CN113392944A - Wireless safety monitoring device for computer application - Google Patents

Wireless safety monitoring device for computer application Download PDF

Info

Publication number
CN113392944A
CN113392944A CN202110676279.5A CN202110676279A CN113392944A CN 113392944 A CN113392944 A CN 113392944A CN 202110676279 A CN202110676279 A CN 202110676279A CN 113392944 A CN113392944 A CN 113392944A
Authority
CN
China
Prior art keywords
monitoring
monitoring unit
sensor
memory
radio frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110676279.5A
Other languages
Chinese (zh)
Inventor
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Vocational And Technical College
Original Assignee
Suzhou Vocational And Technical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Vocational And Technical College filed Critical Suzhou Vocational And Technical College
Priority to CN202110676279.5A priority Critical patent/CN113392944A/en
Publication of CN113392944A publication Critical patent/CN113392944A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092

Abstract

A computer-implemented wireless security monitoring system includes a system for monitoring the status of a container using one or more monitoring units mounted on the container, including a power source, sensors using reflected energy with programmable parameters, sensor identification, recording capabilities on the time axis, long term memory, and the ability to rebroadcast information on Radio Frequency Identification (RFID) radio technologies. Programmable monitoring hardware in the monitoring unit detects significant changes in sensor output as a triggering event. The programmable monitoring hardware includes a memory for storing container identification information. The sensor may comprise a conventional device that can detect various forms of energy, including visible light, infrared light, magnetic fields, radio frequency energy, and sound, which events can be recorded for subsequent readout and/or can immediately generate a radio frequency transmission.

