CROSS REFERENCE TO RELATED APPLICATIONThis application claims priority to U.S. Utility Application entitled “Monitoring and Tracking of Assets by Utilizing Wireless Communications,” assigned application Ser. No. 10/324,422, filed Dec. 20, 2002, which also claims priority to copending U.S. Provisional Application entitled “Implementation of a Low Power Pallet Network for the Tracking of Goods in a Supply Chain,” assigned Application No. 60/349,533, filed Jan. 18, 2002, U.S. Provisional Application entitled “Implementation of a Low Power Pallet Network for the Tracking of Goods in a Supply Chain,” assigned Application No. 60/378,731, filed May 8, 2002, and U.S. Provisional Application entitled “System for an Integrated Sensor RF Identification (ISRFID) with Scalable Location Capabilities and Error Correction,” assigned Application No. 60/350,601, filed Jan. 22, 2002 which are all entirely incorporated herein by reference.[0001]
FIELD OF THE INVENTIONThe present invention relates to systems, devices, methods, and programs for monitoring and tracking assets by utilizing wireless communications.[0002]
DESCRIPTION OF THE RELATED ARTThe supply chain management industry, like most industries, has seen great advances due in large part to the technology boom resulting from the Internet. Today, goods can be tracked with moderate success from source to destination. For example, package delivery companies, such as Federal Express® (FedEx®) and United Parcel Service® (UPS®), provide a package shipping feature in which a user, typically the sender or receiver, can track the current location in the supply chain of a shipped package. Both FedEx® and UPS® command a market premium due in part to this value-added service.[0003]
Package delivery companies focus mainly on small items, such as envelopes and small packages. There is a need in the shipping industry for similar tracking systems for high-value assets, such as International Standards Organization (ISO) cargo containers, automobiles, and ammunitions. These goods often travel long distances across different shipping mediums, such as ships, trains, and trucks. At each hand-off, from for example, ship to truck, the presence of assets may be recorded. In this manner, each asset's location can be reasonably tracked across the supply chain. Unfortunately, however, most of the systems in place today are pieced together to form a tracking system across the entire supply chain. These hybrid systems are prone to lose asset visibility when assets move from one form of asset tracking to another. For example, the inventory system at a shipyard is often different from the inventory system at a warehouse. Each inventory system may utilize different technology, and so may require different means of identifying each asset, adding cost and increasing the chance for lost visibility.[0004]
Tracking the assets in a temporary storage location, such as a warehouse or shipyard, is another aspect of the supply chain. Assets arrive and depart from warehouses continuously, and so tracking the location of the assets within the warehouse is difficult. Two general families of wireless technology exist for monitoring assets in a warehouse. Both families utilize radio frequency (RF) wireless identification (ID) tags.[0005]
The first of such technologies utilizes passive RF ID tags. The tags are often coupled to the shipping pallets that hold the assets to be monitored. The monitoring is performed by a gateway which is a restricted space that contains strong electric or magnetic fields. The field energizes and queries the passive RF ID tags as the tags pass through the gateway. Computers at the gateway can thus monitor the goods entering and leaving the warehouse, or sections thereof. The strength of gateway systems is that the tags are relatively cheap, in large part because they are passive (requiring no batteries). For similar reasons, the tags last for an indefinite period of time. One drawback to these systems is that they require the goods to be passed through designated gateway areas, typically causing great inconvenience. Another drawback is that it is not possible to track the location of the goods within the warehouse. Further, a gateway system must be set up at each warehouse, train depot, shipyard, etc.[0006]
The second family of technologies utilizes triangulation systems appropriately set up within the warehouse. The triangulation system typically requires multiple antennas to be positioned in the warehouse. The system utilizes the antennas to periodically interrogate active RF ID tags on the assets. When the tag responds to the interrogation, the multiple antennas can triangulate the location of the tag. The tags typically require a battery to power a transceiver. The transceiver typically requires considerable power, so as to transmit a fairly strong signal because the antennas are typically positioned relatively far away. The strength of the triangulation system is that assets can be located within the warehouse on demand and with sufficient accuracy. One drawback is that the battery life of the tags is shortened because of the required strong transmit signal. Another drawback is that the antenna network is typically inflexible and so provides limited coverage within a warehouse. Further, simple configurations of a triangulation system can cost well over $100,000 for the antenna arrays alone. Similar to the gateway system, a triangulation system must be set up at each warehouse, train depot, shipyard, etc.[0007]
Based on the foregoing, it should be appreciated that there remains a need for improved systems and methods that address the aforementioned and/or other shortcomings of the prior art. For example, there remains a need for a relatively low-cost asset monitoring system that can be implemented across an entire supply chain and require little maintenance. Accordingly, it would be beneficial if such high-value assets could be monitored across the supply chain with greater accuracy without adding substantial cost.[0008]
SUMMARY OF THE INVENTIONSystems, devices, methods, and programs disclosed herein provide a solution for monitoring and tracking assets by utilizing wireless communications. In particular, the solution provides for in-transit visibility of the existence, location, and conditions of the assets throughout a supply chain. Furthermore, the solution requires minimal new infrastructure and can be integrated with many existing supply chain infrastructures.[0009]
Accordingly, one embodiment of a system for monitoring assets includes a remote monitoring station (RMS) and a network of identification (ID) tags. Each ID tag is coupled to an asset and is configured to wirelessly communicate with other ID tags in the network within a predetermined proximity. Each tag is also configured to relay communications from other ID tags so that a communication path is established between the RMS and any ID tag in the network, either directly or via other ID tags.[0010]
Another embodiment of the present invention may be construed as a wireless ID tag coupled to an asset to be tracked, wherein the wireless ID tag is one of a network of ID tags configured to communicate with an RMS. The wireless ID tag includes a portable power supply and a transceiver configured to wirelessly communicate with other ID tags within a predetermined proximity. The determined proximity is a function of the power supplied by the portable power supply. The wireless ID tag also includes memory configured to store information about the asset upon which the ID tag is coupled. The memory is further configured to store logic for various algorithms. The wireless ID tag also includes a processor for executing the logic for the various algorithms stored in memory. One of the various algorithms comprises relaying communications from other ID tags such that a communication path is established between the RMS and any ID tag in the network, either directly or via other ID tags.[0011]
Still another embodiment may be construed as a system for monitoring assets across a supply chain. The system includes a plurality of wireless radio frequency (RF) ID tags each coupled to an asset to be monitored. Each wireless RF ID tag includes means for communicating with other wireless RF ID tags within a predetermined proximity such that a plurality of networks of wireless RF ID tags are formed across the supply chain. Each network comprises those wireless RF ID tags within proximity of each other. The system also includes a plurality of RMSs positioned across the supply chain, wherein each RMS includes means for communicating with any network of the plurality of networks that is within proximity of the RMS. The system also includes a central monitoring station (CMS) that includes means for communicating with the plurality of RMSs.[0012]
Yet another embodiment of the present invention may be construed as a method of monitoring assets across a supply chain, whereby each asset has an ID tag coupled thereto. The method includes: forming a network of ID tags such that existence in the network conveys the existence and location of the corresponding assets in the supply chain; and polling the network of ID tags to monitor the environmental conditions surrounding the corresponding assets.[0013]
