US20200118405A1 - Trusted monitoring system and method - Google Patents
Trusted monitoring system and method Download PDFInfo
- Publication number
- US20200118405A1 US20200118405A1 US16/706,445 US201916706445A US2020118405A1 US 20200118405 A1 US20200118405 A1 US 20200118405A1 US 201916706445 A US201916706445 A US 201916706445A US 2020118405 A1 US2020118405 A1 US 2020118405A1
- Authority
- US
- United States
- Prior art keywords
- sensors
- information
- electronic device
- data
- received
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 146
- 238000000034 method Methods 0.000 title claims abstract description 92
- 230000007613 environmental effect Effects 0.000 claims abstract description 75
- 238000013480 data collection Methods 0.000 claims abstract description 48
- 239000000126 substance Substances 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 137
- 230000008569 process Effects 0.000 claims description 43
- 238000013475 authorization Methods 0.000 claims description 39
- 238000013515 script Methods 0.000 claims description 31
- 238000004092 self-diagnosis Methods 0.000 claims description 25
- 238000002405 diagnostic procedure Methods 0.000 claims description 24
- 238000012545 processing Methods 0.000 claims description 11
- 230000005855 radiation Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000003745 diagnosis Methods 0.000 claims description 4
- 238000004422 calculation algorithm Methods 0.000 claims description 2
- 230000006835 compression Effects 0.000 claims description 2
- 238000007906 compression Methods 0.000 claims description 2
- 230000010267 cellular communication Effects 0.000 claims 1
- 238000005259 measurement Methods 0.000 description 20
- 230000033001 locomotion Effects 0.000 description 19
- 238000005070 sampling Methods 0.000 description 12
- 238000012806 monitoring device Methods 0.000 description 11
- 230000006266 hibernation Effects 0.000 description 10
- 230000006855 networking Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 230000001360 synchronised effect Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 7
- 230000007958 sleep Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 6
- 230000008867 communication pathway Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 238000013500 data storage Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 238000013474 audit trail Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000008672 reprogramming Effects 0.000 description 3
- 206010009944 Colon cancer Diseases 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 239000000446 fuel Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000010248 power generation Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000002604 ultrasonography Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 244000141359 Malus pumila Species 0.000 description 1
- 238000002441 X-ray diffraction Methods 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 235000021016 apples Nutrition 0.000 description 1
- 235000000332 black box Nutrition 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000000356 contaminant Substances 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B13/00—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
- G05B13/02—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
- G05B13/0265—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric the criterion being a learning criterion
- G05B13/0275—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric the criterion being a learning criterion using fuzzy logic only
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/202—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
- G06N5/048—Fuzzy inferencing
-
- G06N7/005—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G06Q50/28—
-
- G06Q50/30—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/008—Registering or indicating the working of vehicles communicating information to a remotely located station
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/08—Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
- G07C5/0841—Registering performance data
- G07C5/085—Registering performance data using electronic data carriers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/06—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by returnable containers, i.e. reverse vending systems in which a user is rewarded for returning a container that serves as a token of value, e.g. bottles
- G07F7/0618—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by returnable containers, i.e. reverse vending systems in which a user is rewarded for returning a container that serves as a token of value, e.g. bottles by carts
- G07F7/0636—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by returnable containers, i.e. reverse vending systems in which a user is rewarded for returning a container that serves as a token of value, e.g. bottles by carts in which the trolleys or carts are kept in a restricted zone such as a coral-like enclosure, or are passing a gate before use is possible
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G3/00—Alarm indicators, e.g. bells
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2454—Checking of authorisation of a person accessing tagged items in an EAS system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/16—Security signalling or alarm systems, e.g. redundant systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/20—Countermeasures against jamming
- H04K3/22—Countermeasures against jamming including jamming detection and monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H04L67/18—
-
- H04L67/22—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C2009/0092—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/08—Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
- G07C5/0841—Registering performance data
- G07C5/0875—Registering performance data using magnetic data carriers
- G07C5/0891—Video recorder in combination with video camera
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/02—Monitoring continuously signalling or alarm systems
- G08B29/04—Monitoring of the detection circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- U.S. patent application Ser. No. 11/418,380 is one of a set of related U.S. applications filed May 3, 2006, the set including: U.S. patent application Ser. No. 11/418,385 (now abandoned), Ser. No. 11/418,381 (now U.S. Pat. No. 7,609,159), Ser. No. 11/418,380 (now U.S. Pat. No. 7,656,286), Ser. No. 11/418,472 (now abandoned), Ser. No. 11/417,910 (now abandoned), Ser. No. 11/418,496 (now abandoned), Ser. No. 11/417,887 (now U.S. Pat. No. 7,512,583), Ser. No. 11/418,448 (now U.S.
- the field of the invention relates to wireless surveillance and tracking. More particularly, the invention relates to monitoring the state of potentially hostile environments and threat assessment.
- An embodiment of this invention provides a trusted and highly reliable self-contained computer-controlled sensing device that can be configured to monitor any object with a variable number of sensors. Some aspects provide tempest construction and remote re-programmability. Thus some embodiments may be deployed for virtually any application from home security to aircraft security.
- One embodiment is a surveillance system including a plurality of sensors configured to provide environmental and spatial data, and an electronic device configured to receive the sampled environmental and spatial data from the sensors.
- the electronic device is further configured to receive monitoring instructions, and to use the received monitoring instructions to process the received environmental and spatial data.
- Another embodiment is a monitoring system including a plurality of sensors configured to sense information, and an electronic device configured to receive data from the sensors.
- the electronic device is configured to determine an alarm condition based upon the received data, and the electronic device compares the received data to a range of acceptable values and conducts a self-diagnosis prior to transmitting the alarm condition to a remote device.
- Another embodiment is a monitoring system including a plurality of sensors configured to sense information, and an electronic device configured to receive data from the sensors.
- the electronic device is configured to determine an alarm condition based upon the received data, and the electronic device determines a state of reliability of the sensor that the data is received from, and conducts a self-diagnosis based on the determined state of reliability prior to transmitting the alarm condition to a remote device.
- One embodiment is a surveillance system including a plurality of sensors configured to sample environmental and spatial conditions, and an electronic device configured to receive data from the sensors.
- the electronic device is further configured to monitor the received data for anomalies by comparing the received data to a range of acceptable values, and the electronic device includes a motion sensor configured to detect unauthorized contact with the electronic device.
- Another embodiment is a system including a sensor configured to sample environmental and spatial conditions, where the sensor includes a motion sensor.
- the system also includes an electronic device configured to receive data from the sensor and to determine integrity of the received data.
- the electronic device is further configured to monitor data received from the motion sensor to detect unauthorized contact with the sensor.
- Another embodiment is a surveillance system including a plurality of sensors configured to sample environmental and spatial conditions, and an electronic device configured to receive data from the sensors.
- the electronic device is further configured to monitor the received data, and the electronic device includes a motion sensor.
- the electronic device is further configured to transmit an alarm condition to a remote device if the motion sensor data indicates that the electronic device moves outside of a pre-defined area.
- Another embodiment is a monitoring system including at least one sensing device including a plurality of sensors including a motion sensor, and an electronic device configured to receive data from the sensing device.
- the electronic device is further configured to monitor the received data and to determine integrity of the received data.
- the electronic device further is configured to monitor data received from the motion sensor to detect movement of the sensing device, and the electronic device is further configured to transmit an alarm condition to a remote device if the motion sensor data indicates that the sensing device moves outside of a pre-defined area.
- Another embodiment is a system including a plurality of sensors, and an electronic device configured to receive data from the sensors, where the electronic device is configured to transmit sensor data in a secure manner to a remote server, and where the electronic device includes a sensor for detecting jamming.
- One embodiment is a system including a plurality of sensors, and an electronic device including at least two redundant processors each configured to receive data from the sensors and determine an alarm condition.
- the electronic device confirms determination of an alarm condition by both processors before generating an alarm signal.
- Another embodiment is a surveillance system including a plurality of redundant sensors, and an electronic device configured to receive data from at least two of the redundant sensors and determine an alarm condition based on redundant data received from each of the redundant sensors.
- the electronic device confirms determination of an alarm condition by a majority of the redundant sensors before generating an alarm signal.
- Another embodiment is a system including at least one sensor configured to sample environmental and spatial conditions and to transmit the sampled data over a plurality of communication links to an electronic device, and an electronic device configured to receive data from the sensors over the two communication links and determine integrity of the data received over the two communication links. The electronic device determines one of the communication links to be unreliable based on the integrity of the data received.
- Another embodiment is a redundant surveillance system including a first monitoring device configured to receive data over a first communication link, a second monitoring device configured to receive data over a second communication link, and a plurality of redundant sensors in a secure container configured to sample environmental and spatial conditions configured to transmit the sampled data over a the first communication link to the first monitoring device.
- the redundant sensors are configured to receive confirmation of receipt of the data from the first monitoring device over the first communication link, and where the redundant sensors are configured to transmit the sampled data to the second monitoring device over the second communication link to the second monitoring device.
- One embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system.
- the system also includes a plurality of sensors authorized and configured to communicate in the monitoring system, and an electronic device authorized to communicate in the monitoring system and configured to receive data in a secure manner from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system.
- the task authorization message includes information identifying at least the sensor from which to receive the data, and the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are configured to communicate in a secure manner in the monitoring system, the system including a plurality of non-system sensors configured to sense information, where the non-system sensors are not authorized to communicate securely in the monitoring sensor, and an electronic device authorized to communicate in the monitoring system and configured to receive data from the non-system sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system.
- the task authorization message includes information identifying at least the non-system sensor from which to receive the data, and the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system.
- the system also includes a plurality of sensors configured to sense information, where the sensors are authorized and configured to communicate in the monitoring system, and where the sensors are configured to be in a sleep mode until activated by a task authorization message received from a master device authorized to communicate in the monitoring system, and an electronic master device authorized to communicate in the monitoring system and configured to transmit a task authorization message to the sensors.
- the task authorization message includes information identifying at least the sensor from which to receive sensed information, and where the sensor encodes a digital signature and encrypts the sensed information prior to transmitting the sensed information to the electronic master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system, where the system includes a plurality of sensors, and an electronic device authorized to communicate in the monitoring system and configured to receive data from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system.
- the task authorization message includes information identifying at least the sensor from which to receive the data, the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device via a first communication pathway, and the electronic device is configured to confirm receipt of the transmitted data by the remote master device.
- One embodiment is a monitoring system including an environmental sensor configured to detect environmental information associated with an object, an identification sensor configured to identify the object, a timing device configured to provide time information including a time of day and a date, a location sensor configured to receive location information, and an electronic device configured to receive data from the environmental sensor, the identification sensor, the timing device and the location sensor.
- the electronic device is further configured to transmit the received data such that the timing information, object identification information, the location information and the environmental information can be linked together, where the linked data is transmitted to a remote device in a secure manner.
- Another embodiment is a container monitoring system including a plurality of sensors configured to detect environmental information about an area inside or outside the container, a timing device configured to provide time information including a time of day, a location sensor configure to receive location information, and an electronic device configured to receive data from the plurality of sensors, the timing device and the location sensor.
- the electronic device is further configured to transmit the received data such that the timing information, the location information and the environmental information is synchronized, where the synchronized data is transmitted to a remote device in a secure manner.
- Another embodiment is a portable monitoring system including a tempest constructed housing to provide shielding for enclosed devices.
- the housing encloses an environmental sensor configured to detect environmental information, a timing device configured to provide time information including a time of day and a date, a location sensor configured to receive location information, and an processor configured to receive data from the environmental sensor, the timing device and the location sensor.
- the electronic device is further configured to transmit the received data such that the timing information, object identification information, the location information and the environmental information is synchronized, where the synchronized data is transmitted to a remote device in a secure manner.
- One embodiment is a system including a plurality of sensors, a remote device configured to transmit secure instructions, and an electronic device configured to receive data from the sensors.
- the electronic device is further configured to receive the secure instructions from the remote device, where the secure instructions direct the electronic device to receive data from one or more of the sensors.
- Another embodiment is a method including receiving data at an electronic device from a first sensor, and receiving instructions from a remote device, where the instructions direct the electronic device to receive data from a second sensor instead of the first sensor.
- the method also includes discontinuing the receiving of data from the first sensor, and receiving data at the electronic device from the second sensor.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, and an electronic device configured to receive data from the sensors.
- the electronic device is further configured to receive and decrypt the monitoring instructions from the remote device via a network, where the monitoring instructions include a monitoring schedule for one or more of the plurality of sensors, and the electronic device is configured to received data from the sensors in accordance with the received monitoring schedule.
- Another embodiment is a method including receiving an encrypted monitoring schedule from a remote device, where the monitoring schedule defines a sensing schedule for a plurality of sensors and where the monitoring schedule identifies at least one alarm threshold.
- the method also includes decrypting the monitoring schedule, receiving data from one or more sensors based upon the received sensing schedule, determining an alarm condition based upon the alarm threshold and data received from the sensor, encrypting notification of the alarm condition, and transmitting the encrypted notification of the alarm condition to the remote device.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, where the encrypted monitoring instructions include a tolerance range for at least one of the sensors, and an electronic device configured to receive sensor data from the sensors.
- the electronic device is further configured to receive, authenticate and decrypt the encrypted monitoring instructions from the remote device, the electronic device configured to compare the sensor data to the received tolerance range.
- Another embodiment is a method including receiving encrypted monitoring instructions from a remote device, where the monitoring instructions include a tolerance range for sensed data from at least one sensor. The method also includes decrypting the monitoring instructions, determining whether the sensed data are within the identified tolerance range, and transmitting an encrypted alarm signal to the remote device when the sensed data falls outside the identified tolerance range.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, where the encrypted monitoring instructions identify one or more of the plurality of sensors.
- the system also includes a sensing schedule, and one or more alarm thresholds, and an electronic device configured to receive sensor data from the sensors in accordance with the sensing schedule.
- the electronic device is further configured to receive and decrypt the monitoring instructions, and to identify alarm conditions based upon the identified alarm thresholds and sensed data from the sensors.
- Another embodiment is a method including receiving encrypted monitoring instructions from a remote device, where the monitoring instructions include a tolerance range for sensed data from at least one sensor. The method also includes decrypting the monitoring instructions, determining whether the sensed data are within the identified tolerance range, and transmitting an encrypted alarm signal to the remote device when the sensed data falls outside the identified tolerance range.
- FIG. 1A illustrates an example of a communication system for providing redundant communications between one or more master units and one or more remote sensor units.
- FIG. 1B illustrates another example of a communication system between communication devices.
- FIG. 2 is a functional block diagram of certain components of a master unit.
- FIG. 3 is a functional block diagram of certain components of a remote sensor unit.
- FIG. 4 is a flowchart illustrating certain blocks in a method of processing communications in a master unit.
- FIG. 5 is a flowchart illustrating certain blocks in a method of processing communications in a remote sensor unit.
- FIG. 6A is a data packet that may be used in communicating messages to/from the master units, the central data collection servers and/or the remote sensor units.
- FIG. 6B is a data packet that may be used in communicating sampled sensor data from the sensor unit to the master unit.
- FIG. 7 is an example of a data package for communicating between a master unit and a base station.
- FIG. 8 is a master unit task assignment script for communicating task assignments to a master unit.
- FIG. 9 is an example of a data collection unit housing.
- FIG. 10 depicts an example of placement of a data collection unit within a shipping container.
- FIG. 11A to 11C show example embodiments of positioning of data collection units for use in the global communication system of FIGS. 1A and 1B .
- the master unit can be configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the objects being monitored.
- the master unit may be in a fixed location, or attached to a mobile object.
- the master unit can be configured for monitoring objects that enter and leave the area where it is located.
- the master unit may act as a parent controller for one or more child devices, wherein the child devices can be remote sensors or monitors of various measurable conditions including environmental conditions, substance identification, product identification and biometric identification.
- the master unit may be able to discover new remote sensor units as they enter or leave the area where the master unit is located.
- the master unit may be able to be remotely reprogrammed. The reprogramming may be accomplished with authenticated instructions.
- the remote sensor units are configured to communicate with the master unit.
- the communication can be over a secure communication link.
- Remote sensors can be commanded to provide monitored information to the master unit on an as needed basis, on a fixed time basis or in other ways.
- Remote sensor units may be connected to various peripheral measuring devices.
- the central data collection server is connected to the master unit via one or more communication links.
- the central data collection server can send instructions to the master unit over the one or more communication links.
- the instructions can include monitoring task instructions, reprogramming instructions, diagnostic test instructions and others.
- each unit e.g., central data collection servers, master units and remote sensor units can communicate over at least two communication links to at least two other entities.
- independent (redundant) encryption key exchanges are used for all messaging between the various units.
- redundant power supplies are used for the units.
- a process is terminated when its operations are completed.
- a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
- a process corresponds to a function
- its termination corresponds to a return of the function to the calling function or the main function.
- FIG. 1A illustrates an example of an infrastructure of a communication system for providing redundant communications between one or more master units and one or more remote sensor units.
- the example illustrated is a cargo ship with multiple shipping containers 100 .
- the shipping containers 100 may each have one or more master data collection units 105 (each container is depicted with one master unit 105 in this example).
- the containers contain objects (not shown) that may contain remote sensing units (not shown) attached to the objects. Additionally, remote sensing units 110 may be positioned at other areas in and/or outside the containers.
- a device may be connected to a plurality of antennae to overcome positioning problems (e.g., containers stacked on a ship).
- the remote sensor units 110 and the master units 105 communicate over two or more channels to one or more other communication links to two or more communication devices.
- the master units 105 communicate with one or more remote sensor units 110 .
- the master units 105 can also communicate with various other communication devices and/or networks, either for the purpose of collecting data or relaying data to another device with a more robust direct communication channel, serving as a peer-to-peer or ad hoc-network.
- the communication link 1 shows a master unit 105 communicating with another master unit 105 .
- Communication link 2 shows a master unit 105 communicating with a satellite relay 115 .
- the communication link 5 illustrates a master unit 105 communicating with a land or sea based antenna relay 120 .
- the communication links 2 a and 3 depict a remote sensor unit 110 communicating with two relay satellites 115 .
- Communication link 1 a depicts a remote sensor unit 110 communicating with another remote sensor unite 110 (e.g., a relay station).
- the instructions and/or responses to instructions can be forwarded to the intended remote sensor unit 110 or master unit 105 .
- a master unit 105 can communicate with the land or sea based antenna 120 which can then forward the communication to a second master unit 105 via a communication link 5 a.
- Intermediary relay stations may also be used in forwarding messages.
- the remote sensor 110 a may communicate a monitoring measurement to the relay satellite 115 on communication link 3 , which the forwards the message to an on-ship intermediary satellite receiver via communication link 6 a .
- the intermediary on-ship receiver can then forward the message to the master unit 105 (e.g., the master unit that requested a measurement from the remote sensor) via communication link 6 .
- Other types of communication links not shown in FIG. 1 that can be part of the redundant communication infrastructure include cellular telephone networks, LANs (wired or wireless local area networks), WANs, and wired networks (for fixed location units).
- FIG. 1B illustrates another example of a communication system between communication devices.
- the communication system can represent communication flow at multiple levels.
- the master unit 105 serves as a data collection server and communicates with one or more of the remote sensor units 110 that serve as trusted monitoring devices.
- the data collection server can be a central data collection server 125 that communicates with one or more master units 105 that serve as the trusted monitoring devices. Communications can be direct between the data collection server ( 105 or 125 ) and the trusted monitoring devices ( 110 or 105 ). Communications can also be relayed via one or more relay stations such as the relay satellites 115 and the antennas 120 .
- FIG. 2 is a functional block diagram of certain components of a master unit, such as the master units 105 discussed above.
- the master unit system 200 preferably includes a redundant microprocessor component 202 . However, a single microprocessor unit 202 could be utilized.
- the microprocessor 202 may be one or more of any conventional general purpose single- or multi-chip microprocessor such as a Pentium® processor, Pentium II® processor, Pentium processor, Pentium IV® processor, Pentium® Pro processor, a 8051 processor, a MIPS® processor, a Power PC® processor, or an ALPHA® processor.
- the microprocessor 202 may be one or more of any conventional special purpose microprocessor such as a digital signal processor.
- the microprocessor 202 is linked to various other modules on the master unit system 200 with conventional address lines, conventional data lines, and/or conventional control lines for purposes of data transfer, instruction reception and transmission and data processing.
- Memory is provided by a memory component 204 and/or a data storage unit 206 .
- both the memory component 204 and the data storage unit 206 provide redundancy in the form of spatial redundancy (different portions of the same medium), or unit redundancy where two separate devices contain redundant data.
- Memory refers to electronic circuitry that allows information, typically computer data, to be stored and retrieved. Memory can refer to external devices or systems, for example, disk drives or tape drives. Memory can also refer to fast semiconductor storage (chips), for example, Random Access Memory (RAM) or various forms of Read Only Memory (ROM), that are directly connected to the processor. Other types of memory include bubble memory and core memory. Memory also includes storage devices (internal or external) including flash memory, optical memory and magnetic memory.
- the master unit system 200 is comprised of various modules 208 - 228 .
- each of the modules 208 - 228 comprise various sub-routines, procedures, definitional statements, and macros.
- Each of the modules 208 - 228 are typically separately compiled and linked into a single executable program. Therefore, the following description of each of the modules 208 - 228 is used for convenience to describe the functionality of the master unit system 200 .
- the processes that are undergone by each of the modules 208 - 228 may be arbitrarily redistributed to one of the other modules, combined together in a single module, or made available in a shareable dynamic link library. Further each of the modules 208 - 228 could be implemented in hardware.
- a networking circuitry module 208 contains logic and or circuitry for communication of various communication links such as the communication links 1 through 6 and 1 a through 6 a discussed above in reference to FIG. 1A .
- the networking circuitry module 208 may include circuitry for communicating over wireless communication links that may comprise, for example, part of a code division multiple access (CDMA or CDMA2000) communication system, a frequency division multiple access (FDMA) system, an orthogonal frequency division multiple access (OFDM) system such as WiMax (IEEE 802.16x), a time division multiple access (TDMA) system such as GSM/GPRS (General Packet Radio Service)/EDGE (enhanced data GSM environment) or TETRA (Terrestrial Trunked Radio) mobile telephone technology for the service industry, a wideband code division multiple access (WCDMA), a high data rate (1 ⁇ EV-DO or 1 ⁇ EV-DO Gold Multicast) system, or in general any wireless communication system employing a combination of techniques.
- the networking circuitry module 208 may include circuitry for
- An alarm module 210 contains circuitry for receiving notification, via pushed messaging or through periodic monitoring of data from various alarm sensors.
- Alarm sensors may be linked via wired and or wireless communication links.
- the alarm sensors may monitor audible (audio) signals, visual (video) signals, or on/off type of alerts such as door locks, intruder alerts etc.
- An external ports module 212 may provide I/O to various external devices including input/output devices, display devices, printers, cameras, antennas and remote sensors. Preferably, redundant wireless communication links are also provided, via the networking circuitry module 208 , for any of the external devices connected via the external ports.
- the wired external devices are connected to the computer using a standards-based bus system.
- the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures.
- An air circulation component 214 may have multiple input ports for sampling air from various sources. Ducting is connected to the ports to be located in various areas of the monitored area.
- the air intake system includes a fan, a vacuum or other means of moving air so as to supply one or more sensors with unadulterated samples. Details of the air intake analysis system are discussed below.
- a global positioning system (GPS) 216 is used to track the location of the master unit.
- the GPS module may be connected to an external antenna in situations where the master unit is housed in a shielded container or location.
- the GPS system can also receive measurements from remote sensor units that contain GPS tracking ability.
- multiple objects can be tracked by the same master unit.
- multiple sensor units containing GPS capability can combine their satellite signals in order to speed up convergence and capture of the necessary number of GPS satellites. GPS signals may also be combined with other signals to further refine the exact location of the object.
- Instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware and include any type of programmed step undertaken by components of the system. Instructions received by and transmitted by the master unit 200 are typically encrypted. A digital certificate storage and authentication module 218 is used to establish secure connections with the multiple remote sensor units, relay units, intermediary units and central data collection servers of the global system shown in FIG. 1A . An encryption and decryption module 220 is used to encrypt messages transmitted by and decrypt messages received by the master unit 220 . Redundant encryption keys can be used over the redundant channels for added security. The type of encryption for a given task shall be defined by the Assignment Script discussed below in reference to FIG. 8 .
- An on-board power management module 222 is used to monitor batteries, backup batteries, and/or fuel cells as well as external power source reliability and variability. The state of all power sources is monitored at periodic intervals for both quantity and quality so as to get early warning of future operational limitations.
- An external power module 224 is used to convert power from multiple sources for use when available.
- the power module 224 can sense when the master unit is plugged into various voltage levels, AC and/or DC sources in order to power the unit in multiple areas of the world having different power levels and reliability. Filtering can be used to smooth out power surges in areas where the external power is unreliable. Switching to internal power can be automated when power spikes or power loss is detected. An uninterruptible power supply is preferred. In some embodiments, anomalies in the power supply are logged and reported to the central data collection server.
- the remote control of door/orifice entry/exit can be monitored/controlled by module 226 .
- the master unit can control the unlocking and or opening of doors using electro-mechanical, pneumatic devices or other means known to those in the art.
- a suite of remote sensor command and control modules 228 A to 228 K are used to connect peripherals directly to the master unit or to allow the master unit to interact with the remote sensors.
- the various remote sensor types will be presented below. Additional remote sensor suites can be added to the master unit by recognizing the presence of a new remote sensor.
- the new remote sensor may be recognized by monitoring for and receiving an identification signal broadcast by the new remote sensor.
- the identification signal may contain identification information that identifies a type of sensor, a model number etc.
- the master unit can conduct authentication of the new remote sensor or transmit the identification information to a central server for evaluation and/or approval to communicate with the new sensor.
- the server can then send a new assignment script that includes new instructions for adding the new remote sensor to the monitoring schedule of the master unit.
- new remote sensor slots can be added by remote programming in order to enhance the number of remote sensors that the master unit can recognize and/or command and interact with.
- empty slots in the master device can be filled with new sensors or external, remote child sensors units can communicate with the master.
- any sensor is first authenticated prior to communicating with a second device.
- FIG. 3 is a functional block diagram of certain components of a remote sensor unit, such as the remote sensor units 105 discussed above.
- the remote sensor unit system 300 preferably includes a redundant microprocessor component 302 .
- a single microprocessor unit 302 could be utilized.
- the microprocessor 302 may be one or more of any conventional general purpose single- or multi-chip microprocessor such as a Pentium® processor, Pentium II® processor, Pentium III® processor, Pentium IV® processor, Pentium® Pro processor, a 8051 processor, a MIPS® processor, a Power PC® processor, or an ALPHA® processor.
- the microprocessor 302 may be one or more of any conventional special purpose microprocessor such as a digital signal processor.
- the microprocessor 302 is used as the main computing source of various other modules on the remote sensor unit system 300 with conventional address lines, conventional data lines, and/or conventional control lines for purposes of data transfer, instruction reception and transmission and data processing.
- the remote sensor unit acts as a slave device to the master unit, e.g., only doing a subset of the master device functions, e.g., not communicating with the central data collection server directly.
- Memory is provided by a memory component 304 and/or a data storage unit 306 .
- both the memory component 304 and the data storage unit 306 provide redundancy in the form of spatial redundancy (different portions of the same medium), or unit redundancy where two separate devices contain redundant data.
- Memory refers to electronic circuitry that allows information, typically computer data, to be stored and retrieved. Memory can refer to external devices or systems, for example, disk drives or tape drives. Memory can also refer to fast semiconductor storage (chips), for example, Random Access Memory (RAM) or various forms of Read Only Memory (ROM), that are directly connected to the processor. Other types of memory include bubble memory and core memory. Memory also includes storage devices (internal or external) including flash memory, optical memory and magnetic memory.
- the remote sensor unit system 300 is comprised of various modules 308 - 324 .
- each of the modules 308 - 324 comprise various sub-routines, procedures, definitional statements, and macros.
- Each of the modules 308 - 324 are typically separately compiled and linked into a single executable program. Therefore, the following description of each of the modules 308 - 324 is used for convenience to describe the functionality of the remote sensor unit system 300 .