Description

Wireless safety monitoring device for computer application
Technical Field
The invention relates to a monitoring device, in particular to a computer application wireless safety monitoring device.
Background
The computer application is a method and technology for applying a computer to various fields, and the method and technology comprise office automation, factory automation and home automation, and along with the continuous improvement of life quality of people, the safety of a home is more and more emphasized, and then a wireless safety monitoring device applied to the computer is derived to wirelessly monitor the safety of the home, but the prior art has the following defects:
the wireless monitoring system is a combination of monitoring and wireless transmission technologies, can transmit field information of different places to a wireless monitoring center in real time through a wireless communication means, and automatically forms a video database for facilitating retrieval in the future.
Therefore, the application provides a computer application wireless safety monitoring device, and the existing problems are improved.
Disclosure of Invention
To overcome the disadvantages and shortcomings of the prior art, the present invention provides a computer-implemented wireless security monitoring device, which includes a monitoring unit or units mounted on a container for monitoring the status change of the container;
the monitoring unit of the invention includes a power source, sensors using reflected energy with programmable parameters, sensor identification, recording capabilities on the time axis, long term memory, and the ability to rebroadcast information on radio frequency identification radio technologies;
the invention relates to a programmable monitoring hardware in a monitoring unit, which is used for detecting the major change output by a sensor as a trigger event and comprises a memory for storing container identification information;
the sensor of the present invention may comprise conventional devices that can detect various forms of energy, including visible light, infrared light, magnetic fields, radio frequency energy, and sound;
the status and record information contained in the monitoring unit of the present invention can be read by radio frequency communication with any suitably equipped device;
one or more monitoring units and one or more readers according to the present invention for reading information from or communicating with the monitoring units,
any suitable equipment described herein includes handheld/mobile devices, laptop computers, desktop computers, and/or dedicated fixed location devices.
The readers of the invention all have radio frequency capability, and may be commercially available cards that are inserted into slots of a computer, the card having a transmitter, a receiver and an antenna, the reader sending and receiving radio signals to a monitoring unit, the monitoring unit including one or more sensors and a radio frequency transmitter/receiver;
the monitoring units of the present invention are built into the monitoring electronics, including a microcomputer, memory and interface hardware to the sensors, the programs or firmware that control the monitoring electronics are developed using standard programming equipment and techniques, each monitoring unit includes the capability of an active RFID tag because it has memory to store identification information associated with its attached container;
the radio frequency transmitter/receiver 25 of the present invention has an address or ID associated with it for identifying transmissions from it and from it, independent of the container's identification information. Any radio device can contact directly and recognize from its signal as a unique single unit, a radio frequency identification radio;
the monitoring unit can move everywhere and is provided with a self-sufficient high-capacity power supply;
the monitoring units of the present invention may communicate via radio frequency transmissions and respond individually or in groups. The distance between the readers and the actual rf transmitter/receiver function of the monitoring unit and various environmental factors such as the physical characteristics of the container, but utility and signals up to 300 feet in distance can typically be passed through a container;
the sensors in the monitoring unit include conventional devices that detect various forms of energy, including visible light, inertial light, magnetic fields, radio frequency energy, and sound.
The monitoring unit of the invention using RFID tags, the sensors are connected to a suitable analog interface, which in turn is connected to an analog-to-digital converter.
The analog interface of the present invention may also be connected directly to a digital logic bus, a microprocessor executing a control program stored in a memory, the microprocessor and memory may be part of a single integrated circuit such as a microcomputer,
the power supply is powered by a battery, the battery is monitored by a power supply monitor, and the RFID tag is connected to the microprocessor independent RFID tag and comprises a radio frequency circuit, a battery, an antenna, a logic circuit and a software program for recording the time of a nonvolatile memory. This timeline may record events and recover as the time of occurrence of the event, when the monitoring sensor detects a triggering event such as a door open, a fault signal is stored in volatile memory until it can be transferred to the timeline of the self-contained RFID tag, which can then be read by the reader.
The sensor of the present invention is placed close to a door, cargo or other monitored object, and the monitoring unit whose maximum distance is limited by the sensor's ability can be mounted inside the container with screws, magnets, etc. The sensor is preferably equipped with an energy transmitter and receiver aimed at the target, and there is no obstacle between the sensor and the target, and the sensor will detect a change or no change in the reflected energy of the target when the target is moving or disturbed.