Finally, another embodiment of the present invention may be construed as a computer readable medium having a program for monitoring assets across a supply chain, whereby each asset has an ID tag coupled thereto. The program includes logic configured to form a network of ID tags such that existence in the network conveys the existence and location of the corresponding assets in the supply chain. The program also includes logic configured to poll the network of ID tags to monitor the environmental conditions surrounding the corresponding assets.[0014]
Clearly, some embodiments of the invention may address shortcomings of the prior art in addition to, or in lieu of, those described here. Additionally, other systems, methods, features, and advantages of the present invention will be or become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.[0015]
BRIEF DESCRIPTION OF THE DRAWINGSMany aspects of the invention can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present invention. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.[0016]
FIG. 1 is a schematic representation of a supply chain for shipping goods from source to destination.[0017]
FIG. 2 is a schematic representation of several embodiments of an asset monitoring system implemented in the storage facility of FIG. 1.[0018]
FIG. 3 is a schematic representation of an embodiment of an asset monitoring system implemented in the shipping container of FIG. 1.[0019]
FIG. 4 is a schematic representation of an embodiment of the asset monitoring system implemented in the shipping vessel of FIG. 1.[0020]
FIG. 5 is a schematic representation of the various asset monitoring systems of FIGS. 2-4 networked together to form one system servicing an entire supply chain.[0021]
FIG. 6 is a block diagram illustrating an embodiment of a wireless RF ID tag in accordance with embodiments of the present invention.[0022]
FIG. 7 is a schematic representation of a data frame as used for communicating between a Remote Monitoring Station (RMS) and the wireless RF ID tag of FIG. 6.[0023]
FIG. 8 is a flowchart illustrating a method of operation of an RMS in accordance with embodiments of the present invention.[0024]
FIG. 9 is a flowchart illustrating in more detail the step of forming a network of wireless RF ID tags of the method of FIG. 8.[0025]
FIG. 10 is a flowchart illustrating in more detail the step of polling a network of wireless RF ID tags of the method of FIG. 8.[0026]
FIG. 11 is a flowchart illustrating a method of operation for a wireless RF ID tag within a network of wireless RF ID tags in accordance with embodiments of the present invention.[0027]
DETAILED DESCRIPTIONAs will be described in greater detail herein, systems, devices, methods devices, and programs of the present invention facilitate the monitoring of the location and condition of assets. In particular, the present invention provides for a low-cost solution that can locate an asset across a supply-chain, including within a storage facility, and can also monitor the environmental conditions, such as temperature and air pressure, affecting the asset, both while being stored and in transit.[0028]
Referring now in more detail to the drawings, in which like numerals indicate corresponding parts throughout the several views, FIG. 1 is a schematic representation of a[0029]supply chain1 for shipping goods from asource10 to adestination30. For example, thesource10 may be a city, such as Hong Kong, and thedestination30 may be a country, such as the United States. Thesupply chain1 described herein attempts only to show the general components needed in shipping goods from one location to another, as well as showing several examples in which embodiments of the present invention may be found. In reality, a supply chain is often customized to the particular goods shipped, as well as to the parties shipping the goods.
The[0030]source10, may include, among other shipping gateways, anairport12 and a ship port, orshipyard14. Often, overseas shipping for large commercial goods, or assets, is performed viacargo ships25, whereas shipping for small commercial goods, such as mail and small packages, is performed viaairplanes20. As will become clear later, several embodiments of the invention may also be utilized for military purposes. Militaries often ship heavy assets, including ammunitions and personnel, viacargo ships25 as well ascargo airplanes20.
A[0031]destination30 will include areciprocating airport32 andshipyard34 for in-boundvessels20 and25. As is well known, both inbound and outbound transit is conducted at bothairports32 andshipyards34. Great confusion at these locations leads to inefficient shipping, lost assets-in-transit, and reduced security. Embodiments of the present invention may be found insource airport12,source shipyard14,destination airport32 anddestination shipyard34 to help reduce the confusion by, among other things, tracking the locations of the assets-in-transit. Furthermore, embodiments of the present invention may be found on the shipping vessels themselves (i.e.,airplane20 and cargo ship25). Several of these embodiments will be discussed in further detail in subsequent figures.
Once the goods have reached the gateway (i.e.,[0032]airport32 or shipyard34) of thedestination30, more shipping is performed to provide the goods to their final destination. In this example, the final destination is astorage facility70, such as a warehouse. In practice, thesupply chain1 does not end at thestorage facility70, as several more destinations, such as retail or wholesale locations, may exist prior to the goods being received at their ultimate destination, typically a consumer. Quite often,trucks40 ship goods fromairport32 andshipyard34 tostorage facility70. Alternatively,trucks40 may ship goods to atrain depot50, where the goods are placed ontrains60 for further shipping. Embodiments of the invention may be found at astorage facility70, such as a warehouse or factory, as well as atrain depot50. Furthermore, embodiments of the present invention may be found ontrucks40 as well as trains60. Subsequent figures will provide greater detail to these embodiments.
The shipping industry has standardized many aspects of shipping. One such way is by the use of International Standards Organization (ISO)[0033]containers45.ISO containers45 are typically steel containers that may store several pallets of goods, or assets. Thecontainers45 are typically shipped overseas on large shipping vessels, such ascargo ship25. Thecargo ship25 may carry several hundreds of thecontainers45, which are typically stacked on top of each other. At theshipyard34, large cranes are used to remove theISO containers45 from the ships. Thecontainers45 are temporarily stored at theshipyard34 until atruck40 ortrain60 is available. Thecontainers45 can then be placed on thetruck40, or train60, where shipping of thecontainer45 proceeds. The contents of thecontainer45 are often removed once thecontainer45 reaches astorage facility70, such as a warehouse. As will become evident in further figures, embodiments of the invention may be found inside anISO container45 to track its contents. Embodiments of the invention may also be implemented to track the ISO containers, themselves. It should also be noted, that other goods, particularly heavy assets, such as automobiles and tanks, that may be shipped without the use ofISO containers45 can also be tracked by embodiments of the present invention.
It should be noted that the term assets has been utilized to describe several objects that may be shipped. These objects may be for example, but not limited to, goods, such as raw materials, food, automobiles as well as military assets such as ammunitions, tanks, and personnel. In the broadest sense, the term asset may be considered anything that is movable and thus can be shipped.[0034]
FIG. 2 is a schematic representation of several embodiments of an[0035]asset monitoring system100 implemented in thestorage facility70 of FIG. 1. Thestorage facility70 may be a structure such as a warehouse or a factory whereby assets are temporarily held during shipping. Often, the assets are moved in and out of thestorage facility70 at great frequency, causing a need for the relative location of each asset within thefacility70 to be monitored. It is important to note that FIG. 2 provides merely a schematic representation of thefacility70. In reality, thestorage facility70 could contain hundreds or thousands of assets dispersed throughout the facility, and potentially stacked on top of each other. Thesystem100 is designed to facilitate the most complex layouts of thestorage facility70, including three-dimensional location monitoring.
The[0036]asset monitoring system100 generally includes at least a first remote monitoring station (RMS)150. In some embodiments, thesystem100 may include a network of RMSs placed throughout thefacility70 so as to provide maximum coverage. In FIG. 2, twoRMSs150 and155 are coupled together by a local area network (LAN)140, so as to provide support for thesystem100 both inside and immediately outside of thefacility70, perhaps on a loading dock. In short, eachRMS150 or155 includes a wireless transceiver coupled to a computer, such as a personal computer (PC).
