CA2518974A1 - Network and inventory management system - Google Patents
Network and inventory management system Download PDFInfo
- Publication number
- CA2518974A1 CA2518974A1 CA 2518974 CA2518974A CA2518974A1 CA 2518974 A1 CA2518974 A1 CA 2518974A1 CA 2518974 CA2518974 CA 2518974 CA 2518974 A CA2518974 A CA 2518974A CA 2518974 A1 CA2518974 A1 CA 2518974A1
- Authority
- CA
- Canada
- Prior art keywords
- base station
- network
- information
- location
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Landscapes
- Business, Economics & Management (AREA)
- Economics (AREA)
- Engineering & Computer Science (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Accounting & Taxation (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Description
NETWORK AND INVENTORY MANAGEMENT SYSTEM
The network is comprised of wireless and wired infrastructure and communicates primarily using 2.4GHz ISM band DSSS (Direct Sequence Spread Spectrum) radio technology. The wireless portion of the network is comprised of several different types of base stations as well as central office locations used to communicate, transport and relay information as well as information received by end points.
The base stations and central office locations can also communicate using other types of wireless and wired technologies. Wireless links can include GSM/CDMA/GPRS
cellular radios, microwave repeaters and UHF or VHF radios. Wired links can include cable access points and land line networks. End points are wireless devices used to collect, transmit receive and relay data from customer points of service. The need for a low cost alternative to the higher bandwidth networks being used to collect and transport small amounts of data such as meter reading is great. This type of network provides for ultra low cost customizable hardware (end points), infrastructure and services for a virtually unlimited number of low data applications and services.
PRODUCTS AND SERVICES BY CATEGORY
SECURITY
People track (handheld sniffer w/rssi) Data link backup Security system monitoring and backup Geo fencing (car rentals, generators etc... ) Valuable asset monitoring Home monitoring (in home patient) SAAQ Registrations expiry (criminal record etc... )
The network is comprised of wireless and wired infrastructure and communicates primarily using 2.4GHz ISM band DSSS (Direct Sequence Spread Spectrum) radio technology. The wireless portion of the network is comprised of several different types of base stations as well as central office locations used to communicate, transport and relay information as well as information received by end points.
The base stations and central office locations can also communicate using other types of wireless and wired technologies. Wireless links can include GSM/CDMA/GPRS
cellular radios, microwave repeaters and UHF or VHF radios. Wired links can include cable access points and land line networks. End points are wireless devices used to collect, transmit receive and relay data from customer points of service. The need for a low cost alternative to the higher bandwidth networks being used to collect and transport small amounts of data such as meter reading is great. This type of network provides for ultra low cost customizable hardware (end points), infrastructure and services for a virtually unlimited number of low data applications and services.
PRODUCTS AND SERVICES BY CATEGORY
SECURITY
People track (handheld sniffer w/rssi) Data link backup Security system monitoring and backup Geo fencing (car rentals, generators etc... ) Valuable asset monitoring Home monitoring (in home patient) SAAQ Registrations expiry (criminal record etc... )
2 Short range tracking (school bag, laptop, keys) Hydro electric pole monitoring (hot spots, transformers, pinpoint failures...
) Mobile locating services (avalanche victim, lost individual, kidnapping, special event) Throw away data collection (volcano temperature, life threatening toxic air conditions) Tamper warning (overnight container facility, construction site tool shed... ) Remote monitoring for 3rd party security companies (industrial park surveillance) SAFETY
Traffic sign monitoring Automated lighting (replace photo sensors) Air quality monitoring (C02 levels/Propane leaks/construction site) Seismic activity monitoring Throw away sensing for toxic emission measurements in a fire COMMERCIAL AND CONSUMER SERVICES
Credit TAG (monitor short term financed inventory) Hotel (weather/clock reset) Bell Boy Weather monitoring Special package tracking in real time Fleet management Favorite songs/shows Truck idle monitoring (Freightliner, UPS) Courier velocity monitoring (high acceleration followed by fast breaking) Humidity sensors for lawn care (golf courses, city parks, etc.)