- the processes that are undergone by each of the modules 308 - 324 may be arbitrarily redistributed to one of the other modules, combined together in a single module, or made available in a shareable dynamic link library. Further each of the modules 308 - 324 could be implemented in hardware.
- a networking circuitry module 308 contains logic and or circuitry for communication of various communication links such as the communication links 1 through 6 and 1 a through 6 a discussed above in reference to FIG. 1A .
- the networking circuitry module 308 may include circuitry for communicating over wireless communication links that may comprise, for example, part of a code division multiple access (CDMA or CDMA2000) communication system, a frequency division multiple access (FDMA) system, an orthogonal frequency division multiple access (OFDM) system such as WiMax (IEEE 802.16x), a time division multiple access (TDMA) system such as GSM/GPRS (General Packet Radio Service)/EDGE (enhanced data GSM environment) or TETRA (Terrestrial Trunked Radio) mobile telephone technology for the service industry, a wideband code division multiple access (WCDMA), a high data rate (1 ⁇ EV-DO or 1 ⁇ EV-DO Gold Multicast) system, or in general any wireless communication system employing a combination of techniques.
- the networking circuitry module 308 may include circuitry for
- An external ports module 312 may provide I/O to various external devices including input/output devices, display devices, printers, cameras, antennas and remote sensors.
- redundant wireless communication links are also provided, via the networking circuitry module 308 , for any of the external devices connected via the external ports.
- the wired external devices are connected to the computer using a standards-based bus system.
- the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures.
- An air circulation component 314 may have multiple input ports for sampling air from various sources. Ducting is connected to the ports to be located at various locations of the monitored area.
- the air intake system includes a fan, a vacuum or other means of moving air so as to supply one or more sensors with unadulterated samples.
- a global positioning system (GPS) 316 is used to track the location of the remote sensor unit.
- the GPS module may be connected to an external antenna in situations where the master unit is housed in a shielded container or location.
- the GPS system can also receive measurements from other remote sensor units that contain GPS tracking ability and are in range of the remote sensor unit. Signal levels can be used to estimate ranges to other remote sensor units containing GPS modules 318 .
- multiple sensor units containing GPS capability can combine their satellite signals in order to accelerate acquisition of the necessary number of GPS satellites.
- a digital certificate storage and authentication module 318 is used to establish secure connections with the multiple remote sensor units, relay units, intermediary units and central data collection servers of the global system shown in FIG. 1A .
- An encryption and decryption module 320 is used to encrypt messages transmitted by and decrypt messages received by the master unit 220 . Redundant encryption keys can be used over the redundant channels for added security.
- An on-board power management module 322 is used to monitor batteries, backup batteries, and/or fuel cells as well as external power source reliability and variability. In some embodiments, anomalies in the power supply are logged and reported to a controlling master unit or forwarded to another communication device as in a peer-to-peer and/or ad hoc network.
- An external power module 324 is used to convert power from multiple sources for use when available.
- the power module 324 can sense when the master unit is plugged into various voltage levels, AC and/or DC sources in order to power the unit in multiple areas of the world having different power levels and reliability. Filtering can be used to smooth out power surges in areas where the external power is unreliable. Switching to internal power can be automated when power spikes or power loss is detected. An uninterruptible power supply is preferred.
- FIG. 4 is a flowchart illustrating certain blocks in a method of processing communications in a master unit.
- the process 400 typically starts in a hibernation state.
- the master unit then transfers out of the hibernation state to step 410 in order to monitor one or more communication links for incoming instructions (e.g., from the central data collection server 125 in FIG. 1B ). Monitoring for incoming instructions at step 410 can be continuous, periodic, or random. If no instruction is received at step 410 , the process 400 proceeds to step 415 where it returns to the hibernation state. If instructions are received at step 410 , the process 400 proceeds to step 420 .
- Step 420 involves authenticating the server from which the received instructions originated. Authentication can include known techniques such as digital IDs with corresponding digital signatures. If the authentication shows that the received message is authentic, the process 400 continues to step 425 . However if the authentication shows the instructions to be false, the process 400 can return to the hibernation state or return to step 410 to detect another incoming instruction. Details of authentication will be discussed below in relation to FIGS. 6 and 7 .
- the process can continue at one or more other steps 430 to 445 , depending on the received instructions.
- the instructions are preferably encrypted and the authenticating device decrypts the instructions before performing and/or instructing other devices to perform the tasks.
- the instruction may direct the master unit to conduct diagnostic tests, step 430 , query and authenticate subsystem modules, components and/or remote sensor units, step 435 , execute tasks defined in a script, step 440 , and/or transmit data packages to one or more remote servers. After completing the instructed tasks the process 400 generally proceeds to step 415 and returns to the hibernation state. Details of the various actions taking place in the steps shown in FIG. 4 will be discussed below in relation to the individual tasks performed by the master unit.
- Instructions received by the master unit while performing the process 400 may require the master unit to transmit instructions to one or more of the remote servers. Additionally, the master unit may be programmed to transmit instructions to remote sensors autonomously without receiving command instructions.
- FIG. 5 is a flowchart illustrating certain blocks in a method of processing instructions in a remote sensor unit.
- the instructions pertain to sampling a sensor measurement and transmitting the sampled data to the master unit.
- the sensor unit can also be instructed to perform processing to that shown in FIG. 4 (e.g., diagnostic tests, reprogramming, etc.)
- the process 500 typically starts in a hibernation state.
- the master unit then transfers out of the hibernation state to step 510 in order to monitor one or more communication links for incoming instructions (e.g., from the master unit 105 in FIGS. 1A and 1B ). Monitoring for incoming instructions at step 510 can be continuous, periodic, or random. If no instruction is received at step 510 , the process 500 proceeds to step 515 where it returns to the hibernation state. If instructions are received at step 510 , the process 500 proceeds to step 520 .
- Step 520 involves providing the master unit with the remote sensor unit's digital ID/signature, thus authenticating the remote sensor to the master unit that sent the instructions.
- Authentication can include known techniques such as digital IDs with corresponding digital signatures.
- the master unit can perform the authentication of the remote sensor's response and determine whether or not to use the forthcoming sensor data. Authentication of the master unit to the remote sensor can also be done at step 520 .
- the master unit will provide a digital ID/signature in the instruction message received at step 510 and the remote sensor will authenticate the master unit. This two-way type of authentication protects both the master unit and the remote sensor from being hacked. If the authentication shows that the received message is from an authentic master unit, the process 500 continues to step 525 . However if the authentication shows the instructions come from an unauthentic master unit, the process 500 can return to the hibernation state or return to step 510 to detect another incoming instruction. Details of authentication will be discussed below in relation to FIGS. 6 and 7 .
- the process can continue at step 525 where the remote sensor unit samples one or more of the measurements that it is equipped to sample.
- the remote sensor may be instructed to sample for a certain time period or at a certain interval. If the sampling is to be terminated at a certain time, as per predetermined or received instructions, the sampling is stopped at step 530 .
- the remote sensor unit may periodically transfer the sampled data to the master unit.
- Sampled data that is to be transferred to the master unit is preferably encrypted at step 535 .
- the remote sensor unit may proceed to step 540 to authenticate the master unit on the one or more communication channels that it will transmit the sampled data on.
- the process 500 continues at step 545 where the sensor data is transmitted to the master unit.
- the transmitted data can be digitally compressed.
- Various compression algorithms can be used to remove the redundancy in the transmitted data, thereby saving time, bandwidth, and/or power.
- the process 500 may return to the hibernation state to receive more instructions, or return to sampling the sensor data at step 530 .
- the remote sensor (or any other transmitting device) is configured to confirm receipt of the data by the master unit (or any other receiving device).
- the remote sensor can retransmit the data over a different communication path (e.g., one of the available redundant communication links). Redundant communication links may include any of those discussed above. Details of the other actions taking place in the steps shown in FIGS. 4 and 5 at the remote sensor unit will be discussed below in relation to the individual tasks performed by the sensor unit.
- FIG. 6A is a data packet that may be used in communicating messages to/from the master units, the central data collection servers and/or the remote sensor units.
- the packet 600 includes a packet header 602 , a packet body 604 and a packet checksum 606 .
- the packet 600 is preferably encrypted as discussed above.
- the packet header 602 can contain information necessary for identifying such things as the length of the packet, the ID of the recipient of the packet, the data stream ID that the packet is a part of and other information known to those of skill in the art.
- the packet body 604 generally contains the message of the packet.
- the packet body 604 may contain instructions as discussed above, sensor measurement data etc.
- the packet body 604 comprises digitally compressed information.
- the packet checksum 606 contains encoded information, e.g., a cyclic redundancy check (CRC), which is used to determine the integrity of the packet when the packet is received.
- the checksum may protect the integrity of data by being used to detect errors in data that are sent through space (e.g., over a communication link) or time (e.g., storage).
- a checksum may be calculated by simply adding up the components of a message or a portion of a message.
- a checksum may also be based on the body of the packet containing the message or a portion of the message.
- Checksums may be an integer number of bits or bytes.
- a checksum may also be based on a cryptographic hash function. Unlike a simple additive checksum, a hash function may enable detection of a reordering of the bits in a message, inserting or deleting zero-valued bits or bytes and multiple errors that cancel each other out.
- FIG. 6B is a data packet that may be used in communicating sampled sensor data from the sensor unit to the master unit as in step 545 of the process 500 .
- the packet 600 A has a packet header 602 that includes a digital signature field 608 , a task ID field 610 and a sensor ID and version field 612 .
- the signature field 608 contains the digital signature that is used to authenticate the remote sensor to the master unit as in step 520 of the process 500 .
- the Task ID field 610 contains a sequence number that is used by the master unit to identify which task this message contains a response for.
- the master units may be monitoring many remote sensors, each of which may have several task IDs.
- the size of the task ID field 610 if a fixed number of bits, should be large enough to cover the largest number of simultaneous tasks that the master unit expects to submit.
- the task ID field 610 could be variable so as to allow expansion of the number of allowable task IDs to grow as the number of remote sensors which the master unit is control of grows.
- the sensor identification field 612 contains information identifying the identity of a particular remote sensor.
- the sensor identification field 612 may contain indexed information that identifies a number of items such as, for example, the type of sensor (e.g., a temperature sensor, an air sampling sensor, a biometric sensor, etc.), the serial number of the sensor to distinguish from other sensors of the same type, and the version number of the sensor to distinguish software and/or hardware versions.
- the packet 600 A also contains fields 614 to 618 .
- Field 614 contains the start date and time when the sampled measurements were sampled.
- the field 616 contains the sampled data that was sampled by the sensor from the start time to the stop time.
- the field 618 contains the stop date and time for the sampled data.
- Field 620 contains the checksum that is used by the master unit in verifying the integrity of the data packet 600 A. If the integrity is determined to be erroneous, then the master unit may request that the remote sensor retransmit the message.
- FIG. 7 is a data packet that may be used in communicating data from the master unit to the central date collection server as in step 445 of the process 400 .
- the packet 700 has a packet header 602 that includes a digital signature field 702 , a task script ID field 704 and a communication channel ID 706 .
- the signature field 702 contains the digital signature that is used to authenticate the master unit to the central data collection server.
- the task script ID field 704 contains a sequence number that is used by the central data collection server to identify which task script this message contains a response for. Task scripts will be discussed below in relation to FIG. 8 . As with the task ID field 610 , the size of the task script ID field 704 , if a fixed number of bits, should be large enough to cover the largest number of simultaneous task scripts that may be active simultaneously.
- the Communication channel ID field 706 is used for audit trail tracking purposes. By combining the communication channel ID field 706 with the master unit ID (contained in the master unit digital signature field 702 . Maintaining these audit trails may allow identification of compromised or unreliable devices and/or compromised communication channels. Maintaining audit trails may also allow identification of which information was sent by which device and when it was sent.
- the packet body 604 of the packet 700 contains the fields 708 to 716 which contain the responses to the various script tasks that the central data collection unit requested of the master unit.
- the field 708 contains the start date and time for which the message contains monitoring information.
- the field 710 contains the data sampled from various sensors (two sensors A and B in this example).
- the field 712 contains system status information. This system status information may be the result of diagnostic test done on the master unit modules and/or components, or they may be the status of remote sensors that the master unit is the controlling parent of Field 714 contains information regarding errors or flags identifying the errors. Such errors may include errors in previously received task script instruction messages.
- Field 716 contains the stop date and time for the data contained in the packet 700 .
- Field 718 contains the checksum that is used by the master unit in verifying the integrity of the data packet 700 . If the integrity is determined to be erroneous, then the central data collection unit may request that the remote sensor retransmit the message.
- FIG. 8 is a master unit task assignment script for communicating task assignments to a master unit.
- the header contains 10 fields containing information identifying the master unit that the script is targeted for.
- the digital signature field is used for authentication of the central data collection server (or other issuing device) that issued the script instructions.
- Other fields in the header may include a various task classifications including a customer ID, a project ID, and the targeted master unit ID.
- Other fields in the header may identify the location of the master unit including a vessel or structure ID and/or a location ID.
- Other header fields may include scheduling or sequence number information such as a logistics number field, a service start and/or stop time field, a field designating a previous script to be replaced by the current script and a script version number.
- the body of the task assignment script assigns the tasks to the master unit in the form of an inventory list of all actions and devices approved to participate (or be utilized) in the current job.
- the body fields 1 through 14 list monitoring tasks to be performed utilizing preferably two remote sensors, designated sensor A and sensor B in this script.
- the sensors A and B may be pre-designated in a previous script or listed in the current script (not shown in FIG. 8 ).
- the master unit will record the various measurements of the service description tasks listed in the body of the task assignment script and log in the other portions of the inventory check list including a comparison check of sensor A to sensor B (e.g., for identification of a faulty sensor), a sample interval time, a transmit interval time, a date an time stamp that the measured data was transmitted back to a central data collection sever, a field identifying whether the data was logged locally, as well as records indicating whether or not the encryption key handshake and authentication tasks were completed successfully.
- a secure system for remotely gathering information is formed.
- the master unit (or a data collection server) monitors data received from one or more trusted sensors for the purposes of determining an alarm condition.
- the master unit may receive an indication of a state of alarm from a remote sensor or a sensor connected directly to the master unit via one or more of the sensor suite ports 228 A to 228 K.
- the master unit may also make a determination of an alarm condition based on data received from remote sensors.
- the data received from the remote trusted sensors is compared against a range of acceptable values. The master unit performs a self-diagnosis of the data received from the one or more trusted sensors in order to prevent false alarms.
- One method of performing the self-diagnosis involves receiving similar data from redundant remote trusted sensors.
- a majority rule is used where an alarm is issued if a majority of the similar sensors are transmitting data that is outside of the acceptable levels. If there are 2 redundant remote sensors, then the majority rule may require that both sensors measure unacceptable levels. If there are three redundant sensors, then receiving unacceptable levels from two out of the three will result in a determination of a state of alarm.
- the self diagnosis is based on a state of reliability of the trusted monitor that the data is received from.
- the master unit may require additional data (e.g., from other sensors or a retransmission of data from the same sensor) to make the self-diagnosis.
- additional data e.g., from other sensors or a retransmission of data from the same sensor.
- Other self-diagnosis techniques that can indicate a corrupt or unreliable source of information include various forms of error checking such as cyclic redundancy checks and/or checksums.
- Another variation of diagnosis comprises running through a standardized set of routines or measuring something of a known value. The measured result is compared to known values in order to detect errors or to calibrate the device.
- the central data collection unit can perform similar alarm state determinations as those presented here, involving determining an alarm state of one or more master units and/or remote sensors.
- the alarm condition can have more than two states (other than an alarm state and a non-alarm state).
- the alarm state may have several different levels of risk, such as for example, 3, 4, 5, 6, or more levels of risk with the severity of the risk condition increasing with each increase in alarm level.
- alarm level 1 may be a condition where no received data lies outside the acceptable ranges (e.g., a no alarm state)
- level 2 may be if the received data from one or more sensors is approaching an unacceptable level
- level 3 may be where the received data has exceeded the acceptable level but only by a small amount and the level 4 condition may cover when the received data exceeds the unacceptable level by more than the level 3 amount.
- a monitoring device e.g., a master unit or a central data collection unit
- a method of determining tampering of a device involves receiving information from a motion sensor. If a trusted device is a stationary (or mostly stationary) device, the a motion sensor can be monitored in order to determine possible tampering. For a stationary device, any motion above the noise level of the motion sensor may be used as an indication that someone or something has attempted to move or at least make contact with the stationary device. For other devices, a movement outside of a defined localized or proximal area may be an indication of tampering.
- CRCs are typically used to identify whether data has been modified between where it originated (e.g., at a trusted remote sensor) and where it was received (e.g., at a master unit and our a data collection server).
- Jamming signals may be detected by the resulting corrupt data (e.g., failures of CRCs or checksums).
- Jamming signals may also be detected directly by measuring the level of RF energy within a certain bandwidth of frequencies. High levels of RF energy within a certain bandwidth may be used as an indication that the certain bandwidth is being selectively jammed. Monitoring a plurality of sensors may add confidence to the positive (or negative) detection of jamming.
- Redundancy of information sources, processors, power supplies, communication links, memory, and communication devices of all kinds may add security and robustness to the information monitored in the monitoring system.
- Redundant processors may be monitored and if one is determined to be corrupted, the second one may serve as a temporary backup until the corrupt processor is fixed and/or replaced.
- Redundant sensors may be used to reduce the risk of false alarm by using a majority rules method of determining and issuing an alarm state as discussed above.
- Redundant power supplies may be utilized to lower the likelihood of power failure.
- Redundant communication links offer many useful tools for increasing the security and thus the trustworthiness of the monitoring system of some embodiments.
- the best choice can be determined in several ways. In one method, battery strength may be used in choosing which redundant communication links to use. If the on-board power management component 222 or 322 determines that the battery level of a master unit or remote sensor is low, the communication link requiring the lower transmit power may be the better choice. If battery life is not a problem, or an external power source with indefinite power availability is present, then the most power demanding communication link may be the best choice since it may prove more reliable and more secure. If a battery level is detected to be low, the power management component may activate a recharge state. Recharging can include use of an external AC or DC power supply, solar power generation, wind power generation or any of other power generating techniques known to those of skill in the art.
- received signal strength may be used as a deciding factor in which communication link to used between two communication devices.
- the signal to noise ratio (SNR) of received data may be used as an indicator of a reliable channel.
- One artifact of jamming may be a low SNR measurement of received data.
- SNR may be used to detect jamming on a communication link. By monitoring the SNR of all available communication links, the communication link with the highest SNR may be chosen as a best link between two communication devices.
- the urgency of the message and/or the security level of the information level being sent may be crucial in deciding which communication link to use.
- the estimated time to transmit and receive the message may be most important. If time is more critical then security, then a communication link that utilizes an encryption and/or authentication scheme that requires several handshakes may be less desirable than a communication link that has a simple fast way of establishing a link.
- Some types of information may call for higher levels of encryption and the communication links with the best encryption security may be chosen first.
- Integrity check failures may be an indication of equipment failure (e.g., an obstructed antenna), jamming, power failure or other system failures. Redundant antennas may be employed to overcome equipment failure such as an obstructed antenna. Feedback of integrity check results may be used as an indication than one antenna is not as effective as another and the ineffective antenna may not be used until the effectiveness returns.
- equipment failure e.g., an obstructed antenna
- Redundant antennas may be employed to overcome equipment failure such as an obstructed antenna.
- Feedback of integrity check results may be used as an indication than one antenna is not as effective as another and the ineffective antenna may not be used until the effectiveness returns.
- Redundant communication links need not be utilized simultaneously, although this is one option. Robust communications between two or more devices can be accomplished using a single communication link. Robust communications can be more likely if all data packets are encrypted and authenticated (e.g., signed with a digital signature). The likelihood of losing data can be reduced if large internal memory storage is provided for all communication devices. Redundant memory also reduces likelihood of loss of information due to storage device failure. Frequent handshakes between devices, for example frequent data receipt acknowledgements (Acks) can be used to verify receipt of data. Other methods of providing robust communication links will be apparent to those of skill in the art.
- Acks frequent data receipt acknowledgements
- the master unit may revert to the beginning of the task being performed when communication was interrupted and restart the task.
- both devices may keep a log of actions taken (for example, see the master unit task assignment script shown in FIG. 8 ) and communication may be reestablished at the last uncompleted task in the list.
- redundant sensors can provide an indication of a location of an event or an object. For example, if there is a set of remote sensors for detecting radiation sources, a location of a source of radiation may be pinpointed by interpolating the strengths of the radiation measurements of each sensor. A radius of possible locations may be estimated for a given measurement and estimates from three remote sensors can be used to triangulate a two dimensional position of the source of the radiation. Four remote sensors can be used to located an object in three dimensions. Other examples include temperature sensors used to locate heat sources, and air quality sensors used to locate sources of contaminants.
- Another example uses multiple GPS receivers to more quickly acquire the number of satellites needed form establishing a GPS location measurement.
- the geographic diversity offered by spreading GPS receivers over an area decreases the likelihood of all the receivers being blocked (e.g., by buildings etc.).
- the remote sensors can be located in any of the communication devices discussed above including master units, remote sensors and data collection servers.
- Each of the packages has at least one sensor measuring at least one sensed input condition.
- the input condition may be a location measurement, an altitude measurement, a temperature, magnetic field measurement or other measurement.
- Each of the packages also has at least one telemetric communicator configured to provide (e.g., transmit) the sensed input to a coordinating device.
- the coordinating device is configured to process the sensed information.
- the telemetric communicator is configured to communicate the sensed information over a first communication link to the coordinating device.
- the telemetric communicator is configured to transmit the sensed information to another telemetric communicator contained in another one of the packages.
- the telemetric communicator may still communicate to the coordinating device via an ad hoc network of one or more packages. This type of networking can enable the detection of an object being moved (e.g., being stolen from a warehouse) to be identified and monitored for tracking purposes.
- inventions provide a system that can track not only the location of one or more objects, but may also verify that the proper individual is in possession of the object.
- These embodiments include an environmental sensor configured to detect environmental information about an object.
- the environmental sensor may detect a magnetic field, a radio field or some other field associated with the object.
- a product identification sensor is configured to receive information to identify the object.
- the object may contain an RFID tag to transmit to the product identification sensor for identification.
- biometric sensor configured to receive biometric information about an individual. In one aspect the biometric information is kept on record in a list of individuals permitted access to the object.
- the system may also include a GPS sensor configured to receive GPS location information.
- sensors are all accessible to be monitored by a trusted electronic device such as, for example, the master control unit or the data collection server discussed above.
- the monitoring device can perform a diagnosis of the sensed information to assess whether the object being monitored is in danger of being moved and or tampered with by someone other than the permitted individuals.
- FIG. 9 shows an example of a housing of a data collection unit.
- the data collection unit 900 may be a data collection server, a master unit or a remote sensor.
- the unit 900 in FIG. 9 contains an antenna 905 and an LED display 910 .
- the data collection unit 900 also contains two air sampling tubes 915 .
- the underside of the housing contains at least two pressure or proximity activated anti-tamper switches 920 , a fastener 925 to lock to the mounting base and a bus connector 930 to attach to an optional external power supply, keyboard, display device or similar peripheral.
- the housing of the unit 900 is of Tempest construction and shielded to resist external measurement devices from gaining access to magnetic and or electric emissions.
- FIG. 10 depicts an example of placement of a data collection unit within a shipping container.
- the data collection unit 900 is mounted to a mounting base 1025 .
- the mounting base 1025 may include one or more external power connections 1020 , and be attached to the container 1000 so as to be difficult to remove.
- the container 1000 preferably includes multiple antenna 1015 (external and/or internal), where the container in FIG. 10 includes three external antenna.
- the multiple antenna can provide directional diversity for transmission and reception of signals in case one or more antenna are obstructed.
- the container 1000 can also comprise multiple internal sensors such as a passage control sensor 1005 .
- the passage control sensor 1005 can permit individuals or objects with proper identification devices (biometrics, smart cards, RFID cards etc.) to enter the container 1000 or an area 1030 within the container.
- a door sensor 1010 may also indicate whether a door of the area 1030 within the container has been opened.
- Other sensors may include sensors for detecting the presence of certain objects within the container 1000 .
- Such sensors may include ultrasound pattern sensors, radar or x-ray pattern sensors and others.
- the data collection unit 900 may use comparison of the ultrasound, x-ray and/or radar patterns to detect changes in the content and/or layout of objects in the container. This can allow for the detection of objects added, moved and/or removed from the container 1000 .
- FIGS. 11A to 11C show other example embodiments of places for positioning of data collection units.
- FIG. 11A shows positioning of the data collection unit 900 within an airliner 1100 .
- FIG. 11B shows positioning of the data collection unit 900 within an automobile 1120 .
- FIG. 11C shows positioning of the data collection unit 900 within a building 1130 .
- the embodiment in FIG. 11C includes an audio capture device 1132 and a video capture device 1134 that can be used to monitor audio and video/image data (e.g., of people entering and/or leaving the building 1130 .
- a central server of the monitoring system is provided information such as company information, product description and ID numbers (e.g. manifest), safety disclosures, customs disclosures, financial disclosures and receiver party information about the various items in the container.
- information such as company information, product description and ID numbers (e.g. manifest), safety disclosures, customs disclosures, financial disclosures and receiver party information about the various items in the container.
- the central server may also be provided with biometric data of authorized personnel permitted to access the container.
- Authorized personnel may have a hand-held-device (HHD) that is configured to communicate with a monitoring system in the container.
- HHD hand-held-device
- Upon approaching the container an authorized person can scan the container's identifying information with the HHD at which point an authorization process determines whether to issue an electronic authorization key.
- the authorization process may include the authorized personnel scanning a biometric fingerprint with the HHD.
- the HHD can then perform an authentication process based on the biometric scan. If the authentication process is successful, the key can be transmitted to the Master Controller located inside the container.
- the Master Controller receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras.
- the cameras are remote sensors that the MC is in communication with. The images are stored to the local disk memory of the MC and every 100th frame may be relayed to the central server.
- the personnel When the authenticated personnel enters the container, he may install the necessary sensors depending on the contents of the container.
- the personnel installs radiological sensors, one sensor in each corner of the container and attaches special ducting connected to the MC to pull air from several locations. He first scans each sensor device with the HHD, mounts the sensors securely in place, then transmits the data to the MC with the HHD.
- the MC compares the sensor codes to the JAS to verify authenticity and instructs each sensor to conduct a self-diagnosis and tamper check.
- the MC performs a complete self diagnostic routine of all sensors and systems, then sends the results to the central server.
- the server will respond to the MC with approval to reseal the container.
- an authorized personnel Upon arrival at the loading dock, an authorized personnel scans his personal and corporate ID badges on the scanner mounted on the container door. The codes are passed to the MC and compared with the values in the JAS. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras.
- the supervisor closes the container doors, scans his ID cards and enters a code confirming the loading is complete.
- the message is forwarded to the MC which then sends a signal to activate the solenoid thus locking the door.
- the MC performs an integrity check of all locks and orifice sensors, takes a baseline sample from all sensors activated as defined by the JAS. The results are relayed to the central server. If all data is in conformance, the server issues an authorization key to the MC which in turn illuminates green LEDs at several locations around the exterior of the container. At this point, the container is ready to be transported to the shipping terminal.
- the trucking company Prior to picking up the container, the trucking company provides the central server with information including the truck ID number, the driver ID number, the relevant container ID and the shipper ID. An electronic authorization key is then transferred to the driver's HHD.
- the driver Upon arrival at the Wang facility, the driver scans his index finger on his HHD, then scans the truck ID tags, the container ID and the Wang facility ID. The information is relayed to the MC in the container.
- the MC compares the information and keys to those received in the last JAS, and determines if they are consistent. In this case, the driver was replaced at the last minute and authorization was not received.
- the LEDs on the container turn red and the HHD instructs the driver to contact his management. His management repeats the registration procedure using his ID, and the central server issues new instructions to his HHD.
- the container's MC When the container's MC detects movement due to the truck moving, it starts the transportation section of the JAS.
- GPS antenna are scheduled to collect route information and the full range of environmental sensors are sampling every five minutes inside the container.