The logic control, and monitoring sensors and timetable or real time clock of the present invention are part of the RFID circuit, and its memory or memory maintained in a separate memory access a self contained RFID tag and memory for subsequent propagation as long as the fault information mediation is suitable for transmitting or storing timestamps.
The application program of the reader of the invention must encrypt the data, only authorized readers and users can see the data, but a few people with proper authority can change the data, any unauthorized data modification attempt can cause the electronic envelope to be destroyed, once the electronic seal is destroyed, the electronic envelope will break down, and a proper notice can be sent;
the data of the invention can be written by a three step encryption process, first, the data to be written is encrypted using a standard encryption algorithm (64 bits, 128 bits or 1024 bits depending on the country where the application is used). An initial checksum key is stored in the data stream for verifying that the data structure is complete upon decryption.
The resulting data is then preferably compressed using prior art compression methods to both optimize space in the tag memory and provide additional data scrambling.
Finally, when reading the data from the monitoring unit, the reader will perform in reverse, and at the end of the decryption process, the validity of the checksum key will be tested, indicating that the data has actually returned to its original state, some or all of which, depending on the authorization of the user, will be available to the user.
Drawings
FIG. 1 is a flow chart of the overall steps of the present invention
FIG. 2 is a block diagram of an embodiment of a monitoring unit of the present invention
FIG. 3 is a block diagram of an embodiment of an RS485 serial interface of the present invention
FIG. 4 is a diagram of an embodiment of the present invention
Detailed Description
It should be noted that the embodiments and features of the embodiments can be combined with each other without conflict, and the present application will be further described in detail with reference to the drawings and specific embodiments.
As shown in fig. 1, a computer-implemented wireless security monitoring device, the system includes a method of tin foil monitoring the status or change of status of a container using one or more monitoring units mounted on the container. The monitoring unit preferably includes a power source, sensors using reflected energy with programmable parameters, sensor identification, recording capabilities on a time axis, long term memory, and the ability to rebroadcast information on radio frequency identification radio technologies. Programmable monitoring hardware in the monitoring unit detects significant changes in sensor output as a triggering event. The programmable monitoring hardware includes a memory for storing container identification information. The sensor may comprise a conventional device that can detect various forms of energy, including visible light, infrared light, magnetic fields, radio frequency energy, and sound. This event may be recorded as a subsequent readout and/or a radio frequency transmission may be generated immediately. In one embodiment, the monitoring unit is mounted in a container suitable for long distance transport. The sensor arrangement causes opening and closing of the container door to produce a change in the sensor output that is detected by the monitoring hardware as a triggering event. The triggering event may be used for security of tamper detection. The status and record information contained in the monitoring unit can be read by radio frequency communication with any suitably equipped device, including hand-held devices and laptops.
Fig. 1 depicts a system 20 according to the present invention. The system 20 includes one or more monitoring units 21 and one or more readers 30 for reading information from the monitoring units 21 or communicating with the monitoring units 21, such as handheld/mobile devices 31, laptop computers 32, desktop computers 33 and/or dedicated fixed location devices 34. Each reader 30 has radio frequency capability and may be a commercially available card that plugs into a slot of a computer. The card has a transmitter, a receiver and an antenna. The reader 30 preferably sends and receives radio signals to the monitoring group 21. The monitoring unit 21 includes one or more sensors 22 and a radio frequency transmitter/receiver 25. Radio frequency capability is limited to transmissions for certain applications. The monitoring unit 21 is built into the monitoring electronics 24, which includes a microcomputer, memory and interface hardware to the sensor 22. The program or firmware that controls the monitoring electronics 24 is developed using standard programming equipment and techniques. Each monitoring unit 21 includes the capability of an active RFID tag because it has memory to store identification information associated with the container to which it is attached. The rf transmitter/receiver 25 has an address or ID associated with it for identifying transmissions from it and from it, independent of the container's identification information. Any radio device capable of direct contact and recognizing from its signal as a unique single unit is a radio frequency identification radio may be used within the scope of the present invention. Such as a GSM handset. Ultra-wideband radio, satellite radio, and spread spectrum radio. Any of the radios described above may be substituted for the radio frequency transmitter/receiver 25. Since the number 21 monitoring unit is intended to move with the container, a self-sufficient power source, such as a battery, is required.