Various assets may be dispersed throughout the[0037]facility70. Coupled to each asset is a wireless radio frequency (RF) identification (ID) tag. FIG. 6 will provide more detail about the wireless RF ID tags, but in brief, each tag is configured to wirelessly communicate with other tags and any RMSs within a determined proximity. The power consumed by each tag is a direct function of the range of the tag, so the range of each tag will be determined so as to provide for power efficiency. Because of the limited range of the tags, communication betweenRMS150 and a destination tag110, may be relayed via intermediate tags such astags120 and130. Accordingly, each tag can communicate with theRMS150, either directly or indirectly, thus creating a network of wireless RF ID tags. For example, a wireless RF ID tag may be capable of communicating within a 50 ft radius. TheRMS150 may be located well over 50 ft away from this tag. In this case, several intermediate tags may be necessary to relay the communications between theRMS150 and the tag. The present invention can provide for the shortest path between any tag and theRMS150.
As mentioned, each[0038]tag110,120, and130 is coupled to an asset. In conventional supply-chain systems, assets are shipped on pallets, either wooden or steel, whereby a forklift is generally used to move the pallets throughout thefacility70. In general, a wireless RF ID tag may be coupled to the pallet holding the assets. In this manner, the trackable pallet can be re-used.
In other embodiments, a dummy wireless[0039]RF ID tag135 may be used to relay communications between remote assets and theRMS150. The dummy wirelessRF ID tag135 is essentially the same as the wireless RF ID tags, except that it is not coupled to a mobile asset. The dummy wirelessRF ID tag135 may be positioned throughout thefacility70, so as to provide better coverage when assets are spread sparingly throughout thefacility70.
The[0040]asset monitoring system100 provides for the communication between any wireless RF ID tag among a network of tags and theRMS150. In FIG. 2, the destination tag110 is located far enough away from theRMS150 that intermediate tags are required to relay any communication. Thesystem100 facilitates communication from the tag110 to theRMS150 only after theRMS150 has requested a communication. In this regard, the RF ID tags act as slaves to theRMS150, the master. TheRMS150 can transmit a downstream communication to the destination tag110 (coupled to an asset). In the example illustrated in FIG. 2, the downstream communication is relayed from a first intermediate tag130 (coupled to an asset) to a second intermediate tag120 (coupled to an asset) to the destination tag110. The downstream communication, although containing the same payload, can be broken up into segments. The firstdownstream segment101 is fromRMS150 to the firstintermediate tag130. The firstintermediate tag130 interprets the firstdownstream segment101 and relays it along to the secondintermediate tag120 via a second downstream segment103. The secondintermediate tag120 does the same and relays the communication along to the destination tag110 via a third downstream segment105. The destination tag110 can process the downstream communication and reply with an upstream communication to theRMS150. A first upstream segment102 is received by the secondintermediate tag120 and relayed along to the firstintermediate tag130 via secondupstream segment104. A thirdupstream segment106 is communicated to theRMS150 from the firstintermediate tag130. Once the network has been formed, the path in which a communication may travel can be determined by theRMS150. Otherwise, the path in which a communication may travel may not be precisely known by theRMS150, but the path will be communicated to theRMS150. As will be discussed in further detail in relation to FIG. 7, the path of intermediate tags may be fixed for each destination tag110 and communicated along with the information from theRMS150 to the destination tag110. Alternatively, a broadcast signal may be communicated from theRMS150, or any intermediate tag, such that any tag within the range of the broadcast can receive and retransmit the signal, if necessary.
Periodically, the[0041]RMS150 may reform the network of tags. The method in which theRMS150 can accomplish this is described in further detail in FIG. 8. In short, theRMS150 sends out repetitive broadcast signals and waits for replies to come back. Once all of the replies are from tags already having replied, theRMS150 is aware of the tags in the surrounding network. Furthermore, theRMS150 is aware of the relative location of each tag to each other tag because a trail of intermediate tags is recorded for each upstream communication segment. With this information, theRMS150 has the ability to calculate the shortest path of intermediate tags for each destination tag. As can be seen, some tags closest to theRMS150 would receive and transmit as intermediate tags more often than others, leading to battery overuse for some of the tags. TheRMS150 can alter the shortest path algorithm for each destination tag so that power use is spread evenly across intermediate tags.
By periodically reforming the network, the[0042]RMS150 can monitor which tags have entered the network and which tags have left the network. Furthermore, theRMS150 can monitor the relative position of the tags as they may move between reforms of the network. The periodicity of reforming the network may vary according to the asset traffic within thefacility70. For example, for afacility70 that handles little asset traffic, the network may be reformed once a day. In this regard, if an asset were to arrive and depart before a reform of the network, the asset would not be detected. As another example, the network may be reformed periodically, for example, every fifteen minutes. Accordingly any asset that arrives and departs more than fifteen minutes later will be detected.
The size of the network of tags is limited only by the number and spacing of the tags in the network. Provided there are enough intermediate tags to relay the signals, there is no maximum distance a destination tag must be from the[0043]RMS150. Furthermore, by utilizing more than oneRMS150, the network can be extended beyond the reach of the most remote tags in the network. For example, FIG. 2 illustrates two RMSs150 and155.RMS155 may be used to monitor outside of thefacility70, which may be too far away from the nearest tag inside thefacility70. By networking theRMSs150 and155, any asset that exists in or around thefacility70 may be monitored. Furthermore, the movement of assets from inside to outside, or vice versa, can be monitored.
FIG. 2 also illustrates a[0044]secondary communication path125 fromRMS150 to destination tag110. TheRMS150 is capable of determining an alternative path for communicating with the destination tag110 if needed. This may occur as a result of an intermediate tag being moved or running out of power. However, as will become evident, thesystem100 is configured so that the tags utilize minimum power during operation. Extended battery life for each tag is a main advantage of thesystem100, so the prospect of a tag running out of power, although inevitable, is not expected to happen often.
Up until this point, only the relative position of each tag in the network could be calculated. However, an absolute location can also be established for each asset and can be stored in the tag. As mentioned earlier, forklifts are often used to move the assets in, out, and around the[0045]facility70. Once placed at a location, the tag coupled to the particular asset can be programmed with the location. This may be done in a number of ways. One way is to track the location of the forklift that is moving the asset, for instance with an inertial navigation system (INS). Once the asset is placed, the location of the forklift established by the INS, as well as the position of the forklift tines (for height dimension), may be communicated to the tag of the asset. The coordinates (i.e., Cartesian, polar, or spherical) of the location can then be programmed into the memory of the tag. Alternatively, a handheld device, such as a personal desktop assistant, with a positioning system could be used to communicate the location of an asset to the asset. Other equivalent methods could be utilized as well to communicate the information to the asset. Once programmed, the asset may convey such information on the next successive communication with theRMS150. In this manner, the location of tags in proximity to a tag with a known location can be also found. For example, if a tag with an unknown location can communicate directly with a tag with a known location, then the tag with the unknown location must be within range of the other tag. Using various techniques, the approximate location of the unknown tag can be more precisely found. For example, by finding another tag with a known location that the tag with the unknown location can communicate with can further approximate the location by using various geometry techniques. Obviously, the more tags with a known location, the more accurate the approximate location of the tags with an unknown location. In practice, it would seem likely that either all of the locations are known, or none of the locations are known. In the latter case, only the existence of the asset and the relative distance from theRMS150 would be known.
As will be better illustrated in FIG. 6, various sensors may be coupled to each asset and may connect to the tag also coupled to the asset. In this manner, various environmental parameters may be monitored and communicated to the[0046]RMS150. For example, temperature, air pressure, vibrations, humidity, and electromagnetic radiation, including ionizing radiation (i.e., alpha and gamma rays), can be sensed. The same general communication protocol can be used to communicate such information betweenRMS150 and destination tag110, via intermediate tags.
As will become clear in FIGS. 3 and 4 the same assets that are stored in the[0047]storage facility70 are often shipped overseas. Theasset monitoring system100 can be implemented in various environments where environmental conditions must be considered. Accordingly, these conditions can be monitored throughout the transport of the goods.
The first of such implementations, where environmental conditions may be a factor, is illustrated in FIG. 3, which is a schematic representation of an embodiment of the[0048]asset monitoring system200 implemented in theISO shipping container45 of FIG. 1. In this implementation, the location of the assets within theISO shipping container45 is obviously not much of a concern, although the location of theISO shipping container45 is important. In actuality there are various systems already implemented that provide for such tracking. For example, Qualcomm® Corporation has a system known as OmniTRACS®, which is a two-way satellite communication system that allows trucks to be monitored and tracked and to allow data communication with dispatchers. Other systems, such as Aether System's MobileMax™, Axiom Navigation's Asset Tracking, and Preco's Advanced Asset Management exist that provide essentially the same service. However, none of these systems provide the in-transit visibility of theasset monitoring system200. Thesystem200 can effectively monitor the environmental conditions of the assets within thecontainer45. This information can then be communicated via satellite to a central monitoring station (CMS). Alternatively, a resident system, such as OmniTRACS® may be used to communicate such information from the container to a central location, via satellite, or other communication link.
The[0049]system200 generally includes the same components as thesystem100 of FIG. 2. Acontainer communication unit250 may include similar means as theRMS150 of FIG. 2 for communicating with a network of wireless RF ID tags. Thecontainer45 includes, in its storage, assets often stacked on top of each other. Each asset in thecontainer45 may have coupled to it a wireless RF ID tag that includes various sensors. Collectively, the wireless RF ID tags within thecontainer45 make up a network of tags, where each tag can communicate with thecontainer communication unit250, either directly or indirectly, via intermediate tags, in the same manner as illustrated in FIG. 2. For example,destination tag210 may be coupled to an asset which requires several intermediate tags, such asintermediate tag230 to communicate with thecontainer communication unit250. A downstream communication signal from thecontainer communication unit250 may be relayed to thedestination tag210 in segments. Similarly, an upstream communication signal may be relayed from thedestination tag210 tocontainer communication unit250. In practice, fewer intermediate tags (i.e., tag230) would be required in this implementation, because of the close proximity of the tags to thecontainer communication unit250.
The[0050]system200 may perform an initial forming of the network of tags at the start of transit, and may periodically reform the network during transit to check for lost or stolen goods. In practice, the periodicity of the reforming of the network would be greatly decreased in this implementation, for obvious reasons. However, the environmental conditions may be periodically monitored more often in this implementation. For example, each tag in the network may be polled to see if any preprogrammed sensor thresholds have been exceeded since the last poll. This information can be communicated back to thecontainer communication unit250 from each tag in the network. This will be discussed in more detail in relation to FIG. 9. Practical examples of environmental conditions that may be monitored in this implementation, are vibrations and temperature. Vibration sensitive assets, such as ammunitions for the military, may be equipped to sustain a maximum amount of vibrations during transit. Thesystem200 can monitor for vibrations during transit, and if the measured vibrations are near the threshold, appropriate actions can be taken. Perhaps a more practical use is to monitor temperature. Various goods, such as food and pharmaceuticals, are sensitive to temperature. By utilizing thesystem200, a recipient of the goods will know the temperature environments in which the goods were shipped, which can help in establishing the quality of the goods shipped.
The[0051]container communication unit250 can be configured to relay the information received to a central monitoring station (CMS) (not shown). This may be performed in a number of ways. The first is by communicating with asatellite270 via asatellite link252 directly from thecontainer communication unit250, whereby thecontainer communication unit250 would include an appropriate transceiver communicate with the CMS via thesatellite270. An alternative method is to communicate with anintermediate transceiver unit260, which may be mounted to thetruck40 hauling thecontainer45. In this case, thecontainer communication unit250 may have the means for communicating with the wireless RF ID tags, but not with thesatellite270. A wired orwireless link262 may be provided to communicate between thetransceiver unit260 and thecontainer communication unit250. Other equivalents in the art, such as cellular communication, could also be utilized, and should be included herein. It is important to note that thecommunication links252 or264, either from thecontainer communication unit250 or thetransceiver unit260 may be provided by a third party such as the services discussed above. In this manner, thesystem200 can be implemented into an existing structure with little cost.
It should also be noted that the assets, as discussed earlier, are typically shipped on pallets, and the tags would be coupled thereto. The same pallets, and thus the same tags, can be used in the implementation as illustrated in FIG. 2 and FIG. 3. As will become clearer upon discussion of the implementation of FIG. 4, the asset monitoring system provides a modular solution that can be implemented across the entire supply chain.[0052]
FIG. 4 is a schematic representation of another embodiment of the[0053]asset monitoring system300 as implemented in theshipping vessel25 of FIG. 1. This implementation is similar to that of FIG. 3 in that it can provide for in-transit visibility of the environmental conditions of the assets being shipped. FIG. 4 also shows an implementation in which the container communication units, such asunit250 of FIG. 3, serve as intermediate tags in a network of wireless RF ID tags. Thesystem300 includes ashipping communication unit350 which includes the equivalent means as theRMS150 of FIG. 2 for communicating with a network of wireless RF ID tags. The network, however, includes the tags coupled to the assets within eachcargo container45, but also the container communication units, which now function as intermediate tags. For example, theshipping communication unit350 can communicate with an asset located withincargo container46 via various intermediate tags, which includes thecontainer communication unit310 of thedestination cargo container46, as well ascontainer communication unit330. Accordingly, theshipping communication unit350 may communicate with the CMS (not shown) viasatellite370. The shipping communicateunit350 includes the necessary resources (i.e., a satellite transceiver) to communicate with thesatellite370 vialink352. This service may be provided by a third party service such as Qualcomm's® OmniTRACS®.
In an alternative manner, as also illustrated in FIG. 3, each container communication unit (i.e.,[0054]310) may be configured to communicate directly with thesatellite370 vialink372. The environmental conditions within thecontainer46 could still be communicated to the CMS in this fashion.
FIG. 5 is a schematic representation of the various asset monitoring systems networked together to form one[0055]system170 servicing an entire supply chain. Thesystem170 generally includes a central monitoring station (CMS)160 coupled to acommunication network161. Also coupled to thenetwork161 are the various RMSs150 and155 from theasset monitoring system100 configured in the storage facility70 (See FIG. 2). Thecontainer communication unit250 of theasset monitoring system200 configured in a cargo container (See FIG. 3) as well as theshipping communication unit350 of theasset monitoring system300 configured on theshipping vessel25 are coupled to thenetwork161. Collectively these two units will be referred to as communication units. With this configuration, theCMS160 can monitor the activity and conditions of the various assets across the supply chain.
Although only a handful of implementations have been illustrated, such as in the[0056]storage facility70, thecargo container45, and theshipping vessel25, those skilled in the art will appreciate the various other implementations that could be utilized. An asset monitoring system could be implemented in many facilities equivalent to thestorage facility70, such as theshipyard34,airport32, and train depot50 (See FIG. 1). Likewise, an asset monitoring system, could be configured on anairplane20 as well as atrain60. All of these applications, as well as other equivalents, could easily be implemented and connected to thenetwork161 such that theCMS160 could monitor them as well.
The[0057]CMS160, as its name implies, is the central location for access to the remote units (ie.,RMS150,155,container communication unit250, and shipping communication unit350). TheCMS160 may be configured to communicate in both directions, so that a user at theCMS160 could not only monitor the information being received by theCMS160, but could also send a command to, for example,RMS155 to search for a particular asset, or, as another example, to test the environmental conditions of an asset communicating with theshipping communication unit350. TheCMS160 may comprise a computer (not shown) with a network interface for communicating with thenetwork161. Furthermore, theCMS160 may also include a transceiver for receiving satellite communications from thecontainer communication unit250 and theshipping communication unit350. The necessary software and firmware to communicate with the remote units, as well as monitor the assets across the supply chain, may be resident on the computer of theCMS160.
The[0058]network161 may be any type of communication network in which various computing devices can communicate. For example, but not limited to, thenetwork161 could be a Local Area Network (LAN) and/or a Wide Area Network (WAN) and could utilize the Internet. Thenetwork161 could be comprised of various hardware components such as routers and bridges (not shown) to facilitate the communication between the various interconnected devices. As illustrated in FIG. 2, the communication betweenRMS150 and155 may be accomplished through a LAN, whereas the communication between theRMS150 and theCMS160 may require a WAN and the Internet.
[0059]RMS150 includes a computer, such asPC151, coupled to awireless transceiver152. Thewireless transceiver152 may be coupled to anantenna153 for communicating with the network wireless RF ID tags (See FIG. 2). Thewireless transceiver152 may be external fromPC151 or may be configured internally.
The[0060]PC151 may include a network interface (not shown) for communicating with theCMS160 and theRMS155 via the network161 (either LAN or WAN). ThePC151 also includes, although not shown for clarity, a processor for processing various functions stored in memory, also found in thePC151. The memory may store firmware and software for the various algorithms needed to monitor the network of wireless RF ID tags. These algorithms include those to be described in FIGS. 8, 9, and10. Furthermore, the memory may include a program for determining the shortest path for each tag in the network, as discussed earlier.RMS155 includes aPC156 and awireless transceiver157, and generally includes similar hardware and software asRMS150.
The[0061]container communication unit250, as briefly discussed in FIG. 3, includes similar components as to theRMS150 for communicating with the network of wireless RF ID tags. Likewise, thecontainer communication unit250 may also include similar software and firmware to perform various algorithms for monitoring the assets. Thecontainer communication unit250 may not necessarily utilize a PC, but instead may utilize a general computer, without any user interface. TheCMS160 may be configured to provide a user interface, remotely, for thecontainer communication unit250. Theunit250 may also include the necessary transceiver to communicate with theCMS160 via thesatellite270, or some other communication scheme. Thecommunication link162 may include a satellite uplink, and a satellite downlink to theCMS160, which may pass through an intermediate gateway, or server. Thesatellite270 can provide a two-way communication, such that theCMS160 can remotely control thecontainer communication unit250. Other forms of thecommunication link162 may be via a cellular connection to a switched-circuit telephone service, or perhaps through a radio transmission, such as microwave.
The[0062]ship communication unit350 can communicate with theCMS160 viacommunication link163 in much the same manner as thecontainer communication unit250. Theship communication unit350 also includes the necessary resources to communicate with a network of wireless RF ID tags.
The remote units, such as the[0063]ship communication unit350 may be configured to communicate directly withRMS150 and155, but in practice, this would be done indirectly through theCMS160.
FIG. 6 is a block diagram illustrating an embodiment of a wireless[0064]RF ID tag400 in accordance with embodiments of the present invention. The wirelessRF ID tag400, as discussed earlier, is coupled to an asset that is to be tracked and monitored. The asset, may be anything in which knowledge of its location and/or environmental surroundings is important, particularly while being shipped. Most of the assets, accordingly, will be of significant value, either monetarily or for security reasons. Examples include: automobiles, ammunitions, and tanks. Further, many assets (e.g., consumer goods) are shipped on pallets. Thetag400 may be coupled to the pallets, which can be re-used many times for different shipments.
Generally, the[0065]tag400 includes aprocessing device420,memory410, atransceiver450, and an input/output interface440 all coupled via alocal interface460. Although illustrated as external and exclusive components, a variety ofsensors442,444,446, and448 may be configured with thetag400, and may be considered as components of thetag400. Thetag400 may also include a user interface (not shown) for providing interaction from a user. The user interface may include several buttons and switches and a display screen for interacting with a user.
The[0066]local interface460 can be, for example, but not limited to, one or more buses or other wired or wireless connections, as is known in the art. Thelocal interface460 may have additional elements, which are omitted for simplicity, such as controllers, buffers (caches), drivers, repeaters, and receivers, to enable communications. Further, thelocal interface460 may include address, control, and/or data connections to enable appropriate communications among the aforementioned components.
The components of the[0067]tag400 are powered by aportable power supply430. Theportable power supply430, most likely would be a battery providing extended life. Since the purpose of the system is to track assets in transit, the system itself must meet regulatory requirements for shipping, specifically the system must meet Department of Transportation regulations and international air cargo regulations. Accordingly, theportable power supply430 must be of a size and construction that does not become hazardous. The design of thetag400 is such that it may be powered by a lithium battery for over two years using a total quantity of lithium less than10 grams. Many container storage areas are subject to extremes of heat and cold, therefore theportable power supply430 and tag400 combination may be designed to operate from −40 C. to 70 C., without generating hazardous waste or noxious/corrosive gases. The design of the hardware, protocols, and algorithms is geared toward meeting these objectives. The power supplied by theportable power supply430 directly affects the transmission and reception range of thetransceiver450 and can be controllably adapted to the environment in which the asset is located. For example, assets inside acargo container45 are typically placed closer together and so the distance for a wireless communication to travel is reduced, thus allowing for the reduction in the power supplied by theportable power supply430. In this manner, power can be conserved.
The[0068]processor420 is a hardware device for executing software or firmware, particularly that stored inmemory410. Theprocessor460 can be any custom made or commercially available processor, a central processing unit (CPU), an auxiliary processor among several processors associated with thetag400, a semiconductor based microprocessor (in the form of a microchip or chip set), a macroprocessor, or generally any device for executing software instructions.
The[0069]memory410 can include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, etc.)) and nonvolatile memory elements (e.g., ROM, hard drive, tape, NVRAM, CDROM, etc.). Moreover, thememory410 may incorporate electronic, magnetic, optical, and/or other types of storage media. Note that thememory410 can have a distributed architecture, where various components are situated remote from one another, but can be accessed by theprocessor420.
The[0070]transceiver450 is configured to facilitate the communication of signals to and from thetag460. A variety of wireless protocols may be implemented in thetag460, one of which is a frame based protocol to be discussed in further detail in FIG. 7. Thememory410 includes the necessary resources (e.g., firmware and software) to modulate and demodulate the data for the particular protocol, but thetransceiver450 includes the necessary hardware resources to communicate the information. Such hardware resources may include the necessary circuitry to amplify the downstream and upstream signals, such as gain amplifiers. A variable strength line driver amplifier may be included in thetransceiver450 for controlling the level of output power on the transmitted signal. The strength of the transmitted signal is a direct function of the power supplied by theportable power supply430. Filters for reducing noise may also be included in thetransceiver450 as well. Thetransceiver450 may be coupled to anantenna452, used for transmitting and receiving the electromagnetic radiation. Preferably, the wireless communications would be performed in the radio frequency band and more preferably around 900 MHz. Thetransceiver450 could easily be configured for other frequencies, however, such as 830 MHz (Europe) or 2.4 GHz.
The input/[0071]output interface440 provides an interface for the variety ofsensors442,444,446, and448. As discussed earlier, thesensors442,444,446, and448 can be used to monitor the environmental conditions surrounding the asset, and thus thetag400. For example, afirst sensor442 may be configured to measure the air pressure surrounding the asset. This may be particularly useful for implementing the asset monitoring system in thecargo airplane20 of FIG. 1, or perhaps at a high altitude location. Asecond sensor444 may be configured to measure the air temperature surrounding the asset. As discussed earlier, this is particularly useful for implementing the asset monitoring system on ashipping vessel25, where extreme temperature conditions are a factor. Athird sensor446 may be configured to measure the electromagnetic radiation surrounding the asset, including the total radiation being emitted from the network of wireless RF ID tags. Assets, such as ammunitions and missiles are vulnerable to high levels of electromagnetic radiation. By monitoring the radiation emitted by the network, one can be sure that the radiation level in critical areas, such as around ammunitions, is not exceeded. Afourth sensor448 may be configured to measure vibrations experienced by the asset. Again, assets, such as ammunitions and missiles are vulnerable to high levels of vibrations. Other sensors may be configured with thetag400 to measure a wide variety of other environmental conditions, such as humidity and solar exposure.
The[0072]sensors442,444,446, and448 may be integrated with thetag400 or, as shown in FIG. 6, may be exclusive to thetag400 and connected to thetag400 via the input/output interface440. Power from theportable power supply430 may be supplied to thesensors442,444,446, and448 via the input/output interface440.
The[0073]memory410, as mentioned, includes a variety of memory elements, such as volatile and non-volatile memory, for storing data. Software and firmware may also be stored in thememory410 that is configured to provide various functions to thetag410. It will be appreciated, however, that a key aspect of the invention is the simplicity incorporated into thetag400, thus keeping thememory410 to a minimum.
The[0074]memory410 generally comprises a storage location for a unique identifier, such as aserial number418 designated for eachtag400 upon its creation. The uniqueserial number418 is used during wireless communications to identify thetag400. The contents of the asset may also be linked to the uniqueserial number418, however this information will not be conveyed wirelessly. An RMS, or the CMS, upon reception of the uniqueserial number418, may correlate the contents of the asset with the uniqueserial number418. In this manner, relevant information, which can be intercepted by eavesdroppers, is not communicated wirelessly. The uniqueserial number418 may be stored in a simple register and may be re-programmed at a later time.
Also included in the[0075]memory410 is storage for the coordinate location414 of the asset. This information, as discussed earlier, may be in the Cartesian coordinate system, perhaps a polar or spherical coordinate system, or a proprietary coordinate system. The coordinate location414 may be programmed via communication from the RMS, from a wireless communication via a hand-held device, such as a PDA, from an inertial navigation system onboard a forklift, or some other equivalent means. If thetag400 is so equipped, the coordinate location414 may be programmed via a user interface, such as the one briefly discussed above. The coordinate location414, can be re-programmed and several previous locations can remain stored for a chosen period of time.
Various sensor parameters are stored in the[0076]memory410 along with recorded sensor data in thesensor information section412. Thesensor information section412 may include variable parameters stored in non-volatile memory to help operate thesensors442,444,446, and448. Such variable parameters may include the time between two successive sensor readings and threshold limits. For example, the time between successive readings may be on the order of 15 minutes or 120 minutes. Threshold limits can be programmed according to the necessary environmental conditions of the asset. For example, a high and low temperature threshold, or a maximum level of electromagnetic radiation. These parameters may be programmed from the RMS or may be programmed in a similar fashion as the coordination location information414.
Also stored in the[0077]sensor information section412 of the memory are previous readings of thesensors442,444,446, and448. For example, thesensor information section412 may be large enough to hold three prior readings for eachsensor442,444,446, or448. Likewise, threshold exceedances for eachsensor442,444,446, or448 may be triggered at any reading and stored in thesensor information section412. Upon a command from the RMS, the data, such as the sensor readings and threshold exceedances can be communicated back to the RMS. Generally, thesensor information section412, the coordinate location414 information, and theserial number418 will be stored in non-volatile memory.
[0078]Several operating algorithms416 through software and firmware are also stored in thememory410. The operatingalgorithms416 may include the algorithms necessary to communicate with the RMS as well as the other wireless RF ID tags in the network. The operatingalgorithms416 may also include the algorithms necessary to operate thesensors442,444,446, and448. Another algorithm potentially included in the operatingalgorithms416 may be for managing the output of theportable power supply430.
The communication algorithms include the resources for modulating and demodulating the wireless communications and preparing and receiving such communications from the[0079]transceiver450 of thetag400. The modulation protocol incorporated into the communication algorithm may vary greatly by the implementation. Routing and linking algorithms may also be stored among the communication algorithms. These algorithms perform the framing of data frames for communication of data between tags, as well as manipulating the frames for proper routing among the network of wireless RF ID tags. Arepresentative data frame500 in accordance with embodiments of the present invention is illustrated in detail in FIG. 7. An error checking scheme such as a Checksum or a cyclic redundancy check (CRC) scheme can also be stored among the communication algorithms. Temporary memory, such as RAM, may be included inmemory410 for temporarily storing data frame information while communicating.
Also included in the operating[0080]algorithms416 are the appropriate processes to be performed in response to a variety of commands from the RMS. Such commands include storing information received from the RMS, retrieving information, such as sensor information, and replying with requested information, as well as simply replying to inform the RMS of the existence of thetag400 in the network. More detail about the various commands will be provided in the discussion relating to FIG. 7.
It should be noted that various software and/or firmware programs have been briefly described herein. It will be appreciated that the various software and/or firmware programs, such as the various communication algorithms and command response algorithms, comprise an ordered listing of executable instructions for implementing logical functions. These programs can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or transmission device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. In the context of this document, a “computer-readable medium” can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the information system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (a non-exhaustive list) of the computer-readable media would include the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc read-only memory (CDROM) (optical). Note that the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.[0081]
FIG. 7 is a schematic representation of a[0082]data frame500 as used for communicating between an RMS and a wireless RF ID tag. Thedata frame500 consists of several fields each containing pertinent information. In the preferred embodiment, the length of thedata frame500 is not fixed, but would have some nominal maximum length in accordance with the size of thememory410 of the wirelessRF ID tag400. The data may be made up of several 8 bit characters, and preferably, but not necessarily made up of 8 bit ASCII characters. It should be appreciated that thedata frame500 is one of many ways available to wirelessly communicate information, and although this represents the currently preferred method, certainly other equivalent methods are available, and should be accordingly protected herewith.
The[0083]data frame500 begins with aheader portion510 that merely identifies the start of theframe500. Amessage destination field520 is next in theframe500, followed by amessage source field530. The payload540 including various tokens (i.e.,541,542, and543) is next in theframe500. Following the payload540 is an error-checking field550. A trailer portion560 signifies the end of thedata frame500. Each field of theframe500 may be delimited from each other by white space.
The[0084]header portion510, in this embodiment, is made up of three consecutive carriage return characters (ASCII-0×0D) each of which is composed of 8 bits. Utilizing three consecutive similar characters is helpful when synchronizing the communication. Manchester encoding and decoding may be used to synchronize communication, and three characters is often enough to establish synchronization. Manchester encoding is well known in the art. Other predetermined characters could be utilized in place of a carriage return. Theheader portion510 is used to signify the start of thedata frame500 and to delimit it from preceding frames.
The[0085]message destination field520 identifies the destination tag for a particular communication as well as the necessary intermediate tags by including a string of unique identifiers of the wireless RF ID tags that are to communicate, by relaying, thedata frame500. The unique identifier preferably would be theserial number418 of each tag. The rightmost serial number is the ultimate destination tag for thedata frame500.
Two example strings of[0086]serial numbers521 are522 are provided for illustrations purposes. The first string ofserial numbers521 is “ABC|567|321” which signifies that the tag with serial number “ABC” will first receive thisframe500. Tag ABC knows to relay thisframe500 because its serial number is the leftmost serial number in thestring521. Upon relaying theframe500, tag “ABC” will remove its serial number from themessage destination field520 and place it in themessage source field530. Tag “ABC” will then relay this frame and tag “567” will be the only tag to receive and accept theframe500 just re-broadcast by Tag “ABC”, although other tags within the vicinity may receive it as well. Tag “567” knows to relay theframe500 because now its serial number is the leftmost serial number in thestring521. Any other tags within the range of the broadcasting tag may receive theframe500, but will not relay it because its serial number is not in thestring521. Eventually, the destination tag will receive thedata frame500 and process it. The destination tag will know to process it when it recognizes that its serial number is the rightmost serial number in thestring521 and/or the only serial number in thestring521.
The second string of[0087]serial numbers522 is “D7E|124|*” which signifies that tag “D7E” will next relay the message. The ‘*’ character represents a broadcast address, which means that any tag within the range of the preceding tag (in this example tag “124”) should process theframe500. The broadcast address is often utilized in forming the network and will be described in further detail in FIGS. 8 and 9.
Each tag serial number may be communicated with the binary equivalent of the ASCII character, or hexadecimal representation, of each character of the serial number. So for the example of “D7E,” three octets would be necessary, one for each character in the serial number. Each serial number, in this embodiment, is delimited by the ‘|’ character, although some other character may be used. The ultimate length of any one string of serial numbers in the[0088]message destination field520 may be limited by the temporary memory in the tags. The length of the string of serial numbers also limits the number of intermediate tags in a communication, which limits the overall width of the network of wireless RF ID tags.
In the case of a reply communication from a tag to the RMS, the RMS identifier, or address, may be characterized by the characters ‘RMSx’ where ‘x’ represents a sequence of characters unique to that particular RMS.[0089]
The[0090]message source field530 identifies the source of theframe500, as well as the intermediate tags that have relayed theframe500 by conveying the serial numbers of the source and intermediate tags in a string. This is similar to that of themessage destination field520. An example string is provided that is “4C2|RMSx” which indicates that “RMSx” is the source of theframe500, and tag “4C2” has relayed theframe500. As mentioned, the ‘x’ in ‘RMSx’ would be a unique sequence of characters identifying a particular RMS. When a tag relays theframe500, it adds its own serial number, or identifier, to the beginning of the string. Once theframe500 has reached the destination tag, the destination tag, in replying, simply takes the string of serial numbers stored in thesource field530 and places it in thedestination field520. This information, in a reply message back to an RMS, is also used by the RMS to form the network.
The payload[0091]540 of theframe500 includes the information that is to be conveyed from source to destination. In most cases where an RMS is communicating to a destination tag in its network, the information will be a command. The destination tag will in turn, reply with a receipt of the command in a reply communication. Generally, the payload540 can be filled with several tokens delimited by a space. Several examples are provided of various commands that may be communicated in the payload540. For instance, afirst command541 is “CMD=TELL” which would be found in adata frame500 sent from an RMS to a destination tag. The TELL command instructs the destination tag to retrieve the information stored in non-volatile memory, such as the tagserial number418, and/or its location coordinates414 (See FIG. 6). A second command542 is “CMD=SET M=60 THI=140 TLO=39” which again would be in a communication from the RMS to a destination tag. The SET command instructs the destination tag to set its sensor operating parameters to the prescribed values. In this example, setting the time between sensor readings to 60 minutes (M=60), setting the high temperature threshold to 140° F. (THI=140), and the low temperature threshold to 39° F. (TLO=39). As discussed in FIG. 8 this information may be stored in thememory410 of thetag400 in thesensor information section412. The second command542 contains several tokens (i.e., CMD=SET, M=60, THI=140, TLO=39) all delimited with a space. In practice, multiple commands with multiple tokens could be sent in the payload540 of oneframe500. A reply543 to the SET command542 is simply “SET” which is communicated from destination tag to the RMS. The replies to certain commands are simply acknowledgments and affirmations of the command. To other commands, pertinent information, such as the sensor readings or the coordinate locations could be communicated in the reply message.
The error-checking field[0092]550 is used for data integrity of theframe500. Any conventional error-checking scheme could be utilized, such as a Checksum, or a CRC.
The trailer[0093]560 indicates the end of theframe500. In this embodiment, the trailer560 is simply a single carriage return character, although another predetermined character could be used.
In the discussion that follows, flowcharts are provided. It is to be understood that any process steps or blocks in these flowcharts represent modules, segments, or portions of code that include one or more executable instructions for implementing specific logical functions or steps in the process. It will be appreciated that, although particular example process steps are described, alternative implementations are feasible and steps may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved. Moreover, various examples of systems and devices configured to perform these methods have been included for illustrative purposes. It will be appreciated that, although these are the only examples provided, other systems and devices not exemplified could be configured to perform these methods.[0094]
FIG. 8 is a flowchart illustrating a[0095]method600 of operation of an RMS (e.g., RMS150) in accordance with embodiments of the present invention. In practice, themethod600 could function free from user interaction, but more than likely would have some periodic user input. Furthermore, the steps of themethod600 may be initialized remotely by a central monitoring station (CMS).
The[0096]method600 begins with a receiving command to form the network (step602). As discussed earlier, a network of wireless RF ID tags may be reformed on a programmed periodic basis, perhaps hourly, or daily. Once the RMS is triggered to form the network, the RMS begins forming the network (step610) by sending out broadcasts to discover the wireless RF ID tags in the network. This step will be further illustrated in detail in FIG. 9.
Once the RMS has received the replies from the tags in the network, the RMS is configured to map out the network (step[0097]620). Step620 may encompass several algorithms to produce the shortest communication links required for each tag in the network. The algorithms also may map the network such that the communications are more evenly spread across the network, so as to avoid depending on a select few key positioned tags in the network. For instance, tags closest to the RMS in a given direction would experience more traffic, than others, thus resulting in quicker power consumption. The algorithms incorporated intostep620, can reconfigure the communication links to spread out the burden over other tags. Once the network has been formed and mapped, the RMS may return to anidle mode660. Forming and mapping the network helps to track the existence and relative location of the tags in the network.
It should be noted that the network may be reformed periodically. The term periodically, in the context of this document, should be construed to mean performing in a manner more than once with some type of algorithmic expression of its frequency. For example, forming the network may be performed every hour, whereby the time between successive reformings would be constant. Alternatively, the time between reformings may be in a pseudo-random fashion, for example, ranging from five minutes to sixty minutes. Another feasible alternative is reforming the network more often during busiest shipping hours, such as during the day and reforming the network less often during the night.[0098]
Several times between reforming the network, the tags of the network may be polled for their status, such as environmental status and location. Once the RMS has been triggered to poll the network (step[0099]604), the network may be polled (step630). This step is described in further detail in FIG. 10, but in brief, any environmental parameter exceedances, as well as location coordinate information may be requested of each tag in the network. The RMS then receives responses conveying this information from the tags in the network. The RMS can then record and report the status of the assets by communicating, for example, the exceedance information, to the CMS (step640). Upon recording and reporting the status of the assets, the RMS may return back to theidle mode660.
Every so often the RMS may be triggered to send a message to a particular tag in the network (step[0100]606). This may be enabled by a user operating the RMS, or it may be enabled remotely by the CMS. The message that is to be sent to the particular tag may be a command requesting information about the tag, or it may be a command to store information also being sent. For example, the tag's new location may be programmed by the RMS, or new environmental thresholds may be communicated to the tag. Sending a message requires preparing the message (step650). This includes building the appropriate data frame(s) to convey the message. The RMS can populate the message destination field520 (See FIG. 7) with the appropriate destination tag as well as intermediate tags. This information is available to the RMS upon forming and mapping the network (step610 and620). Alternatively, the RMS can send out a broadcast message to the destination tag, without knowing the intermediate tags necessary to convey the information.
Once prepared, the message can be sent (step[0101]652). Eventually, the RMS will receive a response (step654) and record the response (step656). This step may require communicating the information along to the CMS. Once complete, the RMS can return back to theidle mode660.
FIG. 9 is a flowchart illustrating a[0102]method610 of forming a network of wireless RF ID tags of the method of FIG. 8. Themethod610 encompasses the process by which the RMS forms and periodically reforms the network, as discussed in FIG. 8, to properly track the existence and relative location of the tags, and thus the assets, within the network.
The[0103]method610 begins with an initialization (step611). At this point, a counter may be initialized to ‘0.’ The counter tracks the levels in the network which signifies the number of tags necessary to communicate to a destination tag. So, when the counter initialized to ‘0,’ the RMS is looking for the tags within the immediate range of the RMS, thus requiring zero intermediate tags. As the counter increases, the width of the network increases, from zero intermediate tags, to one intermediate tag, to two intermediate tags, and so on, until no new tags are found in an iteration of themethod610.
To search for tags at the current level, the RMS broadcasts out a ‘PING’ command to any tags that are within its range (step[0104]612). To accomplish this, the RMS can populate the message destination field of the data frame with a broadcast address, ‘*’. By including only one ‘*’, the tags within the immediate range of the RMS will receive the command. Each of these tags will then respond to the ‘PING’ command. At this point, the RMS begins collecting the responses (step613) and records the tags that have responded. If any new tags respond (step614) (in the first iteration, all of the tags that respond will be new) the counter is incremented (step615).
The process is repeated by sending a ‘PING’ command out for each tag that was discovered in the previous level. For example, if a level ‘0’ ‘PING” command returned three tags, A, B, and C, then three new ‘PING commands’ will be sent out during the level ‘1’ iteration. The three ‘PING’ commands would include in the message destination field ‘A|*’, B|*’, and ‘C|*’.[0105]
These messages will be reached by any tags that are within the range of any tags in the first level. These tags can reply to each ‘PING’ command they receive. Upon collecting these responses, the RMS can eliminate redundant replies. For example, a “[0106]Level 1” tag may receive more than one ‘PING’ command from more than one “Level 0” tag and so will reply to both. By reviewing the message source fields of the received messages, the RMS can recognize redundant replies. This information is also useful when mapping the network (step620 of FIG. 8). If new tags have been recognized, the counter increments again, and the process repeats, until no new tags have been recognized. At this point, the process exits (step616), and it is assumed that all the tags within the network have been discovered.
FIG. 10 is a flowchart illustrating a[0107]method630 of polling a network of wireless RF ID tags in accordance with embodiments of the present invention. Themethod630 provides more detail to thestep630 of FIG. 8, which as discussed briefly, polls each of the tags in the network to find out the environmental conditions in which their assets are experiencing. Alternatively, the tags may be polled for location information.
The[0108]method630 begins with a simple initialization step (step631). The RMS, from forming and mapping a network, includes a list of the tags in the network. To properly poll these tags, the RMS must send out many messages, at least one for each tag. However, these messages cannot be sent out in a single burst, as it could overload the network due to an excessive number of relays by intermediate tags. Further, an excessive amount of wireless communications at any one time within a confined area, may cause problems. To transmit the wireless communications, electromagnetic radiation must be emitted by the transmitter. In some cases, too much electromagnetic radiation within a given area at any one time can cause a problem for radiation sensitive assets, such as ammunitions and explosives. To avoid this, the RMS can send out the polling signals to the network of tags over an extended period of time in a pseudo-random fashion, and in a manner that avoids too much radiation within a given area. So, the RMS will continue themethod630 provided there are more messages to be sent (step632). Once the tags have been polled, themethod630 will end (step638).
To poll each tag, a ‘READINGS’ command may be sent to each tag (step[0109]633). The tag may then retrieve this information from its memory and reply back accordingly. As each reply is received by the RMS (step634), the RMS can store the responses (step635) as well as monitor for any threshold exceedances that have occurred (step636). If a threshold exceedance has occurred, the pertinent information will be recorded and may be communicated to the CMS (step637). Such pertinent information may include the time of exceedance, the specific tag that replied with the exceedance, and the location of the specific tag. The responses may also include the actual readings of the sensors, so if an exceedance is recognized, the sensor readings can be communicated to the CMS. Without an exceedance being detected, the information may or may not be recorded (depending on the specific configuration) nor communicated to CMS. This process continues until each desired tag has been polled for its readings.
FIG. 11 is a flowchart illustrating a[0110]method700 of operation for a wireless RF ID tag within a network of RF tags in accordance with embodiments of the present invention. Themethod700 assumes that the tag remains in asleep mode710 until it receives a communication. During thesleep mode710 however, the tag may periodically take a reading of its sensors and store the readings until a request for them has been received.
Once the tag receives a message (step[0111]720), the tag checks to see if its own address, designated by its unique serial number, is in themessage destination field520 of the received data frame500 (FIG. 7) or message (step730). Alternatively, the tag looks to see if a ‘*’ address for a network wide broadcast is the leftmost address in the message destination field. In either case, themethod700 proceeds to step740. If neither its unique serial number exists anywhere in themessage destination field520, nor a ‘*’ exists at the leftmost address in themessage destination field520, the tag will then return tosleep mode710, as the current message is neither for that tag nor requires that tag to relay the message.
Assuming the message should be processed by the tag, the tag then checks to see if the its address or the ‘*’ is the only address in the message destination field[0112]520 (step740). If so, the tag must process the message according to the command sent in the message (step750). If its own address or the ‘*’ is not the only address in themessage destination field520, the tag recognizes that it must relay the message. To relay the message, the tag can strip the address from the message destination field520 (step742) and append the address to the message source field530 (step744). The message can then be re-transmitted (step760).
If the address or the ‘*’ is the only address in the[0113]message destination field520, the tag will then process the message according to the command received in the payload (step750) of the message, ordata frame500. Just prior to processing the message, the tag may perform an error check, using the error-checking field550 of the message. Once processed, the tag can create a reply message by populating themessage destination field520 of the reply message with the information in the message source field530 (step752). The message source field can then be populated with the serial number of the tag (step754). The payload of the reply message can then be appropriately configured to convey a receipt of the received message as well as communicate the requested information. The error-checking field550 will be repopulated with the correct error-checking information. Once the message has been built, it can be transmitted back in the direction in which it came (step760).
It should be emphasized that the above-described embodiments of the present invention, are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiment(s) of the invention without departing substantially from the spirit and principles of the invention. For example, it will be appreciated by those skilled in the art that the particular format of the[0114]data frame500 could be varied without departing from the fuctionality it affords. Additionally, although the present invention focuses on an implementation for tracking heavy assets across a supply chain, those skilled in the art will appreciate that other implementations of the present invention are foreseeable. For instance, automobiles may be monitored while on-site at a car dealership. All such modifications and variations are intended to be included herein within the scope of the present invention and protected by the following claims.