) Mobile locating services (avalanche victim, lost individual, kidnapping, special event) Throw away data collection (volcano temperature, life threatening toxic air conditions) Tamper warning (overnight container facility, construction site tool shed... ) Remote monitoring for 3rd party security companies (industrial park surveillance) SAFETY
Traffic sign monitoring Automated lighting (replace photo sensors) Air quality monitoring (C02 levels/Propane leaks/construction site) Seismic activity monitoring Throw away sensing for toxic emission measurements in a fire COMMERCIAL AND CONSUMER SERVICES
Credit TAG (monitor short term financed inventory) Hotel (weather/clock reset) Bell Boy Weather monitoring Special package tracking in real time Fleet management Favorite songs/shows Truck idle monitoring (Freightliner, UPS) Courier velocity monitoring (high acceleration followed by fast breaking) Humidity sensors for lawn care (golf courses, city parks, etc.)
3 Satellite TV
DVD Return (beep... ) Temperature monitoring (Food/pharmaceutical) AUTOMATION
Automatic meter reading Inventory management (pallet) Stock level monitoring and replenishment (vending machine) Mail box notification Garbage container level notification Automated sprinkler (Farmers etc... ) MARKETING
Geo marketing (where are products moving, trends... ) Piggyback cell phone battery pack Flight time data & Information PRODUCTS
Low cost text pager Kit cadeau Network vehicle/equipment starter (irrigation pumps) Wireless pool temperature and chemical monitor (includes add quantities...) Wireless OBD2 data information
DVD Return (beep... ) Temperature monitoring (Food/pharmaceutical) AUTOMATION
Automatic meter reading Inventory management (pallet) Stock level monitoring and replenishment (vending machine) Mail box notification Garbage container level notification Automated sprinkler (Farmers etc... ) MARKETING
Geo marketing (where are products moving, trends... ) Piggyback cell phone battery pack Flight time data & Information PRODUCTS
Low cost text pager Kit cadeau Network vehicle/equipment starter (irrigation pumps) Wireless pool temperature and chemical monitor (includes add quantities...) Wireless OBD2 data information
4 Base Stations (see diactram) 1: Master base station The master base station is used to communicate information via wireless and or wired links back to the central. The information is collected from slave and or lower tier base stations as well as end-points. The time at which the information will be communicated to the central is based on its priority level. Information that is not time sensitive can be buffered and sent at a time when data traffic levels are lower thus maximizing network bandwidth. The master base stations will also be responsible for network channel assignments (control channel) as well as various information updates to other base stations and end points.
2: 2"d tier base station The second tier base station is used to communicate with master base stations. This base station will communicate with the master base station based on the priority level of the information received from end points.
Information that is not time sensitive can also be buffered and sent at a time when data traffic levels are lower thus maximizing network bandwidth. This type of base station will operate using channel assignments received from master base stations.
3: Combination base station The combination base station can communicate with central offices, master base stations and 2"d tier base stations via wireless and or wired links. It can also operate as a standalone unit not requiring information and or instructions from either a central office or other base stations (customer/application site specific base station). This type of base station could be used in an application requiring limited geographical area coverage and no network support.
2: 2"d tier base station The second tier base station is used to communicate with master base stations. This base station will communicate with the master base station based on the priority level of the information received from end points.
Information that is not time sensitive can also be buffered and sent at a time when data traffic levels are lower thus maximizing network bandwidth. This type of base station will operate using channel assignments received from master base stations.
3: Combination base station The combination base station can communicate with central offices, master base stations and 2"d tier base stations via wireless and or wired links. It can also operate as a standalone unit not requiring information and or instructions from either a central office or other base stations (customer/application site specific base station). This type of base station could be used in an application requiring limited geographical area coverage and no network support.
5 4. Mobile base station The mobile base station can communicate with master, 2nd tier and combination base stations as well as with a central office once setup. This type of base station can be used in a temporary application such as special events and special tracking applications. Mobile base stations can also be used in vehicles such as service and repair or monitoring vehicles for remote data collection and processing. The mobile base station can also operate as a standalone unit.
Central office The central office is used to provide main operational support to the network.
It can communicate with the base stations via wireless and wired links. The central office can also be used to communicate information serviced by the network directly to customers and or various service providers. The central office can communicate directly with 3rd parties and can also be used as a dispatching service provider for applications requiring such services. The central office will also handle miscellaneous task such as automated billing services and so on.
Central office The central office is used to provide main operational support to the network.
It can communicate with the base stations via wireless and wired links. The central office can also be used to communicate information serviced by the network directly to customers and or various service providers. The central office can communicate directly with 3rd parties and can also be used as a dispatching service provider for applications requiring such services. The central office will also handle miscellaneous task such as automated billing services and so on.
6 End Point The "end-point" is a wireless device used to collect, communicate, receive and relay data to the network. The data is collected from the host to which it is interfaced. An end point can be fully customized based on its intended use.
Depending on the application the device interface will be customized to the host specifications. The end point can be made to operate using AC or DC power sources. The data transmitted by an end-point can be given a priority setting that will determine when where and how the data will be carried and routed by the network. A high priority message would include alarm monitoring data where as a low level priority message could include weather or vending machine data. The end-point device can also be comprised of several radio modules, larger memory blocs and different sensors. The housing can also be customized in order to withstand harsh operating conditions.
Protocol items Data transfer (routing and destination info) Packet structure and build Base station types and their functionalities TAG/End point functionality Priority level Priority handling/routing Channel assignment table Star/Mesh and (Distress or Critical) Topology Jam sensing Environment learning / Dynamic networking
Depending on the application the device interface will be customized to the host specifications. The end point can be made to operate using AC or DC power sources. The data transmitted by an end-point can be given a priority setting that will determine when where and how the data will be carried and routed by the network. A high priority message would include alarm monitoring data where as a low level priority message could include weather or vending machine data. The end-point device can also be comprised of several radio modules, larger memory blocs and different sensors. The housing can also be customized in order to withstand harsh operating conditions.
Protocol items Data transfer (routing and destination info) Packet structure and build Base station types and their functionalities TAG/End point functionality Priority level Priority handling/routing Channel assignment table Star/Mesh and (Distress or Critical) Topology Jam sensing Environment learning / Dynamic networking
7 Architecture items to define further Base station types - Descriptions+locations+coverage+functionality Central - Description+functionality High level network protocol and architecture points - Alarm monitoring data can be verified at different intervals based on network traffic. The verifications can also be sporadic.
- Data routing can be customized based on message priority. A critical message will be sent via a more direct route, etc.
- End points will send "distress" message to "all" within its vicinity if it has not heard from its local base station in a set amount of time.
- End points will also accelerate and increase the number of transmissions.
- End point can move from a networked scenario (relay it's information via a base station and so on) to a point to point scenario (relay info via other end points within range). Selection of which end point to send to will be based on the RSSI.
- Communication between 2 end points can be done in several different manners based on RSSI levels Tower IDs and destination ID.
- Ex: The 2 end points will communicate to each other without sending through a base station if RSSI level is high = Point to point.
- Data routing can be customized based on message priority. A critical message will be sent via a more direct route, etc.
- End points will send "distress" message to "all" within its vicinity if it has not heard from its local base station in a set amount of time.
- End points will also accelerate and increase the number of transmissions.
- End point can move from a networked scenario (relay it's information via a base station and so on) to a point to point scenario (relay info via other end points within range). Selection of which end point to send to will be based on the RSSI.
- Communication between 2 end points can be done in several different manners based on RSSI levels Tower IDs and destination ID.
- Ex: The 2 end points will communicate to each other without sending through a base station if RSSI level is high = Point to point.
8 - Ex: 2 end points will communicate with each other via a base station if Rssi level is to low and the tower IDs contained in the messages match. = Point to Base station to point.
- Ex: 2 end points will communicate with each other via the full network if the messages have different tower iDs = Point to base station to central to point.
- Packets can contain the following:
Header/Priority level/Tower id/Endpoint id/DATA/status/RSSI
info/1/oltage/Destination ID
- Endpoints can move from STAR to MESH topology based on RSSI
levels/message priority/specific routing instructions/jamming sensor, etc.
- End points have "ENVIRONMENT SENSING & LEARNING" or "DYNAMIC
NETWORKING" capability. An endpoint learns "acquires the location or IDs of other end points and base stations within range. This is done in order to establish the most efficient mode of information routing. It is also done in order to establish an emergency routing scenario "in case"...The end point can also send its "acquired knowledge" back to the central.
- JAM Sensing: An end point or ANY network element can sense jamming equipment based on RSSI level fluctuations. These elements can react by selecting alternate channels/using back up routing and call also accelerate and increase the transmissions. These elements can also power up or down the output power of the radio.
- Ex: 2 end points will communicate with each other via the full network if the messages have different tower iDs = Point to base station to central to point.
- Packets can contain the following:
Header/Priority level/Tower id/Endpoint id/DATA/status/RSSI
info/1/oltage/Destination ID
- Endpoints can move from STAR to MESH topology based on RSSI
levels/message priority/specific routing instructions/jamming sensor, etc.
- End points have "ENVIRONMENT SENSING & LEARNING" or "DYNAMIC
NETWORKING" capability. An endpoint learns "acquires the location or IDs of other end points and base stations within range. This is done in order to establish the most efficient mode of information routing. It is also done in order to establish an emergency routing scenario "in case"...The end point can also send its "acquired knowledge" back to the central.
- JAM Sensing: An end point or ANY network element can sense jamming equipment based on RSSI level fluctuations. These elements can react by selecting alternate channels/using back up routing and call also accelerate and increase the transmissions. These elements can also power up or down the output power of the radio.
9 - (Preliminary) End points will be controlled using 3 main control channels:
Timing info (yr/mm/dd/hr/mn/sec/ms) and traffic/weather (used to give battery powered end points a time slot to transmit and receive so as to save battery life and avoid network and spatial saturation.
Special commands to individual and or groups (all quiet/all power up-down, etc.
Locating IDs=low power endpoint to base station (sent to end point and end point re-transmit to base station on command or automatically) This invention also pertains to an inventory management system (IMS). The IMS
is comprised of numerous transmitters and or transceivers, fixed and or mobile electronic readers (base stations) linked to a network/server and database. An item is outfitted with one or more identifying tags (ID tags) which are registered in the database. These ID tags are used to remotely identify the item to which it is attached as well as its location.
An area is outfitted with location beacons that transmit location numbers or IDs which correlate to a specific area or location and that are received by the ID
tags and then transmitted by the ID tags back to a base station and or central for data logging, locating and or identification purposes. In order to determine the exact coverage size and location for the location beacon, a location beacon can operate at different output power levels and can be outfitted with different types of antennae such as directional or omni-directional antennae.
The system also includes remote data collectors or mobile base stations. These devices are used when inventory or assets are moved from one location (building ,etc.) to another. These devices constantly listen for ID tag transmissions and keep them in a buffer in order to upload the received information to a central or master base station. The mobile base stations can be used by service and repair personnel, warehouse personnel, production personnel and so on.
System components detailed ID Tag (Typically a battery operated transceiver): The ID Tag is a transceiver that transmits a unique ID along with several other pieces of information.
This
Timing info (yr/mm/dd/hr/mn/sec/ms) and traffic/weather (used to give battery powered end points a time slot to transmit and receive so as to save battery life and avoid network and spatial saturation.
Special commands to individual and or groups (all quiet/all power up-down, etc.
Locating IDs=low power endpoint to base station (sent to end point and end point re-transmit to base station on command or automatically) This invention also pertains to an inventory management system (IMS). The IMS
is comprised of numerous transmitters and or transceivers, fixed and or mobile electronic readers (base stations) linked to a network/server and database. An item is outfitted with one or more identifying tags (ID tags) which are registered in the database. These ID tags are used to remotely identify the item to which it is attached as well as its location.
An area is outfitted with location beacons that transmit location numbers or IDs which correlate to a specific area or location and that are received by the ID
tags and then transmitted by the ID tags back to a base station and or central for data logging, locating and or identification purposes. In order to determine the exact coverage size and location for the location beacon, a location beacon can operate at different output power levels and can be outfitted with different types of antennae such as directional or omni-directional antennae.
The system also includes remote data collectors or mobile base stations. These devices are used when inventory or assets are moved from one location (building ,etc.) to another. These devices constantly listen for ID tag transmissions and keep them in a buffer in order to upload the received information to a central or master base station. The mobile base stations can be used by service and repair personnel, warehouse personnel, production personnel and so on.
System components detailed ID Tag (Typically a battery operated transceiver): The ID Tag is a transceiver that transmits a unique ID along with several other pieces of information.
This
10 information can include location number (number received from a location beacon), status information, hour meter, temperature, etc. The type of information transmitted by the ID Tag is dependant upon what type of object that it is either installed on or interfaced to.
Ex: Pallet of food: This type of application would require the use of an ID
Tag capable of measuring the temperature of the goods on the pallet and transmitting the information.
Ex: Rental equipment (lift truck): This type of application would require the use of an ID Tag capable of counting the number of (in use) hours and transmitting the information for billing purposes.
Location Beacon (Typically a battery operated transmitter): The location beacon is a transmitter that constantly transmits a unique ID number on a "reserved" channel. This ID correlates to a specific area or location. The ID
is received and then re-transmitted by the ID Tag to a base station and or central in order to identify and be able to locate the item to which a particular ID Tag is affixed. In order to control the coverage area of a location beacon, the beacon can operate at different output power levels thus increasing or reducing the range at which the beacon ID can be received by an ID Tag. The location beacon can also
Ex: Pallet of food: This type of application would require the use of an ID
Tag capable of measuring the temperature of the goods on the pallet and transmitting the information.
Ex: Rental equipment (lift truck): This type of application would require the use of an ID Tag capable of counting the number of (in use) hours and transmitting the information for billing purposes.
Location Beacon (Typically a battery operated transmitter): The location beacon is a transmitter that constantly transmits a unique ID number on a "reserved" channel. This ID correlates to a specific area or location. The ID
is received and then re-transmitted by the ID Tag to a base station and or central in order to identify and be able to locate the item to which a particular ID Tag is affixed. In order to control the coverage area of a location beacon, the beacon can operate at different output power levels thus increasing or reducing the range at which the beacon ID can be received by an ID Tag. The location beacon can also
11 be equipped with various types of antennae including directional, semi-directional and omni-directional in order to establish a coverage area with greater precision.
Fixed Base Station (Master transceiver): The Base station is a master transceiver used to communicate with the mobile base stations, the ID Tags as well as any location beacons that have receive capability. The base station is interfaced to a pc via an RS232 or USB port and is controlled by a proprietary GUl/program. The base station can request updated/real time location information from an ID Tag. It can also request an upload of information stored in a mobile base station (detailed further in this document). The base station can also be used in order to perform coverage tests and so on.
Mobile Base Station (mobile transceiver): The mobile transceiver is a device used in order to receive and communicate with ID Tags and location beacons found in remote locations (location other than the "home" location of an ID
Tag and the mobile base station). When a mobile base station no longer hears its home beacon it begins to listen for ID Tag transmissions and logs the data in its memory until it returns to its home area or location and hears an upload request from a master base station. It will then upload all of the ID Tag information stored in its memory to the master base station for system updating.
Ex: A Lift truck is rented to a warehouse. The rental service truck is outfitted with a mobile base station and is used to collect the remote information. As the truck leaves its home area and no longer hears its home locator beacon, it will begin to listen for ID Tags and will log any such transmissions in its memory. As the truck approaches the warehouse where the lift truck has been rented to, the mobile base station will log the information sent by the ID Tag (ID number, Location ID, Hour counter "for billing", Tag status and so on) and will upload this information when it return to it's home location and hears the upload request.
Fixed Base Station (Master transceiver): The Base station is a master transceiver used to communicate with the mobile base stations, the ID Tags as well as any location beacons that have receive capability. The base station is interfaced to a pc via an RS232 or USB port and is controlled by a proprietary GUl/program. The base station can request updated/real time location information from an ID Tag. It can also request an upload of information stored in a mobile base station (detailed further in this document). The base station can also be used in order to perform coverage tests and so on.
Mobile Base Station (mobile transceiver): The mobile transceiver is a device used in order to receive and communicate with ID Tags and location beacons found in remote locations (location other than the "home" location of an ID
Tag and the mobile base station). When a mobile base station no longer hears its home beacon it begins to listen for ID Tag transmissions and logs the data in its memory until it returns to its home area or location and hears an upload request from a master base station. It will then upload all of the ID Tag information stored in its memory to the master base station for system updating.
Ex: A Lift truck is rented to a warehouse. The rental service truck is outfitted with a mobile base station and is used to collect the remote information. As the truck leaves its home area and no longer hears its home locator beacon, it will begin to listen for ID Tags and will log any such transmissions in its memory. As the truck approaches the warehouse where the lift truck has been rented to, the mobile base station will log the information sent by the ID Tag (ID number, Location ID, Hour counter "for billing", Tag status and so on) and will upload this information when it return to it's home location and hears the upload request.
12 Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter or change the nature and scope of the present invention.
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2518974 CA2518974A1 (en) | 2005-09-09 | 2005-09-09 | Network and inventory management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2518974 CA2518974A1 (en) | 2005-09-09 | 2005-09-09 | Network and inventory management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2518974A1 true CA2518974A1 (en) | 2007-03-09 |
Family
ID=37871979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2518974 Abandoned CA2518974A1 (en) | 2005-09-09 | 2005-09-09 | Network and inventory management system |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2518974A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446289A (en) * | 2016-11-11 | 2017-02-22 | 无锡雅座在线科技发展有限公司 | Information inquiry method and device based on Pinpoint |
CN111638487A (en) * | 2020-05-07 | 2020-09-08 | 中国第一汽车股份有限公司 | Automatic parking test equipment and method |
-
2005
- 2005-09-09 CA CA 2518974 patent/CA2518974A1/en not_active Abandoned
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446289A (en) * | 2016-11-11 | 2017-02-22 | 无锡雅座在线科技发展有限公司 | Information inquiry method and device based on Pinpoint |
CN106446289B (en) * | 2016-11-11 | 2019-10-01 | 无锡雅座在线科技股份有限公司 | Information query method and device based on Pinpoint |
CN111638487A (en) * | 2020-05-07 | 2020-09-08 | 中国第一汽车股份有限公司 | Automatic parking test equipment and method |
CN111638487B (en) * | 2020-05-07 | 2022-07-22 | 中国第一汽车股份有限公司 | Automatic parking test equipment and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101112077B (en) | Method and system to monitor a person using wireless media | |
US11868102B2 (en) | Monitoring apparatus and system | |
KR101812527B1 (en) | Smart port system for BLE beacon-based port incoming and outgoing vehicle management | |
US10580276B2 (en) | System and method for automatic tool tracking, monitoring, and inventory management | |
US8816850B2 (en) | Tracking and monitoring system for opencast mines | |
US8587414B2 (en) | Wireless information and safety system for mines | |
US20120116931A1 (en) | Method for establishing an impromtu geofenced area to organize and analyze shipments | |
CN100387030C (en) | Wireless transceiver network employing node-to-node data messaging | |
JP5010404B2 (en) | How to collect data on cargo containers | |
CN100450269C (en) | Monitoring changeable locations of client devices in wireless networks | |
US20040217864A1 (en) | Tagging and tracking system for assets and personnel of a commercial enterprise | |
CN101848419A (en) | Positioning and tracking system of underground/roadway moving object | |
CN101725370A (en) | Underground locating and monitoring system | |
CN109791646A (en) | Article tracking system | |
US20090309731A1 (en) | Method and system for tracking objects using Global Positioning System (GPS) receiver built in the Active Radio Frequency ID (RFID) receiver | |
CN102185745A (en) | IOT (internet of things) service system | |
CN109146023A (en) | Shipping mass monitoring method based on assets material object ID intelligent recognition | |
CN101923779A (en) | Sensor network-based intelligent public traffic scheduling and monitoring system | |
CA2518974A1 (en) | Network and inventory management system | |
KR20110061191A (en) | Management system on underground city-gas facility | |
CN103016061A (en) | Underground locating and monitoring communication system | |
US20090040051A1 (en) | System and Method for Identifying First Responders in a Hazardous Environment | |
CN201698022U (en) | System for locating and tracking moving target in pit/tunnel | |
CN215010726U (en) | Flow guide equipment positioning management system of rail transit station | |
CN108491746A (en) | A kind of piping lane intellectualized management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |