , the gateway will delay a random time interval 1315 before responding with a slave response message 1316 to engage transparent modem mode and retrieve the data 1317 . Once the data has been retrieved from a repeater, it will resume slave mode 1319 , again searching for data to retrieve.
  • a local network master may perform the logical fimctions of a repeater by alternating as a master and a slave to another nearby master.
  • a group of network masters may collectively network to build a bridge for local sensor and other master data to hand off data to a regionally configured gateway or fixed repeater.
  • a local device may incorporate both master and slave operation to serve as a local repeater to extend the range of a sensor to a local master.
  • This type of a device has value for sensors that are disadvantageously placed relative to the monitoring master, such as sensors inside metal containers with the associated master outside the container.
  • a single local repeater can penetrate the metal enclosure using a master node on the inside to monitor sensors inside the container, and using a slave node on the outside that communicates to the local asset management master device.
  • the local repeater simply incorporates both communication methods to monitor the slaves that would otherwise not be operable to the local network master. In this case, the local repeater may use a unique identification or it could simply mimic the identification of the local master to the slaves.
  • the local network master may be configured to redundantly store to local data storage any transmitted data satellite message, setting the CNTRL/S term. In this way, messages that may be dropped by the simplex satellite network are augmented through gateway devices, often later as the device comes within range of a gateway or repeater.
  • the data through the gateway may be collected using a long-range communication link and merged with data collected from the data satellite system to create a more complete set of data.
  • gateways, repeaters, or configuration tools could monitor the CNTRL/M and/or CNTRLIU flags to detect and retrieve data created by the asset management device itself or remote users who uploaded data for storage.
  • a logistics manager may seal a container with an asset management device affixed, then upload user data to storage data for later retrieval at container destination.
  • the destination manager could monitor the idle message of the local master and detect it by using the CNTRL/U flag if user data exists for extraction and review.
  • Repeaters can retrieve data from a local network master upon detection of a CNTRL/S flag after a random delay of several Idle message cycle intervals. This delay allows a time window where any local gateway will have ample opportunity to be the first to retrieve data directly from a network master.
  • the repeater can randomize the Idle Sequence TDMA slot to minimize the probability that multiple repeaters will attempt to retrieve data from a local network master at the same Idle Sequence TDMA interval.
  • the delays in retrieving the data from a local network master are relatively small compared to the standard time to resolve a GPS location determination. Gateway devices differ from repeaters in that they contain computation controllers, typically microprocessor based and custom algorithms and software to perform a variety of functions.
  • embodiments of the present invention to establish private or public networks to control battery powered remote simplex asset management devices is unique.
  • Other two-way type devices do not incorporate a wireless architecture that will support battery operation, let alone provide for the additional capability of supporting wireless sensors.
  • the present invention discussed herein provides utility in container security, rail, marine, fixed and mobile security, trailer tracking and more on a global scale, operable using batteries for years of service.
  • a general-purpose computer may be used to implement the method of the present invention, wherein the computer housing houses a motherboard which contains a CPU, memory (e.g., DRAM, ROM, EPROM, EEPROM, SRAM, SDRAM, and Flash RAM), and other optional special purpose logic devices (e.g., ASICS) or configurable logic devices (e.g., GAL and reprogrammable FPGA).
  • the computer also includes plural input devices, (e.g., keyboard and mouse), and a display card for controlling a monitor.
  • the computer may include a floppy disk drive; other removable media devices (e.g.
  • the computer may also include a compact disc reader, a compact disc reader/writer unit, or a compact disc jukebox, which may be connected to the same device bus or to another device bus.
  • the system includes at least one computer readable medium.
  • Examples of computer readable media are compact discs, hard disks, floppy disks, tape, magneto optical disks, PROMs (e.g., EPROM, EEPROM, Flash EPROM), DRAM, SRAM, SDRAM, etc.
  • PROMs e.g., EPROM, EEPROM, Flash EPROM
  • DRAM DRAM
  • SRAM SRAM
  • SDRAM Secure Digital Random Access Memory
  • the present invention includes software for controlling both the hardware of the computer and for enabling the computer to interact with a human user.
  • Such software may include, but is not limited to, device drivers, operating systems and user applications, such as development tools.
  • Computer program products of the present invention include any computer readable medium which stores computer program instructions (e.g., computer code devices) which when executed by a computer causes the computer to perform the method of the present invention.
  • the computer code devices of the present invention can be any interpretable or executable code mechanism, including but not limited to, scripts, interpreters, dynamic link libraries, Java classes, and complete executable programs. Moreover, parts of the processing of the present invention may be distributed (e.g., between (1) multiple CPUs or (2) at least one CPU and at least one configurable logic device) for better performance, reliability, and/or cost.
  • the invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art. Numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.

Abstract

A device, method, and computer program product for monitoring and transmitting a location and a local status of a remote device using a satellite transmitter is provided. The monitoring device includes a position location unit, a satellite transmitter, a power source, a controller, and a short-range radio transceiver. The position location unit is configured to determine a location of the remote device. The satellite transmitter is configured to transmit the location to one or more satellites in low earth orbit. The controller includes a power management unit configured to control a power state of the position location unit and the satellite transmitter, and to periodically enable and disable power from the power source to the position location unit and the satellite transmitter. The short-range radio transceiver is used to configure and remotely manage the monitoring device and is used by the monitoring device to monitor local sensors wirelessly.