- Both the shipping terminal operator and the ship captain can perform similar procedures as that of the trucking company above such that accountability for the container is never in question.
- the JAS for this particular container shipment dictates the following tasks: 1) Sample environmental once every 15 minutes, 2) Capture one image frame from each camera every five minutes, and 3) Transmit all samples to server once per hour.
- the MC for this container authenticates itself with a neighbor MC and requests relay which in turn does the same until a container is found with clear access and a strong signal to the satellite or relay antenna.
- the ship During the voyage to the destination port, the ship encounters a heavy storm with 30 foot seas.
- the MC's motion sensors detect pitching in excess of 30 degrees at 20 second intervals. As this value is well outside the norm (the acceptable ranges dictated by the JAS), the MC queries adjacent containers for redundant motion readings and determines that the reading is not in error nor is it significantly different than neighboring containers (an indication that the container is not being stolen).
- the cameras and audio sensors can record video and audio to detect shifting cargo that may result in product damage.
- authorized personnel of the receiving company can logon to the central server to track developments along the way.
- the authorization information is relayed to the container's MC where it performs an authorization process to determine whether to issue an electronic key.
- the MC may consult with the server.
- the Master Controller receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras. The images are stored to the local disk memory and every 100th frame is relayed to the server.
- JS Job Assignment Script
- the monitoring system in this example is used as a sentry system for the office building.
- the central server may be provided with information including company identifying information, business description and employee ID numbers, safety disclosures, structural disclosures, financial disclosures and vendor information.
- a security personnel downloads authorization information to a handheld device then scans his index finger to confirm identity.
- the HDD instructs him to retrieve a new device from SecureTech's inventory with ID nr 98765.
- the security personnel scans the box seal then performs a visual integrity inspection and enters his findings to the HHD. He then transmits the information to the sentry system Master Controller (MC) which performs an authorization process with a remote server to determine whether to issue an electronic key. If successful, the key is transmitted to the Master Controller along with its first Job Assignment Script (JAS).
- MC sentry system Master Controller
- the Master Controller receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the housing of the MC.
- JS Job Assignment Script
- the security personnel then proceeds to follow instructions provided by the HDD to perform the following tasks:
- the security personnel scans each device with the HHD, mounts them securely in place, then transmit the data to the MC.
- the MC compares the sensor codes to the JAS to verify authenticity and instructs each sensor to conduct a self-diagnosis and tamper check.
- the MC performs a complete diagnostic routine of all sensors and systems, then sends the results to the remote server over both a wired and wireless link (redundant communication links). If all is in order, the server will respond with an activation key and issue a new JAS to the MC.
- exterior cameras detect a middle-aged man just outside the door for prolonged periods of time on three days in the same week.
- the main exterior camera focused on the entrance became occluded (11:22:28).
- the MC referenced the backup measures specified in the JAS and immediately acted to reposition internal camera 4 in the lobby to point in the direction of the main entrance.
- Two minutes later (11:24:21) a heavily disguised person entered the lobby with a large suitcase. Since these two events fall outside the normal operating ranges for these two measurements as defined in the most recent JAS, the data is immediately relayed to the central server via both wired and wireless connections.
- the MC detects abnormally high electromagnetic interference. As a result, the ID badge scanner malfunctions and permits an unauthorized person to slip into the main lobby. Already on heightened alert, the MC forwards the event immediately to the server and receives an instant response to shut down elevator operation and lock all exterior doors. All security personnel are alerted to the breach and the intruder is captured. This example is meant only to describe the varied monitoring methods that some embodiments can provide.
- a surveillance system in one innovative aspect, includes a plurality of sensors configured to provide environmental and or spatial data.
- the system also includes an electronic device configured to receive the sampled environmental and or spatial data from the sensors.
- the electronic device is further configured to receive monitoring instructions, and to use the received monitoring instructions to process the received environmental and/or spatial data.
- the system also includes a remote device configured to provide the monitoring instructions to the electronic device.
- the electronic device may be configured to authenticate the remote device prior to using the monitoring instructions to process the received environmental and/or spatial data.
- One or more of the sensors included in the system may be enclosed within a tamper and eavesdrop proof enclosure.
- the monitoring instructions may be contained in a script message.
- Them received monitoring instructions may be encrypted.
- the electronic device is further configured to decrypt encrypted monitoring instructions. It may be desirable for the electronic device to be further configured to compare at least a portion of the received sensor data to a range of acceptable values and to transmit the data to the remote device.
- the electronic device may be configured to conduct a self-diagnosis prior to transmitting the data to the remote device.
- a monitoring system in another innovative aspect, includes a plurality of sensors configured to sense information.
- the monitoring system also includes an electronic device configured to receive data from the sensors.
- the electronic device is configured to determine an alarm condition based upon the received data.
- the electronic device is configured to compare the received data to a range of acceptable values and conduct a self-diagnosis prior to transmitting the alarm condition to a remote device.
- the electronic device is configured to transmit the alarm condition to the remote device over a plurality of communication links.
- the plurality of communication links may include at least two or more of a code division multiple access system, a frequency division multiple access system, and orthogonal frequency division multiple access system, a time division multiple access system, a terrestrial trunked radio system, and a wideband code division multiple access system.
- the received data may include redundant data from two or more of the sensors.
- the electronic device may be configured to conduct the self-diagnosis based on a majority rule of the redundant data from the two or more sensors.
- the electronic device may also be configured to conduct the self-diagnosis by performing an integrity check of the received data.
- the electronic device may be further configured to determine the alarm condition to be in a state of alarm if the received data lies outside the range of this acceptable values and the self-diagnosis shows no failure conditions.
- a monitoring system in yet another innovative aspect, includes a plurality of sensors configured to sense information.
- the monitoring system further includes an electronic device configured to receive data from the sensors.
- the electronic device is configured to determine an alarm condition based upon the received data.
- the electronic device is further configured to determine a state of reliability of the sensor that the data is received from.
- the electronic device is further configured to conduct a self-diagnosis based on the determine state of reliability prior to transmitting the alarm condition to a remote device.
- the electronic device is configured to transmit the alarm condition to the remote device over a plurality of communication links.
- the electronic device may be configured to determine the state of reliability based on a checksum.
- the self-diagnosis may comprise the electronic device requesting a first sensor to retransmit the sensed information if the data from the first sensor is determined to be unreliable.
- the self-diagnosis may comprise the electronic device requesting a second sensor to retransmit redundant data if the data from a first sensor is determined to be unreliable where the redundant data is requested from substantially the same type of sensor and location.
- the electronic device is further configured to compare the received data to a range of acceptable values.
- the electronic device may be configured to determine the alarm condition to be in a state of alarm if the data received from a first sensor lies outside the range of acceptable values and the self-diagnosis shows the first sensor to be reliable.
- the alarm condition may include three or more levels of alarm.
- the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system.
- the system includes a plurality of sensors authorized and configured to communicate in the monitoring system.
- the monitoring system also includes an electronic device authorized to communicate in the monitoring system.
- Electronic device is further configured to receive data in a secure manner from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system.
- the task authorization message includes information identifying at least the sensor from which to receive the data.
- the electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device.
- the electronic device may be configured to activate from a sleep mode upon receiving the task authorization message. In some implementations electronic device may be configured to transmit the received data in a secure manner to the remote master device.
- the sensors may be configured to broadcast a sensor identification number.
- the task authorization information identifying the sensor may include at least a portion of the broadcast sensor identification number.
- a further monitoring system is provided in yet another innovative aspect.
- the system includes a plurality of communication devices configured to communicate in a secure manner in the system.
- the system includes a plurality of non-system sensors configured to sense information.
- the non-system sensors are not authorized to communicate securely in the monitoring system.
- the system further includes an electronic device authorized to communicate in the monitoring system.
- the electronic device is further configured to receive data from the non-system sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system.
- the task authorization message includes information identifying at least the non-system sensor from which to receive the data.
- Electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device.
- electronic device is further configured to be activated from a sleep mode upon receiving the task authorization message.
- the electronic device may be configured to transmit the received data in a secure manner to the remote master device.
- the non-system sensors may be configured to broadcast a sensor identification number wherein the task authorization information identifying the non-system sensor includes at least a portion of the broadcast sensor identification number. It may be desirable for the electronic device to be configured to encode context information into a message containing the received data.
- the electronic device may be configured to transmit the received data message in a secure manner to the remote master device wherein the context information includes data identifying a time and a location from which the data was received.
- a monitoring system includes a plurality of communication devices authorized to communicate in the monitoring system.
- the system further includes a plurality of sensors configured to sense information.
- the sensors are authorized in configured to communicate in the monitoring system.
- the sensors are further configured to be in a sleep mode until activated by a task authorization message received from a master device authorized to communicate in the monitoring system.
- the system further includes an electronic master device authorized to communicate in the monitoring system and configured to transmit a task authorization message to the sensors.
- the task authorization message includes information identifying at least the sensor from which to receive sensed information.
- the sensors are configured to encode a digital signature and encrypt the sensed information prior to transmitting the sensed information to the electronic master device.
- the electronic device is further configured to be activated from a sleep mode upon relieving a second task authorization message from a remote master device authorized to communicate in the system.
- Electronic device may be further configured to transmit the received information in a secure manner to the remote master device.
- the sensors are configured to intermittently broadcast a sensor identification number while in the sleep mode.
- the task authorization information identifying the sensor may include at least a portion of the broadcast sensor identification number.
- a monitoring system including a plurality of communication devices that are authorized to communicate in the monitoring system.
- the system includes a plurality of sensors.
- the system further includes an electronic device authorized to communicate in the monitoring system.
- the electronic device is further configured to receive data from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the system.
- the task authorization message includes information identifying at least the sensor from which to receive the data.
- Electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device via a first communication path.
- the electronic device is further configured to confirm receipt of the transmitted data by the remote master device.
- electronic device may transmit the received data to remote master device via a second communication pathway if the electronic device does not confirm receipt of the data by the remote master device.
- the first comedic occasion pathway may include a satellite network in the second communication pathway may include a local wireless work.
- the first communication pathway may include a local wireless network in the second communication pathway may include a satellite network.
- a monitoring system in a further innovative aspect, includes an environmental sensor configured to detect environmental information associated with an object.
- the system includes an identification sensor configured to identify the object.
- the system includes a timing device configured to provide time information including a time of day and the date.
- the system further includes a location sensor configured to receive location information.
- the system also includes an electronic device configured to receive data from the environmental sensor, the identification sensor, the timing device, and the location sensor.
- the electronic device is further configured to transmit the received data such that the timing information, object identification information, location information, and the environmental information can be linked together.
- the linked data may be transmitted to a remote device in a secure manner.
- the object is a person any identification sensor is a biometric sensor configured to receive biometric information of the person.
- the identification sensor may be a camera configured to capture images of the object.
- the object may be located in a room.
- the location sensor may include a GPS sensor.
- the timing device may be configured to receive a system time.
- the environmental sensor may be implemented as a chemical detector, radiological detector, or the like.
- a shipping container monitoring system includes a plurality of sensors configured to detect environmental information about an area inside or outside the container.
- the system includes a timing device configured to provide time information including a time of day.
- the system includes a location sensor configured to receive location information.
- the system further includes an electronic device configured to receive data from the plurality of sensors, the timing device, and the location sensor.
- the electronic device is configured to transmit the received data such that the timing information, the location information, and the environmental information are synchronized.
- the synchronized data is encrypted and transmitted to a remote device in a secure manner.
- the plurality of sensors may include an image capture device configured to capture images of the inside of the container.
- the plurality of sensors may include an image capture device configured to capture images of the container.
- the location sensor may include a GPS sensor.
- the timing device may be configured to receive a system time.
- the system may include a plurality of antenna wherein the electronic device is further configured to transmit the synchronize data via one of the antenna.
- the plurality of sensors are configured to be in a sleep state until a task authorization message is received and authenticated as having been transmitted from the remote device.
- the system may include a bus comprising a plurality of connectors. The plurality of sensors may be configured to plug into the connectors of the bus and to communicate with the electronic device with a communications protocol.
- a portable monitoring system is described in a further innovative aspect.
- the system includes a tempest constructed housing to provide shielding for enclosed devices.
- the housing encloses an environmental sensor configured to detect environmental information.
- the housing encloses a timing device configured to provide time information including a time of day and a date.
- the housing encloses a location sensor configured to receive location information.
- the housing encloses a processor configured to receive data from the environmental sensor, the timing device, and the location sensor.
- the electronic device is configured to transmit the received data such that the timing information, object identification information, the location information, and the environmental information are synchronized.
- the synchronize data is transmitted to a remote device in a secure manner.
- At least one of the sensors includes an image capture device configured to capture image data. At least one of the sensors may include an audio capture device configured to capture audio information.
- the location sensor may include a GPS sensor.
- the timing device may be configured to receive a system time.
- the system may include a plurality of antenna at least one of which may be used by the electronic device to transmit the synchronize data.
- the system may include a plurality of additional sensors.
- the system may also include a remote device configured to transmit secure instructions.
- the system may further include an electronic device configured to receive data from the sensors.
- the electronic device may be configured to receive the secure instructions from the remote device.
- the secure instructions may direct the electronic device to receive data from one or more of the sensors.
- the electronic device may be configured to authenticate the received secure instructions.
- the system includes a plurality of sensors.
- the system includes a remote device configured to transmit encrypted monitoring instructions.
- the system further includes an electronic device configured to receive data from the sensors.
- the electronic device is further configured to receive and decrypt the monitoring instructions from the remote device via a network.
- the monitoring instructions include a monitoring schedule for one or more of the plurality of sensors.
- the electronic device is configured to receive data from the sensors in accordance with the received monitoring schedule.
- the monitoring schedule defines the frequency that at least one of the sensors will transmit data to the electronic device.
- the monitoring schedule may define a sampling frequency for at least one of the sensors.
- the monitoring instructions and also define a plurality of alarm conditions.
- the electronic device may be configured to authenticate the received monitoring instructions.
- the system includes a plurality of sensors.
- the system includes a remote device configured to transmit encrypted monitoring instructions.
- the encrypted monitoring instructions may include a tolerance range for at least one of the sensors.
- the system further includes an electronic device configured to receive sensor data from the sensors.
- the electronic device is further configured to receive, authenticate, and decrypt the encrypted monitoring instructions from the remote device.
- the electronic device is further configured to compare the sensor data to the received tolerance range.
- a further system is provided in yet another innovative aspect.
- the system includes a plurality of sensors.
- the system includes a remote device configured to transmit encrypted monitoring instructions. Encrypted monitoring instructions identify one or more of the plurality of sensors, sensing schedule, and one or more alarm thresholds.
- the system also includes an electronic device configured to receive sensor data from the sensors in accordance with the sensing schedule. The electronic device is also configured to receive and decrypt the monitoring instructions. The electronic device is further configured to identify alarm conditions based on the identified alarm thresholds and sent data from the sensors.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Strategic Management (AREA)
- Artificial Intelligence (AREA)
- Development Economics (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Automation & Control Theory (AREA)
- Entrepreneurship & Innovation (AREA)
- Medical Informatics (AREA)
- Emergency Management (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Fuzzy Systems (AREA)
- Accounting & Taxation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Finance (AREA)
- Primary Health Care (AREA)
- Computational Linguistics (AREA)
- Radar, Positioning & Navigation (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
Abstract
Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.
Description
- This application is a continuation of U.S. patent application Ser. No. 15/287,464, filed Oct. 6, 2016, issued on Dec. 10, 2019, which is a continuation of U.S. patent application Ser. No. 14/480,362, filed on Sep. 8, 2014, which is a continuation of U.S. patent application Ser. No. 13/724,942, filed on Dec. 21, 2012, issued on Sep. 9, 2014 as U.S. Pat. No. 8,830,053, which is a continuation of U.S. patent application Ser. No. 12/641,139, filed on Dec. 17, 2009, which is a continuation of U.S. patent application Ser. No. 11/418,380, filed on May 3, 2006, issued on Feb. 2, 2010 as U.S. Pat. No. 7,656,286, which claims a benefit of priority from U.S. provisional Application No. 60/677,164 filed on May 3, 2005 and of U.S. provisional Application No. 60/735,539 filed on Nov. 10, 2005, each of which is incorporated herein by reference in its entirety for all purposes.
- U.S. patent application Ser. No. 11/418,380 is one of a set of related U.S. applications filed May 3, 2006, the set including: U.S. patent application Ser. No. 11/418,385 (now abandoned), Ser. No. 11/418,381 (now U.S. Pat. No. 7,609,159), Ser. No. 11/418,380 (now U.S. Pat. No. 7,656,286), Ser. No. 11/418,472 (now abandoned), Ser. No. 11/417,910 (now abandoned), Ser. No. 11/418,496 (now abandoned), Ser. No. 11/417,887 (now U.S. Pat. No. 7,512,583), Ser. No. 11/418,448 (now U.S. Pat. No. 7,526,455), Ser. No. 11/418,382 (now abandoned), Ser. No. 11/418,395 (now abandoned), Ser. No. 11/418,447 (now abandoned), and Ser. No. 11/417,893 (now abandoned). Each of the set is incorporated by reference in its entirety.
- The field of the invention relates to wireless surveillance and tracking. More particularly, the invention relates to monitoring the state of potentially hostile environments and threat assessment.
- In the aftermath of Sep. 11, 2001 (9/11), studies have focused on what could have been done before, during and after; either to have prevented it from happening or reduced the destruction and casualties. Two fundamental weaknesses have been identified: 1) the failure to gather, process and disseminate early indicators in an efficient manner, and 2) the lack of a common, interoperable communications platform for distributing all forms of information. Furthermore, the 9/11 attack pointed out the fact that virtually every building, vehicle, public venue and person, regardless of where it is in the world, is potentially vulnerable as a future target. Thus, there is a need for improved systems and methods for controlling security risks.
- The system, method, and devices of the invention each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this invention, its more prominent features will now be discussed briefly. After considering this discussion, and particularly after reading the section entitled “Detailed Description of Certain Embodiments” one will understand how the features of this invention provide advantages over other error management solutions.
- An embodiment of this invention provides a trusted and highly reliable self-contained computer-controlled sensing device that can be configured to monitor any object with a variable number of sensors. Some aspects provide tempest construction and remote re-programmability. Thus some embodiments may be deployed for virtually any application from home security to aircraft security.
- One embodiment is a surveillance system including a plurality of sensors configured to provide environmental and spatial data, and an electronic device configured to receive the sampled environmental and spatial data from the sensors. The electronic device is further configured to receive monitoring instructions, and to use the received monitoring instructions to process the received environmental and spatial data.
- Another embodiment is a monitoring system including a plurality of sensors configured to sense information, and an electronic device configured to receive data from the sensors. The electronic device is configured to determine an alarm condition based upon the received data, and the electronic device compares the received data to a range of acceptable values and conducts a self-diagnosis prior to transmitting the alarm condition to a remote device.
- Another embodiment is a monitoring system including a plurality of sensors configured to sense information, and an electronic device configured to receive data from the sensors. The electronic device is configured to determine an alarm condition based upon the received data, and the electronic device determines a state of reliability of the sensor that the data is received from, and conducts a self-diagnosis based on the determined state of reliability prior to transmitting the alarm condition to a remote device.
- One embodiment is a surveillance system including a plurality of sensors configured to sample environmental and spatial conditions, and an electronic device configured to receive data from the sensors. The electronic device is further configured to monitor the received data for anomalies by comparing the received data to a range of acceptable values, and the electronic device includes a motion sensor configured to detect unauthorized contact with the electronic device.
- Another embodiment is a system including a sensor configured to sample environmental and spatial conditions, where the sensor includes a motion sensor. The system also includes an electronic device configured to receive data from the sensor and to determine integrity of the received data. The electronic device is further configured to monitor data received from the motion sensor to detect unauthorized contact with the sensor.
- Another embodiment is a surveillance system including a plurality of sensors configured to sample environmental and spatial conditions, and an electronic device configured to receive data from the sensors. The electronic device is further configured to monitor the received data, and the electronic device includes a motion sensor. The electronic device is further configured to transmit an alarm condition to a remote device if the motion sensor data indicates that the electronic device moves outside of a pre-defined area.
- Another embodiment is a monitoring system including at least one sensing device including a plurality of sensors including a motion sensor, and an electronic device configured to receive data from the sensing device. The electronic device is further configured to monitor the received data and to determine integrity of the received data. The electronic device further is configured to monitor data received from the motion sensor to detect movement of the sensing device, and the electronic device is further configured to transmit an alarm condition to a remote device if the motion sensor data indicates that the sensing device moves outside of a pre-defined area.
- Another embodiment is a system including a plurality of sensors, and an electronic device configured to receive data from the sensors, where the electronic device is configured to transmit sensor data in a secure manner to a remote server, and where the electronic device includes a sensor for detecting jamming.
- One embodiment is a system including a plurality of sensors, and an electronic device including at least two redundant processors each configured to receive data from the sensors and determine an alarm condition. The electronic device confirms determination of an alarm condition by both processors before generating an alarm signal.
- Another embodiment is a surveillance system including a plurality of redundant sensors, and an electronic device configured to receive data from at least two of the redundant sensors and determine an alarm condition based on redundant data received from each of the redundant sensors. The electronic device confirms determination of an alarm condition by a majority of the redundant sensors before generating an alarm signal.
- Another embodiment is a system including at least one sensor configured to sample environmental and spatial conditions and to transmit the sampled data over a plurality of communication links to an electronic device, and an electronic device configured to receive data from the sensors over the two communication links and determine integrity of the data received over the two communication links. The electronic device determines one of the communication links to be unreliable based on the integrity of the data received.
- Another embodiment is a redundant surveillance system including a first monitoring device configured to receive data over a first communication link, a second monitoring device configured to receive data over a second communication link, and a plurality of redundant sensors in a secure container configured to sample environmental and spatial conditions configured to transmit the sampled data over a the first communication link to the first monitoring device. The redundant sensors are configured to receive confirmation of receipt of the data from the first monitoring device over the first communication link, and where the redundant sensors are configured to transmit the sampled data to the second monitoring device over the second communication link to the second monitoring device.
- One embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system. The system also includes a plurality of sensors authorized and configured to communicate in the monitoring system, and an electronic device authorized to communicate in the monitoring system and configured to receive data in a secure manner from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system. The task authorization message includes information identifying at least the sensor from which to receive the data, and the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are configured to communicate in a secure manner in the monitoring system, the system including a plurality of non-system sensors configured to sense information, where the non-system sensors are not authorized to communicate securely in the monitoring sensor, and an electronic device authorized to communicate in the monitoring system and configured to receive data from the non-system sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system. The task authorization message includes information identifying at least the non-system sensor from which to receive the data, and the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system. The system also includes a plurality of sensors configured to sense information, where the sensors are authorized and configured to communicate in the monitoring system, and where the sensors are configured to be in a sleep mode until activated by a task authorization message received from a master device authorized to communicate in the monitoring system, and an electronic master device authorized to communicate in the monitoring system and configured to transmit a task authorization message to the sensors. The task authorization message includes information identifying at least the sensor from which to receive sensed information, and where the sensor encodes a digital signature and encrypts the sensed information prior to transmitting the sensed information to the electronic master device.
- Another embodiment is a monitoring system, where the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system, where the system includes a plurality of sensors, and an electronic device authorized to communicate in the monitoring system and configured to receive data from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system. The task authorization message includes information identifying at least the sensor from which to receive the data, the electronic device authenticates and encrypts the received data prior to transmitting the received data to the remote master device via a first communication pathway, and the electronic device is configured to confirm receipt of the transmitted data by the remote master device.
- One embodiment is a monitoring system including an environmental sensor configured to detect environmental information associated with an object, an identification sensor configured to identify the object, a timing device configured to provide time information including a time of day and a date, a location sensor configured to receive location information, and an electronic device configured to receive data from the environmental sensor, the identification sensor, the timing device and the location sensor. The electronic device is further configured to transmit the received data such that the timing information, object identification information, the location information and the environmental information can be linked together, where the linked data is transmitted to a remote device in a secure manner.
- Another embodiment is a container monitoring system including a plurality of sensors configured to detect environmental information about an area inside or outside the container, a timing device configured to provide time information including a time of day, a location sensor configure to receive location information, and an electronic device configured to receive data from the plurality of sensors, the timing device and the location sensor. The electronic device is further configured to transmit the received data such that the timing information, the location information and the environmental information is synchronized, where the synchronized data is transmitted to a remote device in a secure manner.
- Another embodiment is a portable monitoring system including a tempest constructed housing to provide shielding for enclosed devices. The housing encloses an environmental sensor configured to detect environmental information, a timing device configured to provide time information including a time of day and a date, a location sensor configured to receive location information, and an processor configured to receive data from the environmental sensor, the timing device and the location sensor. The electronic device is further configured to transmit the received data such that the timing information, object identification information, the location information and the environmental information is synchronized, where the synchronized data is transmitted to a remote device in a secure manner.
- One embodiment is a system including a plurality of sensors, a remote device configured to transmit secure instructions, and an electronic device configured to receive data from the sensors. The electronic device is further configured to receive the secure instructions from the remote device, where the secure instructions direct the electronic device to receive data from one or more of the sensors.
- Another embodiment is a method including receiving data at an electronic device from a first sensor, and receiving instructions from a remote device, where the instructions direct the electronic device to receive data from a second sensor instead of the first sensor. The method also includes discontinuing the receiving of data from the first sensor, and receiving data at the electronic device from the second sensor.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, and an electronic device configured to receive data from the sensors. The electronic device is further configured to receive and decrypt the monitoring instructions from the remote device via a network, where the monitoring instructions include a monitoring schedule for one or more of the plurality of sensors, and the electronic device is configured to received data from the sensors in accordance with the received monitoring schedule.
- Another embodiment is a method including receiving an encrypted monitoring schedule from a remote device, where the monitoring schedule defines a sensing schedule for a plurality of sensors and where the monitoring schedule identifies at least one alarm threshold. The method also includes decrypting the monitoring schedule, receiving data from one or more sensors based upon the received sensing schedule, determining an alarm condition based upon the alarm threshold and data received from the sensor, encrypting notification of the alarm condition, and transmitting the encrypted notification of the alarm condition to the remote device.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, where the encrypted monitoring instructions include a tolerance range for at least one of the sensors, and an electronic device configured to receive sensor data from the sensors. The electronic device is further configured to receive, authenticate and decrypt the encrypted monitoring instructions from the remote device, the electronic device configured to compare the sensor data to the received tolerance range.
- Another embodiment is a method including receiving encrypted monitoring instructions from a remote device, where the monitoring instructions include a tolerance range for sensed data from at least one sensor. The method also includes decrypting the monitoring instructions, determining whether the sensed data are within the identified tolerance range, and transmitting an encrypted alarm signal to the remote device when the sensed data falls outside the identified tolerance range.
- Another embodiment is a system including a plurality of sensors, a remote device configured to transmit encrypted monitoring instructions, where the encrypted monitoring instructions identify one or more of the plurality of sensors. The system also includes a sensing schedule, and one or more alarm thresholds, and an electronic device configured to receive sensor data from the sensors in accordance with the sensing schedule. The electronic device is further configured to receive and decrypt the monitoring instructions, and to identify alarm conditions based upon the identified alarm thresholds and sensed data from the sensors.
- Another embodiment is a method including receiving encrypted monitoring instructions from a remote device, where the monitoring instructions include a tolerance range for sensed data from at least one sensor. The method also includes decrypting the monitoring instructions, determining whether the sensed data are within the identified tolerance range, and transmitting an encrypted alarm signal to the remote device when the sensed data falls outside the identified tolerance range.