In certain applications, a large number of monitoring units 21 may be used simultaneously in a yard, warehouse, etc. Various containers may be equipped with a monitoring unit 21. The monitoring unit 21 may communicate via radio frequency transmission and respond individually or in groups. The distance between readers 30 and the actual rf transmitter/receiver function 25 of the monitoring unit 21 and various environmental factors such as physical characteristics of the container, but typically utilities and signals up to 300 feet in distance may be passed through a container. Active RFID technology is commercially available and the present invention may be implemented, in part, using active RFID technology. The sensor 22 is used to monitor changes in the environment in the container. For example, the opening and closing of the door may be detected. The sensors may also be used to detect movement of cargo or intrusion into the container. The sensor typically uses reflected energy, for example, the presence of a door can be sensed by transmitting and receiving the reflected energy. This method does not require breaking or cutting of wires or cables to sound an alarm, nor does it require switches or electromagnetic contacts to operate or sound an alarm. The present invention is not limited to any particular type of sensor. The sensors 22, which may be usefully included in the monitoring unit 21 according to the present invention, include conventional devices for detecting various forms of energy, including visible light, inertial light, magnetic fields, radio frequency energy, and sound.
Fig. 2 illustrates an embodiment of monitoring unit 21 using RFID tag 54. This embodiment can be used for tamper detection security. The sensor 22 is connected to a suitable analogue interface 42, which interface 42 is in turn connected to an analogue to digital converter 44. The analog interface 42 may also be connected directly to the digital logic bus 46 because some microcomputer devices have a built-in a/D converter. The microprocessor executes a control program stored in the memory. The microprocessor and memory may be part of a single integrated circuit such as a microcomputer. Power was supplied by battery No. 52, which was monitored by a power supply monitor No. 54. The avatar RF communication here is a software program that is connected by a separate RFID tag 54 to the microprocessor 48. the separate RFID tag contains the radio frequency circuitry, battery, antenna, logic circuitry and time records of non-volatile memory. This timeline may record events and recover as events occur. When the monitoring sensor detects a triggering event such as a door open, the fault signal is stored in volatile memory until it can be transferred to the self-contained RFID tag's timeline. The reader can then read this information.
The monitoring unit 21 of the present invention monitors the safety of any container, crate or container, immediately or subsequently disseminated by monitoring conditions such as door position or opening devices and recording such information. More specifically, the position of the door, etc. is returned to the sensor by transmitting and receiving energy, as it is reflected to the door. When the door is opened, the energy received by the sensor changes, and a fault state occurs. The fault signal is then immediately replayed and/or recorded with a relative or real time timestamp for transmission by the radio frequency communication signal.
The device may use sensors instead of physical seals or electromechanical switches to monitor the door, door jam, door frame, moving opening or moving side (hereinafter "door") depending on its installation location. The device allows the sensor to detect a fault condition when the door is moved and record it as a time stamp accessible to the RFID tag for transmission to the RFID reader.
The sensor 22 is preferably placed in close proximity to a door, cargo or other monitored object. The maximum distance is limited by the sensor capabilities. The monitoring unit 21 may be mounted inside the container with screws, magnets, etc. The sensor is preferably fitted with an energy transmitter and receiver aimed at the target, with no obstructions between the sensor and the target. When the target moves or is disturbed, the sensor detects the change or no change of the reflected energy of the target. A difference or absence of energy indicative of object motion is a fault or trigger event. The sensor 22 may be similar to a commercial SICK ELF sensor in SIC technology information documents.
The signal indicative of the fault is then detected by the microprocessor 48 or other logic circuit, which is stored in a memory separate from or internal to the microprocessor or microcomputer, as shown in FIG. 2. Since it is useful to know when a fault occurs and it is necessary to record the error, the information on the microprocessor's fault zone is memorized in its volatile memory until it can record the relative time in non-volatile memory or use the time stamp of a real time clock. Once in the non-volatile memory, information about the failure may be read by the RFID tag 54. Once the fault is recorded in non-volatile memory, the microprocessor clears the fault condition from memory and receives the next fault again.
The RFID tag 54 used in the above-described embodiment of the invention may be a commercially available identitec Solutions i-Q series of active uhf tags i-Q series described in the document. The RFID tags used in the present invention are active and must have the ability to access fault information, including the timestamp, or in the case of the Identec i-Q tag, the timestamp capability, which is actually part of the tag's memory capability. In the embodiment, the Identec tag directly obtains the fault information from the microprocessor through an external lead wire, and stores the fault on a time axis in the memory of the Identec tag. The advantage of the above method is that the time axis can be extended due to the zooming effect of using two devices with memory. An example of this is that the Identec i-Q tag has a battery life of 5 years and 32K memory and can record 13312 events or readings on a time axis, which means that a transit time of 30 days is covered, which can read the sensor every 20 seconds. In order to provide adequate protection on the door, the sensor must monitor continuously or at least every few seconds. One way to achieve this is to record the event as described above and save it in volatile memory for more than 20 seconds until it can be recorded on non-volatile memory, which is activated by the Identec tag every 20 seconds. The disadvantage of this method is that the recorded failure time is only within 20 seconds. In this embodiment, the sensor is always in the on position, just like the Identec tag. Because the sensor registers a fault when there is no energy reflected back to the sensor, a fault condition will always occur if the battery is disconnected, removed, or broken. Likewise, if no failure occurs, the correct function is displayed and successful installation is indicated. This information can be read and tested at installation time using a reader.
In an alternate embodiment of the monitoring unit 21 of the present invention, the RFID tag 54 need not have timeline storage capability. In this embodiment, when a triggering event occurs, the fault signal from the sensor 22 is stored on a timeline or real time clock in the memory 49 of the monitoring unit 21, where the radio frequency circuitry can be read by a reader. In this case, the microprocessor would be programmed to continuously monitor the sensors or turn them on at predetermined intervals to look for a fault condition. When a fault occurs, it can be replayed immediately or recorded directly on the time axis or real-time clock of the microprocessor logic circuit. The microprocessor will also provide memory and interfaces and logic for the RFID circuitry, and in this embodiment, the microprocessor can be directly accessed by the RFID circuitry to perform additional functions, such as turning the door sensor off and on. Reading values from the sensor to determine if it is functioning correctly, changing the gain or sensitivity on the sensor to adjust or calibrate the sensor due to differences in the sensor mounting distance from the door, or the reflection of its environment.
For the purposes of the present invention, the logic control, and monitoring sensors and the timetable or real time clock are part of the RFID circuitry, and its memory or memory maintained in a separate memory access a self contained RFID tag and memory for subsequent propagation as long as the fault information mediation is suitable for transmitting or storing the timestamp.
The fault is recorded on long term memory associated with the time stamp and where the RFID circuit is accessible it must be transmitted to a reader 30 for use. RFID tags may be read with a fixed or hand-held reader. The reader may also read the information on the tag as a rebroadcast device and then transmit the information via remote technology.
The alternative embodiment of the monitoring unit 21 shown in fig. 3 uses an RS485 serial interface 62 to transmit data from the microprocessor 48 to the radio transmitter/receiver 25, which transmitter/receiver 25 may be any alternative. As described above. In the present embodiment, the monitoring unit 21 is independent and independent of the function provided by the RFID tag. All functional control, logic and memory are contained within monitor unit number 21, whose firmware and radio are used for communication only.
The monitoring unit 21 contains memory for storing important information about the container, such as the owner's name, the contents or inventory of the container, and contact information about the particular cargo being monitored. In addition, the monitoring unit 21 contains data recorded from sensors, for example the status of the container doors (security alarm). Encryption of sensitive data is handled by the reader. Therefore, when data is written to monitoring unit number 21 or RFID tag 54 memory, the reader's application must encrypt the data. In this way, only authorized readers and users can see the data, and a few with proper authority can change the data. Any unauthorized attempt to modify the data will result in the electronic envelope being breached, and once the electronic seal is breached, a malfunction will occur and appropriate notification can be sent. Data may be written by a three step encryption process in which the data to be written is first encrypted using rsa standard encryption algorithms (64, 128 or 1024 bits depending on the country in which the application is used). An initial checksum key is stored in the data stream for verifying that the data structure is complete upon decryption. The resulting data is then preferably compressed using prior art compression methods to both optimize space in the tag memory and provide additional data scrambling.
When reading data from the 21 st monitoring unit, the reader will reverse execution. At the end of the decryption process, the checksum key will be tested for validity, indicating that the data has in fact returned to its original state. Some or all of the data is available to the user based on the user's authorization.
An embodiment of the method of the invention using the 21 st monitoring unit is as follows. The shipper holds the goods to be shipped in a container. The container door has closed and the shipper records the container as "closed" using a hand-held (or fixed) reader. The reader updates the number 21 monitoring unit with a data packet including, but not limited to, the date and time the container was registered as closed and the username that logged into the reader when the container was registered as the owner information for the closure. Inventory information, and documentation locations for related shipping information. This data is written to the monitoring unit 21 using the procedure described above. At this time, the 21 st monitoring unit starts to start. Automatically calibrate and begin monitoring sensor targets, doors, cargo, etc. The device will self-calibrate itself creating an average baseline value and then monitor for changes in this value, which will indicate a fault. All values or faults (values not within the set parameters) may optionally be recorded periodically in the memory of the RFID tag and in the real time clock. The fault will sound an alarm or the recorded record will be available for remote access using RFID technology. The monitoring process continues until the container is received by a waypoint during the transportation. When the monitoring unit 21 comes into contact with an authorized reader. The data is then read into the application software, the encryption process is reversed, and the application software tests the integrity of the data in each process. The user can then view the data. If the waypoint is the end of the transport, the user may choose to receive the container. Thus, the monitoring unit 21 is registered as "open".
The 21 st monitoring unit has a command set to which it responds, which may vary from application to application. Each 21 st monitoring unit has a unique address to which it responds, but preferably it also responds to selected broadcast commands directed to all monitoring units. The broadcast command may contain an unassigned address, such as "00," indicating that all units should receive the command. However, these units do not respond to the broadcast command, so a typical use of the broadcast command is to wake up all units in preparation for a subsequent individual command. The NOP command containing the address of the monitoring unit may also be used to wake up the unit. Another general command that should be executed at the monitoring strand is "sleep". In the sleep mode, energy is conserved. Since it is expected that there will be various types/embodiments of monitoring units, an identification number corresponding to the type of monitoring unit should be specified, which identification number should be accessible by a command (e.g., "get unit ID"). It may be desirable to monitor the response of the unit for a command to change the address (e.g., "set address"). The "Set Address" command helps to avoid Address conflicts. Reading of failure information, etc., is stored in the monitoring unit 21 by a "get response" command. The amount of data returned by the unit will vary from application to application.
In addition to security, the invention can also be used to monitor and track the movement of items in a supply chain. Refer to fig. 4. Monitoring unit number 21, equipped with appropriate sensors, can sense the presence of objects moving in the supply chain and broadcast this information through the various readers described herein. In the supply chain, proximity sensors have been used to monitor and trigger events. Up to now, these sensors have been fixed in fixed positions. With this invention, the proximity detector can be wireless and therefore mobile, limited only by radio range. The firmware programming for object tracking or counting in the monitoring unit 21 is different from that for the security application. A trigger event does not imply a fault condition but simply requires a sufficient length of time to be logged for transmission to the reader. One application of the present invention as shown in fig. 4 would be to detect an object 71. As they move from one location to another. 72 years or container. In this application it is important to record or log events on the mobile unit, especially in case of multiple mobile units, and thus the possibility of different mobile units regarding which mobile unit the object is placed. In such an application, each mobile unit would be equipped with one or more sensors 22 for opening the mobile unit or container. Each monitoring unit 21 will have a radio transmitter 25 which in this application is only capable of transmitting. When an object 74 is placed in the container, the proximity sensor 22 in the monitoring unit 21 will see the event by reflecting the signal and broadcast the event to the reader via the radio frequency transmitter, which will notice that the particular object is placed in the particular container. In this way, as individual objects move into individual receptacles, it is possible to track them, and thereby track and verify that they have moved into the correct receptacle 72 for placement by an operator, automated sorting equipment, or the like.
In a preferred embodiment, the monitoring of the sensors uses programmable parameters to determine when a triggering event occurs. Each sensor and application environment has a certain level of noise in its output or extraneous changes that can be considered normal. To avoid recording and transmitting extraneous information, programmable parameters can be used to filter the sensor output. As part of the manufacturing process, a set of default parameters is written into the non-volatile memory of the monitoring unit. The selected parameters of a particular sensor may be changed by commands sent and received to the 21 st monitoring unit. Examples of parameters are sensor sampling rate (frequency of readings taken by the monitoring unit 21), sensitivity or threshold parameters, output type (sensor output activated to "On" condition or sensor output activated to "of" condition), alarm signal duration (time the alarm is maintained until reset and ready for next notification), and boundary parameters such as maximum temperature, maximum impact, minimum radiation level, etc., all being default values at the factory.
It is preferred that the 21 st monitoring unit includes a sleep mode in which power is conserved. In the sleep mode, the microprocessor enters a sleep state to save power. An interrupt driven timer is set to periodically wake up the microprocessor to read data and perform other tasks. Temperature, humidity and other static sensors wake up at a predetermined sampling rate (see parameters above) and then make measurements. As temperature etc. can usually be recorded over time. The measurement itself is not necessarily a trigger event to record, so it sleeps to conserve power, and they wake up to record the current reading. The log of recorded values is readable when a command is received from the reader.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various equivalent changes, modifications, substitutions and alterations can be made herein without departing from the principles and spirit of the invention, the scope of which is defined by the appended claims and their equivalents.

Claims (9)

1. A computer-implemented wireless security monitoring device comprising a monitoring unit or units mounted on a container for monitoring changes in the condition of the container;
the monitoring unit includes a power source, sensors using reflected energy with programmable parameters, sensor identification, recording capabilities on the time axis, long term memory, and the ability to rebroadcast information on radio frequency identification radio technologies;
the programmable monitoring hardware in the monitoring unit detects the significant change of the sensor output as a trigger event, and comprises a memory for storing container identification information;
the sensor may comprise a conventional device that can detect various forms of energy, including visible light, infrared light, magnetic fields, radio frequency energy, and sound;
the status and record information contained in the monitoring unit can be read by radio frequency communication with any suitably equipped device;
2. a computer-implemented wireless security monitoring device as claimed in claim 1, wherein one or more monitoring units and one or more readers for reading information from or communicating with the monitoring units,
any suitable equipment includes handheld/mobile devices, laptop computers, desktop computers, and/or dedicated fixed location devices.
The readers are all radio frequency capable and may be commercially available cards that are inserted into slots in a computer, the card having a transmitter, a receiver and an antenna, the reader sending and receiving radio signals to a monitoring unit, the monitoring unit including one or more sensors and a radio frequency transmitter/receiver;
3. a computer-implemented wireless security monitoring device as claimed in claim 1, wherein the monitoring unit is built into the monitoring electronics, which includes a microcomputer, memory and interfacing hardware to the sensors, the program or firmware controlling the monitoring electronics being developed using standard programming equipment and techniques, each monitoring unit including the capability of an active RFID tag because it has memory to store identification information associated with its attached container;
the rf transmitter/receiver 25 has an address or ID associated with it for identifying transmissions from it and from it, independent of the container's identification information. Any radio device can contact directly and recognize from its signal as a unique single unit, a radio frequency identification radio;
the monitoring unit can move everywhere and is provided with a self-sufficient high-capacity power supply;
4. a computer-implemented wireless security monitoring device as claimed in claim 3, wherein the monitoring unit is capable of communicating via radio frequency transmission and responding individually or in groups. The distance between the readers and the actual rf transmitter/receiver function of the monitoring unit and various environmental factors such as the physical characteristics of the container, but utility and signals up to 300 feet in distance can typically be passed through a container;
the sensors in the monitoring unit include conventional devices that detect various forms of energy, including visible light, inertial light, magnetic fields, radio frequency energy, and sound.
5. A computer-implemented wireless security monitoring device as claimed in claim 1, characterized in that the monitoring unit using RFID tags, the sensors are connected to a suitable analog interface, which in turn is connected to an analog-to-digital converter.
6. A computer-implemented wireless security monitoring device according to claim 5, wherein the analog interface is also directly connected to the digital logic bus, the microprocessor executes the control program stored in the memory, the microprocessor and the memory may be part of a single integrated circuit such as a microcomputer,
the power supply is powered by a battery, the battery is monitored by a power supply monitor, the RFID tag is connected to the microprocessor, and the RFID tag is independent and comprises a radio frequency circuit, a battery, an antenna, a logic circuit and a software program for recording the time of the nonvolatile memory. This timeline may record events and recover as the time of occurrence of the event, when the monitoring sensor detects a triggering event such as a door open, a fault signal is stored in volatile memory until it can be transferred to the timeline of the self-contained RFID tag, which can then be read by the reader.
7. A computer applied wireless safety monitoring device is characterized in that a sensor is placed close to a door, goods or other monitoring targets, and a monitoring unit with the maximum distance limited by the capability of the sensor can be installed inside a container by using screws, magnets and the like. The sensor is preferably equipped with an energy transmitter and receiver aimed at the target, and there is no obstacle between the sensor and the target, and the sensor will detect a change or no change in the reflected energy of the target when the target is moving or disturbed.
8. A computer application wireless security monitoring device as claimed in claim 6, wherein the logic control and monitoring sensor and the time schedule or real time clock are part of a radio frequency identification circuit, the memory of which or stored in a separate memory access a self contained RFID tag and memory for subsequent propagation as long as the fault information mediation is suitable for transmitting or storing the time stamp.
9. The computer application wireless security monitoring device of claim 6, wherein the application program of the reader must encrypt the data, only authorized readers and users can see the data, and a few people with proper authority can change the data, any unauthorized data modification attempt will cause the electronic envelope to be destroyed, once the electronic seal is destroyed, the electronic seal will malfunction, and appropriate notification can be sent;
data may be written by a three step encryption process in which first the data to be written is encrypted using a standard encryption algorithm (64 bits, 128 bits or 1024 bits depending on the country in which the application is used). An initial checksum key is stored in the data stream for verifying that the data structure is complete upon decryption.
The resulting data is then preferably compressed using prior art compression methods to both optimize space in the tag memory and provide additional data scrambling.
Finally, when reading the data from the monitoring unit, the reader will perform in reverse, and at the end of the decryption process, the validity of the checksum key will be tested, indicating that the data has actually returned to its original state, some or all of which, depending on the authorization of the user, will be available to the user.
CN202110676279.5A 2021-06-17 2021-06-17 Wireless safety monitoring device for computer application Withdrawn CN113392944A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110676279.5A CN113392944A (en) 2021-06-17 2021-06-17 Wireless safety monitoring device for computer application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110676279.5A CN113392944A (en) 2021-06-17 2021-06-17 Wireless safety monitoring device for computer application

Publications (1)

Publication Number Publication Date
CN113392944A true CN113392944A (en) 2021-09-14

Family

ID=77621876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110676279.5A Withdrawn CN113392944A (en) 2021-06-17 2021-06-17 Wireless safety monitoring device for computer application

Country Status (1)

Country Link
CN (1) CN113392944A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460321A (en) * 2022-10-13 2022-12-09 重庆可兰达科技有限公司 Continuous and accurate positioning method capable of saving iPhone electric quantity

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115460321A (en) * 2022-10-13 2022-12-09 重庆可兰达科技有限公司 Continuous and accurate positioning method capable of saving iPhone electric quantity
CN115460321B (en) * 2022-10-13 2024-03-29 重庆可兰达科技有限公司 Continuous accurate positioning method capable of saving iPhone electric quantity

Similar Documents

Publication Publication Date Title
US7135976B2 (en) Wireless monitoring device
US8031069B2 (en) Electronic security seal and system
US9460593B2 (en) Container breach detector system
US8258950B2 (en) Method and apparatus for control or monitoring of a container
US7471203B2 (en) Tamper monitoring system and method
US8154404B2 (en) Method and apparatus for detecting movement of a shipping container latch
US5887176A (en) Method and system for remote monitoring and tracking of inventory
US7218215B2 (en) Cargo container integrity system
US7859404B2 (en) Method and apparatus for proximity activated RFID system
US8384520B2 (en) Glazing comprising an electronic device and method of reading/writing information in said device
US20070090921A1 (en) Electronic lock box with key presence sensing
US20050046567A1 (en) Method and system for utilizing multiple sensors for monitoring container security, contents and condition
CN101180663A (en) A method and a device for detecting intrusion into or tempering with contents of an enclosure
US20080120200A1 (en) Method and system for automatic inventory variance identification
WO2012006296A2 (en) System and method of determining gas detector information and status via rfid tags
US20080186184A1 (en) Networked security tags for portable devices
KR100920477B1 (en) Ubiquitous cabinet using rfid
CN113392944A (en) Wireless safety monitoring device for computer application
JP5016011B2 (en) Vending machine door open / close detection / recording device
Marin et al. Development and implementation of a low-cost security system
Wihl Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210914