Description

    CROSS-REFERENCE TO RELEATED APPLICATIONS
  • This application is a continuation-in-part of U.S. application Ser. No. 10/656,133, filed on Sep. 8, 2003, which is herein incorporated by reference in its entirety.
  • FIELD OF THE INVENTION
  • The present invention relates to the monitoring of mobile and remote endpoint devices over a very large area of service.
  • BACKGROUND OF THE INVENTION
  • Asset management is a critical part of any business entity engaged in the transfer of raw or finished goods. It is important to carefully manage re-supply of raw materials to ensure that the manufacturing or service element of an industry does not halt and to carefully manage transportation of finished goods to minimize inventory held for sale. Those companies that do not optimize manufacturing and materials handling are at a significant disadvantage.
  • The proliferation of location based services, devices, and methods in the past decade is a testimony to the market need for an effective means for locating and managing remote assets that are fixed or mobile. There exist several methods for collecting remote data wirelessly, including terrestrial and satellite based communications systems. The problem arises in collecting data from assets that do not have readily available power, such as cargo trailers, rail, and remote fixed assets such as pipelines, shear sensors, and the like.
  • The uncertainty associated with raw materials and finished goods in transit presents a problem in asset management. Companies generally operate with an element of uncertainty as to the exact time of delivery or location of pending delivery for products and raw materials in transit. Unforeseen conditions impacting the arrival of truck, rail, or other vessel deliveries are impossible to predict and difficult to model. Real-time information about materials in transit can be used to forecast deliveries, schedule manpower and other materials, and predict finished goods inventory supply.
  • The transportation industry suffers from in-transit cargo theft and loss. Loss of cargo happens in a wide variety of ways, from employee/driver theft to the organized capture of entire fleets of trailers and rail-cars. The transportation industry has been struggling to limit loss through radio communication means. The cellular telephone industry has enabled a host of communications products that are making an impact. These products provide many finctions such as standard voice communication, data services, and real-time position reporting and status of vehicle operations such as speed, temperature, or brake conditions.
  • Conventional solutions typically rely on cellular communication systems or satellite communication systems. Existing technology solutions that rely on cellular coverage are generally not ubiquitous in coverage. Cellular coverage may be adequate for urban and major interstate routes but becomes unreliable in rural or sparsely populated regions. Additionally, a cellular network implemented primarily for voice communications is a poor solution for rail or vessel data communication. Also, as cellular technology advances, the protocols have transitioned from analog to digital and now to tri-band Global System for Mobile Communication (GSM). Thus, some communication systems developed only a few years ago are already obsolete.
  • Cellular communication asset management systems are inherently two-way in nature and thus require continuous line power for operation. This type of system does not operate effectively on battery power without periodic reconnection to line power such as an automotive power system.
  • Satellite based communication systems mitigate some of the problems associated with cellular asset management devices. For instance, satellite modems are not limited to the service coverage area of cellular telephone corridors. Instead, the area of service is related to the satellite system selected for use and thereby solves the problem of rural and vessel coverage.
  • Satellite asset management systems are preferred if the communication system can provide adequate information bandwidth to support the application requirements. Generally, satellite asset management systems are the successors of cellular systems and offer broadband feature sets such as Internet and voice over Internet-Protocol. Broadband satellite services are typically expensive and generally prone to communication failures due to weather and obstruction. Most asset management systems which utilize broadband satellite must package broadband services such as voice or Internet in order to justify the cost of the data bandwidth, even though the information for asset management is generally low-bandwidth in nature. This drives the cost of satellite-based asset management systems up.
  • The transmit power required to communicate to geo-stationary satellites imposes power system problems for a remote asset management device. Existing satellite asset management systems generally must incorporate transmit power amplifiers of up to 10 Watts to adequately operate. As most satellite communication systems impose tightly controlled spectral masks, digital communication systems must incorporate linear or nearly linear (Class A or Class AB) power amplifier architectures to prevent spectral re-growth. As a result, the transmit device must be designed to produce up to 10 Watts with amplifier architectures which are typically only 40% efficient. This creates difficult design limitations which require sufficient line power or high-density bulky battery systems to function.
  • Most satellite-based asset management systems use satellite architectures that are duplex in nature. In order to send data over a satellite, the remote device must generally negotiate a data channel. Even if the data is only one-way in nature, the communication modem must contain both receive and transmit capability to implement this negotiation. Remote asset management devices must both listen and transmit in order to facilitate data transfer to and from a remote device.
  • Both cellular and two-way satellite asset management systems require available line power or extensive battery systems to operate. Even existing systems equipped with low power operational states must utilize excessive power to manage two-way communications as well as transmit with sufficient energy to operate within the communications infrastructure.
  • Existing asset management devices are generally located on the tractor-cab of the truck, train, or vessel. This serves to locate the cargo while the load is attached. Unfortunately, when a load such as the trailer, rail-car, or barge is disconnected, the important information that provides value for asset management is lost. Trailers that get dropped-off by a driver may become lost for hours or days, resulting in the total loss of perishable loads or missing deadlines for non-perishable loads. Thus, inventory management becomes difficult and highly labor intensive to minimize misplaced loads.
  • Rail-car tracking systems generally lag in capability behind truck tracking systems. Since rail-cars remain on class 1 lines, the owners typically know when the rail-cars have passed checkpoints using barcode or visual identification systems. However, once the rail-cars are placed on class 2 or class 3 lines there is generally no real-time tracking. Additionally, customers often use rail-cars as temporary storage to delay offloading goods and maintain an average amount of storage of goods at the cost of the rail-fleet owner. Rail-fleet owners have a difficult time assessing demurrage charges because they may not know if the rail-car has been offloaded on schedule or where the rail-car is currently located. As a result, the only solution generally applied is to add new cars to the fleet to satisfy logistic problems of moving goods.
  • Barge and vessel owners generally are dependent on river pilots and deep-sea vessel operators for the location of goods using voice communication only. As such, commodity traders usually maintain a staff of logistics personnel to voice-track products as they are moved. A radio-telemetry product that works without a cellular infrastructure and without the requirement of available power can thus dramatically reduce the reliance of pilots and logistics staff.
  • There is thus an unmet need in the art for an asset management device that operates on an internal battery and provides years of service, utilizes satellite communication with a world-wide footprint, integrates Global Positioning Satellite service (GPS) providing world-wide location determination, utilizes remote configuration, and which provides for external data such as alarms and raw user data, enabling sophisticated endpoint monitoring.
  • SUMMARY OF THE INVENTION
  • It is a first object of this present invention to enable simplex transmitters for remote configuration through the use of an external interface, which can be a wired or a wireless interface such as a short-range radio transceiver interface. The present invention provides a system and method whereby the introduction of an external interface is extremely power efficient while providing utility of function. The present invention also provides a system and method whereby use of the external interface is extremely power efficient, and does not significantly impair the overall service life of the battery operated remote asset management device.
  • The introduction of an external interface introduces many new utilities as well as overcomes a significant shortcoming of the prior art. Since a simplex satellite transmitter is one-way, it is dependent on internally or locally initiated stimuli to engage alternate functional modes. For example, since it is not possible to talk to a remote asset management device that is field deployed, it is impossible to instruct such a device to alter a report schedule or initiate an extended low power state. Thus, it is an additional object of the present invention to provide an external interface to provide configuration, sensor monitoring, group detection and control, and long-range detection and control of host satellite asset management devices. The addition of the external interface, operating in a power efficient mode, serves to overcome deficiencies in the art.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing and other advantages and features of the present invention will become more apparent from the detailed description of exemplary embodiments of the invention given below with reference to the accompanying drawings.
  • FIG. 1 is a block diagram of a battery powered remote endpoint asset management device capable of ascertaining its location and relaying the location to an external satellite network.
  • FIG. 2 is a block diagram of a battery powered remote endpoint asset management device with additional functionality including the external interface shown as a short-range radio transceiver interface according to one embodiment of the present invention.
  • FIG. 3 is a block diagram of a battery powered remote endpoint asset management device with the additional functionality of a power efficient mode of operation for the short-range radio transceiver interface of one embodiment of the present invention.
  • FIG. 4 is an operational illustration of the use of a configuration tool enabled with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 5 is an operational illustration of the use of a configuration tool enabled with a short-range radio transceiver interface used to configure one or more remote sensors to be monitored by a host satellite asset management device according to one embodiment of the present invention.
  • FIG. 6 is an operational illustration of the use of a gateway device enabled with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices or one or more remote sensors according to one embodiment of the present invention.
  • FIG. 7 is an operational illustration of the use of a remote controller used to control one or more gateway devices, each with a short-range radio transceiver interface used to configure one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 8 is an operational illustration of the use of an interrogator device used to initiate a satellite transmission from of one or more remote host satellite asset management devices according to one embodiment of the present invention.
  • FIG. 9 is an operational illustration of the use of one or more gateway devices to relay data from one or more remote host satellite asset management devices in one embodiment of the present invention.
  • FIG. 10 depicts the communication method for a power efficient short-range radio transceiver interface used in the remote host satellite asset management device of one embodiment of the present invention.
  • FIG. 11 depicts the communications interface between a remote host satellite asset management device and a slave device in one embodiment of the present invention.
  • FIG. 12 further defines the control registers used for managing the interface described in the embodiments of FIGS. 10 and 11.
  • FIG. 13 depicts operation of the short-range transceiver link using gateway and repeater devices in one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, preferred embodiments of the present invention are described.
  • FIG. 1 illustrates the functional blocks of a battery operated endpoint device for remote asset management as described in U.S. Patent Application Publication Number 20050171696, which in turn references U.S. Pat. No. 4,977,577 and U.S. Pat. No. 5,987,058, each assigned to the assignee of the present application, Axonn LLC, and each incorporated by reference herein.
  • Enclosure 102 depicts the physical enclosure of the asset management device. Internal to the enclosure 102 is a battery 107 used to power the location determination device 103. The location determination device 103 may be any means in the art for ascertaining the location of the endpoint device. For example, the location determination device 103 may derive the location using inertial navigation, barcode scan for waypoints, radio telemetry for fixed waypoints, or satellite data. Once the location has been ascertained by a location determination function, the location information is transmitted using a satellite transmitter 104 to the satellite system 105. This transmission function may be accomplished using any number of satellite communications means, such as a simplex satellite transmitter. Simplex communication as known in the art is a form of one-way communication that provides for a transmit or a receive path between two network components. The efficiencies of a simplex one-way satellite transmitter may be utilized to send data to a satellite constellation for relay to a ground receiver or network. The data may be distributed from the receiver gateways to end users using a variety of other terrestrial communication networks, such as the Internet.
  • Battery 107 is a power source local to the device and provides power to the remote asset management device.
  • The embodiment of the present invention as shown in FIG. 2 adds several capabilities to the remote asset management device of FIG. 1. The addition of an external interface having a short-range radio transceiver overcomes many obstacles associated with use of a simplex satellite transmitter to manage assets. While an external interface having a radio frequency transceiver is described in various embodiments of the present invention, one of skill in the art will understand that the external interface can use any wireless frequency. One of skill in the art will also realize that the host controller 307 can be connected to one or more external interfaces, which can be collectively referred to as the “external interface.” As described in various embodiments of the present invention, the external interface can have one or more wired or wireless interfaces, including a wireless external interface using radio frequency such as the short-range transceiver 308. For convenience only and to help illustrate the novelty of various embodiments of the present invention, the short-range transceiver external interface 308 may be discussed or illustrated as a separate physical or logical unit, such as item 308 in FIG. 3. Thus, while illustrated or discussed separately, one of skill in the art will realize that the short-range transceiver 308 is simply one type of external interface useable with embodiments of the present invention.
  • In FIG. 2, the remote asset management device 202 contains a location determination device such as a GPS receiver 203 which receives signals from the GPS satellite constellation 201. Location determination may also be accomplished in a variety of ways, with GPS employed in various embodiments. The satellite transmitter 204 relays information about the remote asset management device 202 to the satellite constellation 205. The satellite transmitter can be a two-way transmitter. The current embodiment utilizes a simplex transmitter. The short-range radio transceiver 208 is used by the asset management device 202 to communicate terrestrially to a remote device similarly enabled with a compatible radio transceiver.
  • Remote asset management device 202 includes a host interface controller 206 which performs several functions that add utility to the endpoint device. The primary function of the host interface controller 206 is power management. Thus, the host interface controller 206 can contain an algorithmic engine capable of enabling and disabling the functional blocks of the remote asset management device 202. The host interface controller 206 can therefore connect the battery 207 of the remote asset management device 202 to the GPS receiver 203, the satellite transmitter 204, and the short-range transceiver 208 to perform power management functions as necessary, such as disabling all functionality to set the unit 202 into a low power state. While in a low power state, the host interface controller 206 will use a variety of means to resume active power mode to perform the asset management function.
  • FIG. 3 provides another embodiment of the present invention useful for asset management. As in FIG. 2, the present embodiment is contained in an enclosure 302 suitable for numerous applications. The enclosure 302 in the present embodiment is designed to withstand the harsh environment of outdoor use for extended periods of time. The device retains the principal functions of location determination 303 derived from the satellite system 301, a satellite transmission means 304, a short-range radio transceiver 308, a battery 306, and a host controller 307. The host controller 307 includes hardware or algorithmic means to accomplish the functions depicted in the controller block. The controller 307 performs power management functions, placing the asset management device in reduced power states and resuming operational functions. The controller 307 may use the timer function to periodically or randomly engage operation. It may also use the event table or alternate event table or a combination of each to schedule operational functions. The controller 307 may include alarm detection means to initiate an unscheduled operational function. The controller 307 may include an external interface used by an external device to initiate an unscheduled operational function. Finally, the controller 307 may use a motion detection means to initiate an operational function. These controller 307 functions may also be used in various combinations to enable complex operational functions. The controller 307 functions can include a satellite transmission event and a local communication event via the short-range transceiver 308 means.
  • The current embodiment of the present invention can include external interfaces 309 used to bridge the communication between the controller 307 and any combination of external alarms, configuration devices, or communications devices. Additionally, the present invention may also include an optional power input 310 used to extend or replace the internal battery 306 function.
  • The short-range radio transceiver can be power managed to prevent undue degradation of service life through exhaustion of battery 306. FIG. 3 also depicts a data storage element 311 which provides for data logging of the asset management device 302. Data may be generated by the controller or received from remote sensors or data interfaces via the wired serial interface or over the wireless short-range transceiver interface 308.
  • FIG. 4 shows one embodiment of the present invention which does not require physical connection to an asset management device 403 for configuration. FIG. 4 depicts this function where the asset management device 403 incorporates the internal means and functions enclosed in 302. The short-range radio transceiver function 403 can be used to communicate with a configuration tool 405. The configuration tool 405 need only be in relative proximity to the asset management device 403 to configure it. Since the radio link is bidirectional, the configuration tool 405 can query the asset management device identification information to determine the precise device being configured. Similarly, the configuration tool 405 can communicate with one or more asset management devices 403, 404 within range of the short-range radio transceiver link. The configuration tool 405 can query each unique identification term and present them to the operator for individual or group selection. In this way, an operator may configure devices at depot maintenance while still in the packing crate, or individually in the initial configuration. The operator also has the ability to perform query or configuration functions in the field after the units have been deployed. Once configured, each unit resumes the operational finctions of asset management as before, using the GPS satellite network 401 to determine location and relaying long-range data over the data satellite network 402. The present embodiment can use a LEO Data Satellite network.
  • Additionally, it is an object of the present invention to utilize a wireless external interface to enable use of wireless sensors, thus removing the need to install connecting wiring. FIG. 5 depicts both the use of wireless sensors 506 and 507 with asset management devices 503 and 504 as well as the use of the configuration tool 505 to properly configure each device. The sensors 506 and 507 may be any one of a variety of sensors including door switches, temperature, pressure, volume, dry contact closure, data logger sensors, and the like. These sensors operate on their own power, and upon determination of need to relay data to the asset management device 503 or the system, the sensors pass sensor data to the asset management device 503. The sensor may be tightly bound to a specific asset management device using identification data for each sensor and the asset management device. Tightly bound sensors send their data only to one asset management device.
  • Alternatively, the sensor may be loosely bound, enabled to communicate to any asset management device 503, 504 in range of the transceiver link 506, 507. In this mode, the sensor may be portable between asset management devices 503, 504. Examples of the utility provided would be a sensor affixed to a palette or mobile load that is transferred between trailers, each tagged with an asset management device 503. The portable sensor would therefore acquire any suitable asset management device 503 and thus relay data to the data satellite 502 while in transit. Other similar applications exist where the sensor must be portable.
  • The asset management device 503 may also support a multiplicity of wireless sensors. The current embodiment can support many wireless sensors as each sensor can contain a unique identification data term. The protocol implemented in one embodiment of the present invention supports up to 32 unique sensors, allowing for many palettes of cargo tagged with portable sensors to be monitored by one asset management device 503. Each sensor such as 506 or 507 would logically connect to a given asset management device 503 and use that device 503 to relay sensor data to the data satellite network 502.
  • The configuration tool 505 can be used to configure the sensors 506, 507 for operation either at time of deployment or subsequently in field use. The configuration tool 505 can configure an asset management device 503 as described previously by initiating a communication link and acting as a slave device. The configuration tool 505 can configure a sensor 506, 507 by initiating a communication link while acting as a master device with a reserved identification code that the sensors detect. Under normal operation the sensor monitors the master communications node of the asset management device, but can also detect the presence of the unique identification code of the configuration tool 505, and upon determining a tool is present could slave to the configuration tool 505. The configuration tool 505 could then configure the operational setting of each sensor 506, 507 and then release them to re-acquire the asset management device serving as the master communications node for that sensor network. Alternatively, a local stimulus to the sensor such as a switch or magnet activated relay switch could trigger the sensor 506 to engage configuration mode with the configuration tool 505.
  • Another object of an embodiment of the present invention is to provide for automated monitoring and configuration of asset management devices and sensors through the use of a gateway device 605 as depicted in FIG. 6. The gateway device 605 can be a fixed asset used to monitor a specific region for the presence of assets that are equipped with the asset management device 603 or 604. The gateway device 605 can also be mobile. A single gateway device 605 can monitor one or more asset management devices and also the sensors 606, 607 that are bound to them. The gateway device 605 can be an asset management device with an external interface in various embodiments of the present invention.
  • The gateway device 605 may be configured to locally monitor a region, such as a depot service yard, and to detect the presence of assets as they arrive in the yard. Upon such detection, the gateway device 605 can alter the configuration of any or all detected assets. Such configuration changes may be a change in reporting, internal functions such as motion detection, mapping, frequency, or any other operational function local to the asset management device 603. It may also instruct the asset management device 603 to enter a low power state, thus reducing the power utilization and data messaging to the data satellite network 602. The gateway device 605 may also instruct the asset management device 603 to engage a low power state while in the presence of the gateway communications link, and then automatically resume operation upon detection of removal from the gateway device 605. In this way, the asset management device 603 can engage a low power mode and then resume normal reporting functions when the asset management device is relocated away from the gateway device 605.
  • The gateway device 605 may be used in a stand alone operation for managing short-range transceiver equipped assets 603 within a local region. Alternatively, the gateway device 605 could include a long-range communications function 608 to enable remote communications between the gateway device 605 and a remote controller. A gateway device 605 equipped with a long-range communications means may be connected to a local network containing local controllers or other gateway devices. In such a way, the effective range of the short-range transceiver could be extended through the use of a multiplicity of gateway devices communicating over a local network in order to more effectively provide short-range transceiver capability over an expanded range of service. A local controller function also connected to the network could manage each gateway device 605 to properly manage the remote asset management devices 603, 604 and sensors 606, 607 within range of the collective gateway devices. This controller function could reside in either a stand alone controller, or in one or more of the gateway devices 605 themselves acting as a network master.
  • Similarly, the long-range communications interface 608 could interface to a distant network, interfacing the gateway device 605 to a distant controller or network of controllers. The long-range communications interface can be a dedicated hard-wired line, public or private telephone, Internet, long-range wireless such as cellular, RF data link, satellite, or other similar means. The gateway device 605 can be controlled by a distant controller monitoring and controlling the operations of the asset management devices 603, 604 in range of the gateway device 605. The distant controller can be an asset management device with an external interface in various embodiments of the present invention.
  • FIG. 7 depicts an embodiment of the present invention for using local and distant networks and controllers to better manage and control widely distributed assets tagged with asset management devices enabled with short-range wireless transceivers. The long-range communications means of the gateway 705 can enable a private network where an asset manager could remotely monitor and control assets abroad. In this embodiment, the network 708 can be the public telephone network, the Internet, or other means to connect the distant controller 709 to a local network of asset management devices 703, 704 within the short-range transceiver operational range 706. The distant controller 709 can operate on multiple private and local networks 706, 707.
  • Another embodiment of the present invention provides for public or shared use of widely distributed gateway devices 705, each networked using the long-range communications means of each gateway device 705 in each gateway region 706, 707 over a long-range network 708 to a distant controller 709. In this embodiment, an asset manager could distribute posted commands for specific assets to a multiplicity of widely distributed gateway devices 705. Upon detection of the presence of the desired asset via the short-range transceiver link to any gateway device 705, the gateway device 705 can effect a change of configuration in the remote asset, and subsequently report the change to the central controller and asset manager. In such an embodiment, multiple asset managers could use the same network and same distributed gateway devices 705, accessing shared or unique sets of endpoint assets to gain widely distributed access to mobile assets. In such a way, gateway devices 705 widely distributed but networked using their intrinsic long-range communications means could act as a back-channel communications means not present in simplex communications. By intelligently selecting locations for networked gateway devices 705 such as truck stops, rail yards, interstate crossings, and high density asset nodes, the asset management device of the present invention becomes capable of receiving reconfiguration commands abroad for the majority of operating devices of a fleet.
  • Since each local network can operate with encryption, it is possible to use the gateway networks in a public manner. Gateway regions may be established and connected into a central network controller for use by a multiplicity of separate users or companies to collectively gain broader regional coverage than attainable using privately installed networks. Gateways 705 that are used in this manner can use the encryption keys tied to specific master identifications to access their own local master networks over any installed public gateway device 705.
  • For example, customers that install their gateway devices 705 to manage their own depot storage regions may connect to a public network accessible through a web-site over the Internet. Other companies similarly enrolling in the approach could add their gateway regions to the public network, such as interstate weigh stations and truck stops. Both companies may post commands at all connected gateway devices to perform specific functions for a unique master identification device upon detection. Once the local network master is in range of any of the public gateway devices, the gateway will use the customer supplied encryption key, secured by the network controller as private to the customer, and access the local network master to perform the specified function. In this way, the introduction of other gateway devices to the public network enables broader and broader control access to mobile asset management devices. The same architecture discussed as private using FIG. 7 applies to public use of gateways 705. If the controller depicted has broad public use, such as a user login with security, the users may access all gateways 705 connected to the network independent of the location or real ownership of the hardware box. The controller and gateways 705 would safeguard the encryption keys for each user and each local network master identification using standard user access control.
  • Another embodiment of the present invention uses the short-range transceiver capability of each asset management device to initiate a solicited transmission through an active interrogation function. FIG. 8 depicts the use of an interrogator device 801 which is a device enabled with a compatible short-range transceiver suitable for engaging a compatible asset management device 803. The interrogator device 801 operates within the effective range of the short-range transceiver 802. Assets 803 that enter this effective range are detected by the interrogation device 801, which in turn establishes a slave communication link to the asset management device 803. Using the slave communication link, the interrogator 801 can collect data from the asset management device 803 or trigger it to initiate a satellite function, such as transmit data to the data satellite 807 or ascertain location using the GPS satellite 806 and relay that information to the data satellite 807. The interrogation device 801 therefore functions as a local alarm input upon detection of an asset management device. The interrogation device 801 can also contain some history record to determine if the device in range is a new arrival. One mode of operation can use the history information to initiate an interrogation function upon new detection of an asset management device 803. Another mode of operation would be to interrogate periodically while an asset 803 is in range 802. Still another mode of operation would be to interrogate at a range of input power level or a range based on GPS location to make an entry and exit interrogation. The interrogator can be an asset management device with an external interface in various embodiments of the present invention.
  • As depicted in the embodiment of FIG. 8, the in-range asset management device 803 can be mobile, traveling down a path such as a road 805. The interrogation device 801 can be a roadside mounted device, detecting and initiating a GPS location message to the data satellite network 807. An out of range asset management device 804 would only perform a similar function upon entry into the range 802 of the interrogation device 801. A system as described here would provide a location and time tag for assets passing a fixed gate or checkpoint.
  • Another embodiment of the present invention enables extensions of range for the short-range transceiver function through the use of repeat enabled gateway devices. FIG. 9 depicts a gateway device 905 functioning in a repeater mode and relaying data between a multiplicity of asset management devices 903, 904 and the gateway device 906. In such a manner, the gateway device 906 may be able to access a wider distribution of asset management devices than is provided for by the range of the short-range transceiver function. This capability provides utility for assets that are disadvantageously positioned, such as stacked or loaded in the holds of ships or strung in lines such as loaded on a train. The repeater capability allows for a gateway device 906 or devices to stay in positive communications contact with the distributed asset 903, 904 management devices. The protocol of the short-range transceiver function incorporates repeat level data to ensure that repeated messages eventually terminate and thus a repeater will not continue to repeat a repeated message. Similarly, multiple repeaters can be used to further extend the effective range and provide multiple paths for data flow to provide better network integrity.
  • In embodiments of the present invention, the addition of a wireless interface to the short-range transceiver of the asset management tool provides powerful enhancements to existing functions and enables new capabilities. In order for the short-range transceiver function to work properly, it is necessary for the power utilization to be minimized in order to preserve the service life of the battery operated endpoint asset management devices and sensors. An efficient and innovative protocol is implemented in the present invention that enables the functions described herein while minimally impacting the battery life of the asset management device. The protocol described below causes a degradation of the product life of a few months over 8 years of service and requires approximately 10 uA of average current draw on the primary battery.
  • FIGS. 10, 11, and 12 disclose embodiments of the protocol in use. The protocol and method provide for the creation of local networks, coexisting open local networks, coexisting closed local networks, distributed local and closed networks, bound and unbound sensors, configuration tools, interrogation, repeater, and gateway devices. A key aspect for each local network is that all devices on the network may operate predominately in the dormant or off mode.
  • Each local network is managed by a network master. The asset management device serves as the local network master in one embodiment of the present invention. Network slaves are devices that communicate only with the network master. Slave devices in the present invention are typically sensors, but can be asset management devices in various embodiments of the present invention. A key aspect in the present invention is that sensors are intelligent, performing the prescribed sensing function and using the network master most often as a communications conduit to the data system, which is a satellite system in one embodiment of the present invention. The network master predominately provides for the easy acquisition of slave devices.
  • To accomplish these goals, the network master as depicted in FIG. 10 continually generates a series of Network Master Idle Messages 1004 on a periodic basis. Each Network Master Idle Message 1004 contains one or more of the following data terms:
  • LEADER: data term used by the receiving device (network slave) to detect a message start.
  • MASTER ID: data term specific and unique to a network master device. This is the electronic serial number (ESN) of the asset management device.
  • CONTROL REGISTER: contains a set of data terms used to manage the local network. The Network Master Idle Message Control Register 1202 is further described in FIG. 12 where the specific terms contained include one or more of the following:
  • CNTRL/Type: a term denoting the device type acting as a network master.
  • CNTRL/Carton Manifest: a term denoting the network master holds a shipping carton data manifest in memory (used in product manufacturing packaging and shipping).
  • CNTRL/D: a term denoting the network master holds data in a local data store for collection by external network controller such as a repeater or gateway device.
  • RF Sequence Number: a term that enumerates the specific time window allocated to the Network Master Idle Message. The network master increments this sequence number between 0 to 31 and then repeats the sequence indefinitely. The range of sequence numbers is not critical to the operation of the method. 32 individual time slots can be used in one embodiment of the present invention to facilitate up to 32 different slave devices per network master. Each slave device may seize an available RF sequence number Time Division Multiple Access (TDMA) slot for responding to the master idle message and predominately use this slot for all communications to the network master. Optionally, a slave device may simply attempt to communicate on any channel time slot.
  • DITHER: a term that denotes the time period till next Network Master Idle Message. The messages generally occur periodically and are modified slightly with a randomization term to prevent adjacent network masters from locking and jamming each other.
  • ECRC: or checksum (CRC) term is a data validation term used to qualify the data integrity of the message for the receiver.
  • The network master repeatedly transmits the Network Master Idle Message, modifying the RF Sequence number. Following transmission of the message, the network master listens for any slave device to send a message as depicted on timeline expansion 1003. If no slave device message is detected, the network master resumes low power or sleep mode. The typical duty cycle for active versus inactive is 1:1000. The precise duty cycle is a tradeoff between response time for a slave device and battery live of the master device.
  • A slave device monitors the idle messages of the network master. When it needs to communicate to the master, it will respond in the time window immediately following the master idle message as shown in 1003. Optionally, in one embodiment of the present invention there is a subsequent acknowledgement from the master to the slave immediately following the slave response. If implemented, this acknowledgement confirms the message was received by the master device.
  • The network slave device transmits data to the network master using a Network Slave Response Message 1005 protocol. This message contains one or more of the following data terms:
  • LEADER: data term used by the receiving device (network master) to detect a message start.
  • MASTER ID: a repeat of the master ID received. This is the electronic serial number (ESN) of the master asset management device.
  • SLAVE ID: data term specific and unique to a network slave device. This is the electronic serial number (ESN) of the slave device.
  • CONTROL REGISTER: contains a set of data terms used to manage the local network. The Network Slave Response Message Control Register 1204 is further described in FIG. 12, where the specific terms include one or more of the following:
  • CNTRL/TX: a term instructing the network master to relay the information in a subsequent transmission to the data satellite network or short-range transceiver interface. This term is set to no-transmit for supervisory and data log type messages.
  • CNTRL/DEV TYPE: a term denoting the device type acting as a network slave.
  • CNTRL/GPS: a term that instructs the network master to perform a GPS function, and/or pass payload verbatim, and/or then replace a specific field of data in the payload with location data prior to transmission or data store.
  • CNTRL/D: a term instructing the network master to store data for collection by an external network controller such as a repeater or gateway device.
  • RF Sequence Number: a term that enumerates the specific time window allocated to the Network Master Idle Message. The network master increments this sequence number between 0 to 31 and then repeats the sequence one or more times. The range of sequence numbers is not critical to the operation of the method. 32 individual time slots were chosen for the present embodiment to facilitate up to 32 different slave devices per network master. Each Slave device may seize an available RF sequence number Time Division Multiple Access (TDMA) slot for responding to the master idle message and predominately use this slot for all communications to the network master, or alternatively simply attempt communication on any time receive window of the master device. The method for timeslot selection can be established during Slave setup mode.
  • Payload: a term that contains sensor or remote slave data to be acted upon by the network master. The payload field is further defined for use in the asset management device to include specific sensor types, data logging fimctions, data relay, and location determination commands.
  • CRC: or Cyclic Redundancy Checksum (CRC) term is a data validation term used to qualify the data integrity of the message for the receiver.
  • Two types of slave devices are supported, bound or unbound. Additionally, a slave device can operate in one of three modes, acquire, track, and alarm. In acquire mode, the slave device listens for all Network Master Idle Messages observable.
  • If a bound sensor in acquire mode detects and decodes the message, it will confirm that the Master ID matches the master ID configured in the sensor, and thus the sensor has found the master it is logically bound with. If the Master ID does not match the configured term, it ignores the message and continues monitoring additional messages. Upon detection of the appropriate Network Master Idle Message, the slave will transmit to the network master with a Network Slave Response Message 1005 time coincident to the network master listen interval. The slave device can then transition from acquire mode to track mode. The network master may optionally be configured to engage a function upon determination of a lost sensor or slave device that fails to report in a specified period of time. For example, the network master may send a data message to the satellite data network notifying the detection of a lost sensor. This enables a security notification for a locally disabled sensor such as a door switch.
  • In track mode, the sensor will resume a low power state coincident with the master low power state and awaken each master sync message to track and stay in sync with the network master. The slave need not transmit each wake interval, but merely track to follow the randomized Dither parameters. If the slave misses a sync message, it merely resumes acquire mode. The slave will periodically transmit a supervisory message to the network master to keep the master from timing out and transmitting a lost sensor message, if the function is enabled.
  • If a sensor determines it is time to perform the designed function, such as detection of an door open, a temperature alarm, or a wired input alarm, the sensor will engage alarm mode. In this mode the sensor will initiate a Network Slave Response Message on the next TDMA window coincident with the RF Sequence number detected when the unit engaged tracking mode, or alternatively simply transmit in the receive time window following any master idle message.
  • An unbound sensor operates as a bound sensor except that it will engage any network master available, ignoring the Master ID field match that the bound sensor performs. Unbound sensors operate as slave devices that can relay sensor data through any conduit available, generally with the purpose of relaying to the satellite data network the sensor data independent of the asset management device used. Examples of use for unbound sensors include cargo tags, security switches, industrial data sensors etc. In each of these cases, the sensor data itself is the valuable item, and the asset management device used to relay this data is relatively unimportant. The data may be relayed to the satellite data network or a local recipient via the short-range transceiver interface. Additionally, the data may be logged to local data storage 311 of the asset management device.
  • A sensor may remain in track mode until it is time to perform a transmit function and then wait until the desired RF Sequence number occurs, or it may remain totally dormant, then engage acquire mode to initiate a data transmission. If a sensor is logging or monitoring data or is monitored by the system for a lost sensor, it is usually configured to remain in track mode, generating periodic supervisory messages to the network master. If a sensor is very infrequently used, it is probably dormant, and will acquire only upon sensor event. In this case the acquisition cycle would appear as depicted in the embodiment of FIG. 11.
  • When the sensor event occurs coincident to 1103 in the diagram, the sensor engages listen mode waiting to hear the next master idle message 1101 with an embedded RF sequence number (4 in the case of the diagram). Decoding the transmitted master idle message, the sensor may notice another sensor transmitting in the slot or simply not successfully complete the communication link through active acknowledgement on the Slave Response fail. The sensor may reschedule a second attempt, noting the DITHER term, denoting the next event window and resuming low power mode to awaken at the end of the sleep interval. On waking, the sensor may again fail to finish the communication exchange as depicted, and again reschedule for the next time window. The sensor would continue this process until it successfully communicates 1104 with the network master with the successful slave response message 1105.
  • A similar approach is used for sensors that are experiencing difficulty in reliably communicating as determined by a CRC test. The sensor would simply track to the next available slot and operate within that TDMA sequence number slot. In this way, high densities of sensors and masters will dynamically adjust to operate correctly, with the network master merely monitoring and collecting data. The network master sets up the structure for sensors to adjust and collects data from any TDMA slot without priority or weight of position. This pushes down the network management to sensors that are equipped with a mechanism to automatically adjust and acquire communication channels of the master.
  • Data security remains a concern over any communication link, especially wireless links. The short-range transceiver interface can incorporate three levels of encryption in the master idle messages 1004 and the network slave response messages 1005. The encryption is designed to allow for friendly (owner devices) and foreign (other party's devices) cooperation without enabling misuse of the communication link.
  • The lowest level of encryption is disabled. Disabled encryption allows for any person to observe, configure, or copy the communication of a given local network. A network operating without encryption allows for any sensor to operate over any network manager in bound or unbound modes.
  • The next level of encryption is moderate. Moderate encryption, as depicted in 1004, uses an encryption key that scrambles the data following the leader. The encryption key is generally provided to a given user of the network hardware. All master and slave devices will use the same key allowing all devices of a given user (friendly) to operate together and ignore any other similar devices (foreign) of another party. This prevents unbound sensors of a user from using a foreign master to relay data over the data satellite network (and also the battery usage associated with the master function). Moderate encryption allows for the detection of communication in a local region but not the interpretation of the communication.
  • The CRC checksum could be redundantly encrypted (ECRC) as shown in 1004 or un-encrypted (CRC) as shown in 1005.
  • The last level of encryption is high. High encryption scrambles all the data of the message including the leader. As with moderate encryption, only friendly devices have access to the communication network. But unlike moderate encryption, high encryption mode makes it impossible for a foreign observer to detect or intercept communications in a local region. Without the encryption key, the operation of the network is undetectable.
  • The short-range transceiver interface as described above is also suitable for use with other slave devices such as configuration tools, data logging interfaces, gateway, and repeater devices. Configuration tools can initiate a communication link with a master device by connecting as a slave device and then passing a payload command that engages configuration mode. Similarly, configuration tools can initiate a communication link with a slave device by connecting as a master device with a pre-defined master ID of a configuration tool. Slave devices within range of the configuration tool would receive the configuration master idle message and abort following any previously bound network master and rebind to the configuration tool. The tool then communicates the desired configuration changes and releases the slave to resume operation with the specified network master.
  • Gateway devices can similarly connect to master and slave devices within range of the short-range transceiver link. The embodiment of FIG. 13 depicts the operation of gateways and repeaters retrieving data from a network master. Line 1301 represents a time line for a sensor or slave device connected or bound to a local network master 1302. As described above, the slave device listens to the network master 1305 awaiting his RF Sequence TDMA window to pass sensor data to the master. Once the slave decodes the desired RF Sequence number 1306, it responds to the master with a slave response message 1307. The slave response message may command the network master (as a term in the payload field) to send the payload to the data satellite network, short-range transceiver network, store in data storage, or any combination thereof. If the master contains any data in data storage, it sets the CNTRL/S term 1202 which is transmitted in each subsequent master idle message. This is denoted as a solid rectangle on the master timelines of FIG. 13.
  • Operating as slave devices, a gateway device can link to any network master and effect configuration changes and pass and collect data. Operating as a network master, the gateway device can connect to a slave device and effect configuration changes and pass and collect data.
  • A repeater is a gateway device that connects to a local network master to relay data from that network to a nearby gateway using a short-range transceiver interface. Time line 1303 represents the operation of a repeater in collecting data from a local network master. The repeater device monitors the master idle messages 1308 and notes the presence of the CNTRL/S flag 1309 indicating the master is holding data that can be collected. The repeater device then delays a randomized time interval 1310 and initiates a dialog with the network master by issuing a slave response message 1311 with the Type field of the Control Register denoting Transparent Modem. The network master and repeater device engage a point-to-point communications link 1312 where the gateway retrieves the held information, clearing the CNTRL/S flag of the network master. The network master resumes sending periodic idle messages 1313 with the CNTRL/S flag cleared.
  • The repeater then changes modes and becomes a new local network master 1314, transmitting the Idle message with a CNTRL/S flag set. The repeaters also incorporate use of the Repeat Level term to either bit-mask by installed repeater instance or by incrementing count to ensure the message will not be repeated indefinitely. Subsequent repeaters or gateways, can pull the data from the repeater operating as a master. In this way, slave response messages stored in a local network masters may propagate through repeaters to distant gateway devices for collection.
  • A gateway monitors all network masters 1304, including the repeater operating in slave mode. Upon the detection of a CNTRL/S bit in either a network master or a repeater 1314, the gateway will delay a random time interval 1315 before responding with a slave response message 1316 to engage transparent modem mode and retrieve the data 1317. Once the data has been retrieved from a repeater, it will resume slave mode 1319, again searching for data to retrieve.
  • Similarly, a local network master may perform the logical fimctions of a repeater by alternating as a master and a slave to another nearby master. In this mode of operation, a group of network masters may collectively network to build a bridge for local sensor and other master data to hand off data to a regionally configured gateway or fixed repeater.
  • In yet another embodiment of the present invention, a local device may incorporate both master and slave operation to serve as a local repeater to extend the range of a sensor to a local master. This type of a device has value for sensors that are disadvantageously placed relative to the monitoring master, such as sensors inside metal containers with the associated master outside the container. A single local repeater can penetrate the metal enclosure using a master node on the inside to monitor sensors inside the container, and using a slave node on the outside that communicates to the local asset management master device. The local repeater simply incorporates both communication methods to monitor the slaves that would otherwise not be operable to the local network master. In this case, the local repeater may use a unique identification or it could simply mimic the identification of the local master to the slaves.
  • The local network master may be configured to redundantly store to local data storage any transmitted data satellite message, setting the CNTRL/S term. In this way, messages that may be dropped by the simplex satellite network are augmented through gateway devices, often later as the device comes within range of a gateway or repeater. The data through the gateway may be collected using a long-range communication link and merged with data collected from the data satellite system to create a more complete set of data.
  • Similarly, gateways, repeaters, or configuration tools could monitor the CNTRL/M and/or CNTRLIU flags to detect and retrieve data created by the asset management device itself or remote users who uploaded data for storage. A logistics manager may seal a container with an asset management device affixed, then upload user data to storage data for later retrieval at container destination. The destination manager could monitor the idle message of the local master and detect it by using the CNTRL/U flag if user data exists for extraction and review.
  • Repeaters can retrieve data from a local network master upon detection of a CNTRL/S flag after a random delay of several Idle message cycle intervals. This delay allows a time window where any local gateway will have ample opportunity to be the first to retrieve data directly from a network master. The repeater can randomize the Idle Sequence TDMA slot to minimize the probability that multiple repeaters will attempt to retrieve data from a local network master at the same Idle Sequence TDMA interval. The delays in retrieving the data from a local network master are relatively small compared to the standard time to resolve a GPS location determination. Gateway devices differ from repeaters in that they contain computation controllers, typically microprocessor based and custom algorithms and software to perform a variety of functions.
  • The ability of embodiments of the present invention to establish private or public networks to control battery powered remote simplex asset management devices is unique. Other two-way type devices do not incorporate a wireless architecture that will support battery operation, let alone provide for the additional capability of supporting wireless sensors. The present invention discussed herein provides utility in container security, rail, marine, fixed and mobile security, trailer tracking and more on a global scale, operable using batteries for years of service.
  • Many of the algorithmic operations and fimctions described herein may be implemented using a conventional general purpose computer or microprocessor programmed according to the teachings of the present invention, as will be apparent to those skilled in the art. Appropriate software can readily be prepared by programmers of ordinary skill based on the teachings of the present disclosure as will be apparent to those skilled in the art.
  • A general-purpose computer may be used to implement the method of the present invention, wherein the computer housing houses a motherboard which contains a CPU, memory (e.g., DRAM, ROM, EPROM, EEPROM, SRAM, SDRAM, and Flash RAM), and other optional special purpose logic devices (e.g., ASICS) or configurable logic devices (e.g., GAL and reprogrammable FPGA). The computer also includes plural input devices, (e.g., keyboard and mouse), and a display card for controlling a monitor. Additionally, the computer may include a floppy disk drive; other removable media devices (e.g. compact disc, tape, and removable magneto optical media); and a hard disk or other fixed high density media drives, connected using an appropriate device bus (e.g., a SCSI bus, an Enhanced IDE bus, or an Ultra DMA bus). The computer may also include a compact disc reader, a compact disc reader/writer unit, or a compact disc jukebox, which may be connected to the same device bus or to another device bus.
  • As stated above, the system includes at least one computer readable medium. Examples of computer readable media are compact discs, hard disks, floppy disks, tape, magneto optical disks, PROMs (e.g., EPROM, EEPROM, Flash EPROM), DRAM, SRAM, SDRAM, etc. Stored on any one or on a combination of computer readable media, the present invention includes software for controlling both the hardware of the computer and for enabling the computer to interact with a human user. Such software may include, but is not limited to, device drivers, operating systems and user applications, such as development tools. Computer program products of the present invention include any computer readable medium which stores computer program instructions (e.g., computer code devices) which when executed by a computer causes the computer to perform the method of the present invention. The computer code devices of the present invention can be any interpretable or executable code mechanism, including but not limited to, scripts, interpreters, dynamic link libraries, Java classes, and complete executable programs. Moreover, parts of the processing of the present invention may be distributed (e.g., between (1) multiple CPUs or (2) at least one CPU and at least one configurable logic device) for better performance, reliability, and/or cost.
  • The invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art. Numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.

Claims (72)

1. A monitoring device configured to monitor a remote status of mobile assets, comprising:
a position location unit to determine a location of a remote device;
a simplex satellite transmitter configured to transmit the location to one or more satellites;
a power source;
an external interface for communicating with one or more devices;
a controller in communication with the external interface and including a power management unit configured to control a power state of the position location unit and of the simplex satellite transmitter; and wherein
the controller is further configured to control the position location unit to determine the location and to control the simplex satellite transmitter to transmit the location based on the interval schedule.
2. The monitoring device of claim 1, wherein the position location unit comprises a GPS receiver subsystem.
3. The monitoring device of claim 1, wherein the power management unit is further configured to control a power state of the external interface and to periodically enable and disable power from the power source to the external interface.
4. The monitoring device of claim 1, wherein the external interface includes at least one of a plurality of alarm inputs.
5. The monitoring device of claim 1, wherein the external interface includes a configuration interface configured to receive modifications to configuration parameters.
6. The monitoring device of claim 5, wherein the power management unit is further configured to control a power state of the configuration interface and to periodically enable and disable power from the power source to the configuration interface.
7. The monitoring device of claim 1, wherein the external interface includes an external data unit configured to receive external data.
8. The monitoring device of claim 7, wherein the power management unit is further configured to control a power state of the external data unit and to periodically enable and disable power from the power source to the external data unit.
9. The monitoring device of claim 1, wherein the external interface includes at least one of a wired or wireless interface.
10. A monitoring device for monitoring a remote status of a mobile asset, the monitoring device comprising:
a position location unit to determine a location of a remote device;
a satellite transmitter to transmit the location to one or more satellites;
an external interface for communicating with one or more devices;
a power source; and
a controller in communication with the external interface and including a power management unit configured to control the supply of power from the power source to the satellite transmitter on an interval schedule.
11. The monitoring device of claim 10, wherein the position location unit comprises a GPS receiver subsystem.
12. The monitoring device of claim 10, wherein the external interface includes at least one of a wired or wireless interface.
13. The monitoring device of claim 10, wherein the power source comprises a battery.
14. The monitoring device of claim 10, wherein at least one of the one or more satellites operate as a bent-pipe relay device.
15. The monitoring device of claim 10, wherein the external interface includes at least one of an alarm input, a configuration interface configured to receive modifications to configuration parameters, and an external data unit configured to receive external data.
16. The monitoring device of claim 10, wherein the external interface is periodically enabled by the power management unit to communicate with one or more devices.
17. The monitoring device of claim 10, wherein the external interface is used to modify an operating configuration of the monitoring device.
18. The monitoring device of claim 10, wherein the external interface is used to monitor one or more sensor devices.
19. The monitoring device of claim 10, wherein the external interface is used to relay information received from one or more devices.
20. The monitoring device of claim 18, wherein a sensor is at least one of a door sensor, a cargo sensor, a dry contact circuit closure sensor, a temperature sensor, an analog voltage sensor, an analog measurement sensor, a volume sensor, a pressure sensor, or a humidity sensor.
21. The monitoring device of claim 10, wherein the external interface detects a remote sensor and initiates a satellite transmission.
22. The monitoring device of claim 21, wherein the satellite transmission contains data from at least one of the remote sensor, the monitoring device, and the position location unit.
23. The monitoring device of claim 10, wherein the controller is further configured to control the position location unit to determine the location and to control the satellite transmitter to transmit the location based on the interval schedule.
24. The monitoring device of claim 10, wherein the interval schedule is at least one of a repeated fixed interval, a set of fixed intervals sequentially executed and repeated as a set, or an interval which is randomly or pseudo-randomly adjusted over time.
25. The monitoring device of claim 15, wherein the controller is configured to detect at least one of the plurality of alarm inputs, and upon detection of an alarm input, to cause the satellite transmitter to transmit alarm data.
26. The monitoring device of claim 15, wherein the controller is configured to detect at least one of the plurality of alarm inputs, and upon detection of an alarm input, to enable power to the satellite transmitter and to the position location unit, and to cause the position location unit to determine the location and to cause the satellite transmitter to transmit the location and alarm data.
27. The monitoring device of claim 15, wherein the controller is configured to detect at least one of the plurality of alarm inputs, and upon detection of an alarm input, to enable power to the external interface.
28. The monitoring device of claim 10, wherein the controller is configured to detect modifications to a configuration parameter, and upon detection of modifications to the configuration parameter, to modify operation in accordance with the configuration parameter.
29. The monitoring device of claim 10, wherein the controller is configured to detect external data from a device, and upon detection of external data, to cause the satellite transmitter to transmit the external data.
30. The monitoring device of claim 10, wherein the controller is configured to queue transmissions to the satellite transmitter and to control the satellite transmitter to transmit the queued transmissions as a block.
31. The monitoring device of claim 10, wherein the controller is configured to control the satellite transmitter to periodically transmit a health status of the remote device.
32. The monitoring device of claim 10, further comprising a motion detection unit.
33. The monitoring device of claim 32, wherein the controller is configured to cause the position location unit to determine the location and to cause the satellite transmitter to transmit the location upon detection of motion by the motion detection unit.
34. The monitoring device of claim 32, wherein the controller is configured to cause the satellite transmitter to transmit a motion detection message upon a determination by the motion detection unit of a stop of motion followed by a start of motion.
35. The monitoring device of claim 32, wherein the controller is configured to cause the satellite transmitter to transmit a motion cease message upon a detection by the motion detection unit of a start of motion followed by a stop of motion.
36. The monitoring device of claim 10, wherein the power management unit is configured to disable power and then enable power to the satellite transmitter on a duty cycle of less than a 1% power-on to power-off ratio
37. A method for monitoring a remote device with an asset management device, the method comprising the steps of:
enabling power to an external interface of the asset management device;
transmitting a synchronization message through the external interface, the synchronization message containing a device identification data field associated with the asset management device;
enabling receive mode on the external interface for a period following transmission of the synchronization message and awaiting a potential response message from one or more remote devices; and
disabling power to the external interface.
38. The method of claim 37, wherein the enabling power step comprises the step of enabling power to an external interface of the asset management device on at least one of a predetermined interval, a predetermined set of intervals, or an interval adjusted randomly or pseudo-randomly over time.
39. The method of claim 37, wherein the remote device is a sensor.
40. The method of claim 37, wherein the synchronization message contains a time data term instructing one or more remote devices of the next scheduled interval.
41. The method of claim 37, further comprising the steps of:
receiving by the asset management device a message from one or more remote devices; and
transmitting data using a satellite transmitter to one or more satellites.
42. The method of claim 41, wherein the transmitted data contains data from at least one of the remote device or the asset management device.
43. The method of claim 37, further comprising the step of logically binding the remote device to the asset management device, whereby the remote device exclusively communicates with the asset management device for a period of time.
44. The method of claim 37, further comprising the step of roaming and temporarily binding by the remote device to one or more asset management devices.
45. The method of claim 37, wherein the external interface is at least one of a wired interface or a wireless interface.
46. A configuration tool for configuring one or more host satellite asset management devices using a wireless interface, wherein a host satellite asset management device includes a position location unit to determine a location of a remote device, a satellite transmitter to transmit the location to a satellite, and an external interface for communicating with the configuration tool.
47. The configuration tool of claim 46, wherein the configuration tool provides for the configuration of a reduced set of host satellite asset management devices, with the reduced set based on data derived from the whole set of detected host asset management devices.
48. The configuration tool of claim 46, wherein the configuration tool configures at least two of the host satellite asset management devices simultaneously.
49. The configuration tool of claim 46, wherein the configuration tool configures one or more remote sensor devices.
50. A gateway device for controlling one or more host satellite asset management devices, the gateway device comprising:
a wireless interface compatible with at least one of a host satellite asset management device or a remote sensor device; and
a controller device to control the wireless interface for communicating with a host satellite asset management device or a remote sensor device.
51. The gateway device of claim 50, wherein at least one of a host satellite asset management device or the gateway device comprises:
a position location unit to determine a location of a remote device;
a satellite transmitter to transmit the location to one or more satellites;
an external interface for communicating with one or more devices; and
a power source.
52. The gateway device of claim 50, wherein the controller device is further configured to detect new and exiting host satellite asset management devices and to communicate a change of device configuration based on proximity to the gateway device.
53. The gateway device of claim 50, wherein the controller device is further configured to detect a host satellite asset management device and to configure the detected host device for low power operation while in proximity to the gateway device.
54. The gateway device of claim 50, wherein the gateway device announces its presence to a host satellite asset management device and wherein the host satellite asset management device alters its mode of operation while in proximity to the gateway device.
55. The gateway device of claim 50, wherein the controller device is further configured to relay information from nearby host satellite asset management devices to other gateway devices.
56. The gateway device of claim 50, wherein the gateway device further comprises a communication interface for communicating with a remote system controller interface.
57. The gateway device of claim 56, wherein the controller device is further configured to monitor nearby host satellite asset management devices and to relay data from the nearby host devices to the communication interface.
58. The gateway device of claim 56, wherein the communication interface is at least one of a wired or wireless interface.
59. An interrogator device comprising:
a wireless interface; and
a controller which monitors and detects the presence of one or more host asset management devices, and upon detection of a host device binds to and initiates a function that results in the host device transmitting a satellite message.
60. The interrogator device of claim 59, wherein the transmitted satellite message contains at least one of location information, interrogator identification information, or interrogator information.
61. The interrogator device of claim 59, wherein at least one of the interrogator device or the host satellite asset management device comprises:
a position location unit to determine a location of a remote device;
a satellite transmitter to transmit the location to one or more satellites;
an external interface for communicating with one or more devices; and
a power source.
62. A method for modifying a configuration of a host satellite asset management device using a gateway device, wherein the host satellite asset management device comprises a position location unit, a satellite transmitter, a wireless interface, a power source, and a controller, and wherein the gateway device comprises a controller, a wireless interface, and a communication interface, the method comprising the steps of:
detecting by the gateway device the presence of the host satellite asset management device using the wireless interface of the gateway device;
establishing a wireless communication channel between the gateway device and the host satellite asset management device; and
modifying by the gateway device the configuration of the host satellite asset management device using the wireless communication channel, wherein the configuration is modified based on instructions received through the communication interface from a remote controller.
63. A method for communicating data using one or more nodes, the method comprising the steps of:
transmitting from a master communication node a Network Master Idle Message comprising a Leader, Master Identification, Control register, Sequence Number, Dither parameter, and a checksum; and
initiating by the master communication node a period of input message detection during which the master communication node awaits a Network Slave Response Message from a slave communication node.
64. The method of claim 63, further comprising the steps of:
transmitting by the slave communication node a Network Slave Response Message;
receiving the Network Slave Response Message by the master communication node; and
performing by the master communication node a function designated in the Network Slave Response Message.
65. The method of claim 63, further comprising the step of resuming by the master communication node, upon receipt of a Network Slave Response Message, a low power mode for a periodic interval indicated by the Dither parameter.
66. The method of claim 63, further comprising the step of resuming by the master communication node, upon failing to receive a Network Slave Response Message, a low power mode for a periodic interval indicated by the Dither parameter.
67. The method of 63, further comprising the steps of:
determining a communications need by the slave communication node;
initiating by the slave communication node a period of input message detection during which the slave communication node awaits a Network Master Idle Message;
receiving the Network Master Idle Message by the slave communication node; and
qualifying the master communication node as acceptable using the Master Identification.
68. The method of 67, further comprising the step of initiating by the slave communication node a transmit function to the master communication node.
69. The method of claim 67, further comprising the step of resuming by the slave communication node a lower power state until the slave communication node determines a communication need.
70. The method of claim 63, wherein the Network Master Idle Message is transmitted on a an interval being at least one of a repeated fixed interval, a set of fixed intervals sequentially executed and repeated as a set, or an interval adjusted with a randomization term to randomly vary the interval.
71. The method of claim 63, wherein at least one of the one or more nodes is a device comprising a position location unit to determine a location of the device, a satellite transmitter to transmit the location to one or more satellites, an external interface for data communications, and a power source.
72. The method of 71, wherein the external interface is at least one of a wired or wireless interface.
US11/480,793 2003-09-08 2006-07-03 Asset management device and method using simplex satellite transmitter augmented with local area transceiver Abandoned US20080018496A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/480,793 US20080018496A1 (en) 2003-09-08 2006-07-03 Asset management device and method using simplex satellite transmitter augmented with local area transceiver
US12/962,848 US20110090041A1 (en) 2003-09-08 2010-12-08 Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/656,133 US7099770B2 (en) 2003-09-08 2003-09-08 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US11/480,793 US20080018496A1 (en) 2003-09-08 2006-07-03 Asset management device and method using simplex satellite transmitter augmented with local area transceiver

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/656,133 Continuation-In-Part US7099770B2 (en) 2003-09-08 2003-09-08 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/962,848 Continuation US20110090041A1 (en) 2003-09-08 2010-12-08 Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver

Publications (1)

Publication Number Publication Date
US20080018496A1 true US20080018496A1 (en) 2008-01-24

Family

ID=34226288

Family Applications (5)

Application Number Title Priority Date Filing Date
US10/656,133 Expired - Lifetime US7099770B2 (en) 2003-09-08 2003-09-08 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US11/063,589 Expired - Lifetime US7337061B2 (en) 2003-09-08 2005-02-24 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US11/480,793 Abandoned US20080018496A1 (en) 2003-09-08 2006-07-03 Asset management device and method using simplex satellite transmitter augmented with local area transceiver
US11/962,898 Abandoned US20080097687A1 (en) 2003-09-08 2007-12-21 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US12/962,848 Abandoned US20110090041A1 (en) 2003-09-08 2010-12-08 Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/656,133 Expired - Lifetime US7099770B2 (en) 2003-09-08 2003-09-08 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US11/063,589 Expired - Lifetime US7337061B2 (en) 2003-09-08 2005-02-24 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter

Family Applications After (2)

Application Number Title Priority Date Filing Date
US11/962,898 Abandoned US20080097687A1 (en) 2003-09-08 2007-12-21 Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US12/962,848 Abandoned US20110090041A1 (en) 2003-09-08 2010-12-08 Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver

Country Status (2)

Country Link
US (5) US7099770B2 (en)
CA (1) CA2446289C (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119002A1 (en) * 2005-08-22 2009-05-07 Astrium Gmbh Terminal For Satellite Navigation System
US20110090041A1 (en) * 2003-09-08 2011-04-21 Gary Naden Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver
US20110116556A1 (en) * 2009-11-17 2011-05-19 Kevin Towers High power radio device communication parameter configuration and methods using limited configuration power
US20110151895A1 (en) * 2009-12-21 2011-06-23 I-Contain Limited Mobile monitoring device and monitoring system for electronic equipment
WO2012003473A1 (en) * 2010-07-02 2012-01-05 Schweitzer Engineering Laboratories, Inc. Systems and methods for remote device management
US8155640B1 (en) * 2005-06-09 2012-04-10 Skybitz, Inc. System and method for mobile terminal initiated satellite communications
WO2012109252A1 (en) * 2011-02-08 2012-08-16 Globalstar, Inc. Solar powered simplex tracker
US20120309300A1 (en) * 2010-02-26 2012-12-06 Thl Holding Company, Llc Bridge device for use in a system for monitoring protective headgear
CN102890871A (en) * 2012-10-23 2013-01-23 中国矿业大学 Remote wireless real-time detection system for terrestrial magnetism parking space
US20130082828A1 (en) * 2007-03-13 2013-04-04 Blackbird Technologies, Inc. Mobile asset tracking unit, system and method
US8538373B2 (en) 2011-05-25 2013-09-17 Blackbird Technologies, Inc. Methods and apparatus for emergency tracking
US20130342394A1 (en) * 2012-06-22 2013-12-26 EyeSpy Security Ltd. Apparatus and system for tracking packaging including bait packaging
US8700313B2 (en) 2006-08-24 2014-04-15 Blackbird Technologies, Inc. Mobile unit and system having integrated mapping, communications and tracking
US20150172364A1 (en) * 2013-12-12 2015-06-18 Sony Corporation Information processing apparatus, relay computer, information processing system, and information processing program
US9106645B1 (en) * 2011-01-26 2015-08-11 Symantec Corporation Automatic reset for time-based credentials on a mobile device
US20170078978A1 (en) * 2015-09-15 2017-03-16 Qualcomm Incorporated Duty cycle-based power control scheme for satellite communication
US9786146B2 (en) 2015-05-22 2017-10-10 3Si Security Systems, Inc. Asset tracking device configured to selectively retain information during loss of communication

Families Citing this family (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6844845B1 (en) * 2003-01-06 2005-01-18 Garmin Ltd. Waterproof combined global positioning system receiver and two-way radio and method of waterproof enclosure fabrication
US7672639B2 (en) * 2003-01-29 2010-03-02 Globalstar, Inc. Method and system for routing telemetry in a simplex mode
US20050159890A1 (en) * 2004-01-16 2005-07-21 Humphries Laymon S. Method and system for scheduling of data retrieval from mobile telemetry devices
WO2006051464A1 (en) * 2004-11-12 2006-05-18 Koninklijke Philips Electronics, N.V. Method for automatic association of medical devices to a patient and concurrent creation of a patient record
US7353034B2 (en) 2005-04-04 2008-04-01 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
US7672262B2 (en) * 2005-04-22 2010-03-02 Baker Hughes Incorporated System, method, and apparatus for command and control of remote instrumentation
US8781671B2 (en) * 2005-06-09 2014-07-15 New York Air Brake Corporation On-board brake system diagnostic and reporting system
GB0521916D0 (en) * 2005-10-27 2005-12-07 Oxloc Ltd Oxloc asset alerts power management strategy
US8712650B2 (en) 2005-11-17 2014-04-29 Invent.Ly, Llc Power management systems and designs
US10882399B2 (en) 2005-11-17 2021-01-05 Invently Automotive Inc. Electric vehicle power management system
US11084377B2 (en) 2005-11-17 2021-08-10 Invently Automotive Inc. Vehicle power management system responsive to voice commands from a Gps enabled device
US11285810B2 (en) 2005-11-17 2022-03-29 Invently Automotive Inc. Vehicle power management system
US11186173B2 (en) 2005-11-17 2021-11-30 Invently Automotive Inc. Electric vehicle power management system
US11186175B2 (en) 2005-11-17 2021-11-30 Invently Automotive Inc. Vehicle power management system
US11345236B2 (en) 2005-11-17 2022-05-31 Invently Automotive Inc. Electric vehicle power management system
US11186174B2 (en) 2005-11-17 2021-11-30 Invently Automotive Inc. Vehicle power management system
US8972161B1 (en) 2005-11-17 2015-03-03 Invent.Ly, Llc Power management systems and devices
US11267338B2 (en) 2005-11-17 2022-03-08 Invently Automotive Inc. Electric vehicle power management system
US11279234B2 (en) 2005-11-17 2022-03-22 Invently Automotive Inc. Vehicle power management system
US11220179B2 (en) 2005-11-17 2022-01-11 Invently Automotive Inc. Vehicle power management system determining route segment length
US11225144B2 (en) 2005-11-17 2022-01-18 Invently Automotive Inc. Vehicle power management system
US11207980B2 (en) 2005-11-17 2021-12-28 Invently Automotive Inc. Vehicle power management system responsive to traffic conditions
US11390165B2 (en) 2005-11-17 2022-07-19 Invently Automotive Inc. Electric vehicle power management system
US11230190B2 (en) 2005-11-17 2022-01-25 Invently Automotive Inc. Electric vehicle power management system
US11254211B2 (en) 2005-11-17 2022-02-22 Invently Automotive Inc. Electric vehicle power management system
US11370302B2 (en) 2005-11-17 2022-06-28 Invently Automotive Inc. Electric vehicle power management system
US11279233B2 (en) 2005-11-17 2022-03-22 Invently Automotive Inc. Electric vehicle power management system
US11267339B2 (en) 2005-11-17 2022-03-08 Invently Automotive Inc. Vehicle power management system
US11247564B2 (en) 2005-11-17 2022-02-15 Invently Automotive Inc. Electric vehicle power management system
US11351863B2 (en) 2005-11-17 2022-06-07 Invently Automotive Inc. Vehicle power management system
US7925426B2 (en) * 2005-11-17 2011-04-12 Motility Systems Power management systems and devices
US11180025B2 (en) 2005-11-17 2021-11-23 Invently Automotive Inc. Electric vehicle power management system
US11207981B2 (en) 2005-11-17 2021-12-28 Invently Automotive Inc. Vehicle power management system
US11214144B2 (en) 2005-11-17 2022-01-04 Invently Automotive Inc. Electric vehicle power management system
US11325468B2 (en) 2005-11-17 2022-05-10 Invently Automotive Inc. Vehicle power management system
US20070170314A1 (en) * 2006-01-26 2007-07-26 Kane Mark E Method and system for locating end of train units
WO2008005012A1 (en) * 2006-07-03 2008-01-10 Axonn Llc Asset management device and method using simplex satellite transmitter augmented with local area transceiver
US7847536B2 (en) 2006-08-31 2010-12-07 Itron, Inc. Hall sensor with temperature drift control
US8024724B2 (en) 2006-08-31 2011-09-20 Itron, Inc. Firmware download
US8312103B2 (en) 2006-08-31 2012-11-13 Itron, Inc. Periodic balanced communication node and server assignment
US8049642B2 (en) * 2006-09-05 2011-11-01 Itron, Inc. Load side voltage sensing for AMI metrology
US8059009B2 (en) 2006-09-15 2011-11-15 Itron, Inc. Uplink routing without routing table
US9354083B2 (en) 2006-09-15 2016-05-31 Itron, Inc. Home area networking (HAN) with low power considerations for battery devices
US8055461B2 (en) 2006-09-15 2011-11-08 Itron, Inc. Distributing metering responses for load balancing an AMR network
US8212687B2 (en) 2006-09-15 2012-07-03 Itron, Inc. Load side voltage sensing for AMI metrology
US8138944B2 (en) 2006-09-15 2012-03-20 Itron, Inc. Home area networking (HAN) with handheld for diagnostics
US7843391B2 (en) 2006-09-15 2010-11-30 Itron, Inc. RF local area network antenna design
US8787210B2 (en) 2006-09-15 2014-07-22 Itron, Inc. Firmware download with adaptive lost packet recovery
US8384558B2 (en) 2006-10-19 2013-02-26 Itron, Inc. Extending contact life in remote disconnect applications
ES2283227B2 (en) * 2007-01-22 2008-03-16 Ingenieria Forestal, S.A. EMERGENCY PERSONAL ALARM SYSTEM.
US8060264B2 (en) * 2007-04-13 2011-11-15 Salco Products Inc. System for monitoring railroad cars
WO2008153232A1 (en) * 2007-06-13 2008-12-18 Ki-Hyung Kim Ubiquitous sensor network system and method of configuring the same
US20090005986A1 (en) * 2007-06-26 2009-01-01 Honeywell International Inc. Low power inertial navigation processing
US8390464B1 (en) * 2007-10-11 2013-03-05 Startrak Information Technologies, Llc Integrating refrigerated transport operations and logistics by creating operational states via wireless communications
US8604925B2 (en) * 2009-10-23 2013-12-10 Globalstar, Inc. Simplex personal and asset tracker
US8130096B2 (en) * 2010-01-20 2012-03-06 Globalstar, Inc. Simplex personal and asset tracker
CA2686037A1 (en) * 2009-11-24 2011-05-24 Kenneth R. Bannard Personnel tracking system
US9442178B2 (en) * 2010-04-23 2016-09-13 Qualcomm Incorporated Hybrid tracking device
WO2011158484A1 (en) * 2010-06-14 2011-12-22 三洋電機株式会社 Terminal device
US10200476B2 (en) 2011-10-18 2019-02-05 Itron, Inc. Traffic management and remote configuration in a gateway-based network
CN103105613B (en) * 2011-11-09 2017-02-08 中兴通讯股份有限公司 Method and device for signal source selection
US9419888B2 (en) 2011-12-22 2016-08-16 Itron, Inc. Cell router failure detection in a mesh network
US9225383B2 (en) 2012-03-14 2015-12-29 Geoforce, Inc. System and method for implementation of a direct sequence spread spectrum transmitter
US9082102B2 (en) 2012-04-10 2015-07-14 Geoforce, Inc. System and method for remote equipment data management
US9916555B2 (en) 2012-04-10 2018-03-13 Geoforce, Inc. Location tracking with integrated identification of cargo carrier contents and related system and method
US9049641B2 (en) 2012-04-10 2015-06-02 Geoforce, Inc. Apparatus and method for radio frequency silencing in oil and gas operations, excavation sites, and other environments
US8924117B2 (en) 2012-05-04 2014-12-30 Wabtec Holding Corp. Brake monitoring system for an air brake arrangement
US9020667B2 (en) 2012-06-11 2015-04-28 Wabtec Holding Corp. Empty-load device feedback arrangement
US10253702B2 (en) * 2012-08-17 2019-04-09 Darren Rivet Control method and system for internal combustion engine
US10078811B2 (en) 2013-11-29 2018-09-18 Fedex Corporate Services, Inc. Determining node location based on context data in a wireless node network
US10453023B2 (en) 2014-05-28 2019-10-22 Fedex Corporate Services, Inc. Methods and node apparatus for adaptive node communication within a wireless node network
DE102014218947A1 (en) * 2014-09-19 2016-03-24 Aspion Gmbh Method and device for monitoring the position of a moving object
US11238397B2 (en) 2015-02-09 2022-02-01 Fedex Corporate Services, Inc. Methods, apparatus, and systems for generating a corrective pickup notification for a shipped item using a mobile master node
US9985839B2 (en) 2015-07-08 2018-05-29 Fedex Corporate Services, Inc. Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events
US9781568B2 (en) * 2016-01-04 2017-10-03 Blackberry Limited Method and mobile transceiver for asset tracking
CN108780538A (en) 2016-03-23 2018-11-09 联邦快递服务公司 The system, apparatus and method of broadcast setting for the node in self-adjusting wireless node network
US10477462B2 (en) * 2016-08-08 2019-11-12 Blackberry Limited Method and mobile transceiver having advanced network selection
BR112020000303A2 (en) 2017-07-07 2020-09-15 Apptricity Corporation network edge controller and remote field service system
KR101985596B1 (en) * 2017-09-18 2019-06-03 이도훈 GPS control system for location based service, and the operating method thereof
US10833799B2 (en) 2018-05-31 2020-11-10 Itron Global Sarl Message correction and dynamic correction adjustment for communication systems
US11915081B2 (en) 2020-04-07 2024-02-27 Apptricity Corporation Flexible radio beacons and flexible delivery structures and system and method for using
WO2021206744A1 (en) 2020-04-07 2021-10-14 Apptricity Corporation Radio frequency (rf) location beacon with tunable antennas and cloud integration
CN111478902B (en) * 2020-04-07 2021-03-23 江苏润和智融科技有限公司 Power edge gateway equipment and sensing data uplink storage method based on same
CN111596648B (en) * 2020-06-10 2021-09-24 中国科学院微小卫星创新研究院 On-orbit experimental verification method for acceleration mode drag-free control

Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4860352A (en) * 1985-05-20 1989-08-22 Satellite Financial Systems Corporation Satellite communication system and method with message authentication suitable for use in financial institutions
US4977577A (en) * 1988-11-02 1990-12-11 Axonn Corporation Wireless alarm system
US5767791A (en) * 1995-11-13 1998-06-16 Vitalcom Low-power circuit and method for providing rapid frequency lock in a wireless communications device
US5801643A (en) * 1996-06-20 1998-09-01 Northrop Grumman Corporation Remote utility meter reading system
US5844482A (en) * 1997-05-20 1998-12-01 Guthrie; Warren E. Tagging system using motion detector
US5959529A (en) * 1997-03-07 1999-09-28 Kail, Iv; Karl A. Reprogrammable remote sensor monitoring system
US5963130A (en) * 1996-10-28 1999-10-05 Zoltar Satellite Alarm Systems, Inc. Self-locating remote monitoring systems
US5987058A (en) * 1988-11-02 1999-11-16 Axonn Corporation Wireless alarm system
US6009306A (en) * 1996-02-05 1999-12-28 Hargis; Keith J. Hub communications satellite and system
US6085090A (en) * 1997-10-20 2000-07-04 Motorola, Inc. Autonomous interrogatable information and position device
US6266008B1 (en) * 1991-12-10 2001-07-24 Charles D. Huston System and method for determining freight container locations
US6317029B1 (en) * 1998-08-07 2001-11-13 Aeroastro, Llc In situ remote sensing
US6396819B1 (en) * 1998-03-21 2002-05-28 Richard D. Fleeter Low-cost satellite communication system
US6512478B1 (en) * 1999-12-22 2003-01-28 Rockwell Technologies, Llc Location position system for relay assisted tracking
US6552652B2 (en) * 2000-11-09 2003-04-22 Synergy Microsystems, Inc. Rescue device
US6559769B2 (en) * 2001-10-01 2003-05-06 Eric Anthony Early warning real-time security system
US6611686B1 (en) * 1999-02-09 2003-08-26 Elite Logistics Services, Inc. Tracking control and logistics system and method
US6657587B1 (en) * 1994-10-12 2003-12-02 Veridian Erim International, Inc. Tracking system using miniaturized concealable communications module
US20040039521A1 (en) * 2002-08-20 2004-02-26 Bluespan, L.L.C. System for monitoring and locating people and objects
US6703946B2 (en) * 2000-05-17 2004-03-09 Omega Patents, L.L.C. Vehicle tracking unit having a self diagnostic mode and related methods
US20040078662A1 (en) * 2002-03-07 2004-04-22 Hamel Michael John Energy harvesting for wireless sensor operation and data transmission
US20040147220A1 (en) * 2003-01-29 2004-07-29 Globalstar L.P. Simplex remote telemetry via a satellite system
US20050052290A1 (en) * 2003-09-08 2005-03-10 Axonn L.L.C. Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US20050068227A1 (en) * 2003-09-26 2005-03-31 Rami Caspi System and method for presence-based area monitoring
US6907346B2 (en) * 2002-02-25 2005-06-14 Sony Corporation GPS receiver apparatus and receiving method
US20050197059A1 (en) * 2004-01-14 2005-09-08 Pioneer Corporation Information processing system, terminal unit, recording device, information processing method, program thereof and recording medium storing the program
US6975941B1 (en) * 2002-04-24 2005-12-13 Chung Lau Method and apparatus for intelligent acquisition of position information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5686888A (en) * 1995-06-07 1997-11-11 General Electric Company Use of mutter mode in asset tracking for gathering data from cargo sensors
WO2000034798A2 (en) * 1998-12-07 2000-06-15 Global Trak, Inc. Apparatus and method for triggerable location reporting

Patent Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4860352A (en) * 1985-05-20 1989-08-22 Satellite Financial Systems Corporation Satellite communication system and method with message authentication suitable for use in financial institutions
US4977577A (en) * 1988-11-02 1990-12-11 Axonn Corporation Wireless alarm system
US5987058A (en) * 1988-11-02 1999-11-16 Axonn Corporation Wireless alarm system
US6266008B1 (en) * 1991-12-10 2001-07-24 Charles D. Huston System and method for determining freight container locations
US6657587B1 (en) * 1994-10-12 2003-12-02 Veridian Erim International, Inc. Tracking system using miniaturized concealable communications module
US5767791A (en) * 1995-11-13 1998-06-16 Vitalcom Low-power circuit and method for providing rapid frequency lock in a wireless communications device
US6009306A (en) * 1996-02-05 1999-12-28 Hargis; Keith J. Hub communications satellite and system
US5801643A (en) * 1996-06-20 1998-09-01 Northrop Grumman Corporation Remote utility meter reading system
US5963130A (en) * 1996-10-28 1999-10-05 Zoltar Satellite Alarm Systems, Inc. Self-locating remote monitoring systems
US5959529A (en) * 1997-03-07 1999-09-28 Kail, Iv; Karl A. Reprogrammable remote sensor monitoring system
US5844482A (en) * 1997-05-20 1998-12-01 Guthrie; Warren E. Tagging system using motion detector
US6085090A (en) * 1997-10-20 2000-07-04 Motorola, Inc. Autonomous interrogatable information and position device
US6396819B1 (en) * 1998-03-21 2002-05-28 Richard D. Fleeter Low-cost satellite communication system
US6317029B1 (en) * 1998-08-07 2001-11-13 Aeroastro, Llc In situ remote sensing
US6611686B1 (en) * 1999-02-09 2003-08-26 Elite Logistics Services, Inc. Tracking control and logistics system and method
US6512478B1 (en) * 1999-12-22 2003-01-28 Rockwell Technologies, Llc Location position system for relay assisted tracking
US6703946B2 (en) * 2000-05-17 2004-03-09 Omega Patents, L.L.C. Vehicle tracking unit having a self diagnostic mode and related methods
US6552652B2 (en) * 2000-11-09 2003-04-22 Synergy Microsystems, Inc. Rescue device
US6559769B2 (en) * 2001-10-01 2003-05-06 Eric Anthony Early warning real-time security system
US6907346B2 (en) * 2002-02-25 2005-06-14 Sony Corporation GPS receiver apparatus and receiving method
US20040078662A1 (en) * 2002-03-07 2004-04-22 Hamel Michael John Energy harvesting for wireless sensor operation and data transmission
US6975941B1 (en) * 2002-04-24 2005-12-13 Chung Lau Method and apparatus for intelligent acquisition of position information
US6778902B2 (en) * 2002-08-20 2004-08-17 Bluespan, L.L.C. System for monitoring and locating people and objects
US20040260463A1 (en) * 2002-08-20 2004-12-23 Bluespan, L.L.C. System for monitoring and locating people and objects
US7050906B2 (en) * 2002-08-20 2006-05-23 Bluespan Inc. System for monitoring and locating people and objects
US20040039521A1 (en) * 2002-08-20 2004-02-26 Bluespan, L.L.C. System for monitoring and locating people and objects
US20040036597A1 (en) * 2002-08-20 2004-02-26 Bluespan, L.L.C. Directional finding system implementing a rolling code
US20040147220A1 (en) * 2003-01-29 2004-07-29 Globalstar L.P. Simplex remote telemetry via a satellite system
US7672639B2 (en) * 2003-01-29 2010-03-02 Globalstar, Inc. Method and system for routing telemetry in a simplex mode
US20050171696A1 (en) * 2003-09-08 2005-08-04 Axonn L.L.C. Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US7099770B2 (en) * 2003-09-08 2006-08-29 Axonn L.L.C. Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US7337061B2 (en) * 2003-09-08 2008-02-26 Axonn, L.L.C. Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US20080097687A1 (en) * 2003-09-08 2008-04-24 Gary Naden Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US20050052290A1 (en) * 2003-09-08 2005-03-10 Axonn L.L.C. Location monitoring and transmitting device, method, and computer program product using a simplex satellite transmitter
US20050068227A1 (en) * 2003-09-26 2005-03-31 Rami Caspi System and method for presence-based area monitoring
US20050197059A1 (en) * 2004-01-14 2005-09-08 Pioneer Corporation Information processing system, terminal unit, recording device, information processing method, program thereof and recording medium storing the program

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110090041A1 (en) * 2003-09-08 2011-04-21 Gary Naden Asset Management Device and Method Using Simplex Satellite Transmitter Augmented with Local Area Transceiver
US9264995B2 (en) 2005-06-09 2016-02-16 Skybitz, Inc. System and method for mobile terminal initiated communications
US8155640B1 (en) * 2005-06-09 2012-04-10 Skybitz, Inc. System and method for mobile terminal initiated satellite communications
US8929279B2 (en) 2005-06-09 2015-01-06 Skybitz, Inc. System and method for mobile terminal initiated satellite communications
US20090119002A1 (en) * 2005-08-22 2009-05-07 Astrium Gmbh Terminal For Satellite Navigation System
US8700313B2 (en) 2006-08-24 2014-04-15 Blackbird Technologies, Inc. Mobile unit and system having integrated mapping, communications and tracking
US8680988B2 (en) * 2007-03-13 2014-03-25 Blackbird Technologies Inc. Mobile asset tracking unit, system and method
US20130082828A1 (en) * 2007-03-13 2013-04-04 Blackbird Technologies, Inc. Mobile asset tracking unit, system and method
US8634482B2 (en) * 2009-11-17 2014-01-21 Cooper Technologies Company High power radio device communication parameter configuration and methods using limited configuration power
US20110116556A1 (en) * 2009-11-17 2011-05-19 Kevin Towers High power radio device communication parameter configuration and methods using limited configuration power
US20110151895A1 (en) * 2009-12-21 2011-06-23 I-Contain Limited Mobile monitoring device and monitoring system for electronic equipment
US9041528B2 (en) * 2010-02-26 2015-05-26 Thl Holding Company, Llc Bridge device for use in a system for monitoring protective headgear
US20120309300A1 (en) * 2010-02-26 2012-12-06 Thl Holding Company, Llc Bridge device for use in a system for monitoring protective headgear
WO2012003473A1 (en) * 2010-07-02 2012-01-05 Schweitzer Engineering Laboratories, Inc. Systems and methods for remote device management
US20120005326A1 (en) * 2010-07-02 2012-01-05 Ryan Bradetich Systems and methods for remote device management
US8578012B2 (en) * 2010-07-02 2013-11-05 Schweitzer Engineering Laboratories Inc Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED
US9106645B1 (en) * 2011-01-26 2015-08-11 Symantec Corporation Automatic reset for time-based credentials on a mobile device
WO2012109252A1 (en) * 2011-02-08 2012-08-16 Globalstar, Inc. Solar powered simplex tracker
US8538373B2 (en) 2011-05-25 2013-09-17 Blackbird Technologies, Inc. Methods and apparatus for emergency tracking
US20130342394A1 (en) * 2012-06-22 2013-12-26 EyeSpy Security Ltd. Apparatus and system for tracking packaging including bait packaging
CN102890871A (en) * 2012-10-23 2013-01-23 中国矿业大学 Remote wireless real-time detection system for terrestrial magnetism parking space
US20150172364A1 (en) * 2013-12-12 2015-06-18 Sony Corporation Information processing apparatus, relay computer, information processing system, and information processing program
US10379699B2 (en) * 2013-12-12 2019-08-13 Sony Corporation Information processing apparatus, relay computer, information processing system, and information processing program
US9786146B2 (en) 2015-05-22 2017-10-10 3Si Security Systems, Inc. Asset tracking device configured to selectively retain information during loss of communication
US20170078978A1 (en) * 2015-09-15 2017-03-16 Qualcomm Incorporated Duty cycle-based power control scheme for satellite communication
CN108141275A (en) * 2015-09-15 2018-06-08 高通股份有限公司 For the power control scheme based on duty ratio of satellite communication
US10412685B2 (en) * 2015-09-15 2019-09-10 Qualcomm Incorporated Duty cycle-based power control scheme for satellite communication

Also Published As

Publication number Publication date
US20080097687A1 (en) 2008-04-24
CA2446289C (en) 2009-08-18
US7337061B2 (en) 2008-02-26
CA2446289A1 (en) 2005-03-08
US20050052290A1 (en) 2005-03-10
US20110090041A1 (en) 2011-04-21
US20050171696A1 (en) 2005-08-04
US7099770B2 (en) 2006-08-29

Similar Documents

Publication Publication Date Title
US20080018496A1 (en) Asset management device and method using simplex satellite transmitter augmented with local area transceiver
WO2008005012A1 (en) Asset management device and method using simplex satellite transmitter augmented with local area transceiver
JP5010404B2 (en) How to collect data on cargo containers
US9832547B2 (en) Association functionality in a mobile monitoring device for continual remote monitoring of a condition
CA2548841C (en) System and method for asset tracking and monitoring
CN101461271B (en) System and method for real-time management of mobile resources
CN101556710B (en) Global tracking management method of container and electronic device and reading-writing device for implementing same
US20070120736A1 (en) Method and system for discrete location triggering for enhanced asset management and tracking
US9436853B1 (en) Methods and apparatus for combining temperature data from separate segments of handling
US8280345B2 (en) LPRF device wake up using wireless tag
US20070216542A1 (en) System and method for remotely tracking and monitoring a container and its contents
US20100277283A1 (en) Systems and methods for RFID tag operation
US20100219938A1 (en) Screening transmissions for power level and object identifier in asset monitoring and tracking systems
US7717338B2 (en) Cargo hold item identification and monitoring system
US20100277280A1 (en) Systems and methods for relaying information with RFID tags
US20100277285A1 (en) Systems and methods for communication with RFID tags
CN105934722A (en) Train and rail yard management system
US20120112902A1 (en) System For Multiple Layered Security Within A Cargo Container
US20090128303A1 (en) System and method for employing geographically overlapping autonomous static and mobile wireless networks for asset tracking
US20100135187A1 (en) System and method for controlling network configuration for moving object
US20210042871A1 (en) Mesh network for parent-child package monitoring
KR20090121722A (en) Vehicle position tracking system and method thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: AXONN, L.L.C., LOUISIANA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHAMBER, STEPHEN;TANNER, RONNIE;QUILLIN, SCOTT;AND OTHERS;REEL/FRAME:023142/0818;SIGNING DATES FROM 20070209 TO 20070219

AS Assignment

Owner name: NOXA HOLDINGS LLC,LOUISIANA

Free format text: CHANGE OF NAME;ASSIGNOR:AXOM L.L.C.;REEL/FRAME:023957/0445

Effective date: 20091231

AS Assignment

Owner name: NOXA HOLDINGS LLC,LOUISIANA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY DATA SHOULD READ AXONN L.L.C. PREVIOUSLY RECORDED ON REEL 023957 FRAME 0445. ASSIGNOR(S) HEREBY CONFIRMS THE CHANGE OF NAME;ASSIGNOR:AXONN L.L.C.;REEL/FRAME:023973/0954

Effective date: 20091231

AS Assignment

Owner name: SPOT LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOXA HOLDINGS LLC (F/K/A AXONN, L.L.C.);REEL/FRAME:024823/0087

Effective date: 20100803

AS Assignment

Owner name: GLOBALSTAR, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SPOT LLC;REEL/FRAME:024915/0605

Effective date: 20100820

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BNP PARIBAS, AS SECURITY AGENT, FRANCE

Free format text: SECURITY INTEREST;ASSIGNOR:GLOBALSTAR, INC.;REEL/FRAME:025609/0048

Effective date: 20100909

AS Assignment

Owner name: BNP PARIBAS, AS SECURITY AGENT, FRANCE

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNMENT DOCUMENT PREVIOUSLY RECORDED AT REEL: 025609 FRAME: 0048. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:GLOBALSTAR, INC.;REEL/FRAME:047887/0001

Effective date: 20100909

AS Assignment

Owner name: GLOBALSTAR, INC., LOUISIANA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BNP PARIBAS;REEL/FRAME:058220/0028

Effective date: 20211108