-
FIG. 1A illustrates an example of a communication system for providing redundant communications between one or more master units and one or more remote sensor units. -
FIG. 1B illustrates another example of a communication system between communication devices. -
FIG. 2 is a functional block diagram of certain components of a master unit. -
FIG. 3 is a functional block diagram of certain components of a remote sensor unit. -
FIG. 4 is a flowchart illustrating certain blocks in a method of processing communications in a master unit. -
FIG. 5 is a flowchart illustrating certain blocks in a method of processing communications in a remote sensor unit. -
FIG. 6A is a data packet that may be used in communicating messages to/from the master units, the central data collection servers and/or the remote sensor units. -
FIG. 6B is a data packet that may be used in communicating sampled sensor data from the sensor unit to the master unit. -
FIG. 7 is an example of a data package for communicating between a master unit and a base station. -
FIG. 8 is a master unit task assignment script for communicating task assignments to a master unit. -
FIG. 9 is an example of a data collection unit housing. -
FIG. 10 depicts an example of placement of a data collection unit within a shipping container. -
FIG. 11A to 11C show example embodiments of positioning of data collection units for use in the global communication system ofFIGS. 1A and 1B . - Methods and apparatus for monitoring remotely located objects with a system comprised of at least one master data collection unit, any number of remote sensor units, and a central data collection server are described. The master unit can be configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the objects being monitored. The master unit may be in a fixed location, or attached to a mobile object. The master unit can be configured for monitoring objects that enter and leave the area where it is located. The master unit may act as a parent controller for one or more child devices, wherein the child devices can be remote sensors or monitors of various measurable conditions including environmental conditions, substance identification, product identification and biometric identification. The master unit may be able to discover new remote sensor units as they enter or leave the area where the master unit is located. The master unit may be able to be remotely reprogrammed. The reprogramming may be accomplished with authenticated instructions.
- The remote sensor units are configured to communicate with the master unit. The communication can be over a secure communication link. Remote sensors can be commanded to provide monitored information to the master unit on an as needed basis, on a fixed time basis or in other ways. Remote sensor units may be connected to various peripheral measuring devices.
- The central data collection server is connected to the master unit via one or more communication links. The central data collection server can send instructions to the master unit over the one or more communication links. The instructions can include monitoring task instructions, reprogramming instructions, diagnostic test instructions and others.
- Redundancy of system elements adds to the reliability of the system. In some embodiments, each unit (e.g., central data collection servers, master units and remote sensor units can communicate over at least two communication links to at least two other entities. In some embodiments, independent (redundant) encryption key exchanges are used for all messaging between the various units. In some embodiments redundant power supplies are used for the units.
- What follows is the description of a universal “black-box” surveillance device capable of use in buildings, bridges, vehicles or containers so as to create a uniform surveillance infrastructure across all vertical applications. Each device would be configured to sample, transmit and process phenomena in exactly the same manner so as to eliminate the notorious problem with data analysis—comparing ‘apples’ data to ‘oranges’ data. By standardizing all common processes, this invention overcomes the stovepipe nature of traditional solutions and opens the door to near real-time sharing of early-warning data. Indeed, managers of critical infrastructure are increasingly acknowledging their interdependence and desire to collaborate on the creation of a 360 degree surveillance capability built for interoperability with a goal of prevention.
- In the following description, specific details are given to provide a thorough understanding of the disclosed methods and apparatus. However, it will be understood by one of ordinary skill in the art that the disclosed methods and apparatus may be practiced without these specific details. For example, electrical components may be shown in block diagrams in order not to obscure certain aspects in unnecessary detail. In other instances, such components, other structures and techniques may be shown in detail to further explain certain aspects.
- It is also noted that certain aspects may be described as a process, which is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently and the process can be repeated. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
-
FIG. 1A illustrates an example of an infrastructure of a communication system for providing redundant communications between one or more master units and one or more remote sensor units. The example illustrated is a cargo ship with multiple shipping containers 100. The shipping containers 100 may each have one or more master data collection units 105 (each container is depicted with onemaster unit 105 in this example). The containers contain objects (not shown) that may contain remote sensing units (not shown) attached to the objects. Additionally,remote sensing units 110 may be positioned at other areas in and/or outside the containers. In some cases a device may be connected to a plurality of antennae to overcome positioning problems (e.g., containers stacked on a ship). - Preferably, the
remote sensor units 110 and themaster units 105 communicate over two or more channels to one or more other communication links to two or more communication devices. As discussed above, themaster units 105 communicate with one or moreremote sensor units 110. However, themaster units 105 can also communicate with various other communication devices and/or networks, either for the purpose of collecting data or relaying data to another device with a more robust direct communication channel, serving as a peer-to-peer or ad hoc-network. For example, thecommunication link 1 shows amaster unit 105 communicating with anothermaster unit 105.Communication link 2 shows amaster unit 105 communicating with asatellite relay 115. Thecommunication link 5 illustrates amaster unit 105 communicating with a land or sea basedantenna relay 120. The communication links 2 a and 3 depict aremote sensor unit 110 communicating with tworelay satellites 115.Communication link 1 a depicts aremote sensor unit 110 communicating with another remote sensor unite 110 (e.g., a relay station). By having thesecondary communication links remote sensor unit 110 ormaster unit 105. For example, amaster unit 105 can communicate with the land or sea basedantenna 120 which can then forward the communication to asecond master unit 105 via acommunication link 5 a. - Intermediary relay stations may also be used in forwarding messages. For example, the remote sensor 110 a may communicate a monitoring measurement to the
relay satellite 115 oncommunication link 3, which the forwards the message to an on-ship intermediary satellite receiver viacommunication link 6 a. The intermediary on-ship receiver can then forward the message to the master unit 105 (e.g., the master unit that requested a measurement from the remote sensor) viacommunication link 6. Other types of communication links not shown inFIG. 1 that can be part of the redundant communication infrastructure include cellular telephone networks, LANs (wired or wireless local area networks), WANs, and wired networks (for fixed location units). -
FIG. 1B illustrates another example of a communication system between communication devices. The communication system can represent communication flow at multiple levels. In one embodiment themaster unit 105 serves as a data collection server and communicates with one or more of theremote sensor units 110 that serve as trusted monitoring devices. At another level, the data collection server can be a centraldata collection server 125 that communicates with one ormore master units 105 that serve as the trusted monitoring devices. Communications can be direct between the data collection server (105 or 125) and the trusted monitoring devices (110 or 105). Communications can also be relayed via one or more relay stations such as therelay satellites 115 and theantennas 120. - Redundancy of communication as illustrated by the various communication links of
FIG. 1A is only one level of redundancy offered in some embodiments. Further reliability is afforded by other redundancy built into the master units and remote sensor units.FIG. 2 is a functional block diagram of certain components of a master unit, such as themaster units 105 discussed above. Themaster unit system 200 preferably includes aredundant microprocessor component 202. However, asingle microprocessor unit 202 could be utilized. Themicroprocessor 202 may be one or more of any conventional general purpose single- or multi-chip microprocessor such as a Pentium® processor, Pentium II® processor, Pentium processor, Pentium IV® processor, Pentium® Pro processor, a 8051 processor, a MIPS® processor, a Power PC® processor, or an ALPHA® processor. In addition, themicroprocessor 202 may be one or more of any conventional special purpose microprocessor such as a digital signal processor. Themicroprocessor 202 is linked to various other modules on themaster unit system 200 with conventional address lines, conventional data lines, and/or conventional control lines for purposes of data transfer, instruction reception and transmission and data processing. - Memory is provided by a
memory component 204 and/or adata storage unit 206. Preferably, both thememory component 204 and thedata storage unit 206 provide redundancy in the form of spatial redundancy (different portions of the same medium), or unit redundancy where two separate devices contain redundant data. Memory refers to electronic circuitry that allows information, typically computer data, to be stored and retrieved. Memory can refer to external devices or systems, for example, disk drives or tape drives. Memory can also refer to fast semiconductor storage (chips), for example, Random Access Memory (RAM) or various forms of Read Only Memory (ROM), that are directly connected to the processor. Other types of memory include bubble memory and core memory. Memory also includes storage devices (internal or external) including flash memory, optical memory and magnetic memory. - The
master unit system 200 is comprised of various modules 208-228. As can be appreciated by one of ordinary skill in the art, each of the modules 208-228 comprise various sub-routines, procedures, definitional statements, and macros. Each of the modules 208-228 are typically separately compiled and linked into a single executable program. Therefore, the following description of each of the modules 208-228 is used for convenience to describe the functionality of themaster unit system 200. Thus, the processes that are undergone by each of the modules 208-228 may be arbitrarily redistributed to one of the other modules, combined together in a single module, or made available in a shareable dynamic link library. Further each of the modules 208-228 could be implemented in hardware. - A
networking circuitry module 208 contains logic and or circuitry for communication of various communication links such as thecommunication links 1 through 6 and 1 a through 6 a discussed above in reference toFIG. 1A . Thenetworking circuitry module 208 may include circuitry for communicating over wireless communication links that may comprise, for example, part of a code division multiple access (CDMA or CDMA2000) communication system, a frequency division multiple access (FDMA) system, an orthogonal frequency division multiple access (OFDM) system such as WiMax (IEEE 802.16x), a time division multiple access (TDMA) system such as GSM/GPRS (General Packet Radio Service)/EDGE (enhanced data GSM environment) or TETRA (Terrestrial Trunked Radio) mobile telephone technology for the service industry, a wideband code division multiple access (WCDMA), a high data rate (1×EV-DO or 1×EV-DO Gold Multicast) system, or in general any wireless communication system employing a combination of techniques. Thenetworking circuitry module 208 may include circuitry for communicating over wired communication links that may comprise, for example, co-axial cable, fiber-optic cable and others. - An
alarm module 210 contains circuitry for receiving notification, via pushed messaging or through periodic monitoring of data from various alarm sensors. Alarm sensors may be linked via wired and or wireless communication links. The alarm sensors may monitor audible (audio) signals, visual (video) signals, or on/off type of alerts such as door locks, intruder alerts etc. - An
external ports module 212 may provide I/O to various external devices including input/output devices, display devices, printers, cameras, antennas and remote sensors. Preferably, redundant wireless communication links are also provided, via thenetworking circuitry module 208, for any of the external devices connected via the external ports. Typically, the wired external devices are connected to the computer using a standards-based bus system. In different embodiments of the present invention, the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures. - An
air circulation component 214 may have multiple input ports for sampling air from various sources. Ducting is connected to the ports to be located in various areas of the monitored area. The air intake system includes a fan, a vacuum or other means of moving air so as to supply one or more sensors with unadulterated samples. Details of the air intake analysis system are discussed below. - A global positioning system (GPS) 216 is used to track the location of the master unit. The GPS module may be connected to an external antenna in situations where the master unit is housed in a shielded container or location. The GPS system can also receive measurements from remote sensor units that contain GPS tracking ability. Thus, multiple objects can be tracked by the same master unit. In addition, multiple sensor units containing GPS capability can combine their satellite signals in order to speed up convergence and capture of the necessary number of GPS satellites. GPS signals may also be combined with other signals to further refine the exact location of the object.
- Instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware and include any type of programmed step undertaken by components of the system. Instructions received by and transmitted by the
master unit 200 are typically encrypted. A digital certificate storage andauthentication module 218 is used to establish secure connections with the multiple remote sensor units, relay units, intermediary units and central data collection servers of the global system shown inFIG. 1A . An encryption anddecryption module 220 is used to encrypt messages transmitted by and decrypt messages received by themaster unit 220. Redundant encryption keys can be used over the redundant channels for added security. The type of encryption for a given task shall be defined by the Assignment Script discussed below in reference toFIG. 8 . - An on-board
power management module 222 is used to monitor batteries, backup batteries, and/or fuel cells as well as external power source reliability and variability. The state of all power sources is monitored at periodic intervals for both quantity and quality so as to get early warning of future operational limitations. - An
external power module 224 is used to convert power from multiple sources for use when available. Thepower module 224 can sense when the master unit is plugged into various voltage levels, AC and/or DC sources in order to power the unit in multiple areas of the world having different power levels and reliability. Filtering can be used to smooth out power surges in areas where the external power is unreliable. Switching to internal power can be automated when power spikes or power loss is detected. An uninterruptible power supply is preferred. In some embodiments, anomalies in the power supply are logged and reported to the central data collection server. - The remote control of door/orifice entry/exit can be monitored/controlled by
module 226. The master unit can control the unlocking and or opening of doors using electro-mechanical, pneumatic devices or other means known to those in the art. - A suite of remote sensor command and
control modules 228A to 228K, preferably all redundant, are used to connect peripherals directly to the master unit or to allow the master unit to interact with the remote sensors. The various remote sensor types will be presented below. Additional remote sensor suites can be added to the master unit by recognizing the presence of a new remote sensor. For example, the new remote sensor may be recognized by monitoring for and receiving an identification signal broadcast by the new remote sensor. The identification signal may contain identification information that identifies a type of sensor, a model number etc. The master unit can conduct authentication of the new remote sensor or transmit the identification information to a central server for evaluation and/or approval to communicate with the new sensor. The server can then send a new assignment script that includes new instructions for adding the new remote sensor to the monitoring schedule of the master unit. Additionally, new remote sensor slots can be added by remote programming in order to enhance the number of remote sensors that the master unit can recognize and/or command and interact with. In some embodiments, empty slots in the master device can be filled with new sensors or external, remote child sensors units can communicate with the master. Preferably, any sensor is first authenticated prior to communicating with a second device. -
FIG. 3 is a functional block diagram of certain components of a remote sensor unit, such as theremote sensor units 105 discussed above. The remotesensor unit system 300 preferably includes aredundant microprocessor component 302. However, asingle microprocessor unit 302 could be utilized. Themicroprocessor 302 may be one or more of any conventional general purpose single- or multi-chip microprocessor such as a Pentium® processor, Pentium II® processor, Pentium III® processor, Pentium IV® processor, Pentium® Pro processor, a 8051 processor, a MIPS® processor, a Power PC® processor, or an ALPHA® processor. In addition, themicroprocessor 302 may be one or more of any conventional special purpose microprocessor such as a digital signal processor. Themicroprocessor 302 is used as the main computing source of various other modules on the remotesensor unit system 300 with conventional address lines, conventional data lines, and/or conventional control lines for purposes of data transfer, instruction reception and transmission and data processing. In some embodiments, the remote sensor unit acts as a slave device to the master unit, e.g., only doing a subset of the master device functions, e.g., not communicating with the central data collection server directly. - Memory is provided by a
memory component 304 and/or adata storage unit 306. Preferably, both thememory component 304 and thedata storage unit 306 provide redundancy in the form of spatial redundancy (different portions of the same medium), or unit redundancy where two separate devices contain redundant data. Memory refers to electronic circuitry that allows information, typically computer data, to be stored and retrieved. Memory can refer to external devices or systems, for example, disk drives or tape drives. Memory can also refer to fast semiconductor storage (chips), for example, Random Access Memory (RAM) or various forms of Read Only Memory (ROM), that are directly connected to the processor. Other types of memory include bubble memory and core memory. Memory also includes storage devices (internal or external) including flash memory, optical memory and magnetic memory. - The remote
sensor unit system 300 is comprised of various modules 308-324. As can be appreciated by one of ordinary skill in the art, each of the modules 308-324 comprise various sub-routines, procedures, definitional statements, and macros. Each of the modules 308-324 are typically separately compiled and linked into a single executable program. Therefore, the following description of each of the modules 308-324 is used for convenience to describe the functionality of the remotesensor unit system 300. Thus, the processes that are undergone by each of the modules 308-324 may be arbitrarily redistributed to one of the other modules, combined together in a single module, or made available in a shareable dynamic link library. Further each of the modules 308-324 could be implemented in hardware. - A
networking circuitry module 308 contains logic and or circuitry for communication of various communication links such as thecommunication links 1 through 6 and 1 a through 6 a discussed above in reference toFIG. 1A . Thenetworking circuitry module 308 may include circuitry for communicating over wireless communication links that may comprise, for example, part of a code division multiple access (CDMA or CDMA2000) communication system, a frequency division multiple access (FDMA) system, an orthogonal frequency division multiple access (OFDM) system such as WiMax (IEEE 802.16x), a time division multiple access (TDMA) system such as GSM/GPRS (General Packet Radio Service)/EDGE (enhanced data GSM environment) or TETRA (Terrestrial Trunked Radio) mobile telephone technology for the service industry, a wideband code division multiple access (WCDMA), a high data rate (1×EV-DO or 1×EV-DO Gold Multicast) system, or in general any wireless communication system employing a combination of techniques. Thenetworking circuitry module 308 may include circuitry for communicating over wired communication links that may comprise, for example, co-axial cable, fiber-optic cable and others. - An
external ports module 312 may provide I/O to various external devices including input/output devices, display devices, printers, cameras, antennas and remote sensors. Preferably, redundant wireless communication links are also provided, via thenetworking circuitry module 308, for any of the external devices connected via the external ports. Typically, the wired external devices are connected to the computer using a standards-based bus system. In different embodiments of the present invention, the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures. - An
air circulation component 314 may have multiple input ports for sampling air from various sources. Ducting is connected to the ports to be located at various locations of the monitored area. The air intake system includes a fan, a vacuum or other means of moving air so as to supply one or more sensors with unadulterated samples. - A global positioning system (GPS) 316 is used to track the location of the remote sensor unit. The GPS module may be connected to an external antenna in situations where the master unit is housed in a shielded container or location. The GPS system can also receive measurements from other remote sensor units that contain GPS tracking ability and are in range of the remote sensor unit. Signal levels can be used to estimate ranges to other remote sensor units containing
GPS modules 318. In addition, multiple sensor units containing GPS capability can combine their satellite signals in order to accelerate acquisition of the necessary number of GPS satellites. - Instructions received by and transmitted by the
remote sensor unit 300 are typically encrypted. A digital certificate storage andauthentication module 318 is used to establish secure connections with the multiple remote sensor units, relay units, intermediary units and central data collection servers of the global system shown inFIG. 1A . An encryption anddecryption module 320 is used to encrypt messages transmitted by and decrypt messages received by themaster unit 220. Redundant encryption keys can be used over the redundant channels for added security. - An on-board
power management module 322 is used to monitor batteries, backup batteries, and/or fuel cells as well as external power source reliability and variability. In some embodiments, anomalies in the power supply are logged and reported to a controlling master unit or forwarded to another communication device as in a peer-to-peer and/or ad hoc network. - An
external power module 324 is used to convert power from multiple sources for use when available. Thepower module 324 can sense when the master unit is plugged into various voltage levels, AC and/or DC sources in order to power the unit in multiple areas of the world having different power levels and reliability. Filtering can be used to smooth out power surges in areas where the external power is unreliable. Switching to internal power can be automated when power spikes or power loss is detected. An uninterruptible power supply is preferred. -
FIG. 4 is a flowchart illustrating certain blocks in a method of processing communications in a master unit. Theprocess 400 typically starts in a hibernation state. The master unit then transfers out of the hibernation state to step 410 in order to monitor one or more communication links for incoming instructions (e.g., from the centraldata collection server 125 inFIG. 1B ). Monitoring for incoming instructions atstep 410 can be continuous, periodic, or random. If no instruction is received atstep 410, theprocess 400 proceeds to step 415 where it returns to the hibernation state. If instructions are received atstep 410, theprocess 400 proceeds to step 420. - Step 420 involves authenticating the server from which the received instructions originated. Authentication can include known techniques such as digital IDs with corresponding digital signatures. If the authentication shows that the received message is authentic, the
process 400 continues to step 425. However if the authentication shows the instructions to be false, theprocess 400 can return to the hibernation state or return to step 410 to detect another incoming instruction. Details of authentication will be discussed below in relation toFIGS. 6 and 7 . - If the received instructions are authenticated at
step 420, the process can continue at one or moreother steps 430 to 445, depending on the received instructions. The instructions are preferably encrypted and the authenticating device decrypts the instructions before performing and/or instructing other devices to perform the tasks. The instruction may direct the master unit to conduct diagnostic tests,step 430, query and authenticate subsystem modules, components and/or remote sensor units,step 435, execute tasks defined in a script,step 440, and/or transmit data packages to one or more remote servers. After completing the instructed tasks theprocess 400 generally proceeds to step 415 and returns to the hibernation state. Details of the various actions taking place in the steps shown inFIG. 4 will be discussed below in relation to the individual tasks performed by the master unit. - Instructions received by the master unit while performing the
process 400 may require the master unit to transmit instructions to one or more of the remote servers. Additionally, the master unit may be programmed to transmit instructions to remote sensors autonomously without receiving command instructions. -
FIG. 5 is a flowchart illustrating certain blocks in a method of processing instructions in a remote sensor unit. In this example, the instructions pertain to sampling a sensor measurement and transmitting the sampled data to the master unit. It should be noted, that the sensor unit can also be instructed to perform processing to that shown inFIG. 4 (e.g., diagnostic tests, reprogramming, etc.) Theprocess 500 typically starts in a hibernation state. The master unit then transfers out of the hibernation state to step 510 in order to monitor one or more communication links for incoming instructions (e.g., from themaster unit 105 inFIGS. 1A and 1B ). Monitoring for incoming instructions atstep 510 can be continuous, periodic, or random. If no instruction is received atstep 510, theprocess 500 proceeds to step 515 where it returns to the hibernation state. If instructions are received atstep 510, theprocess 500 proceeds to step 520. - Step 520 involves providing the master unit with the remote sensor unit's digital ID/signature, thus authenticating the remote sensor to the master unit that sent the instructions. Authentication can include known techniques such as digital IDs with corresponding digital signatures. The master unit can perform the authentication of the remote sensor's response and determine whether or not to use the forthcoming sensor data. Authentication of the master unit to the remote sensor can also be done at
step 520. The master unit will provide a digital ID/signature in the instruction message received atstep 510 and the remote sensor will authenticate the master unit. This two-way type of authentication protects both the master unit and the remote sensor from being hacked. If the authentication shows that the received message is from an authentic master unit, theprocess 500 continues to step 525. However if the authentication shows the instructions come from an unauthentic master unit, theprocess 500 can return to the hibernation state or return to step 510 to detect another incoming instruction. Details of authentication will be discussed below in relation toFIGS. 6 and 7 . - If the received instructions are determined to be authentic at
step 520, the process can continue atstep 525 where the remote sensor unit samples one or more of the measurements that it is equipped to sample. The remote sensor may be instructed to sample for a certain time period or at a certain interval. If the sampling is to be terminated at a certain time, as per predetermined or received instructions, the sampling is stopped atstep 530. - If the sampling is not stopped at step 530 (e.g., in a case where a sampling measurement is continued indefinitely or at least for a period of time longer than the time to update the master unit), the remote sensor unit may periodically transfer the sampled data to the master unit. Sampled data that is to be transferred to the master unit is preferably encrypted at
step 535. Prior to transmitting the encrypted data, the remote sensor unit may proceed to step 540 to authenticate the master unit on the one or more communication channels that it will transmit the sampled data on. - If the authentication handshake at step 540 (which may be a two-way authentication) is completed successfully, the
process 500 continues atstep 545 where the sensor data is transmitted to the master unit. In some embodiments, the transmitted data can be digitally compressed. Various compression algorithms can be used to remove the redundancy in the transmitted data, thereby saving time, bandwidth, and/or power. After the sensor data is transmitted atstep 545, theprocess 500 may return to the hibernation state to receive more instructions, or return to sampling the sensor data atstep 530. In one embodiment, the remote sensor (or any other transmitting device) is configured to confirm receipt of the data by the master unit (or any other receiving device). If the remote sensor (or any other transmitting device) does not confirm receipt of the data by the master unit (or any other receiving device), the remote sensor can retransmit the data over a different communication path (e.g., one of the available redundant communication links). Redundant communication links may include any of those discussed above. Details of the other actions taking place in the steps shown inFIGS. 4 and 5 at the remote sensor unit will be discussed below in relation to the individual tasks performed by the sensor unit. -
FIG. 6A is a data packet that may be used in communicating messages to/from the master units, the central data collection servers and/or the remote sensor units. Thepacket 600 includes apacket header 602, apacket body 604 and apacket checksum 606. Thepacket 600 is preferably encrypted as discussed above. - The
packet header 602 can contain information necessary for identifying such things as the length of the packet, the ID of the recipient of the packet, the data stream ID that the packet is a part of and other information known to those of skill in the art. - The
packet body 604 generally contains the message of the packet. Thepacket body 604 may contain instructions as discussed above, sensor measurement data etc. In some embodiments, thepacket body 604 comprises digitally compressed information. - The
packet checksum 606 contains encoded information, e.g., a cyclic redundancy check (CRC), which is used to determine the integrity of the packet when the packet is received. The checksum may protect the integrity of data by being used to detect errors in data that are sent through space (e.g., over a communication link) or time (e.g., storage). A checksum may be calculated by simply adding up the components of a message or a portion of a message. A checksum may also be based on the body of the packet containing the message or a portion of the message. Checksums may be an integer number of bits or bytes. A checksum may also be based on a cryptographic hash function. Unlike a simple additive checksum, a hash function may enable detection of a reordering of the bits in a message, inserting or deleting zero-valued bits or bytes and multiple errors that cancel each other out. -
FIG. 6B is a data packet that may be used in communicating sampled sensor data from the sensor unit to the master unit as instep 545 of theprocess 500. In this example, thepacket 600A has apacket header 602 that includes adigital signature field 608, atask ID field 610 and a sensor ID andversion field 612. Thesignature field 608 contains the digital signature that is used to authenticate the remote sensor to the master unit as instep 520 of theprocess 500. - The
Task ID field 610 contains a sequence number that is used by the master unit to identify which task this message contains a response for. The master units may be monitoring many remote sensors, each of which may have several task IDs. The size of thetask ID field 610, if a fixed number of bits, should be large enough to cover the largest number of simultaneous tasks that the master unit expects to submit. Thetask ID field 610 could be variable so as to allow expansion of the number of allowable task IDs to grow as the number of remote sensors which the master unit is control of grows. - The
sensor identification field 612 contains information identifying the identity of a particular remote sensor. Thesensor identification field 612 may contain indexed information that identifies a number of items such as, for example, the type of sensor (e.g., a temperature sensor, an air sampling sensor, a biometric sensor, etc.), the serial number of the sensor to distinguish from other sensors of the same type, and the version number of the sensor to distinguish software and/or hardware versions. - The
packet 600A also containsfields 614 to 618.Field 614 contains the start date and time when the sampled measurements were sampled. Thefield 616 contains the sampled data that was sampled by the sensor from the start time to the stop time. Thefield 618 contains the stop date and time for the sampled data. -
Field 620 contains the checksum that is used by the master unit in verifying the integrity of thedata packet 600A. If the integrity is determined to be erroneous, then the master unit may request that the remote sensor retransmit the message. -
FIG. 7 is a data packet that may be used in communicating data from the master unit to the central date collection server as instep 445 of theprocess 400. In this example, thepacket 700 has apacket header 602 that includes adigital signature field 702, a taskscript ID field 704 and acommunication channel ID 706. Thesignature field 702 contains the digital signature that is used to authenticate the master unit to the central data collection server. - The task
script ID field 704 contains a sequence number that is used by the central data collection server to identify which task script this message contains a response for. Task scripts will be discussed below in relation toFIG. 8 . As with thetask ID field 610, the size of the taskscript ID field 704, if a fixed number of bits, should be large enough to cover the largest number of simultaneous task scripts that may be active simultaneously. - The Communication
channel ID field 706 is used for audit trail tracking purposes. By combining the communicationchannel ID field 706 with the master unit ID (contained in the master unitdigital signature field 702. Maintaining these audit trails may allow identification of compromised or unreliable devices and/or compromised communication channels. Maintaining audit trails may also allow identification of which information was sent by which device and when it was sent. - The
packet body 604 of thepacket 700 contains thefields 708 to 716 which contain the responses to the various script tasks that the central data collection unit requested of the master unit. Thefield 708 contains the start date and time for which the message contains monitoring information. Thefield 710 contains the data sampled from various sensors (two sensors A and B in this example). Thefield 712 contains system status information. This system status information may be the result of diagnostic test done on the master unit modules and/or components, or they may be the status of remote sensors that the master unit is the controlling parent ofField 714 contains information regarding errors or flags identifying the errors. Such errors may include errors in previously received task script instruction messages.Field 716 contains the stop date and time for the data contained in thepacket 700. -
Field 718 contains the checksum that is used by the master unit in verifying the integrity of thedata packet 700. If the integrity is determined to be erroneous, then the central data collection unit may request that the remote sensor retransmit the message. -
FIG. 8 is a master unit task assignment script for communicating task assignments to a master unit. The header contains 10 fields containing information identifying the master unit that the script is targeted for. The digital signature field is used for authentication of the central data collection server (or other issuing device) that issued the script instructions. Other fields in the header may include a various task classifications including a customer ID, a project ID, and the targeted master unit ID. Other fields in the header may identify the location of the master unit including a vessel or structure ID and/or a location ID. Other header fields may include scheduling or sequence number information such as a logistics number field, a service start and/or stop time field, a field designating a previous script to be replaced by the current script and a script version number. - The body of the task assignment script assigns the tasks to the master unit in the form of an inventory list of all actions and devices approved to participate (or be utilized) in the current job. The body fields 1 through 14 list monitoring tasks to be performed utilizing preferably two remote sensors, designated sensor A and sensor B in this script. The sensors A and B may be pre-designated in a previous script or listed in the current script (not shown in
FIG. 8 ). The master unit will record the various measurements of the service description tasks listed in the body of the task assignment script and log in the other portions of the inventory check list including a comparison check of sensor A to sensor B (e.g., for identification of a faulty sensor), a sample interval time, a transmit interval time, a date an time stamp that the measured data was transmitted back to a central data collection sever, a field identifying whether the data was logged locally, as well as records indicating whether or not the encryption key handshake and authentication tasks were completed successfully. By preferably using authentication and encryption at the data collection server, the master unit and the remote sensors, a secure system for remotely gathering information is formed. - In some embodiments, the master unit (or a data collection server) monitors data received from one or more trusted sensors for the purposes of determining an alarm condition. As discussed above in reference to the
Alarm component 210 ofFIG. 2 , the master unit may receive an indication of a state of alarm from a remote sensor or a sensor connected directly to the master unit via one or more of thesensor suite ports 228A to 228K. However, the master unit may also make a determination of an alarm condition based on data received from remote sensors. In one embodiment, the data received from the remote trusted sensors is compared against a range of acceptable values. The master unit performs a self-diagnosis of the data received from the one or more trusted sensors in order to prevent false alarms. One method of performing the self-diagnosis involves receiving similar data from redundant remote trusted sensors. In one example, a majority rule is used where an alarm is issued if a majority of the similar sensors are transmitting data that is outside of the acceptable levels. If there are 2 redundant remote sensors, then the majority rule may require that both sensors measure unacceptable levels. If there are three redundant sensors, then receiving unacceptable levels from two out of the three will result in a determination of a state of alarm. In another embodiment, the self diagnosis is based on a state of reliability of the trusted monitor that the data is received from. If a remote sensor has previously been determined to be unreliable (e.g., using known methods of determining the integrity of the received data), then the master unit may require additional data (e.g., from other sensors or a retransmission of data from the same sensor) to make the self-diagnosis. Other self-diagnosis techniques that can indicate a corrupt or unreliable source of information include various forms of error checking such as cyclic redundancy checks and/or checksums. Another variation of diagnosis comprises running through a standardized set of routines or measuring something of a known value. The measured result is compared to known values in order to detect errors or to calibrate the device. It should be noted that the central data collection unit can perform similar alarm state determinations as those presented here, involving determining an alarm state of one or more master units and/or remote sensors. In some embodiments the alarm condition can have more than two states (other than an alarm state and a non-alarm state). For example, the alarm state may have several different levels of risk, such as for example, 3, 4, 5, 6, or more levels of risk with the severity of the risk condition increasing with each increase in alarm level. For example, if there are 4 alarm levels,alarm level 1 may be a condition where no received data lies outside the acceptable ranges (e.g., a no alarm state),level 2 may be if the received data from one or more sensors is approaching an unacceptable level,level 3 may be where the received data has exceeded the acceptable level but only by a small amount and thelevel 4 condition may cover when the received data exceeds the unacceptable level by more than thelevel 3 amount. - In some embodiments, a monitoring device (e.g., a master unit or a central data collection unit) can monitor certain information from a remote sensor and/or a master unit in an attempt to identify unauthorized tampering of a trusted device in the closed monitoring network. One example of a method of determining tampering of a device involves receiving information from a motion sensor. If a trusted device is a stationary (or mostly stationary) device, the a motion sensor can be monitored in order to determine possible tampering. For a stationary device, any motion above the noise level of the motion sensor may be used as an indication that someone or something has attempted to move or at least make contact with the stationary device. For other devices, a movement outside of a defined localized or proximal area may be an indication of tampering.
- Besides motion sensors, other monitored information may be received and used to perform a self-diagnosis so as to determine improper tampering of the device from which monitored information is received. For example, various methods of detecting jamming signals, or detecting high levels of corruptly received data packets can be an indication of tampering. Such indications of tampering can be used to flag normally trusted devices of the network as untrustworthy. Checksums or CRCs are typically used to identify whether data has been modified between where it originated (e.g., at a trusted remote sensor) and where it was received (e.g., at a master unit and our a data collection server). Jamming signals may be detected by the resulting corrupt data (e.g., failures of CRCs or checksums). Jamming signals may also be detected directly by measuring the level of RF energy within a certain bandwidth of frequencies. High levels of RF energy within a certain bandwidth may be used as an indication that the certain bandwidth is being selectively jammed. Monitoring a plurality of sensors may add confidence to the positive (or negative) detection of jamming.
- As discussed above, redundancy of information sources, processors, power supplies, communication links, memory, and communication devices of all kinds may add security and robustness to the information monitored in the monitoring system. Redundant processors may be monitored and if one is determined to be corrupted, the second one may serve as a temporary backup until the corrupt processor is fixed and/or replaced. Redundant sensors may be used to reduce the risk of false alarm by using a majority rules method of determining and issuing an alarm state as discussed above. Redundant power supplies may be utilized to lower the likelihood of power failure.
- Redundant communication links offer many useful tools for increasing the security and thus the trustworthiness of the monitoring system of some embodiments. When more than two choices exist as candidates for the redundant communication links, the best choice can be determined in several ways. In one method, battery strength may be used in choosing which redundant communication links to use. If the on-board
power management component - In another method, received signal strength may be used as a deciding factor in which communication link to used between two communication devices. The signal to noise ratio (SNR) of received data may be used as an indicator of a reliable channel. One artifact of jamming may be a low SNR measurement of received data. SNR may be used to detect jamming on a communication link. By monitoring the SNR of all available communication links, the communication link with the highest SNR may be chosen as a best link between two communication devices.
- In another method, the urgency of the message and/or the security level of the information level being sent may be crucial in deciding which communication link to use. In a situation where the urgency in a message is important, then the estimated time to transmit and receive the message may be most important. If time is more critical then security, then a communication link that utilizes an encryption and/or authentication scheme that requires several handshakes may be less desirable than a communication link that has a simple fast way of establishing a link. Some types of information may call for higher levels of encryption and the communication links with the best encryption security may be chosen first.
- In another method of choosing which of a plurality of communication links to use, some links may be disqualified from consideration of various reasons. Repeated failure of data integrity checks may rule out one or more communication links. Integrity check failures may be an indication of equipment failure (e.g., an obstructed antenna), jamming, power failure or other system failures. Redundant antennas may be employed to overcome equipment failure such as an obstructed antenna. Feedback of integrity check results may be used as an indication than one antenna is not as effective as another and the ineffective antenna may not be used until the effectiveness returns.
- Redundant communication links need not be utilized simultaneously, although this is one option. Robust communications between two or more devices can be accomplished using a single communication link. Robust communications can be more likely if all data packets are encrypted and authenticated (e.g., signed with a digital signature). The likelihood of losing data can be reduced if large internal memory storage is provided for all communication devices. Redundant memory also reduces likelihood of loss of information due to storage device failure. Frequent handshakes between devices, for example frequent data receipt acknowledgements (Acks) can be used to verify receipt of data. Other methods of providing robust communication links will be apparent to those of skill in the art.
- In a situation where a single active channel is being used to communicate between any two devices in the system, there is a chance that communications may be interrupted. In some embodiments that utilize a master/slave hierarchy, the master unit may revert to the beginning of the task being performed when communication was interrupted and restart the task. In some embodiments, both devices may keep a log of actions taken (for example, see the master unit task assignment script shown in
FIG. 8 ) and communication may be reestablished at the last uncompleted task in the list. - Besides reducing the likelihood of a false alarm due to a failure of a single device, multiple remote sensors spread over a geographic area offer capabilities that single sensors do not offer. In some embodiments, redundant sensors can provide an indication of a location of an event or an object. For example, if there is a set of remote sensors for detecting radiation sources, a location of a source of radiation may be pinpointed by interpolating the strengths of the radiation measurements of each sensor. A radius of possible locations may be estimated for a given measurement and estimates from three remote sensors can be used to triangulate a two dimensional position of the source of the radiation. Four remote sensors can be used to located an object in three dimensions. Other examples include temperature sensors used to locate heat sources, and air quality sensors used to locate sources of contaminants. Another example uses multiple GPS receivers to more quickly acquire the number of satellites needed form establishing a GPS location measurement. The geographic diversity offered by spreading GPS receivers over an area decreases the likelihood of all the receivers being blocked (e.g., by buildings etc.). It should be noted that the remote sensors can be located in any of the communication devices discussed above including master units, remote sensors and data collection servers.
- Another example of utilizing multiple sensors involves a system for tracking multiple packages or objects in a packaging system. Each of the packages has at least one sensor measuring at least one sensed input condition. The input condition may be a location measurement, an altitude measurement, a temperature, magnetic field measurement or other measurement. Each of the packages also has at least one telemetric communicator configured to provide (e.g., transmit) the sensed input to a coordinating device. The coordinating device is configured to process the sensed information. The telemetric communicator is configured to communicate the sensed information over a first communication link to the coordinating device. In one embodiment, if the first communication link is not available (as can be determined by an integrity check), the telemetric communicator is configured to transmit the sensed information to another telemetric communicator contained in another one of the packages. Thus, if one package is move out of range of the coordinating device, it may still communicate to the coordinating device via an ad hoc network of one or more packages. This type of networking can enable the detection of an object being moved (e.g., being stolen from a warehouse) to be identified and monitored for tracking purposes.
- Other embodiments provide a system that can track not only the location of one or more objects, but may also verify that the proper individual is in possession of the object. These embodiments include an environmental sensor configured to detect environmental information about an object. The environmental sensor may detect a magnetic field, a radio field or some other field associated with the object. A product identification sensor is configured to receive information to identify the object. The object may contain an RFID tag to transmit to the product identification sensor for identification. There is also a biometric sensor configured to receive biometric information about an individual. In one aspect the biometric information is kept on record in a list of individuals permitted access to the object. The system may also include a GPS sensor configured to receive GPS location information. These sensors are all accessible to be monitored by a trusted electronic device such as, for example, the master control unit or the data collection server discussed above. The monitoring device can perform a diagnosis of the sensed information to assess whether the object being monitored is in danger of being moved and or tampered with by someone other than the permitted individuals.
- The sensors in the examples discussed above do not need to be attached to the objects that they are tracking in all situations.
FIG. 9 shows an example of a housing of a data collection unit. Thedata collection unit 900 may be a data collection server, a master unit or a remote sensor. Theunit 900 inFIG. 9 contains anantenna 905 and anLED display 910. Thedata collection unit 900 also contains twoair sampling tubes 915. The underside of the housing contains at least two pressure or proximity activatedanti-tamper switches 920, afastener 925 to lock to the mounting base and abus connector 930 to attach to an optional external power supply, keyboard, display device or similar peripheral. Preferably, the housing of theunit 900 is of Tempest construction and shielded to resist external measurement devices from gaining access to magnetic and or electric emissions. -
FIG. 10 depicts an example of placement of a data collection unit within a shipping container. Thedata collection unit 900 is mounted to a mountingbase 1025. The mountingbase 1025 may include one or more external power connections 1020, and be attached to thecontainer 1000 so as to be difficult to remove. Thecontainer 1000 preferably includes multiple antenna 1015 (external and/or internal), where the container inFIG. 10 includes three external antenna. The multiple antenna can provide directional diversity for transmission and reception of signals in case one or more antenna are obstructed. Thecontainer 1000 can also comprise multiple internal sensors such as apassage control sensor 1005. Thepassage control sensor 1005 can permit individuals or objects with proper identification devices (biometrics, smart cards, RFID cards etc.) to enter thecontainer 1000 or anarea 1030 within the container. Adoor sensor 1010 may also indicate whether a door of thearea 1030 within the container has been opened. Other sensors, not shown inFIG. 10 , may include sensors for detecting the presence of certain objects within thecontainer 1000. Such sensors may include ultrasound pattern sensors, radar or x-ray pattern sensors and others. Thedata collection unit 900 may use comparison of the ultrasound, x-ray and/or radar patterns to detect changes in the content and/or layout of objects in the container. This can allow for the detection of objects added, moved and/or removed from thecontainer 1000. -
FIGS. 11A to 11C show other example embodiments of places for positioning of data collection units.FIG. 11A shows positioning of thedata collection unit 900 within anairliner 1100.FIG. 11B shows positioning of thedata collection unit 900 within anautomobile 1120.FIG. 11C shows positioning of thedata collection unit 900 within abuilding 1130. The embodiment inFIG. 11C includes anaudio capture device 1132 and avideo capture device 1134 that can be used to monitor audio and video/image data (e.g., of people entering and/or leaving thebuilding 1130. - An exemplary use of some of the features of the monitoring system discussed above will now be described. This example describes a scenario for monitoring a shipping container. A central server of the monitoring system is provided information such as company information, product description and ID numbers (e.g. manifest), safety disclosures, customs disclosures, financial disclosures and receiver party information about the various items in the container.
- The central server may also be provided with biometric data of authorized personnel permitted to access the container. Authorized personnel may have a hand-held-device (HHD) that is configured to communicate with a monitoring system in the container. Upon approaching the container an authorized person can scan the container's identifying information with the HHD at which point an authorization process determines whether to issue an electronic authorization key. The authorization process may include the authorized personnel scanning a biometric fingerprint with the HHD. The HHD can then perform an authentication process based on the biometric scan. If the authentication process is successful, the key can be transmitted to the Master Controller located inside the container.
- The Master Controller (MC) receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras. The cameras are remote sensors that the MC is in communication with. The images are stored to the local disk memory of the MC and every 100th frame may be relayed to the central server.
- When the authenticated personnel enters the container, he may install the necessary sensors depending on the contents of the container. In this example, the personnel installs radiological sensors, one sensor in each corner of the container and attaches special ducting connected to the MC to pull air from several locations. He first scans each sensor device with the HHD, mounts the sensors securely in place, then transmits the data to the MC with the HHD. The MC compares the sensor codes to the JAS to verify authenticity and instructs each sensor to conduct a self-diagnosis and tamper check.
- At this point the MC performs a complete self diagnostic routine of all sensors and systems, then sends the results to the central server. When the diagnostic tests are completed successfully, the server will respond to the MC with approval to reseal the container.
- Upon arrival at the loading dock, an authorized personnel scans his personal and corporate ID badges on the scanner mounted on the container door. The codes are passed to the MC and compared with the values in the JAS. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras.
- As other personnel come within range of the container, scanners read each of their personal identity cards and the product codes in or on the boxes. In the meantime, the cameras are operating continuously to record all activity in the container. In this case, the JAS has dictated that all activity be recorded in a real-time log file and that it be relayed to the central server every five minutes. If any unauthorized personnel attempts to enter the container. Motion sensors can detect the presence of a moving body with no readable ID badge. The MC consults the JAS and finds that such breaches are to be handled with both a local audible alarm and a message to the central server.
- Once loading is complete, the supervisor closes the container doors, scans his ID cards and enters a code confirming the loading is complete. The message is forwarded to the MC which then sends a signal to activate the solenoid thus locking the door. The MC performs an integrity check of all locks and orifice sensors, takes a baseline sample from all sensors activated as defined by the JAS. The results are relayed to the central server. If all data is in conformance, the server issues an authorization key to the MC which in turn illuminates green LEDs at several locations around the exterior of the container. At this point, the container is ready to be transported to the shipping terminal.
- Prior to picking up the container, the trucking company provides the central server with information including the truck ID number, the driver ID number, the relevant container ID and the shipper ID. An electronic authorization key is then transferred to the driver's HHD. Upon arrival at the Wang facility, the driver scans his index finger on his HHD, then scans the truck ID tags, the container ID and the Wang facility ID. The information is relayed to the MC in the container. The MC compares the information and keys to those received in the last JAS, and determines if they are consistent. In this case, the driver was replaced at the last minute and authorization was not received. The LEDs on the container turn red and the HHD instructs the driver to contact his management. His management repeats the registration procedure using his ID, and the central server issues new instructions to his HHD. These changes now allow the driver to successfully mount the container on his truck and remove it from the shipper premises.
- When the container's MC detects movement due to the truck moving, it starts the transportation section of the JAS. In this case GPS antenna are scheduled to collect route information and the full range of environmental sensors are sampling every five minutes inside the container.
- Both the shipping terminal operator and the ship captain can perform similar procedures as that of the trucking company above such that accountability for the container is never in question.
- Once the ship is underway, the JAS for this particular container shipment dictates the following tasks: 1) Sample environmental once every 15 minutes, 2) Capture one image frame from each camera every five minutes, and 3) Transmit all samples to server once per hour.
- The first time the MC attempts to communicate with the server, it detects a weak signal from all its own antenna as the container is surrounded by other containers. The JAS dictates a secondary alternative of peer to peer relay with adjacent containers. The MC for this container authenticates itself with a neighbor MC and requests relay which in turn does the same until a container is found with clear access and a strong signal to the satellite or relay antenna.
- During the voyage to the destination port, the ship encounters a heavy storm with 30 foot seas. The MC's motion sensors detect pitching in excess of 30 degrees at 20 second intervals. As this value is well outside the norm (the acceptable ranges dictated by the JAS), the MC queries adjacent containers for redundant motion readings and determines that the reading is not in error nor is it significantly different than neighboring containers (an indication that the container is not being stolen). Through the voyage the cameras and audio sensors can record video and audio to detect shifting cargo that may result in product damage.
- When the ship arrives in port at Los Angeles, the accountability procedures outlined above can be repeated for each handling situation and entity.
- Well before the container arrives, authorized personnel of the receiving company can logon to the central server to track developments along the way.
- When the container arrives at the destination dock, personnel can perform biometric authentication as was done in previous situations. The authorization information is relayed to the container's MC where it performs an authorization process to determine whether to issue an electronic key. The MC may consult with the server.
- The Master Controller (MC) receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the door of the container and simultaneously starts image capture from both the internal and external cameras. The images are stored to the local disk memory and every 100th frame is relayed to the server.
- At the destination unloading dock, personnel come within range of the container, scanners read each of their personal identity cards and the product codes in or on the boxes as they are removed from the container. Cameras operate continuously to record all activity in the container. In this case, the JAS has dictated that all activity be recorded in a real-time log file and that it be relayed to the server every fifteen minutes. This example is meant to describe the varied monitoring methods that some embodiments can provide.
- Another exemplary use of some of the features of the monitoring system discussed above will now be described. This example describes the use of the technology for monitoring an office building.
- The monitoring system in this example is used as a sentry system for the office building. The central server may be provided with information including company identifying information, business description and employee ID numbers, safety disclosures, structural disclosures, financial disclosures and vendor information.
- A security personnel downloads authorization information to a handheld device (HHD) then scans his index finger to confirm identity. The HDD instructs him to retrieve a new device from SecureTech's inventory with ID nr 98765. The security personnel scans the box seal then performs a visual integrity inspection and enters his findings to the HHD. He then transmits the information to the sentry system Master Controller (MC) which performs an authorization process with a remote server to determine whether to issue an electronic key. If successful, the key is transmitted to the Master Controller along with its first Job Assignment Script (JAS).
- The Master Controller (MC) receives the key and compares it to the most recent Job Assignment Script (JAS) received from the backend server. If the key codes match, the MC sends a signal to the solenoid to unlock the housing of the MC.
- The security personnel then proceeds to follow instructions provided by the HDD to perform the following tasks:
-
- 1. Open the MC housing
- 2. Install one modular sensor controller inside the MC to detect proprietary equipment tags.
- 3. Connect the MC to pre-existing devices in the building:
- a. ID card readers
- b. Proprietary tag reader—sensor heads
- c. Cameras
- d. Door sensors
- e. Elevator activity sensors
- f. Wide-area microphones
- g. Portable x-ray bag scanner
- h. Air-ducting from all entry passages to the MC input portal.
- Prior to mounting or connecting the MC, the security personnel scans each device with the HHD, mounts them securely in place, then transmit the data to the MC. The MC compares the sensor codes to the JAS to verify authenticity and instructs each sensor to conduct a self-diagnosis and tamper check.
- Once installation of the remote sensors and the Sentry box has been completed, the MC performs a complete diagnostic routine of all sensors and systems, then sends the results to the remote server over both a wired and wireless link (redundant communication links). If all is in order, the server will respond with an activation key and issue a new JAS to the MC.
- In one example scenario, exterior cameras detect a middle-aged man just outside the door for prolonged periods of time on three days in the same week. On Tuesday of the following week, the main exterior camera focused on the entrance became occluded (11:22:28). Upon detection, the MC referenced the backup measures specified in the JAS and immediately acted to reposition
internal camera 4 in the lobby to point in the direction of the main entrance. Two minutes later (11:24:21), a heavily disguised person entered the lobby with a large suitcase. Since these two events fall outside the normal operating ranges for these two measurements as defined in the most recent JAS, the data is immediately relayed to the central server via both wired and wireless connections. - Such a message is accomplished using the following process steps.
-
- 1. The MC conducts a self-diagnosis of all critical components and stores the results;
- 2. Outbound data is assembled into a list of files and compressed to one package.
- a. Camera frames are synchronized with corresponding date/time
- b. Camera frames are linked to Lat/Long of building as well as position of the anomaly within a pre-defined grid for the space in question.
- 3. The JAS is consulted for the current encryption parameters and the above package is encrypted accordingly.
- 4. The message is digitally signed using the remote server's key
- 5. Identical copies of the package are sent via a wired and cell connection. 6. The MC waits for notice of successful receipt from the remote server.
- Several minutes later, the MC detects abnormally high electromagnetic interference. As a result, the ID badge scanner malfunctions and permits an unauthorized person to slip into the main lobby. Already on heightened alert, the MC forwards the event immediately to the server and receives an instant response to shut down elevator operation and lock all exterior doors. All security personnel are alerted to the breach and the intruder is captured. This example is meant only to describe the varied monitoring methods that some embodiments can provide.
- Additional innovative embodiments are contemplated.
- In one innovative aspect a surveillance system is provided. The system includes a plurality of sensors configured to provide environmental and or spatial data. The system also includes an electronic device configured to receive the sampled environmental and or spatial data from the sensors. The electronic device is further configured to receive monitoring instructions, and to use the received monitoring instructions to process the received environmental and/or spatial data.
- In some implementations, the system also includes a remote device configured to provide the monitoring instructions to the electronic device. The electronic device may be configured to authenticate the remote device prior to using the monitoring instructions to process the received environmental and/or spatial data. One or more of the sensors included in the system may be enclosed within a tamper and eavesdrop proof enclosure. In some implementations, the monitoring instructions may be contained in a script message. Them received monitoring instructions may be encrypted. In such implementations, the electronic device is further configured to decrypt encrypted monitoring instructions. It may be desirable for the electronic device to be further configured to compare at least a portion of the received sensor data to a range of acceptable values and to transmit the data to the remote device. The electronic device may be configured to conduct a self-diagnosis prior to transmitting the data to the remote device.
- In another innovative aspect a monitoring system is provided. The monitoring system includes a plurality of sensors configured to sense information. The monitoring system also includes an electronic device configured to receive data from the sensors. The electronic device is configured to determine an alarm condition based upon the received data. The electronic device is configured to compare the received data to a range of acceptable values and conduct a self-diagnosis prior to transmitting the alarm condition to a remote device.
- In some implementations the electronic device is configured to transmit the alarm condition to the remote device over a plurality of communication links. The plurality of communication links may include at least two or more of a code division multiple access system, a frequency division multiple access system, and orthogonal frequency division multiple access system, a time division multiple access system, a terrestrial trunked radio system, and a wideband code division multiple access system. The received data may include redundant data from two or more of the sensors. The electronic device may be configured to conduct the self-diagnosis based on a majority rule of the redundant data from the two or more sensors. The electronic device may also be configured to conduct the self-diagnosis by performing an integrity check of the received data. The electronic device may be further configured to determine the alarm condition to be in a state of alarm if the received data lies outside the range of this acceptable values and the self-diagnosis shows no failure conditions.
- In yet another innovative aspect, a monitoring system is provided. The monitoring system includes a plurality of sensors configured to sense information. The monitoring system further includes an electronic device configured to receive data from the sensors. The electronic device is configured to determine an alarm condition based upon the received data. The electronic device is further configured to determine a state of reliability of the sensor that the data is received from. The electronic device is further configured to conduct a self-diagnosis based on the determine state of reliability prior to transmitting the alarm condition to a remote device.
- In some implementations, the electronic device is configured to transmit the alarm condition to the remote device over a plurality of communication links. The electronic device may be configured to determine the state of reliability based on a checksum. The self-diagnosis may comprise the electronic device requesting a first sensor to retransmit the sensed information if the data from the first sensor is determined to be unreliable. The self-diagnosis may comprise the electronic device requesting a second sensor to retransmit redundant data if the data from a first sensor is determined to be unreliable where the redundant data is requested from substantially the same type of sensor and location. In some implementations the electronic device is further configured to compare the received data to a range of acceptable values. The electronic device may be configured to determine the alarm condition to be in a state of alarm if the data received from a first sensor lies outside the range of acceptable values and the self-diagnosis shows the first sensor to be reliable. In some implementations the alarm condition may include three or more levels of alarm.
- In a further innovative aspect, another monitoring system is provided the monitoring system includes a plurality of communication devices that are authorized to communicate in the monitoring system. The system includes a plurality of sensors authorized and configured to communicate in the monitoring system. The monitoring system also includes an electronic device authorized to communicate in the monitoring system. Electronic device is further configured to receive data in a secure manner from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system. The task authorization message includes information identifying at least the sensor from which to receive the data. The electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device.
- In some implementations the electronic device may be configured to activate from a sleep mode upon receiving the task authorization message. In some implementations electronic device may be configured to transmit the received data in a secure manner to the remote master device. The sensors may be configured to broadcast a sensor identification number. The task authorization information identifying the sensor may include at least a portion of the broadcast sensor identification number.
- A further monitoring system is provided in yet another innovative aspect. The system includes a plurality of communication devices configured to communicate in a secure manner in the system. The system includes a plurality of non-system sensors configured to sense information. The non-system sensors are not authorized to communicate securely in the monitoring system. The system further includes an electronic device authorized to communicate in the monitoring system. The electronic device is further configured to receive data from the non-system sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the monitoring system. The task authorization message includes information identifying at least the non-system sensor from which to receive the data. Electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device.
- In some implementations electronic device is further configured to be activated from a sleep mode upon receiving the task authorization message. The electronic device may be configured to transmit the received data in a secure manner to the remote master device. The non-system sensors may be configured to broadcast a sensor identification number wherein the task authorization information identifying the non-system sensor includes at least a portion of the broadcast sensor identification number. It may be desirable for the electronic device to be configured to encode context information into a message containing the received data. The electronic device may be configured to transmit the received data message in a secure manner to the remote master device wherein the context information includes data identifying a time and a location from which the data was received.
- In a still further innovative aspect, a monitoring system is provided the monitoring system includes a plurality of communication devices authorized to communicate in the monitoring system. The system further includes a plurality of sensors configured to sense information. The sensors are authorized in configured to communicate in the monitoring system. The sensors are further configured to be in a sleep mode until activated by a task authorization message received from a master device authorized to communicate in the monitoring system. The system further includes an electronic master device authorized to communicate in the monitoring system and configured to transmit a task authorization message to the sensors. The task authorization message includes information identifying at least the sensor from which to receive sensed information. The sensors are configured to encode a digital signature and encrypt the sensed information prior to transmitting the sensed information to the electronic master device.
- In some implementations the electronic device is further configured to be activated from a sleep mode upon relieving a second task authorization message from a remote master device authorized to communicate in the system. Electronic device may be further configured to transmit the received information in a secure manner to the remote master device. In some implementations the sensors are configured to intermittently broadcast a sensor identification number while in the sleep mode. In such implementations, the task authorization information identifying the sensor may include at least a portion of the broadcast sensor identification number.
- In yet another innovative aspect, a monitoring system including a plurality of communication devices that are authorized to communicate in the monitoring system is provided. The system includes a plurality of sensors. The system further includes an electronic device authorized to communicate in the monitoring system. The electronic device is further configured to receive data from the sensors when a task authorization message is received and authenticated as having been transmitted from a remote master device authorized to communicate in the system. The task authorization message includes information identifying at least the sensor from which to receive the data. Electronic device is configured to authenticate and encrypt the received data prior to transmitting the received data to the remote master device via a first communication path. The electronic device is further configured to confirm receipt of the transmitted data by the remote master device.
- In some implementations electronic device may transmit the received data to remote master device via a second communication pathway if the electronic device does not confirm receipt of the data by the remote master device. The first comedic occasion pathway may include a satellite network in the second communication pathway may include a local wireless work. In some implementations the first communication pathway may include a local wireless network in the second communication pathway may include a satellite network.
- In a further innovative aspect, a monitoring system is provided. The monitoring system includes an environmental sensor configured to detect environmental information associated with an object. The system includes an identification sensor configured to identify the object. The system includes a timing device configured to provide time information including a time of day and the date. The system further includes a location sensor configured to receive location information. The system also includes an electronic device configured to receive data from the environmental sensor, the identification sensor, the timing device, and the location sensor. The electronic device is further configured to transmit the received data such that the timing information, object identification information, location information, and the environmental information can be linked together. The linked data may be transmitted to a remote device in a secure manner.
- In some implementations the object is a person any identification sensor is a biometric sensor configured to receive biometric information of the person. The identification sensor may be a camera configured to capture images of the object. The object may be located in a room. The location sensor may include a GPS sensor. The timing device may be configured to receive a system time. The environmental sensor may be implemented as a chemical detector, radiological detector, or the like.
- In a further innovative aspect, a shipping container monitoring system is provided. The system includes a plurality of sensors configured to detect environmental information about an area inside or outside the container. The system includes a timing device configured to provide time information including a time of day. The system includes a location sensor configured to receive location information. The system further includes an electronic device configured to receive data from the plurality of sensors, the timing device, and the location sensor. The electronic device is configured to transmit the received data such that the timing information, the location information, and the environmental information are synchronized. The synchronized data is encrypted and transmitted to a remote device in a secure manner.
- The plurality of sensors may include an image capture device configured to capture images of the inside of the container. The plurality of sensors may include an image capture device configured to capture images of the container. The location sensor may include a GPS sensor. The timing device may be configured to receive a system time. In some implementations, the system may include a plurality of antenna wherein the electronic device is further configured to transmit the synchronize data via one of the antenna. In some implementations, the plurality of sensors are configured to be in a sleep state until a task authorization message is received and authenticated as having been transmitted from the remote device. The system may include a bus comprising a plurality of connectors. The plurality of sensors may be configured to plug into the connectors of the bus and to communicate with the electronic device with a communications protocol.
- A portable monitoring system is described in a further innovative aspect. The system includes a tempest constructed housing to provide shielding for enclosed devices. The housing encloses an environmental sensor configured to detect environmental information. The housing encloses a timing device configured to provide time information including a time of day and a date. The housing encloses a location sensor configured to receive location information. The housing encloses a processor configured to receive data from the environmental sensor, the timing device, and the location sensor. The electronic device is configured to transmit the received data such that the timing information, object identification information, the location information, and the environmental information are synchronized. The synchronize data is transmitted to a remote device in a secure manner.
- In some implementations at least one of the sensors includes an image capture device configured to capture image data. At least one of the sensors may include an audio capture device configured to capture audio information. The location sensor may include a GPS sensor. The timing device may be configured to receive a system time. The system may include a plurality of antenna at least one of which may be used by the electronic device to transmit the synchronize data.
- The system may include a plurality of additional sensors. The system may also include a remote device configured to transmit secure instructions. The system may further include an electronic device configured to receive data from the sensors. The electronic device may be configured to receive the secure instructions from the remote device. The secure instructions may direct the electronic device to receive data from one or more of the sensors. In some implementations, the electronic device may be configured to authenticate the received secure instructions.
- In a further innovative aspect, another system is provided. The system includes a plurality of sensors. The system includes a remote device configured to transmit encrypted monitoring instructions. The system further includes an electronic device configured to receive data from the sensors. The electronic device is further configured to receive and decrypt the monitoring instructions from the remote device via a network. The monitoring instructions include a monitoring schedule for one or more of the plurality of sensors. The electronic device is configured to receive data from the sensors in accordance with the received monitoring schedule.
- In some implementations the monitoring schedule defines the frequency that at least one of the sensors will transmit data to the electronic device. The monitoring schedule may define a sampling frequency for at least one of the sensors. The monitoring instructions and also define a plurality of alarm conditions. The electronic device may be configured to authenticate the received monitoring instructions.
- And yet another innovative aspect, yet another system is provided. The system includes a plurality of sensors. The system includes a remote device configured to transmit encrypted monitoring instructions. The encrypted monitoring instructions may include a tolerance range for at least one of the sensors. The system further includes an electronic device configured to receive sensor data from the sensors. The electronic device is further configured to receive, authenticate, and decrypt the encrypted monitoring instructions from the remote device. The electronic device is further configured to compare the sensor data to the received tolerance range.
- A further system is provided in yet another innovative aspect. The system includes a plurality of sensors. The system includes a remote device configured to transmit encrypted monitoring instructions. Encrypted monitoring instructions identify one or more of the plurality of sensors, sensing schedule, and one or more alarm thresholds. The system also includes an electronic device configured to receive sensor data from the sensors in accordance with the sensing schedule. The electronic device is also configured to receive and decrypt the monitoring instructions. The electronic device is further configured to identify alarm conditions based on the identified alarm thresholds and sent data from the sensors.
- While the above detailed description has shown, described, and pointed out novel features of the invention as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the spirit of the invention. As will be recognized, the present invention may be embodied within a form that does not provide all of the features and benefits set forth herein, as some features may be used or practiced separately from others.
Claims (40)
1. A remote monitoring system for a vehicle, the system comprising:
an electronic device configured to receive environmental and spatial data from a plurality of sensors positioned on the vehicle, the electronic device further configured to receive diagnostic test instructions from a remote device remotely located from the vehicle, to conduct one or more self-diagnostic tests on the electronic device, one or more of the plurality of sensors, and the data received from one or more of the plurality of sensors based on the received diagnostic test instructions, and to transmit (a) information obtained based on the received environmental and spatial data and (b) results of the one or more diagnostic tests to the remote device.
2. The system of claim 1 , wherein the electronic device is further configured to receive instructions from at least one of the remote device or local controls to process the received environmental and spatial data.
3. The system of claim 2 , wherein the instructions are contained in a script message, the script message comprising a header containing one or more identification fields and a body containing one or more tasks to be performed.
4. The system of claim 1 , wherein the electronic device is further configured to authenticate the remote device prior to using the diagnostic test instructions or any other instructions received from the remote device.
5. The system of claim 1 , wherein the electronic device is further configured to:
compare the received environmental and spatial data to a range of acceptable values,
determine an alarm condition based upon the received environmental and spatial data, and
conduct a self-diagnosis prior to transmitting the alarm condition to the remote device.
6. The system of claim 1 , wherein the electronic device is further configured to:
determine an alarm condition based upon the received environmental and spatial data,
determine a state of reliability of the plurality of sensors that the data is received from, and
conduct a self-diagnosis based on the state of reliability prior to transmitting the alarm condition to the remote device.
7. The system of claim 1 , wherein the received diagnostic test instructions comprise encrypted information and the electronic device is further configured to decrypt the encrypted information.
8. The system of claim 1 , wherein the electronic device is further configured to compare at least a portion of the received environmental and spatial data to a range of acceptable values such that the obtained information comprises a comparison result, and to transmit the obtained information to the remote device.
9. The system of claim 1 , wherein the electronic device is further configured to recognize an additional sensor dynamically added to the plurality of sensors.
10. The system of claim 1 , further comprising an electronic master device authorized to communicate in the system and configured to transmit a task authorization message to the plurality of sensors, wherein the task authorization message comprises information identifying at least one sensor of the plurality of sensors from which the electronic master devices expects to receive sensed information, and
wherein the at least one sensor is configured to encode a digital signature and encrypt the sensed information prior to transmitting the sensed information to the electronic master device.
11. The system of claim 1 , wherein the vehicle comprises an automobile, a watercraft, or an aircraft.
12. The system of claim 1 , wherein the electronic device is further configured to improve security of communications with the remote device
13. The system of claim 1 , wherein the electronic device is further configured to improve error handling related to the received environmental and spatial data.
14. The system of claim 1 , wherein the electronic device is further configured to improve energy savings when processing and communicating the received environmental and spatial data.
15. The system of claim 1 , wherein the electronic device is further confirmed to authenticate one or more of the plurality of sensors and the remote device before communicating.
16. A method of remotely monitoring a vehicle, the method comprising:
receiving, at an electronic device, environmental and spatial data from a plurality of sensors positioned on the vehicle;
receiving diagnostic test instructions from a remote device remotely located from the vehicle, the diagnostic test instructions configured to conduct one or more diagnostic tests on the electronic device, one or more sensors of the plurality of sensors, and the data received from one or more of the plurality of sensors;
conducting the one or more diagnostic tests on the electronic device, the one or more sensors of the plurality of sensors, and the data received from one or more of the plurality of sensors; and
transmitting (a) information obtained based on the received environmental and spatial data and (b) results of the one or more diagnostic tests from the electronic device to the remote device.
17. A remote monitoring system for a vehicle, the system comprising:
a plurality of sensors disposed on the vehicle and configured to provide environmental and spatial data relating to the vehicle; and
an electronic device in data communication with the plurality of sensors and configured to:
receive the environmental and spatial data from the plurality of sensors,
receive monitoring instructions from at least one of a remote device or local controls, the monitoring instructions including at least one identifier for at least one of the plurality of sensors,
process the received environmental and spatial data based on the received monitoring instructions,
identify processed environmental and spatial data associated with each of the at least one identifier, and
transmit the identified processed environmental and spatial data to the remote device with the at least one identifier.
18. The system of claim 17 , wherein the received monitoring instructions comprise encrypted information and the electronic device is further configured to decrypt the encrypted information and encrypt the identified processed environmental and spatial data for transmission to the remote device.
19. The system of claim 18 , wherein the encrypted monitoring instructions comprise a tolerance range for at least one of the plurality of sensors and wherein the electronic device is configured to compare the received environmental and spatial data from the at least one of the plurality of sensors to the corresponding received tolerance range.
20. The system of claim 17 , wherein the electronic device is further configured to authenticate the remote device prior to processing the received environmental and spatial data based on the received monitoring instructions.
21. The system of claim 17 , wherein the electronic device is further configured to compare at least a portion of the received environmental and spatial data to a range of acceptable values.
22. The system of claim 17 , wherein the electronic device is further configured to conduct a self-diagnosis or a diagnosis of the at least one sensor of the plurality of sensors having the at least one identifier prior to transmitting the identified processed environmental and spatial data to the remote device.
23. The system of claim 22 , wherein the electronic device is further configured to determine an alarm condition based upon the received environmental and spatial data, and wherein the electronic device is further configured to compare the received data to a range of acceptable values and conduct the self-diagnosis or diagnosis prior to transmitting the alarm condition to the remote device.
24. The system of claim 23 , wherein the electronic device is further configured to:
determine an alarm condition based upon the received environmental and spatial data,
determine a state of reliability of the plurality of sensors that the environmental and spatial data is received from, and
conduct a self-diagnosis based on the determined state of reliability prior to transmitting the alarm condition to a remote device.
25. The system of claim 17 , further comprising:
an electronic master device authorized to communicate in the system and configured to transmit a task authorization message to the sensors, wherein the task authorization message comprises information identifying at least one of the plurality of sensors from which to receive sensed information, and
wherein the at least one sensor is configured to encode a digital signature and encrypt the sensed information prior to transmitting the sensed information to the electronic master device.
26. The system of claim 17 , wherein the electronic device is in data communication with the plurality of sensors via one or more of a wired communication network, a wireless communication network, a cellular communication connection, and a satellite communication connection.
27. The system of claim 17 , wherein the plurality of sensors comprise one or more of electromagnetic sensors, air quality sensors, ultrasonic sensors, chemical sensors, radiological sensors, radar sensors, altitude sensors, location sensors, temperature sensors, humidity sensors, audio sensors, radiation sensors, pressure sensors, and global positioning system sensors.
28. The system of claim 17 , wherein the received environmental and spatial data comprises one or more of temperature data, air content information, location information, humidity information, radiation information, pressure information, tamper information, and audio information.
29. A vehicle comprising:
a plurality of sensors configured to provide environmental and spatial data relating to the vehicle; and
an electronic device in data communication with the plurality of sensors and configured to:
receive diagnostic test instructions from a remote device remotely located from the vehicle,
conduct one or more self-diagnostic tests on the electronic device and the data received from the sensors based on the received diagnostic test instructions, and
transmit (a) information obtained based on the received environmental and spatial data and (b) results of the one or more diagnostic tests to the remote device.
30. The vehicle of claim 29 , wherein the plurality of sensors and the electronic device are incorporated into a data collection unit disposed within or an exterior surface of the vehicle.
31. The vehicle of claim 30 , wherein the data collection unit is attached to a surface of the vehicle via a mounting base.
32. The vehicle of claim 29 , wherein the vehicle comprises an automobile, a ship or an airplane.
33. A remote device for monitoring a vehicle, comprising:
a communication circuit configured to:
transmit diagnostic test instructions to an electronic device that receives environmental and spatial data from a plurality of sensors positioned on the vehicle, the diagnostic test instructions causing the remote device to conduct one or more self-diagnostic tests on the electronic device and the data received from the sensors, and
receive, from the electronic device, (a) information obtained based on the received environmental and spatial data and (b) results of the one or more diagnostic tests.
34. The system of claim 1 , wherein the received environmental and spatial data comprises one or more of temperature data, air content information, location information, humidity information, radiation information, pressure information, tamper information, and audio information.
35. The method of claim 16 , wherein the received environmental and spatial data comprises one or more of temperature data, air content information, location information, humidity information, radiation information, pressure information, tamper information, and audio information.
36. The vehicle of claim 29 , wherein the received environmental and spatial data comprises one or more of temperature data, air content information, location information, humidity information, radiation information, pressure information, tamper information, and audio information.
37. The device of claim 33 , wherein the received environmental and spatial data comprises one or more of temperature data, air content information, location information, humidity information, radiation information, pressure information, tamper information, and audio information.
38. The system of claim 12 , wherein the electronic device is further configured to improve security of communications with the remote device by utilizing encryption key exchanges between the electronic device and the remote device for one or more communications between the electronic device and the remote device.
39. The system of claim 13 , wherein the electronic device is further configured to improve error handling related to the received environmental and spatial data by incorporating a packet checksum in communications between the electronic device, the remote device, and any other device and using the checksum to determine integrity of communicated packets.
40. The system of claim 14 , wherein the electronic device is further configured to improve energy savings when processing and communicating the environmental and spatial data by utilizing one or more compression algorithms to remove redundancy in communications between the electronic device and the remote device and any other device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/706,445 US20200118405A1 (en) | 2005-05-03 | 2019-12-06 | Trusted monitoring system and method |
US17/447,389 US20220237997A1 (en) | 2005-05-03 | 2021-09-10 | Trusted monitoring system and method |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67716405P | 2005-05-03 | 2005-05-03 | |
US73553905P | 2005-11-10 | 2005-11-10 | |
US11/418,380 US7656286B2 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US12/641,139 US20100090822A1 (en) | 2005-05-03 | 2009-12-17 | Trusted monitoring system and method |
US13/724,942 US8830053B2 (en) | 2005-05-03 | 2012-12-21 | Trusted monitoring system and method |
US14/480,362 US20160019384A1 (en) | 2005-05-03 | 2014-09-08 | Trusted monitoring system and method |
US15/287,464 US10504349B2 (en) | 2005-05-03 | 2016-10-06 | Trusted monitoring system and method |
US16/706,445 US20200118405A1 (en) | 2005-05-03 | 2019-12-06 | Trusted monitoring system and method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/287,464 Continuation US10504349B2 (en) | 2005-05-03 | 2016-10-06 | Trusted monitoring system and method |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/447,389 Continuation US20220237997A1 (en) | 2005-05-03 | 2021-09-10 | Trusted monitoring system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200118405A1 true US20200118405A1 (en) | 2020-04-16 |
Family
ID=36764587
Family Applications (24)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/417,887 Active 2026-11-24 US7512583B2 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/417,893 Abandoned US20070011105A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,380 Active 2028-06-29 US7656286B2 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,496 Abandoned US20070002140A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,385 Abandoned US20070008410A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,381 Active US7609159B2 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,447 Abandoned US20070022079A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,472 Abandoned US20060291657A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/417,910 Abandoned US20070182544A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,395 Abandoned US20070011107A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,448 Active - Reinstated 2026-06-30 US7526455B2 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,382 Abandoned US20070011106A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US12/431,656 Abandoned US20090210378A1 (en) | 2005-05-03 | 2009-04-28 | Trusted decision support system and method |
US12/641,139 Abandoned US20100090822A1 (en) | 2005-05-03 | 2009-12-17 | Trusted monitoring system and method |
US13/399,249 Active US8515895B2 (en) | 2005-05-03 | 2012-02-17 | Trusted decision support system and method |
US13/724,942 Active US8830053B2 (en) | 2005-05-03 | 2012-12-21 | Trusted monitoring system and method |
US13/970,514 Abandoned US20140058990A1 (en) | 2005-05-03 | 2013-08-19 | Trusted decision support system and method |
US14/480,362 Abandoned US20160019384A1 (en) | 2005-05-03 | 2014-09-08 | Trusted monitoring system and method |
US15/265,551 Abandoned US20170004407A1 (en) | 2005-05-03 | 2016-09-14 | Trusted decision support system and method |
US15/287,464 Active US10504349B2 (en) | 2005-05-03 | 2016-10-06 | Trusted monitoring system and method |
US16/706,445 Abandoned US20200118405A1 (en) | 2005-05-03 | 2019-12-06 | Trusted monitoring system and method |
US16/874,493 Abandoned US20200273304A1 (en) | 2005-05-03 | 2020-05-14 | Trusted decision support system and method |
US17/447,389 Abandoned US20220237997A1 (en) | 2005-05-03 | 2021-09-10 | Trusted monitoring system and method |
US18/150,495 Abandoned US20230401945A1 (en) | 2005-05-03 | 2023-01-05 | Trusted decision support system and method |
Family Applications Before (20)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/417,887 Active 2026-11-24 US7512583B2 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/417,893 Abandoned US20070011105A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,380 Active 2028-06-29 US7656286B2 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,496 Abandoned US20070002140A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,385 Abandoned US20070008410A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,381 Active US7609159B2 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,447 Abandoned US20070022079A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,472 Abandoned US20060291657A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/417,910 Abandoned US20070182544A1 (en) | 2005-05-03 | 2006-05-03 | Trusted monitoring system and method |
US11/418,395 Abandoned US20070011107A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,448 Active - Reinstated 2026-06-30 US7526455B2 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US11/418,382 Abandoned US20070011106A1 (en) | 2005-05-03 | 2006-05-03 | Trusted decision support system and method |
US12/431,656 Abandoned US20090210378A1 (en) | 2005-05-03 | 2009-04-28 | Trusted decision support system and method |
US12/641,139 Abandoned US20100090822A1 (en) | 2005-05-03 | 2009-12-17 | Trusted monitoring system and method |
US13/399,249 Active US8515895B2 (en) | 2005-05-03 | 2012-02-17 | Trusted decision support system and method |
US13/724,942 Active US8830053B2 (en) | 2005-05-03 | 2012-12-21 | Trusted monitoring system and method |
US13/970,514 Abandoned US20140058990A1 (en) | 2005-05-03 | 2013-08-19 | Trusted decision support system and method |
US14/480,362 Abandoned US20160019384A1 (en) | 2005-05-03 | 2014-09-08 | Trusted monitoring system and method |
US15/265,551 Abandoned US20170004407A1 (en) | 2005-05-03 | 2016-09-14 | Trusted decision support system and method |
US15/287,464 Active US10504349B2 (en) | 2005-05-03 | 2016-10-06 | Trusted monitoring system and method |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/874,493 Abandoned US20200273304A1 (en) | 2005-05-03 | 2020-05-14 | Trusted decision support system and method |
US17/447,389 Abandoned US20220237997A1 (en) | 2005-05-03 | 2021-09-10 | Trusted monitoring system and method |
US18/150,495 Abandoned US20230401945A1 (en) | 2005-05-03 | 2023-01-05 | Trusted decision support system and method |
Country Status (2)
Country | Link |
---|---|
US (24) | US7512583B2 (en) |
WO (2) | WO2007027239A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102020211761A1 (en) | 2020-09-21 | 2022-05-19 | Siemens Aktiengesellschaft | Measurement monitor display |
US11646896B1 (en) | 2021-04-15 | 2023-05-09 | National Technology & Engineering Solutions Of Sandia, Llc | Systems and methods for verification and authentication of remote sensing imagery |
US20230163957A1 (en) * | 2018-09-28 | 2023-05-25 | Benjamin Allan Mord | Information integrity in blockchain and related technologies |
Families Citing this family (305)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6636733B1 (en) | 1997-09-19 | 2003-10-21 | Thompson Trust | Wireless messaging method |
GB2387912A (en) * | 2002-04-26 | 2003-10-29 | Messier Dowty Inc | Monitoring parameters in structural components |
DE10328906A1 (en) * | 2003-06-26 | 2005-01-13 | Endress + Hauser Process Solutions Ag | field bus |
US7619512B2 (en) * | 2006-10-02 | 2009-11-17 | Alarm.Com | System and method for alarm signaling during alarm system destruction |
US7265668B1 (en) * | 2003-12-12 | 2007-09-04 | Skybitz, Inc. | System and method for asset tracking and monitoring |
AU2004320238B2 (en) * | 2004-06-04 | 2008-07-03 | Mitsubishi Denki Kabushiki Kaisha | Certificate issuance server and certification system for certifying operating environment |
US7512583B2 (en) * | 2005-05-03 | 2009-03-31 | Palomar Technology, Llc | Trusted decision support system and method |
US20060288207A1 (en) * | 2005-06-17 | 2006-12-21 | Research In Motion Limited | Encoding messages for use in a communication system based on classificaiton status |
WO2007002407A2 (en) * | 2005-06-22 | 2007-01-04 | Custom Metalcraft, Inc. | Intelligent container |
US7953536B2 (en) * | 2005-07-29 | 2011-05-31 | GM Global Technology Operations LLC | Inertial sensor software architecture security method |
CN101300845B (en) * | 2005-09-06 | 2012-10-03 | 因弗拉吉斯公司 | Threat detection and monitoring apparatus with integrated display system |
US20080301049A1 (en) * | 2005-10-04 | 2008-12-04 | Roderick Mark Dyson | Transaction Management System |
CA2625907A1 (en) * | 2005-10-12 | 2007-04-19 | First Data Corporation | System and method for authorizing electronic payment transactions |
US9411969B2 (en) * | 2005-11-25 | 2016-08-09 | Continuity Software Ltd. | System and method of assessing data protection status of data protection resources |
IL172289A (en) * | 2005-11-30 | 2011-07-31 | Rafael Advanced Defense Sys | Limited bandwidth surveillance system and method with rotation among monitors |
TW200732980A (en) * | 2006-02-21 | 2007-09-01 | Guo Yuan Heng | Intelligent display control device, system and operation method for the same |
US20070200701A1 (en) * | 2006-02-27 | 2007-08-30 | English Kent L | Network centric sensor fusion for shipping container security |
US20070294360A1 (en) * | 2006-06-15 | 2007-12-20 | International Business Machines Corporation | Method and apparatus for localized adaptation of client devices based on correlation or learning at remote server |
EP1870806A1 (en) * | 2006-06-19 | 2007-12-26 | Wolfgang Pree GmbH | System for executing distributed sofware |
US7714719B2 (en) * | 2006-06-27 | 2010-05-11 | Qualcomm Incorporated | Field disturbance sensor utilizing leaky or radiating coaxial cable for a conformable antenna pattern |
US20080020724A1 (en) * | 2006-07-19 | 2008-01-24 | John Robert Orrell | Establishing a data link between stacked cargo containers |
US7930543B2 (en) * | 2006-08-18 | 2011-04-19 | Medtronic, Inc. | Secure telemetric link |
US7940933B2 (en) * | 2006-08-18 | 2011-05-10 | Medtronic, Inc. | Secure telemetric link |
US8102999B2 (en) * | 2006-08-18 | 2012-01-24 | Medtronic, Inc. | Secure telemetric link |
SG143084A1 (en) * | 2006-11-17 | 2008-06-27 | Nanyang Polytechnic | Software copyright protection and licensing system using rfid |
US7916022B2 (en) * | 2006-11-21 | 2011-03-29 | Deere & Company | Agricultural information gathering system |
FI20065766A0 (en) * | 2006-11-30 | 2006-11-30 | Ekahau Oy | Techniques to improve the reliability of the forecasting system |
JP2008140095A (en) * | 2006-12-01 | 2008-06-19 | Hitachi Ltd | Decision-making support system |
US8116748B2 (en) | 2006-12-14 | 2012-02-14 | At&T Intellectual Property I, Lp | Management of locations of group members via mobile communications devices |
US20080146250A1 (en) * | 2006-12-15 | 2008-06-19 | Jeffrey Aaron | Method and System for Creating and Using a Location Safety Indicator |
US8566602B2 (en) | 2006-12-15 | 2013-10-22 | At&T Intellectual Property I, L.P. | Device, system and method for recording personal encounter history |
US8160548B2 (en) * | 2006-12-15 | 2012-04-17 | At&T Intellectual Property I, Lp | Distributed access control and authentication |
US7646297B2 (en) | 2006-12-15 | 2010-01-12 | At&T Intellectual Property I, L.P. | Context-detected auto-mode switching |
US8199003B2 (en) | 2007-01-30 | 2012-06-12 | At&T Intellectual Property I, Lp | Devices and methods for detecting environmental circumstances and responding with designated communication actions |
EP1956523B1 (en) * | 2007-02-02 | 2013-05-29 | Semiconductor Energy Laboratory Co., Ltd. | Wireless identification system, semiconductor device, and communication device |
US8009050B2 (en) * | 2007-02-02 | 2011-08-30 | Semiconductor Energy Laboratory Co., Ltd. | Wireless system, semiconductor device, and communication device |
US7788200B2 (en) * | 2007-02-02 | 2010-08-31 | Microsoft Corporation | Goal seeking using predictive analytics |
US7855005B2 (en) * | 2007-02-12 | 2010-12-21 | Deeya Energy, Inc. | Apparatus and methods of determination of state of charge in a redox flow battery |
DE102007009023B4 (en) | 2007-02-23 | 2011-12-22 | Siemens Ag | Device and method for providing RFID identification data for an authentication server |
US7696869B2 (en) * | 2007-04-05 | 2010-04-13 | Health Hero Network, Inc. | Interactive programmable container security and compliance system |
US9135657B2 (en) * | 2007-07-27 | 2015-09-15 | The Invention Science Fund I, Llc | Rewarding independent influencers |
US20080270473A1 (en) * | 2007-04-30 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Determining an influence on a person by web pages |
US20080270551A1 (en) * | 2007-04-30 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Rewarding influencers |
US8793155B2 (en) * | 2007-04-30 | 2014-07-29 | The Invention Science Fund I, Llc | Collecting influence information |
US8290973B2 (en) * | 2007-04-30 | 2012-10-16 | The Invention Science Fund I, Llc | Determining influencers |
US8712837B2 (en) * | 2007-04-30 | 2014-04-29 | The Invention Science Fund I, Llc | Rewarding independent influencers |
US20080270474A1 (en) * | 2007-04-30 | 2008-10-30 | Searete Llc | Collecting influence information |
US20080270552A1 (en) * | 2007-04-30 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Determining influencers |
US20080270620A1 (en) * | 2007-04-30 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Reporting influence on a person by network-available content |
WO2008144550A1 (en) * | 2007-05-17 | 2008-11-27 | Law Enforcement Support Agency | System and method for remote surveillance |
US20090077156A1 (en) * | 2007-09-14 | 2009-03-19 | Srinivas Raghav Kashyap | Efficient constraint monitoring using adaptive thresholds |
GB0712981D0 (en) * | 2007-07-05 | 2007-08-15 | Ibm | an apparatus for establishing trust in data associated with a data processing system |
US8335504B2 (en) * | 2007-08-23 | 2012-12-18 | At&T Intellectual Property I, Lp | Methods, devices and computer readable media for providing quality of service indicators |
US8799103B1 (en) | 2007-09-20 | 2014-08-05 | Ariba, Inc. | Client-side structured data capture and remote application integration using a web browser |
EP2206393A2 (en) * | 2007-09-24 | 2010-07-14 | Savi Technology, Inc. | Method and apparatus for tracking and monitoring containers |
DE102007050708B4 (en) * | 2007-10-22 | 2009-08-06 | Phoenix Contact Gmbh & Co. Kg | System for operating at least one non-safety-critical and at least one safety-critical process |
EP2065849A1 (en) * | 2007-11-30 | 2009-06-03 | Sap Ag | Detection of counterfeited products based on sensor measurements |
US7786858B2 (en) * | 2007-12-07 | 2010-08-31 | Honeywell International Inc. | Video-enabled rapid response system and method |
US8136095B2 (en) * | 2007-12-19 | 2012-03-13 | Microsoft Corporation | Relations in fuzzing data |
US20100287083A1 (en) * | 2007-12-28 | 2010-11-11 | Mastercard International, Inc. | Detecting modifications to financial terminals |
US7895131B2 (en) * | 2008-01-04 | 2011-02-22 | Tracking Innovations, Inc. | Cargo tracking apparatus, system and method |
WO2009105719A2 (en) * | 2008-02-20 | 2009-08-27 | Icontrol, Inc. | Methods for remote device status determination |
US8587150B2 (en) * | 2008-02-28 | 2013-11-19 | Deeya Energy, Inc. | Method and modular system for charging a battery |
US8977843B2 (en) * | 2008-05-30 | 2015-03-10 | The Boeing Company | Geolocating network nodes in attenuated environments for cyber and network security applications |
US8769267B2 (en) * | 2008-05-30 | 2014-07-01 | The Boeing Company | Geothentication based on new network packet structure |
US20100013496A1 (en) * | 2008-06-23 | 2010-01-21 | Jay R. Goetz | Branch circuit black box |
US7927731B2 (en) * | 2008-07-01 | 2011-04-19 | Deeya Energy, Inc. | Redox flow cell |
US8854205B2 (en) * | 2008-07-18 | 2014-10-07 | The F3M3 Companies, Inc. | System and method for countering terrorism by monitoring containers over international seas |
JP5200725B2 (en) | 2008-07-18 | 2013-06-05 | 株式会社リコー | Electronic device regeneration support system |
WO2010042905A1 (en) * | 2008-10-10 | 2010-04-15 | Deeya Energy Technologies, Inc. | Level sensor for conductive liquids |
WO2010042899A1 (en) * | 2008-10-10 | 2010-04-15 | Deeya Energy Technology, Inc. | Flexible multi-walled tubing assembly |
US8236463B2 (en) * | 2008-10-10 | 2012-08-07 | Deeya Energy, Inc. | Magnetic current collector |
US8883297B2 (en) * | 2008-10-10 | 2014-11-11 | Imergy Power Systems, Inc. | Methods for bonding porous flexible membranes using solvent |
US7919204B2 (en) * | 2008-10-10 | 2011-04-05 | Deeya Energy, Inc. | Thermal control of a flow cell battery |
US20100092843A1 (en) * | 2008-10-10 | 2010-04-15 | Deeya Energy Technologies, Inc. | Venturi pumping system in a hydrogen gas circulation of a flow battery |
EP2351184A4 (en) * | 2008-10-10 | 2014-07-09 | Deeya Energy Technologies Inc | Method and apparatus for determining state of charge of a battery |
CN102177689A (en) * | 2008-10-10 | 2011-09-07 | 爱立信电话股份有限公司 | Lawful authorities warrant management |
US20100106515A1 (en) * | 2008-10-23 | 2010-04-29 | Whirlpool Corporation | Introduction and activation of a self-reporting portable container into an inventory system |
US9691114B2 (en) * | 2008-10-23 | 2017-06-27 | Whirlpool Corporation | Consumables inventory management method |
US20100106624A1 (en) * | 2008-10-23 | 2010-04-29 | Whirlpool Corporation | Method of inventory management |
US20100101317A1 (en) * | 2008-10-23 | 2010-04-29 | Whirlpool Corporation | Lid based amount sensor |
US8115688B2 (en) * | 2008-10-24 | 2012-02-14 | Intelleflex Corporation | RF conduit and systems implementing same |
US20100141445A1 (en) * | 2008-12-08 | 2010-06-10 | Savi Networks Inc. | Multi-Mode Commissioning/Decommissioning of Tags for Managing Assets |
CN102282552B (en) * | 2008-12-23 | 2016-08-03 | 黄家正 | Based Intelligent Control based on pattern, monitoring and the system of automatization, method and computer program |
US9659257B2 (en) * | 2009-01-12 | 2017-05-23 | Alphatrac, Inc. | Predictive cueing |
US8423492B2 (en) * | 2009-01-12 | 2013-04-16 | Alphatrac, Inc. | Predictive prompting and decision outcome |
US8590021B2 (en) | 2009-01-23 | 2013-11-19 | Microsoft Corporation | Passive security enforcement |
US9509436B2 (en) | 2009-01-29 | 2016-11-29 | Cubic Corporation | Protection of near-field communication exchanges |
US8170997B2 (en) * | 2009-01-29 | 2012-05-01 | Microsoft Corporation | Unbundled storage transaction services |
US8458105B2 (en) * | 2009-02-12 | 2013-06-04 | Decisive Analytics Corporation | Method and apparatus for analyzing and interrelating data |
US20100235314A1 (en) * | 2009-02-12 | 2010-09-16 | Decisive Analytics Corporation | Method and apparatus for analyzing and interrelating video data |
US10600315B2 (en) | 2009-03-23 | 2020-03-24 | Chris Kelly | Mesh network enabled building safety system and method |
TWM369991U (en) * | 2009-04-24 | 2009-12-01 | Taiwan Secom Co Ltd | Cash box capable of electric shocking and smoke spraying |
US8349477B2 (en) * | 2009-05-28 | 2013-01-08 | Deeya Energy, Inc. | Optical leak detection sensor |
EP2436080A2 (en) * | 2009-05-28 | 2012-04-04 | Deeya Energy, Inc. | Electrolyte compositions |
US8394529B2 (en) * | 2009-05-28 | 2013-03-12 | Deeya Energy, Inc. | Preparation of flow cell battery electrolytes from raw materials |
WO2010138948A2 (en) * | 2009-05-28 | 2010-12-02 | Deeya Energy, Inc. | Buck-boost control circuit |
US8587255B2 (en) * | 2009-05-28 | 2013-11-19 | Deeya Energy, Inc. | Control system for a flow cell battery |
US8289160B1 (en) | 2009-05-29 | 2012-10-16 | United Services Automobile Association (Usaa) | Systems and methods for recording and using information about conditions present in a house or other location |
WO2010138947A2 (en) * | 2009-05-29 | 2010-12-02 | Deeya Energy, Inc. | Methods of producing hydrochloric acid from hydrogen gas and chlorine gas |
US20100306155A1 (en) * | 2009-05-29 | 2010-12-02 | Giannetto Mark D | System and method for validating signatory information and assigning confidence rating |
US20100302369A1 (en) * | 2009-06-01 | 2010-12-02 | Monsive Jr Michael G | Security system with satellite surveillance units |
US8593280B2 (en) * | 2009-07-14 | 2013-11-26 | Savi Technology, Inc. | Security seal |
US8456302B2 (en) * | 2009-07-14 | 2013-06-04 | Savi Technology, Inc. | Wireless tracking and monitoring electronic seal |
US8065257B2 (en) * | 2009-07-27 | 2011-11-22 | Saab Sensis Corporation | System and method for correlating past activities, determining hidden relationships and predicting future activities |
TW201104450A (en) * | 2009-07-29 | 2011-02-01 | Inventec Corp | Method of remote controlling a server device and the server device |
US8432274B2 (en) | 2009-07-31 | 2013-04-30 | Deal Magic, Inc. | Contextual based determination of accuracy of position fixes |
EP2462758B1 (en) * | 2009-08-04 | 2018-05-30 | Zia Systems, LLC | System and method for installing a liner |
WO2011022412A1 (en) * | 2009-08-17 | 2011-02-24 | Savi Networks Llc | Contextually aware monitoring of assets |
US8314704B2 (en) * | 2009-08-28 | 2012-11-20 | Deal Magic, Inc. | Asset tracking using alternative sources of position fix data |
US20110050397A1 (en) * | 2009-08-28 | 2011-03-03 | Cova Nicholas D | System for generating supply chain management statistics from asset tracking data |
US8334773B2 (en) * | 2009-08-28 | 2012-12-18 | Deal Magic, Inc. | Asset monitoring and tracking system |
US20110054979A1 (en) * | 2009-08-31 | 2011-03-03 | Savi Networks Llc | Physical Event Management During Asset Tracking |
US9633327B2 (en) | 2009-09-25 | 2017-04-25 | Fedex Corporate Services, Inc. | Sensor zone management |
US20110153343A1 (en) * | 2009-12-22 | 2011-06-23 | Carefusion 303, Inc. | Adaptable medical workflow system |
US9978251B2 (en) | 2009-12-28 | 2018-05-22 | Honeywell International Inc. | Wireless location-based system and method for detecting hazardous and non-hazardous conditions |
US8442801B2 (en) * | 2009-12-28 | 2013-05-14 | Honeywell International Inc. | Wireless location-based system for detecting hazardous conditions |
AU2011208346A1 (en) * | 2010-01-21 | 2012-09-06 | Pranamesh Das | Integrated remote pollution monitoring and indexing system and method thereof |
US8951665B2 (en) * | 2010-03-10 | 2015-02-10 | Imergy Power Systems, Inc. | Methods for the preparation of electrolytes for chromium-iron redox flow batteries |
US8473447B2 (en) * | 2010-03-29 | 2013-06-25 | Palo Alto Research Center Incorporated | AI planning based quasi-montecarlo simulation method for probabilistic planning |
US20110248846A1 (en) * | 2010-04-13 | 2011-10-13 | Green SHM Systems, Inc, Incorporated | Wireless Sensing Module and Method of Operation |
US9442178B2 (en) * | 2010-04-23 | 2016-09-13 | Qualcomm Incorporated | Hybrid tracking device |
US8963720B2 (en) * | 2010-05-11 | 2015-02-24 | The Boeing Company | RFID tag container |
DE102010029671B4 (en) * | 2010-06-02 | 2012-03-01 | Cargoguard Gmbh | Backup module for position monitoring of objects |
US8930321B2 (en) | 2010-06-30 | 2015-01-06 | Microsoft Corporation | Logical recovery with unbundled transaction services |
FR2963448A1 (en) * | 2010-07-29 | 2012-02-03 | Sagem Defense Securite | METHOD AND SYSTEM FOR ANALYSIS OF FLIGHT DATA RECORDED DURING THE FLIGHT OF AN AIRCRAFT. |
US8607353B2 (en) * | 2010-07-29 | 2013-12-10 | Accenture Global Services Gmbh | System and method for performing threat assessments using situational awareness |
US10131419B2 (en) * | 2010-10-15 | 2018-11-20 | Goodrich Corporation | Systems and methods for detecting landing gear ground loads |
US8779966B2 (en) * | 2010-11-16 | 2014-07-15 | Tialinx, Inc. | Remote interrogation for detection of activity or living organisms inside electronically conductive containers |
US9043798B2 (en) | 2010-12-16 | 2015-05-26 | International Business Machines Corporation | Remediating gaps between usage allocation of hardware resource and capacity allocation of hardware resource |
US8874734B1 (en) * | 2011-01-09 | 2014-10-28 | Globaltrak, Llc | Enhanced ZigBee mesh network with dormant mode activation |
US8860570B2 (en) * | 2011-02-03 | 2014-10-14 | SenseTech, LLC | Portable wireless personal head impact reporting system |
EP2485201A1 (en) | 2011-02-07 | 2012-08-08 | F.I.M. Legno S.p.A. | Telematic risk management system |
US9253635B2 (en) * | 2011-02-09 | 2016-02-02 | Cubic Corporation | Low power wireless network for transportation and logistics |
US9130937B1 (en) * | 2011-03-07 | 2015-09-08 | Raytheon Company | Validating network communications |
DE102011016163B4 (en) * | 2011-04-05 | 2015-01-22 | Stöbich Brandschutz GmbH | Documenting device with satellite navigation system data receiver and method for documenting the state of a technical device installed in or on a building |
US8681674B2 (en) | 2011-04-28 | 2014-03-25 | Cubic Corporation | Accelerated rejoining in low power wireless networking for logistics and transportation applications |
US9129225B2 (en) * | 2011-05-25 | 2015-09-08 | Nokia Technologies Oy | Method and apparatus for providing rule-based recommendations |
US9058612B2 (en) * | 2011-05-27 | 2015-06-16 | AVG Netherlands B.V. | Systems and methods for recommending software applications |
WO2012174042A2 (en) * | 2011-06-14 | 2012-12-20 | Ark Ideaz, Inc. | Authentication systems and methods |
US8656013B2 (en) * | 2011-06-14 | 2014-02-18 | Sony Computer Entertainment America Llc | Real-time data monitoring based on data push |
US8862313B2 (en) | 2011-08-09 | 2014-10-14 | Continental Automotive Systems, Inc | Smart trailer RFID system |
US8909239B2 (en) | 2011-08-30 | 2014-12-09 | Qualcomm Incorporated | Scheduling generic broadcast of location assistance data |
US9269063B2 (en) * | 2011-09-23 | 2016-02-23 | Elwha Llc | Acquiring and transmitting event related tasks and subtasks to interface devices |
US10467677B2 (en) | 2011-09-28 | 2019-11-05 | Nara Logics, Inc. | Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships |
US11151617B2 (en) | 2012-03-09 | 2021-10-19 | Nara Logics, Inc. | Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships |
US10789526B2 (en) | 2012-03-09 | 2020-09-29 | Nara Logics, Inc. | Method, system, and non-transitory computer-readable medium for constructing and applying synaptic networks |
US8170971B1 (en) | 2011-09-28 | 2012-05-01 | Ava, Inc. | Systems and methods for providing recommendations based on collaborative and/or content-based nodal interrelationships |
US8732101B1 (en) | 2013-03-15 | 2014-05-20 | Nara Logics, Inc. | Apparatus and method for providing harmonized recommendations based on an integrated user profile |
US11727249B2 (en) | 2011-09-28 | 2023-08-15 | Nara Logics, Inc. | Methods for constructing and applying synaptic networks |
JP5874292B2 (en) * | 2011-10-12 | 2016-03-02 | ソニー株式会社 | Information processing apparatus, information processing method, and program |
US20130097317A1 (en) * | 2011-10-18 | 2013-04-18 | Daniel Sheleheda | Method and apparatus for remote trust management for machine to machine communications in a network |
US20130135080A1 (en) * | 2011-11-28 | 2013-05-30 | Upm Rfid Oy | Tag forgery protection |
US20130170107A1 (en) * | 2012-01-04 | 2013-07-04 | Doug Dean | Enclosure for Preventing Tampering of Mobile Communication Equipment in Transportation Industry |
WO2013103779A1 (en) | 2012-01-06 | 2013-07-11 | 3M Innovative Properties Company | Released offender geospatial location information user application |
CA2860411A1 (en) | 2012-01-06 | 2013-07-11 | Hoyt M. Layson | Released offender geospatial location information trend analysis |
ES2614873T3 (en) | 2012-01-06 | 2017-06-02 | 3M Innovative Properties Company | Geospatial location information resolution center for released criminals |
JP5854856B2 (en) * | 2012-01-24 | 2016-02-09 | 三菱電機株式会社 | Plant operation device and plant operation training simulator device |
WO2013147873A1 (en) * | 2012-03-30 | 2013-10-03 | Hewlett-Packard Development Company, L.P. | Protecting context-sensitive data |
US10122710B2 (en) * | 2012-04-19 | 2018-11-06 | Pq Solutions Limited | Binding a data transaction to a person's identity using biometrics |
US8935191B2 (en) * | 2012-05-02 | 2015-01-13 | Sap Ag | Reuse of on-demand enterprise system customization knowledge utilizing collective experience |
US9582767B2 (en) * | 2012-05-16 | 2017-02-28 | Excalibur Ip, Llc | Media recommendation using internet media stream modeling |
GB2502966A (en) * | 2012-06-11 | 2013-12-18 | Everything Everywhere Ltd | Container monitoring device |
US9003162B2 (en) | 2012-06-20 | 2015-04-07 | Microsoft Technology Licensing, Llc | Structuring storage based on latch-free B-trees |
US20140018976A1 (en) * | 2012-07-13 | 2014-01-16 | Honeywell International Inc. | System and method for unmanned system data collection, management, and reporting |
US9294936B2 (en) | 2012-08-14 | 2016-03-22 | Honeywell International Inc. | System and method for improved location system accuracy |
US8892484B2 (en) * | 2012-09-28 | 2014-11-18 | Sphere Of Influence, Inc. | System and method for predicting events |
RU2532723C2 (en) * | 2012-11-14 | 2014-11-10 | Федеральное государственное бюджетное учреждение науки Институт проблем информатики Российской академии наук (ИПИ РАН) | Method of supporting operation of organisational system |
RU2533090C2 (en) * | 2012-11-29 | 2014-11-20 | Федеральное государственное бюджетное учреждение науки Институт проблем информатики Российской академии наук (ИПИ РАН) | System for situation-analytical centres of organisational system |
WO2014104567A1 (en) * | 2012-12-27 | 2014-07-03 | 동아대학교 산학협력단 | Intrusion-detecting and security system on external wall surface of container |
EP2939163A4 (en) * | 2012-12-31 | 2015-12-02 | Shuster Gary Stephen | Decision making using algorithmic or programmatic analysis |
US9648016B2 (en) * | 2013-01-22 | 2017-05-09 | Raytheon Company | Predictive information transmission |
US9131369B2 (en) * | 2013-01-24 | 2015-09-08 | Nuance Communications, Inc. | Protection of private information in a client/server automatic speech recognition system |
US9142114B2 (en) | 2013-01-28 | 2015-09-22 | Apple Inc. | Tracking group members' proximity |
US9514741B2 (en) | 2013-03-13 | 2016-12-06 | Nuance Communications, Inc. | Data shredding for speech recognition acoustic model training under data retention restrictions |
US9514740B2 (en) | 2013-03-13 | 2016-12-06 | Nuance Communications, Inc. | Data shredding for speech recognition language model training under data retention restrictions |
US8692140B1 (en) | 2013-03-15 | 2014-04-08 | Surgitrac Corporation | Surgical object and fluid monitoring system having highly sensitive and reliable detection of objects being placed in a container |
US9103805B2 (en) | 2013-03-15 | 2015-08-11 | Leeo, Inc. | Environmental measurement display system and method |
US9347817B2 (en) | 2013-03-15 | 2016-05-24 | Surgitrac Corporation | Surgical object and comprehensive fluid monitoring system having capability of mobile monitoring and having highly sensitive and reliable detection of objects being placed in a container |
US8963025B2 (en) | 2013-03-15 | 2015-02-24 | Surgitrac Corporation | Surgical object and fluid monitoring system having highly sensitive and reliable detection of objects being placed in a container |
US20140266777A1 (en) * | 2013-03-15 | 2014-09-18 | Leeo, Inc. | Environmental monitoring device |
US8704178B1 (en) | 2013-03-15 | 2014-04-22 | Surgitrac Corporation | Container for surgical object and fluid monitoring system |
US8929246B2 (en) | 2013-04-19 | 2015-01-06 | Cubic Corporation | Payment reconciliation in mixed-ownership low-power mesh networks |
EP4006860A1 (en) * | 2013-04-23 | 2022-06-01 | Canary Connect, Inc. | Security and/or monitoring devices and systems |
US9519591B2 (en) | 2013-06-22 | 2016-12-13 | Microsoft Technology Licensing, Llc | Latch-free, log-structured storage for multiple access methods |
GB2515801A (en) * | 2013-07-04 | 2015-01-07 | Sony Corp | Transmitter and receiver and methods of transmitting and receiving |
US20150020615A1 (en) | 2013-07-16 | 2015-01-22 | Leeo, Inc. | Electronic device with environmental monitoring |
US9116137B1 (en) | 2014-07-15 | 2015-08-25 | Leeo, Inc. | Selective electrical coupling based on environmental conditions |
US9901250B2 (en) * | 2013-10-09 | 2018-02-27 | Senseonics, Incorporated | Use of a sensor with multiple external sensor transceiver devices |
GB2519347A (en) | 2013-10-18 | 2015-04-22 | Pole Star Space Applic Ltd | Method and apparatus for tracking and checking compliance of vessels such as ships |
KR102180226B1 (en) * | 2013-10-30 | 2020-11-18 | 삼성전자주식회사 | Electronic device and method for securing using complex biometrics |
US8989053B1 (en) | 2013-11-29 | 2015-03-24 | Fedex Corporate Services, Inc. | Association management in a wireless node network |
RU2665882C2 (en) * | 2013-12-11 | 2018-09-04 | Ска Хайджин Продактс Аб | Distributed data acquisition equipment configuration |
US10282949B2 (en) * | 2013-12-12 | 2019-05-07 | Rustin B. Penland | Security system for identifying disturbances in a building |
US9177481B2 (en) * | 2013-12-13 | 2015-11-03 | Sikorsky Aircraft Corporation | Semantics based safe landing area detection for an unmanned vehicle |
WO2015094354A1 (en) * | 2013-12-20 | 2015-06-25 | Intel Corporation | Electronic goal monitoring |
WO2015106104A1 (en) * | 2014-01-09 | 2015-07-16 | Oceaneering International, Inc. | Wireless data communications between a remotely operated vehicle and a remote location |
US10382194B1 (en) * | 2014-01-10 | 2019-08-13 | Rockwell Collins, Inc. | Homomorphic encryption based high integrity computing system |
WO2015170186A2 (en) * | 2014-01-17 | 2015-11-12 | Jaber Alexander | Tactical surveillance and monitoring system designed for being carried by an animal |
US10528357B2 (en) * | 2014-01-17 | 2020-01-07 | L3 Technologies, Inc. | Web-based recorder configuration utility |
US11574206B2 (en) * | 2014-06-03 | 2023-02-07 | The Security Oracle, Inc. | Defense and denial method |
US20150379419A1 (en) * | 2014-06-26 | 2015-12-31 | International Business Machines Corporation | Ghost-pattern analyzer |
US9213327B1 (en) | 2014-07-15 | 2015-12-15 | Leeo, Inc. | Selective electrical coupling based on environmental conditions |
US9372477B2 (en) | 2014-07-15 | 2016-06-21 | Leeo, Inc. | Selective electrical coupling based on environmental conditions |
US9170625B1 (en) | 2014-07-15 | 2015-10-27 | Leeo, Inc. | Selective electrical coupling based on environmental conditions |
US9514211B2 (en) | 2014-07-20 | 2016-12-06 | Microsoft Technology Licensing, Llc | High throughput data modifications using blind update operations |
US20160033317A1 (en) * | 2014-08-04 | 2016-02-04 | TaKaDu Ltd. | System and method for assessing sensors' reliability |
US9092060B1 (en) | 2014-08-27 | 2015-07-28 | Leeo, Inc. | Intuitive thermal user interface |
US20160071219A1 (en) | 2014-09-08 | 2016-03-10 | Leeo, Inc. | Dynamic insurance based on environmental monitoring |
US9535153B2 (en) * | 2014-09-09 | 2017-01-03 | Honeywell International Inc. | System and method for improved location accuracy |
US10356649B2 (en) * | 2014-09-26 | 2019-07-16 | Intel Corporation | Multisensory change detection for internet of things domain |
AU2015323957B2 (en) * | 2014-09-30 | 2020-11-19 | Joshua KRAGE | Detecting unauthorized device access by comparing multiple independent spatial-time data sets |
US9474040B2 (en) * | 2014-10-07 | 2016-10-18 | Cisco Technology, Inc. | Independently verifying a transit point in a network environment |
US9445451B2 (en) | 2014-10-20 | 2016-09-13 | Leeo, Inc. | Communicating arbitrary attributes using a predefined characteristic |
US10026304B2 (en) | 2014-10-20 | 2018-07-17 | Leeo, Inc. | Calibrating an environmental monitoring device |
KR101638879B1 (en) * | 2014-11-06 | 2016-07-12 | 주식회사 아이디스 | Mobile device capable of connection with security system under widget |
US9848458B2 (en) * | 2014-12-01 | 2017-12-19 | Oceus Networks, Inc. | Wireless parameter-sensing node and network thereof |
US9495861B2 (en) * | 2014-12-02 | 2016-11-15 | Honeywell International Inc. | System and method for take-over protection for a security system |
GB2533307B (en) | 2014-12-15 | 2017-07-19 | Ge Aviat Systems Ltd | Aircraft wireless network for fixed aircraft components |
US10956856B2 (en) | 2015-01-23 | 2021-03-23 | Samsung Electronics Co., Ltd. | Object recognition for a storage structure |
US9769182B2 (en) * | 2015-02-06 | 2017-09-19 | Honeywell International Inc. | System and method of preventing hijacking of security systems and components |
US11238397B2 (en) | 2015-02-09 | 2022-02-01 | Fedex Corporate Services, Inc. | Methods, apparatus, and systems for generating a corrective pickup notification for a shipped item using a mobile master node |
EP3259209B1 (en) | 2015-02-18 | 2020-11-11 | Fedex Corporate Services, Inc. | Managing logistics information related to a logistics container using a container interface display apparatus |
WO2016137443A1 (en) * | 2015-02-24 | 2016-09-01 | Hewlett Packard Enterprise Development Lp | Using fuzzy inference to determine likelihood that financial account scenario is associated with illegal activity |
EP3268247A1 (en) * | 2015-03-09 | 2018-01-17 | AutoConnect Holdings LLC | Vehicle supervising of occupant applications |
US10089849B2 (en) * | 2015-03-12 | 2018-10-02 | Honeywell International Inc. | Wireless mesh network gas detection real time location system |
US9813334B2 (en) * | 2015-03-31 | 2017-11-07 | Verizon Patent And Licensing Inc. | Network element federation controller and forwarding box |
KR101683592B1 (en) * | 2015-04-14 | 2016-12-07 | 삼성에스디에스 주식회사 | Method and Apparatus for Managing Data, Data Management System Using the Same |
CN104899674A (en) * | 2015-04-24 | 2015-09-09 | 公安部交通管理科学研究所 | Public traffic management service pre-warning method and pre-warning system |
US20160335592A1 (en) * | 2015-05-13 | 2016-11-17 | Carrier Corporation | Modular data logging system with combined data logs |
US10156552B2 (en) | 2015-05-13 | 2018-12-18 | Honeywell International Inc. | Method to auto-configure gas detectors based on real-time location |
CA2930807C (en) | 2015-06-05 | 2021-09-21 | Rustin B. Penland | Security system for identifying disturbances in a building |
US10902374B2 (en) * | 2015-06-19 | 2021-01-26 | International Business Machines Corporation | Encrypted transit information for shipments |
US10378936B2 (en) * | 2015-09-04 | 2019-08-13 | International Business Machines Corporation | Identification of failed sensors in a system of interconnected devices |
US10003466B1 (en) * | 2015-09-15 | 2018-06-19 | Amazon Technologies, Inc. | Network traffic with credential signatures |
US10805775B2 (en) | 2015-11-06 | 2020-10-13 | Jon Castor | Electronic-device detection and activity association |
US9801013B2 (en) | 2015-11-06 | 2017-10-24 | Leeo, Inc. | Electronic-device association based on location duration |
WO2017099744A1 (en) * | 2015-12-09 | 2017-06-15 | Hewlett Packard Enterprise Development Lp | Software development managements |
US10354653B1 (en) | 2016-01-19 | 2019-07-16 | United Services Automobile Association (Usaa) | Cooperative delegation for digital assistants |
EP3433809A4 (en) | 2016-03-23 | 2019-10-02 | Fedex Corporate Services, Inc. | Systems, apparatus, and methods for self-adjusting a broadcast setting of a node in a wireless node network |
RU2630393C1 (en) * | 2016-03-31 | 2017-09-07 | Федеральное государственное учреждение "Федеральный исследовательский центр "Информатика и управление" Российской академии наук (ФИЦ ИУ РАН) | Integrated control system |
US10287816B2 (en) | 2016-04-21 | 2019-05-14 | Rustin B. Penland | Lockable firearm cabinet |
US10907399B2 (en) | 2016-04-21 | 2021-02-02 | Rustin B. Penland | Lockable firearm cabinet |
US20170352234A1 (en) * | 2016-06-01 | 2017-12-07 | Al Radeef Technology & Solutions L.L.C. | Security and surveillance system |
US10769854B2 (en) | 2016-07-12 | 2020-09-08 | Tyco Fire & Security Gmbh | Holographic technology implemented security solution |
EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
US9905120B1 (en) | 2016-08-29 | 2018-02-27 | At&T Digital Life, Inc. | Alarm initiation when sensor is intentionally jammed |
US9965939B2 (en) * | 2016-09-01 | 2018-05-08 | Locus Solutions, Llc | Systems and methods for monitoring vibrations during transportation of goods |
US10311702B2 (en) * | 2016-09-01 | 2019-06-04 | Locus Solutions, Llc | Systems and methods for monitoring vibrations during transportation of goods |
US10902537B2 (en) * | 2016-11-23 | 2021-01-26 | Electronics And Telecommunications Research Institute | Method of processing logistics information, logistics information processing server using the same, and logistics managing apparatus using the same |
IT201600127390A1 (en) * | 2016-12-16 | 2018-06-16 | Sanco S P A | FIRE-FIGHTING CENTRAL |
US10839401B2 (en) | 2017-01-20 | 2020-11-17 | Honeywell International Inc. | Apparatus and method for qualifying data automatically generated from an unqualified system |
EP3351473A1 (en) * | 2017-01-20 | 2018-07-25 | Honeywell International Inc. | Apparatus and method for qualifying data automatically generated from an unqualified system |
US11514056B2 (en) * | 2017-01-23 | 2022-11-29 | Raytheon Technologies Corporation | Data request workflow system |
US11036883B2 (en) * | 2017-01-23 | 2021-06-15 | Raytheon Technologies Corporation | Data filtering for data request workflow system |
BR102017005171A8 (en) * | 2017-03-15 | 2021-05-18 | Velsis Sist E Tecnologia Viaria S/A | embedded system for instantaneous measurement of weight, vibration, deformation, pressure, acceleration and temperature of vehicles and containers |
US10726711B2 (en) | 2017-05-01 | 2020-07-28 | Johnson Controls Technology Company | Building security system with user presentation for false alarm reduction |
WO2018226947A1 (en) * | 2017-06-09 | 2018-12-13 | Walmart Apollo, Llc | Systems, devices, and methods for monitoring packages with affixed sensors |
CN110771090B (en) * | 2017-06-16 | 2023-09-15 | 索尼半导体解决方案公司 | Signal processing device, signal processing method, and program |
CN107895413A (en) * | 2017-09-18 | 2018-04-10 | 同方威视技术股份有限公司 | Electronic lock equipment and the method for carrying out loading space examination |
US10652742B2 (en) * | 2017-11-20 | 2020-05-12 | Valeo Comfort And Driving Assistance | Hybrid authentication of vehicle devices and/or mobile user devices |
US11356804B2 (en) | 2018-02-25 | 2022-06-07 | Qualcomm Incorporated | Systems and methods for efficiently supporting broadcast of location assistance data in a wireless network |
US11669914B2 (en) | 2018-05-06 | 2023-06-06 | Strong Force TX Portfolio 2018, LLC | Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information |
US11550299B2 (en) | 2020-02-03 | 2023-01-10 | Strong Force TX Portfolio 2018, LLC | Automated robotic process selection and configuration |
US11544782B2 (en) | 2018-05-06 | 2023-01-03 | Strong Force TX Portfolio 2018, LLC | System and method of a smart contract and distributed ledger platform with blockchain custody service |
EP3791347A4 (en) | 2018-05-06 | 2022-05-25 | Strong Force TX Portfolio 2018, LLC | Methods and systems for improving machines and systems that automate execution of distributed ledger and other transactions in spot and forward markets for energy, compute, storage and other resources |
US11429922B2 (en) * | 2018-06-21 | 2022-08-30 | Raquel Holatz | Cluster-based container lifecycle tracker |
US20200005172A1 (en) * | 2018-06-29 | 2020-01-02 | Paypal, Inc. | System and method for generating multi-factor feature extraction for modeling and reasoning |
DE102018210959A1 (en) * | 2018-07-04 | 2020-01-09 | Audi Ag | Method for monitoring a traffic component, in particular a motor vehicle, for an unauthorized activity, and system |
US11191056B2 (en) | 2018-08-08 | 2021-11-30 | Qualcomm Incorporated | Systems and methods for validity time and change notification of broadcast location assistance data |
DK201870684A1 (en) * | 2018-08-27 | 2020-05-19 | Aptiv Technologies Limited | Partitioned wireless communication system with redundant data links and power lines |
US10769920B2 (en) * | 2018-09-22 | 2020-09-08 | Fedex Corporate Services, Inc. | Systems, apparatus, and methods for detecting an environmental anomaly and initiating an enhanced automatic response using elements of a wireless node network and using sensor data from ID nodes associated with packages and environmental threshold conditions per package |
US10607476B1 (en) | 2019-03-28 | 2020-03-31 | Johnson Controls Technology Company | Building security system with site risk reduction |
US10607478B1 (en) * | 2019-03-28 | 2020-03-31 | Johnson Controls Technology Company | Building security system with false alarm reduction using hierarchical relationships |
CN109903501B (en) * | 2019-04-03 | 2020-11-24 | 湖南科技学院 | Security probe analysis processing system based on big data |
WO2020206176A1 (en) * | 2019-04-03 | 2020-10-08 | Intuitive Surgical Operations, Inc. | System and method for view restoration |
US11153373B2 (en) | 2019-05-03 | 2021-10-19 | EMC IP Holding Company LLC | Method and system for performance-driven load shifting |
US11138328B2 (en) | 2019-05-30 | 2021-10-05 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
US11165777B2 (en) | 2019-05-30 | 2021-11-02 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
US11153315B2 (en) | 2019-05-30 | 2021-10-19 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
US11922246B2 (en) * | 2019-06-04 | 2024-03-05 | Position Imaging, Inc. | Article-identification-and-location device systems and methods of using same |
US12011073B2 (en) | 2019-06-04 | 2024-06-18 | Position Imaging, Inc. | Article-identification-and-location device systems and methods of using same |
US20200388194A1 (en) * | 2019-06-05 | 2020-12-10 | Honeywell International Inc. | Systems and methods for generating aircraft training programs adapted to user characteristics |
US10999075B2 (en) | 2019-06-17 | 2021-05-04 | Advanced New Technologies Co., Ltd. | Blockchain-based patrol inspection proof storage method, apparatus, and electronic device |
US11750448B2 (en) * | 2019-08-02 | 2023-09-05 | Hewlett Packard Enterprise Development Lp | Network device-integrated asset tag-based environmental sensing with mutual authentication |
US11917488B2 (en) | 2019-09-13 | 2024-02-27 | Troverlo, Inc. | Passive asset tracking using observations of pseudo Wi-Fi access points |
US11622234B2 (en) | 2019-09-13 | 2023-04-04 | Troverlo, Inc. | Passive asset tracking using observations of Wi-Fi access points |
US11589187B2 (en) | 2019-09-13 | 2023-02-21 | Troverlo, Inc. | Passive sensor tracking using observations of Wi-Fi access points |
JP2022549671A (en) * | 2019-09-25 | 2022-11-28 | コモンウェルス サイエンティフィック アンド インダストリアル リサーチ オーガナイゼーション | Cryptographic services for browser applications |
CN110889944A (en) * | 2019-10-18 | 2020-03-17 | 合肥森弗卡电子科技有限公司 | Internet-based security analysis alarm system and method |
CN111063056B (en) * | 2019-11-21 | 2021-09-07 | 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) | Aviation accident analysis method and device, computer equipment and storage medium |
US11277712B2 (en) * | 2019-12-20 | 2022-03-15 | Tatiana Guydouk | Cellular global tracker for freight |
US11982993B2 (en) | 2020-02-03 | 2024-05-14 | Strong Force TX Portfolio 2018, LLC | AI solution selection for an automated robotic process |
WO2021215863A1 (en) * | 2020-04-23 | 2021-10-28 | Bae Sung Hoon | Apparatus for performing smart logistics monitoring and method for controlling same |
US11763182B1 (en) * | 2020-05-07 | 2023-09-19 | Jared Anders Newcombe | Software facilitating decision making method |
US11575979B1 (en) * | 2020-06-29 | 2023-02-07 | Amazon Technologies, Inc. | Real-time multi-dimensional monitoring of environmental parameters |
RU2744767C1 (en) * | 2020-07-09 | 2021-03-15 | Илья Владимирович Волочков | Method and automated system for solving problems |
WO2022046417A1 (en) * | 2020-08-27 | 2022-03-03 | Liveramp, Inc. | Evolutionary analysis of an identity graph data structure |
EP4418576A2 (en) * | 2020-10-28 | 2024-08-21 | Furuno Hellas S.A. | Apparatus and method for remote monitoring |
CN112531889A (en) * | 2020-11-10 | 2021-03-19 | 国网河南省电力公司鹤壁供电公司 | Transformer substation monitoring system based on wireless sensor |
US11811520B2 (en) | 2020-12-10 | 2023-11-07 | International Business Machines Corporation | Making security recommendations |
CN113034841A (en) * | 2021-03-19 | 2021-06-25 | 北京红山信息科技研究院有限公司 | City cooperative management early warning system |
US11941586B2 (en) * | 2022-04-11 | 2024-03-26 | Truist Bank | System for applying an artificial intelligence engine in real-time to affect course corrections and influence outcomes |
CN116540275B (en) * | 2023-07-06 | 2023-09-01 | 中国科学院空天信息创新研究院 | Reliable monitoring and early warning method for probability domain of accurate positioning correction information |
CN117037350B (en) * | 2023-10-10 | 2023-12-19 | 成都汉度科技有限公司 | Dynamic ring monitoring system and data processing method |
Family Cites Families (89)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6919803B2 (en) * | 2002-06-11 | 2005-07-19 | Intelligent Technologies International Inc. | Low power remote asset monitoring |
US5416706A (en) * | 1984-04-27 | 1995-05-16 | Hagenbuch; Leroy G. | Apparatus for identifying containers from which refuse is collected and compiling a historical record of the containers |
US5631835A (en) * | 1984-04-27 | 1997-05-20 | Hagenbuch; Leroy G. | Apparatus for identifying containers from which refuse is collected and compiling a historical record of the containers |
US4636634A (en) * | 1984-08-28 | 1987-01-13 | Veeco Integrated Automation, Inc. | Apparatus with intelligent bins indicating the presence and identity of stored coded articles |
US5068798A (en) | 1989-03-03 | 1991-11-26 | Precision Systems, Inc. | Process environment monitoring system |
US5345809A (en) * | 1989-06-09 | 1994-09-13 | Research Corporation Technologies, Inc. | Explosive detection screening system |
US5078952A (en) | 1989-06-16 | 1992-01-07 | Science Applications International Corporation | Multi-sensor explosive detection system |
US5161110A (en) * | 1990-02-27 | 1992-11-03 | Atlantic Richfield Company | Hierarchical process control system and method |
US5199672A (en) * | 1990-05-25 | 1993-04-06 | Orbital Sciences Corporation | Method and apparatus for deploying a satellite network |
US5121467A (en) * | 1990-08-03 | 1992-06-09 | E.I. Du Pont De Nemours & Co., Inc. | Neural network/expert system process control system and method |
US5219194A (en) * | 1992-02-28 | 1993-06-15 | Viking Corporation | Security seal |
US5219195A (en) * | 1992-03-30 | 1993-06-15 | Lawrence Barry G | Window closure mechanism |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5311562A (en) * | 1992-12-01 | 1994-05-10 | Westinghouse Electric Corp. | Plant maintenance with predictive diagnostics |
US6748318B1 (en) * | 1993-05-18 | 2004-06-08 | Arrivalstar, Inc. | Advanced notification systems and methods utilizing a computer network |
US7397363B2 (en) * | 1993-06-08 | 2008-07-08 | Raymond Anthony Joao | Control and/or monitoring apparatus and method |
US5377906A (en) * | 1993-10-29 | 1995-01-03 | Mason; Randall | Device for detecting and signalling the presence of objects in a closed container and a mailbox containing the same |
US5704018A (en) | 1994-05-09 | 1997-12-30 | Microsoft Corporation | Generating improved belief networks |
US5528228A (en) | 1994-09-08 | 1996-06-18 | Wilk; Peter J. | Protective device for storage and transport containers |
WO1996012187A1 (en) * | 1994-10-13 | 1996-04-25 | Horus Therapeutics, Inc. | Computer assisted methods for diagnosing diseases |
US5629498A (en) * | 1995-01-18 | 1997-05-13 | Richard A. Pollock | Intraoperative tracking devices and processes |
US5905443A (en) | 1995-10-02 | 1999-05-18 | Motorola, Inc. | Paging system employing delivery schedule combining and method of operation thereof |
US5917433A (en) * | 1996-06-26 | 1999-06-29 | Orbital Sciences Corporation | Asset monitoring system and associated method |
US5774876A (en) * | 1996-06-26 | 1998-06-30 | Par Government Systems Corporation | Managing assets with active electronic tags |
JP3989058B2 (en) * | 1997-08-05 | 2007-10-10 | 株式会社ショーワ | Dust cover mounting structure |
US6070143A (en) * | 1997-12-05 | 2000-05-30 | Lucent Technologies Inc. | System and method for analyzing work requirements and linking human resource products to jobs |
US5969884A (en) * | 1998-01-30 | 1999-10-19 | Dal-Craft, Inc. | Place keeper for line magnifier |
US6560592B1 (en) * | 1998-03-19 | 2003-05-06 | Micro Data Base Systems, Inc. | Multi-model computer database storage system with integrated rule engine |
US5963131A (en) | 1998-06-19 | 1999-10-05 | Lexent Technologies, Inc. | Anti-theft device with alarm screening |
GB2339614B (en) * | 1998-07-14 | 2000-06-21 | Infrared Integrated Syst Ltd | Detector-array sensor with mask warning |
AU5916799A (en) * | 1998-09-11 | 2000-04-03 | Key-Trak, Inc. | Object tracking system with non-contact object detection and identification |
US6887710B2 (en) | 1998-11-13 | 2005-05-03 | Mesosystems Technology, Inc. | Robust system for screening mail for biological agents |
US6398727B1 (en) * | 1998-12-23 | 2002-06-04 | Baxter International Inc. | Method and apparatus for providing patient care |
US6370222B1 (en) * | 1999-02-17 | 2002-04-09 | Ccvs, Llc | Container contents verification |
DK1175749T3 (en) * | 1999-04-22 | 2005-10-24 | Veridicom Inc | Biometric authentication with high security using public key / private key encryption pairs |
US6240415B1 (en) | 1999-10-07 | 2001-05-29 | J. Seth Blumberg | Corporate and entertainment management interactive system using a computer network |
DE19950532A1 (en) * | 1999-10-20 | 2001-07-12 | Schoeller Plast Ag | Reusable transportation apparatus with tracking systems has transponder storing information on readiness condition of merchandise and usability profile |
WO2003030120A1 (en) * | 1999-12-16 | 2003-04-10 | Cardinal Automation, Inc. | System for auditing refuse collection |
AU2001239854A1 (en) | 2000-02-23 | 2001-09-03 | Iridian Technologies, Inc. | Tamper proof case for electronic devices having memories with sensitive information |
US6622050B2 (en) | 2000-03-31 | 2003-09-16 | Medtronic, Inc. | Variable encryption scheme for data transfer between medical devices and related data management systems |
US6281797B1 (en) * | 2000-04-04 | 2001-08-28 | Marconi Data Systems Inc. | Method and apparatus for detecting a container proximate to a transportation vessel hold |
US6982643B2 (en) * | 2002-10-08 | 2006-01-03 | Freight Glove Technologies, Llc | Cargo security method and apparatus |
US6988279B1 (en) * | 2000-05-30 | 2006-01-17 | International Business Machines Corporation | Intelligent agent authentication via position locator system |
US6609036B1 (en) * | 2000-06-09 | 2003-08-19 | Randall L. Bickford | Surveillance system and method having parameter estimation and operating mode partitioning |
US6669631B2 (en) * | 2000-06-14 | 2003-12-30 | Medtronic, Inc. | Deep computing applications in medical device systems |
US6594578B2 (en) | 2000-07-10 | 2003-07-15 | United Parcel Service Of America | Detection and removal of self-alerts in a tracking system |
US20020017977A1 (en) * | 2000-08-04 | 2002-02-14 | Wall Mark Emanuel | Method and apparatus for licensing and controlling access, use, and viability of product utilizing geographic position |
AU2001275020A1 (en) * | 2000-09-21 | 2002-04-02 | Theradoc.Com, Inc. | Systems and methods for manipulating medical data via a decision support system |
JP5525673B2 (en) | 2000-09-28 | 2014-06-18 | オラクル・インターナショナル・コーポレイション | Enterprise web mining system and method |
JP4648533B2 (en) * | 2000-10-30 | 2011-03-09 | Okiセミコンダクタ株式会社 | Semiconductor device |
US7343299B2 (en) * | 2000-11-06 | 2008-03-11 | Symbol Technologies, Inc. | System and methods for mail security |
US20020120864A1 (en) * | 2000-12-13 | 2002-08-29 | Wu Jackie Zhanhong | Automatable secure submission of confidential user information over a computer network |
US20020152185A1 (en) * | 2001-01-03 | 2002-10-17 | Sasken Communication Technologies Limited | Method of network modeling and predictive event-correlation in a communication system by the use of contextual fuzzy cognitive maps |
JP3832257B2 (en) * | 2001-02-26 | 2006-10-11 | 株式会社日立製作所 | Synchronous motor start control method and control device |
US6934673B2 (en) * | 2001-05-25 | 2005-08-23 | Hewlett-Packard Development Company, L.P. | Method and apparatus for predicting multi-part performability |
US6707381B1 (en) * | 2001-06-26 | 2004-03-16 | Key-Trak, Inc. | Object tracking method and system with object identification and verification |
US7433826B2 (en) * | 2001-09-19 | 2008-10-07 | Eleytheria, Ltd | System and method for identity validation for a regulated transaction |
US6765490B2 (en) * | 2001-10-23 | 2004-07-20 | Steven W. Lopez | System and methods for detecting harmful agents within contents of mail |
US6948653B2 (en) * | 2001-10-29 | 2005-09-27 | Lockheed Martin Corporation | Hazardous material detection system for use with mail and other objects |
US6613571B2 (en) * | 2001-12-19 | 2003-09-02 | Pitney Bowes Inc. | Method and system for detecting biological and chemical hazards in mail |
US7032816B2 (en) | 2001-12-28 | 2006-04-25 | Kimberly-Clark Worldwide, Inc. | Communication between machines and feed-forward control in event-based product manufacturing |
US7969306B2 (en) * | 2002-01-11 | 2011-06-28 | Sap Aktiengesellschaft | Context-aware and real-time item tracking system architecture and scenarios |
US7334130B2 (en) | 2002-07-19 | 2008-02-19 | Bowers Charles R | Method and apparatus for managing confidential information |
US6801819B1 (en) * | 2002-08-30 | 2004-10-05 | Advanced Micro Devices, Inc. | Method and apparatus for evaluating bids for scheduling a resource |
US6782302B1 (en) | 2002-08-30 | 2004-08-24 | Advanced Micro Devices, Inc. | Method and apparatus for scheduling workpieces with compatible processing requirements |
US7353532B2 (en) | 2002-08-30 | 2008-04-01 | International Business Machines Corporation | Secure system and method for enforcement of privacy policy and protection of confidentiality |
US7002472B2 (en) * | 2002-09-04 | 2006-02-21 | Northrop Grumman Corporation | Smart and secure container |
US20040122709A1 (en) | 2002-12-18 | 2004-06-24 | Avinash Gopal B. | Medical procedure prioritization system and method utilizing integrated knowledge base |
US20040122703A1 (en) * | 2002-12-19 | 2004-06-24 | Walker Matthew J. | Medical data operating model development system and method |
WO2004066236A1 (en) * | 2003-01-14 | 2004-08-05 | United Technologies Corporation | Shipping container and method of using same |
US6768421B1 (en) * | 2003-01-31 | 2004-07-27 | Veritainer Corporation | Container crane radiation detection systems and methods |
US7323981B2 (en) * | 2003-02-20 | 2008-01-29 | Global Statistics, Inc. | Container tracking system |
US20040196182A1 (en) | 2003-04-03 | 2004-10-07 | Unnold Robert M. | Intelligent mobile asset management system |
US6988179B2 (en) * | 2003-04-07 | 2006-01-17 | International Business Machines Corporation | Method, system, and program for ordering of physical extents |
US7019640B2 (en) * | 2003-05-19 | 2006-03-28 | Raytheon Company | Sensor suite and communication system for cargo monitoring and identification |
US7012520B2 (en) * | 2003-06-17 | 2006-03-14 | Infraegis, Inc. | Global intelligent remote detection system |
US20050075899A1 (en) * | 2003-10-06 | 2005-04-07 | Corcoran Timothy M. | Global cargo container information clearinghouse |
US7126473B1 (en) | 2004-02-18 | 2006-10-24 | Roger Andrew Powell | Intrusion detection and secure remote alarm communication system for a security system for the inactive storage of the active ingredients of weapons of mass destruction |
CN2696022Y (en) * | 2004-04-15 | 2005-04-27 | 鸿富锦精密工业(深圳)有限公司 | Computer panel |
US7525431B2 (en) * | 2004-05-06 | 2009-04-28 | Ut-Battelle Llc | Space charge dosimeters for extremely low power measurements of radiation in shipping containers |
JP2005319590A (en) * | 2004-05-06 | 2005-11-17 | Konica Minolta Medical & Graphic Inc | Printing plate material, printing plate, and printing method |
US7225031B2 (en) * | 2004-06-29 | 2007-05-29 | Hitachi Global Storage Technologies Netherlands, B.V. | Hard disk drive medical monitor with security encryption |
US20060071786A1 (en) * | 2004-10-05 | 2006-04-06 | Accenture Global Sevices Gmbh | Cargo security sensing system |
US20060080316A1 (en) * | 2004-10-08 | 2006-04-13 | Meridio Ltd | Multiple indexing of an electronic document to selectively permit access to the content and metadata thereof |
JP4167640B2 (en) * | 2004-10-14 | 2008-10-15 | シャープ株式会社 | Method for determining program voltage of nonvolatile memory |
US7250855B2 (en) * | 2004-12-27 | 2007-07-31 | Sap Aktiengesellschaft | False alarm mitigation using a sensor network |
US7327248B2 (en) | 2004-12-30 | 2008-02-05 | Sap Aktiengesellschaft | Generating electronic seals |
US7218974B2 (en) * | 2005-03-29 | 2007-05-15 | Zarpac, Inc. | Industrial process data acquisition and analysis |
US7512583B2 (en) * | 2005-05-03 | 2009-03-31 | Palomar Technology, Llc | Trusted decision support system and method |
-
2006
- 2006-05-03 US US11/417,887 patent/US7512583B2/en active Active
- 2006-05-03 US US11/417,893 patent/US20070011105A1/en not_active Abandoned
- 2006-05-03 US US11/418,380 patent/US7656286B2/en active Active
- 2006-05-03 US US11/418,496 patent/US20070002140A1/en not_active Abandoned
- 2006-05-03 WO PCT/US2006/017100 patent/WO2007027239A1/en active Application Filing
- 2006-05-03 US US11/418,385 patent/US20070008410A1/en not_active Abandoned
- 2006-05-03 US US11/418,381 patent/US7609159B2/en active Active
- 2006-05-03 US US11/418,447 patent/US20070022079A1/en not_active Abandoned
- 2006-05-03 WO PCT/US2006/016895 patent/WO2006119323A2/en active Application Filing
- 2006-05-03 US US11/418,472 patent/US20060291657A1/en not_active Abandoned
- 2006-05-03 US US11/417,910 patent/US20070182544A1/en not_active Abandoned
- 2006-05-03 US US11/418,395 patent/US20070011107A1/en not_active Abandoned
- 2006-05-03 US US11/418,448 patent/US7526455B2/en active Active - Reinstated
- 2006-05-03 US US11/418,382 patent/US20070011106A1/en not_active Abandoned
-
2009
- 2009-04-28 US US12/431,656 patent/US20090210378A1/en not_active Abandoned
- 2009-12-17 US US12/641,139 patent/US20100090822A1/en not_active Abandoned
-
2012
- 2012-02-17 US US13/399,249 patent/US8515895B2/en active Active
- 2012-12-21 US US13/724,942 patent/US8830053B2/en active Active
-
2013
- 2013-08-19 US US13/970,514 patent/US20140058990A1/en not_active Abandoned
-
2014
- 2014-09-08 US US14/480,362 patent/US20160019384A1/en not_active Abandoned
-
2016
- 2016-09-14 US US15/265,551 patent/US20170004407A1/en not_active Abandoned
- 2016-10-06 US US15/287,464 patent/US10504349B2/en active Active
-
2019
- 2019-12-06 US US16/706,445 patent/US20200118405A1/en not_active Abandoned
-
2020
- 2020-05-14 US US16/874,493 patent/US20200273304A1/en not_active Abandoned
-
2021
- 2021-09-10 US US17/447,389 patent/US20220237997A1/en not_active Abandoned
-
2023
- 2023-01-05 US US18/150,495 patent/US20230401945A1/en not_active Abandoned
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230163957A1 (en) * | 2018-09-28 | 2023-05-25 | Benjamin Allan Mord | Information integrity in blockchain and related technologies |
DE102020211761A1 (en) | 2020-09-21 | 2022-05-19 | Siemens Aktiengesellschaft | Measurement monitor display |
US11646896B1 (en) | 2021-04-15 | 2023-05-09 | National Technology & Engineering Solutions Of Sandia, Llc | Systems and methods for verification and authentication of remote sensing imagery |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220237997A1 (en) | Trusted monitoring system and method | |
US8154397B2 (en) | Locking mechanism, systems and methods for cargo container transport security | |
US20180293538A1 (en) | Maintaining information facilitating deterministic network routing | |
RU2516706C2 (en) | Tracker monitoring system, method of monitoring and securing mobile objects and devices for monitoring location of object | |
US7755479B2 (en) | Global intelligent remote detection system | |
US7019640B2 (en) | Sensor suite and communication system for cargo monitoring and identification | |
EP1535254B1 (en) | Smart and secure container | |
US6879257B2 (en) | State surveillance system and method for an object and the adjacent space, and a surveillance system for freight containers | |
US7936266B2 (en) | Shipping container seal monitoring device, system and method | |
US8392296B2 (en) | Active container management system | |
US20040178880A1 (en) | Secure cargo transport system | |
US20080073422A1 (en) | Method and system for tracking and managing cargo containers | |
TW200417848A (en) | Method and system for monitoring containers to maintain the security thereof | |
US20030160695A1 (en) | Identification and surveillance systems for freight container, and method for the same | |
Dinesh et al. | IADA intelligent cargo system with integrated fingerprint module and GPS modules |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: 1997 IRREVOCABLE TRUST FOR GREGORY P. BENSON, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALOMAR TECHNOLOGY, LLC;REEL/FRAME:052277/0136 Effective date: 20151229 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |