This subject matter is related generally to providing in-transit visibility of shipments in real-time.
A wireless tracking device or “tag” can use various technologies such as Global Positioning System (GPS), Radio Frequency Identification (RFID), and General Packet Radio Service (GPRS), to track and report movements of an asset (e.g., a shipping container) on which the device is mounted. Conventional wireless monitoring devices report locations to a tracking service on a set schedule, regardless of whether the location data is needed by users of the tracking service.
An apparatus, method and system for contextually aware monitoring of an asset's journey through a supply chain are disclosed. In some implementations, contextually aware monitoring can include monitoring of the supply chain tradelane with tracking devices including one or more sensors for determining location, velocity, heading, vibration, acceleration (e.g., 3D acceleration), or any other sensor that can monitor the environment of the shipping container and provide contextual awareness. The contextual awareness can be enabled by geofencing and recursive algorithms, which allow dynamic modification of the tracking device behavior. Dynamic modification can reduce performance to save power (e.g., save battery usage) and lower costs. Dynamic modification can increase performance where it matters in the supply chain for improved reporting accuracy or frequency or recognition of supply chain events. Dynamic modification can adapt performance such as wireless communications to the region or location of the tracking device. Intelligent connection to wireless carriers can be performed, where the device can determine when it should report particular events, based in part on the type of the event and the cost and resources required for reporting.
In general, either the buyer 102 or the seller 104 sends a request to the tracking device provider 106 requesting tracking of the shipment of the asset 108. The tracking device provider 106 arranges for a selected tracking device 114 to be sent from tracking device pool 112 to the location from where the asset is being shipped (e.g., a warehouse of the seller 104). The tracking device pool 112 is a collection of available tracking devices. Each tracking device in the tracking device pool 112 is a tracking device that can be used to track an asset. At the location where the tracking device is shipped (the “origin location”) the tracking device 114 can be affixed or coupled to the asset 108, thus securely sealing the asset 108. An example tracking device is the Savi Networks SN-LSE-01, which is a GPS-based Location+Security+Environmental tracking device. The tracking devices do not have to use GPS, but can alternatively or additionally receive location information using various location technologies including, but not limited to: additional Global Satellite Navigation Systems (GNSS), location from cellular towers, or location from other wireless networks such as WiFi networks.
The selected tracking device 114 can be coupled to the asset 108 before the asset begins its journey and/or re-coupled to the asset 108 during the journey (e.g., after authorized custom inspections). During the journey, the tracking device 114 can be programmed to wake up periodically, initiate communication with the tracking device provider 106, and send event notifications to the tracking device provider 106. In general, each event notification can include an identification of the event (or event type), a location of the asset 108 when the event occurred, and additional details of the event such as a date and/or time when the event occurred, the status of the asset 108 before, during, or after the event, or details on the movement of the asset (e.g., accelerometer or velocimeter readings from the tracking device coupled to the asset). The event information can be stored by the tracking device provider 106, for example, in an event database. The tracking device 114 reports various events, including for example, security events, environmental events, process events, and tracking events. Security events can indicate that the asset 108 or tracking device 114 may have been tampered with. For example, the tracking device 114 can report when a vertical or horizontal bolt securing the tracking device to a container is cut (indicating that the asset was opened). Other types of tampers can also be detected (e.g., shock intrusion or light inside the asset that exceeds a threshold). Environmental events can indicate that one or more environmental variables (e.g., temperature, humidity, shock, acceleration) are beyond an acceptable range (e.g., a range specified by the user). Process events indicate that various procedural events in the journey of the asset have occurred. For example, process events can indicate that a tracking device 114 has been attached to the asset 108 or detached from the asset 108 (e.g., that the asset 108 is beginning or ending its tracking device journey). Process events can also indicate other shipment events in the journey of the asset 108 (e.g., procedural events in the journey of the asset 108), including, but not limited to, that the asset 108 has been stuffed (e.g., filled with contents), that the asset 108 has been sealed, that the asset 108 has been flagged for customs inspection, that customs inspection of the asset 108 has begun, that customs inspection of the asset 108 has ended, that the asset 108 is in a shipping yard, that the asset 108 has left a shipping yard, that the asset 108 has sailed, that the asset 108 has been berthed, and that the asset 108 has been unsealed. Tracking events are periodic reports of the location of tracking device 114. For example, the tracking device 114 can send a report of its current location according to a schedule, for example, at fixed intervals of time, regardless of whether any other events have been issued. A tracking system (e.g., system 200 of
In some implementations, the tracking device provider 106 processes the various event notifications received from the tracking device 114 and provides notifications to the buyer 102 and/or the seller 104 and/or other parties. The notifications can be based, in part, on additional information received from the buyer 102 and/or the seller 104, for example, a description of the business of the buyer 102 and/or seller 104, a description of the contents of the asset 108, or a description of a transaction relevant to the contents of the asset 108.
In some implementations, the tracking device also processes commands (e.g., Over-the-Air (OTA) commands) received from the tracking device provider 106 during a communication session between the tracking device and servers operated by the tracking device provider 106.
In some implementations, the system 200 can include one or more Zero Client Commissioning (ZCC) input devices 202, an information service 204, one or more end user systems 206, Tracking device Logistics Personnel (TL Personnel) 208, one or more assets 210, one or more tracking devices 211 affixed or coupled to the one or more assets 210, an event server 212, an event database 213, a Tracking device Pool Management System (TPMS) 214, a tracking device database 216, a message server 218, a transaction (TXN) server 224, and a failed transaction database 226.
The ZCC input devices 202 are used to commission and decommission tracking devices to assets. The ZCC input devices 202 can be any suitable communication device, including, but not limited to, mobile phones, land phones, email devices, and portable computers. The ZCC input devices 202 communicate with the information service 204 through the message server 218 using a variety of communication modes, including but not limited to: Integrated Voice Response (IVR), Short Message Service (SMS), email, hand-held application, Web interface, and Electronic Data Interchange (EDI) or any other form of electronic message sharing. The ZCC input devices 202 can be operated by various actors having various roles in the supply chain, including but not limited to: dock workers, longshoreman, logistics service providers, freight forwarders, field agents, customs agents, and any other personnel involved in the tracking of an asset.
The information service 204 allows end user systems 206 to track the status of assets 210 in real-time, integrates enterprise data for end user systems, and performs supply chain analysis, including generating supply chain management statistics. The transaction server 224 runs a tracking application that receives event location/status transaction messages (e.g., event notifications) or reports from the event server 212 and applies business logic 222 to the transactions for validating and maintaining associations between tracking device identifiers and asset identifiers. Successful transactions are posted against assets and tracking devices. Failed transactions and reason codes are written to an exception queue in the failed transaction database 226.
The information service 204 can use a portal (not shown) to provide Web forms to end user systems 206 (e.g., a browser on a PC or mobile device). The Web forms can provide an input mechanism for a user to commission or decommission tracking devices and can provide an output mechanism for users to receive real-time tracking and status information regarding assets and events.
The tracking device 211 wakes up periodically to initiate communication with the event server 212 and to send event notifications to the event server 212. In general, each event notification includes an identification of the event (or event type), a location of the asset when the event occurred, and optionally additional details of the event such as the status of the asset before, during, or after the event. The event notification can also include an identification of the tracking device, or an identification of the asset to which the tracking device is coupled. The event information can be stored in the event database 213. The tracking device 211 reports various events, including for example, security events, environmental events, process events, tracking events, and location events, as described above with reference to
The event server 212 periodically receives event notifications from the tracking device 211. The event server can process location information in the notifications. The event server 212 also constructs and sends commands (e.g., OTA commands) to the tracking device 211. Some notification management functions performed by the event server 212 include but are not limited to: checking incoming notifications for syntax errors and population of mandatory fields, checking the accuracy of location information in incoming notifications, sorting or sequencing notifications logically before forwarding the notifications to the information service 204, and constructing output transactions that comply with processing logic.
In some implementations, the TPMS 214 maintains an inventory of tracking devices in the tracking device database 216. The TPMS 214 also maintains the association of the asset identifier (ID) and tracking device ID and the logical state or status of each tracking device, such as ‘In Use,’ ‘Available,’ ‘Begin Journey’, ‘End Journey’, etc. The TPMS 214 also maintains the allocation and availability of tracking devices for logistics and pre-positioning purposes, and may track the health of tracking devices stored in inventory.
In some implementations, the TPMS 214 allows TL personnel 208 to perform housekeeping functions, such as tracking device forecasts, ordering new tracking devices, detecting lost tracking devices, billing management, salvage and environmental disposal of failed tracking devices, inventory tracking, customer help desk and financial accounting. The TPMS 214 allows TL personnel 208 to monitor the state of a tracking device 211 ‘in journey’, trouble shoot causes for failure in communicating with the event server 212, and locate lost tracking devices. The TPMS 214 provides analytic tools to monitor tracking device network performance (e.g., GPS/GPRS coverage/roaming area for specific trade lanes).
The tracking device system 200 is one example infrastructure. Other infrastructures are also possible which contain more or fewer subsystems or components than shown in
Introduction to the Hidden Markov Model
We can find
Train the Model with the EM Algorithm
To train the model, we can use a method called the generalized Expectation Maximization (EM), or Baum-Welch, method. This method examines each journey and counts transitions between states for each tracking device. Then it will normalize the probabilities by multiplying each set by a normalizing constant which will ensure that the probability distribution corresponding to each state adds up to 1.
Smoothing Out the Data with the Forward-Backward Algorithm
The HMM is most efficient when implementing the training using a method called the Forward-Backward method. Example pseudo-code for implementing the Forward-Backward method is illustrated in
For the forward method, we define the forward variable, αt(i), first: αt(i)=P(O1,O2,O3, . . . , Ot,qt=xi|λ), where αt(i) is the probability of the observation sequence O1,O2,O3, . . . , Ot and xi at time t, given the model λ. This probability can be found using a recursive formula:
For the Backward method, we define the forward variable, βt(i), first: βt(i)=P(Ot+1,Ot+2, . . . , OT,qt=xi|λ), where βt(i) is the probability of the observation sequence Ot+1,Ot+2, . . . , OT from time t+1 to T and xi at time t=T, given the model λ. This probability can be found using a recursive formula:
Making Predictions with the Viterbi Method
In order to use the HMM to make predictions, we can use the Viterbi method. The Viterbi method chooses the best state sequence that maximizes the likelihood of the state sequence for the observation sequence. The Viterbi method can be implemented using a recursive approach which is illustrated in
The Viterbi method is illustrated as follows: To initialize the recursion, we first define the state variables 800 which define the base case and will feed the subsequent recursive routine. The recursive functions 801 will terminate when the end of the finite state space is reached and the maximums are found 802. This can be used to derive qi(t) 803 which is the best score (highest probability) along a single path, at time t, which accounts for the first t observations and ends in state xi. In other words, we can see:
Also, by induction we have,
Implementing the HMM
The forward-backward method is illustrated in more detail in
Other actions to update dynamics behavior of the tracking device based upon the context of the asset shipment are possible, in other embodiments beyond the specific examples shown in
Multiple HMM-enabled tracking devices can share data by traversing the same tradelanes.
Structure of the Hybrid Model
Due to the battery constraints on the tracking device, location data can be collected at discrete intervals rather than in a continuous manner. This restricts the amount of data that the device can accrue to train the HMM. Before the tracking device can confidently use the HMM, the tracking device can gather data across its state space. If the model defines the state space as all locations in range from the tracking device, the state space would be large. This means that to train the device on a tradelane, the device would need to perform many journeys on a tradelane before it is able to use the HMM to make accurate predictions.
An additional limitation due to battery power consumption, is that the tracking device is constrained as to its available processing power. With a large state space, the HMM would require a large amount of memory and processing power from the tracking device in order to make predictions.
To reduce the time that it takes to train the model on a tradelane and to reduce the amount of time and power that it takes to process HMM predictions on the device, the HMM can be implemented as a Hybrid Model. In some implementations, the Hybrid model uses geofence zones as quantized states, to significantly reduce the state space.
Technical Overview of the Hybrid Model
The Hybrid Model may be described as one specific implementation. Other implementations are also possible. The State Space xεX at any time t for an interval n is the range of possible locations and activities xnt={gznt, ant} where gzε Geofence Zone and aε{stationary, in motion} denotes activity. In this case, the state of being in a geofence zone is not directly observable because of the “noise,” or inaccuracies, in the location measurements and the deviations of the asset vehicle from the predicted path. Each observation, O, for a given time t is a measurable collection of data: sensor data and tracking data.
The formula for the transition probability of this model is give here (Equation 1):
P(Xt=xj|Xt-1=xi)=P(aj,gzj|ai,gzi)=P(aj|ai,gzi)·P(gzj|gzi,ai) (1)
Transition of Zone: P(gzj|gzi,ai) is the probability of transition to a new geofence zone at time t given the previous geofence zone and previous activity.
Transition of Activity: P(aj|ai,gzi) models the probability of whether or not the tracking device is moving at time t. The model is initialized with the information that, in most cases, moving tracking devices continue to move and non-moving ones continue not to move.
The Hidden Markov Method and Hybrid Model provide context for tradelanes in which historical data is gathered to train the model. This historical data will not be available when first commencing shipments through a new tradelane. This historical data will also not be available, for shipments that stray off a planned tradelane due to supply chain exception events into new tradelanes without historical data. A Nested Geofences model can provide a capability for recognizing context without the need to train on previous historical data.
Based upon the geofence status, the tracking device dynamic behavior may be updated based upon entering a geofence 1701, exiting a geofence 1703 or persisting within a geofence 1705.
Various actions can be defined to be taken to update the behavior of a tracking device, based upon the trigger of entering a geofence 1700. This update of dynamic behavior 1701 can include increasing the frequency of collecting location data to increase granularity of the location data. This update of dynamic behavior 1701 can include increasing a frequency of sending communication reports to reduce a latency of the reports. This update of dynamic behavior 1701 can include using higher accuracy modes of a navigation receiver in the tracking device to increase accuracy of the location data. This update of dynamic behavior 1701 can include selecting a communication channel from a plurality of available communication channels based upon the region or location of the device. This update of dynamic behavior 1701 can include determining whether it is cost-effective to report an event at the particular time based at least in part on a type of the event and the cost and resources required for reporting for the region or location of the device. This update of dynamic behavior 1701 can include utilizing preferred communication channels or excluding communication channels corresponding to a particular geographic region in which the asset is currently located. This update of dynamic behavior 1701 can include determining an occurrence of a supply chain event, including a gate in to a supply chain node. This update of dynamic behavior 1701 can include determining an occurrence of change of custody of the asset being shipped. This update of dynamic behavior 1701 can include determining an updated dynamic estimated time of arrival of the asset at the destination.
Various actions can be defined to be taken to update the behavior of a tracking device, based upon the trigger of exiting a geofence 1702. This update of dynamic behavior 1703 can include reducing the frequency of collecting location data to reduce power consumption by the tracking device. This update of dynamic behavior 1703 can include reducing a frequency of sending communication reports to reduce power consumption by the tracking device. This update of dynamic behavior 1703 can include using lower accuracy modes of the navigation receiver to reduce power consumption by the tracking device. This update of dynamic behavior 1703 can include selecting a communication channel from a plurality of available communication channels based upon the region or location of the device. This update of dynamic behavior 1703 can include determining whether it is cost-effective to report an event at the particular time based at least in part on a type of the event and the cost and resources required for reporting for the region or location of the device. This update of dynamic behavior 1703 can include utilizing preferred communication channels or excluded communication channels corresponding to a particular geographic region in which the asset is currently located. This update of dynamic behavior 1703 can include determining an occurrence of a supply chain event, including a gate out from a supply chain node. This update of dynamic behavior 1703 can include determining an occurrence of change of custody of the asset being shipped. This update of dynamic behavior 1703 can include determining an updated dynamic estimated time of arrival of the asset at the destination.
Various actions can be defined to be taken to update the behavior of a tracking device, based upon the trigger of persisting within a geofence 1704. This update of dynamic behavior 1705 can include reducing the frequency of collecting location data to reduce power consumption by the tracking device. This update of dynamic behavior 1705 can include reducing a frequency of sending communication reports to reduce power consumption by the tracking device. This update of dynamic behavior 1705 can include using lower accuracy modes of the navigation receiver to reduce power consumption by the tracking device. This update of dynamic behavior 1705 can include determining whether it is cost-effective to report an event at the particular time based at least in part on a type of the event and the cost and resources required for reporting for the region or location of the device. This update of dynamic behavior 1705 can include determining an updated dynamic estimated time of arrival of the asset at the destination. This update of dynamic behavior 1705 can include determining an occurrence of a stuck shipment exception condition.
These updates of dynamic behavior 1705 can be based on accumulating data from multiple tracking devices, and downloading contextual data to each tracking device.
Other actions to update dynamics behavior of the tracking device based upon the context of the asset shipment are possible, in other embodiments beyond the specific examples.
The Hidden Markov Method, Hybrid Model and Nested Geofence Model provide context for shipments in motion. An additional capability is required to determine context of shipments at rest.
Various actions can be defined to be taken to update the behavior of a tracking device, based upon matching a Sensor Pattern in a supply chain context. This update of dynamic behavior can include increasing the frequency of collecting location data to increase the granularity of the location data. This update of dynamic behavior can include reducing the frequency of collecting location data to reduce power consumption by the tracking device. This update of dynamic behavior can include increasing the frequency of sending communication reports to reduce the latency of the reports. This update of dynamic behavior can include reducing the frequency of sending communication reports to reduce power consumption by the tracking device. This update of dynamic behavior can include using higher accuracy modes of a navigation receiver in the tracking device to increase accuracy of the location data. This update of dynamic behavior can include using lower accuracy modes of the navigation receiver to reduce power consumption by the tracking device. This update of dynamic behavior can include determining whether it is cost-effective to report an event at the particular time based at least in part on a type of the event and the cost and resources required for reporting for the region or location of the device. This update of dynamic behavior can include determining an occurrence of a supply chain event, including a gate in to or a gate out from a supply chain node, or including a crane load to a ship or a crane load from a ship. This update of dynamic behavior can include determining an occurrence of change of custody of the asset being shipped. This update of dynamic behavior can include determining an updated dynamic estimated time of arrival of the asset at the destination. This update of dynamic behavior can include determining an occurrence of a stuck shipment exception condition.
These updates of dynamic behavior can be based on accumulating data from multiple tracking devices; and downloading contextual data to each tracking device.
Other actions to update dynamics behavior of the tracking device based upon the context of the asset shipment are possible, in other embodiments beyond the specific examples.
The logic behind the system that combines the Nested Geofence method, the Hybrid Model method and the Sensor Pattern Matching method is illustrated in the flow diagram of
The combined models provide a comprehensive set of methods to determine when to dynamically update the behavior of a tracking device. This update of dynamic behavior can include increasing the frequency of collecting location data to increase the granularity of the location data. This update of dynamic behavior can include reducing the frequency of collecting location data to reduce power consumption by the tracking device. This update of dynamic behavior can include increasing the frequency of sending communication reports to reduce the latency of the reports. This update of dynamic behavior can include reducing the frequency of sending communication reports to reduce power consumption by the tracking device. This update of dynamic behavior can include using higher accuracy modes of a navigation receiver in the tracking device to increase accuracy of the location data. This update of dynamic behavior can include using lower accuracy modes of the navigation receiver to reduce power consumption by the tracking device. This update of dynamic behavior can include selecting a communication channel from a plurality of available communication channels based upon the region or location of the device. This update of dynamic behavior can include determining whether it is cost-effective to report an event at the particular time based at least in part on a type of the event and the cost and resources required for reporting for the region or location of the device. This update of dynamic behavior can include utilizing preferred communication channels or excluding communication channels corresponding to a particular geographic region in which the asset is currently located. This update of dynamic behavior can include determining an occurrence of a supply chain event, including a gate in to or a gate out from a supply chain node, or including a crane load to a ship or a crane load from a ship. This update of dynamic behavior can include determining an occurrence of change of custody of the asset being shipped. This update of dynamic behavior can include determining an updated dynamic estimated time of arrival of the asset at the destination. This update of dynamic behavior can include determining an occurrence of a stuck shipment exception condition.
These updates of dynamic behavior can be based on accumulating data from multiple tracking devices; and downloading contextual data to each tracking device.
Other actions to update dynamics behavior of the tracking device based upon the context of the asset shipment are possible, in other embodiments beyond the specific examples.
The features described above can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The features can be implemented in a computer program product tangibly embodied in a computer readable medium, e.g., in a machine-readable storage device, for execution by a programmable processor; and method steps can be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output.
The described features can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. A computer program is a set of instructions that can be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program can be written in any form of programming language (e.g., Objective-C, Java), including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors or cores, of any kind of computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memories for storing instructions and data. Generally, a computer will also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
To provide for interaction with a user, the features can be implemented on a computer having a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer.
The features can be implemented in a computer system that includes a back-end component, such as a data server, or that includes a middleware component, such as an application server or an Internet server, or that includes a front-end component, such as a client computer having a graphical user interface or an Internet browser, or any combination of them. The components of the system can be connected by any form or medium of digital data communication such as a communication network. Examples of communication networks include, e.g., a LAN, a WAN, and the computers and networks forming the Internet.
The computer system can include clients and servers. A client and server are generally remote from each other and typically interact through a network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. For example, elements of one or more implementations may be combined, deleted, modified, or supplemented to form further implementations. As yet another example, the logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. In addition, other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Accordingly, other implementations are within the scope of the following claims.
This application claims the benefit of priority from U.S. Provisional Application No. 61/234,600, filed Aug. 17, 2009. This application also claims the benefit of priority from U.S. Provisional Application No. 61/291,232, filed Dec. 30, 2009. Each of these provisional applications is incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
690191 | Saxe | Dec 1901 | A |
3242625 | Tillinghast | Mar 1966 | A |
3993987 | Stevens | Nov 1976 | A |
4233595 | Landkammer | Nov 1980 | A |
4466288 | Grynberg et al. | Aug 1984 | A |
4507654 | Stolarczyk et al. | Mar 1985 | A |
4729626 | Stieff | Mar 1988 | A |
4736857 | Monico, Jr. et al. | Apr 1988 | A |
4750197 | Denekamp et al. | Jun 1988 | A |
5151684 | Johnsen | Sep 1992 | A |
5189396 | Stobbe | Feb 1993 | A |
5266925 | Vercellotti et al. | Nov 1993 | A |
5483666 | Yamada et al. | Jan 1996 | A |
5491486 | Welles et al. | Feb 1996 | A |
5515030 | Citron et al. | May 1996 | A |
5565858 | Guthrie | Oct 1996 | A |
5656996 | Houser | Aug 1997 | A |
5664292 | Chen | Sep 1997 | A |
5710973 | Yamada et al. | Jan 1998 | A |
5752218 | Harrison et al. | May 1998 | A |
5758263 | Berger et al. | May 1998 | A |
5774876 | Woolley et al. | Jun 1998 | A |
5798460 | Nakagawa et al. | Aug 1998 | A |
5815407 | Huffman et al. | Sep 1998 | A |
5827965 | Nakagawa et al. | Oct 1998 | A |
5861810 | Nguyen | Jan 1999 | A |
5946350 | Uesugi | Aug 1999 | A |
5959529 | Kail, IV | Sep 1999 | A |
6026690 | Nakagawa et al. | Feb 2000 | A |
6069563 | Kadner et al. | May 2000 | A |
6075443 | Schepps et al. | Jun 2000 | A |
6147644 | Castles et al. | Nov 2000 | A |
6243005 | Haimovich et al. | Jun 2001 | B1 |
6249252 | Dupray | Jun 2001 | B1 |
6265973 | Brammall et al. | Jul 2001 | B1 |
6292108 | Straser et al. | Sep 2001 | B1 |
6304211 | Boman | Oct 2001 | B1 |
6420971 | Leck et al. | Jul 2002 | B1 |
6437702 | Ragland et al. | Aug 2002 | B1 |
6469627 | Forster | Oct 2002 | B1 |
6496766 | Bernold et al. | Dec 2002 | B1 |
6529131 | Wentworth | Mar 2003 | B2 |
6571213 | Altendahl et al. | May 2003 | B1 |
6727817 | Maloney | Apr 2004 | B2 |
6736768 | Felt et al. | May 2004 | B2 |
6747558 | Thorne | Jun 2004 | B1 |
6753775 | Auerbach et al. | Jun 2004 | B2 |
6778083 | Auerbach et al. | Aug 2004 | B2 |
6792353 | Lin | Sep 2004 | B2 |
6879962 | Smith et al. | Apr 2005 | B1 |
6919803 | Breed | Jul 2005 | B2 |
6927688 | Tice | Aug 2005 | B2 |
6965313 | Saylor et al. | Nov 2005 | B1 |
6965604 | Sato et al. | Nov 2005 | B1 |
6972682 | Lareau et al. | Dec 2005 | B2 |
6990335 | Shamoon et al. | Jan 2006 | B1 |
7019683 | Stevens et al. | Mar 2006 | B2 |
7035856 | Morimoto | Apr 2006 | B1 |
7044374 | Allison et al. | May 2006 | B2 |
7049963 | Waterhouse et al. | May 2006 | B2 |
7072668 | Chou | Jul 2006 | B2 |
7098784 | Easley et al. | Aug 2006 | B2 |
7106244 | Hsu | Sep 2006 | B2 |
7113090 | Saylor et al. | Sep 2006 | B1 |
7129837 | Shannon | Oct 2006 | B2 |
7136830 | Kuelbs et al. | Nov 2006 | B1 |
7136832 | Li et al. | Nov 2006 | B2 |
7164986 | Humphries et al. | Jan 2007 | B2 |
7193557 | Kovacich et al. | Mar 2007 | B1 |
7196621 | Kochis | Mar 2007 | B2 |
7196622 | Lambright | Mar 2007 | B2 |
7212829 | Lau et al. | May 2007 | B1 |
7239238 | Tester et al. | Jul 2007 | B2 |
7257397 | Shamoon et al. | Aug 2007 | B2 |
7274332 | Dupray | Sep 2007 | B1 |
7275651 | Morales et al. | Oct 2007 | B2 |
7286683 | Hadell | Oct 2007 | B2 |
7298327 | Dupray et al. | Nov 2007 | B2 |
7299007 | Eskin | Nov 2007 | B2 |
7312752 | Smith et al. | Dec 2007 | B2 |
7315281 | Dejanovic et al. | Jan 2008 | B2 |
7336152 | Horwitz et al. | Feb 2008 | B2 |
7336170 | Auerbach et al. | Feb 2008 | B2 |
7339469 | Braun | Mar 2008 | B2 |
7339473 | Lucas | Mar 2008 | B2 |
7350383 | Kuo | Apr 2008 | B1 |
7382251 | Bohman et al. | Jun 2008 | B2 |
7385500 | Irwin | Jun 2008 | B2 |
7385529 | Hersh et al. | Jun 2008 | B2 |
7391321 | Twitchell, Jr. | Jun 2008 | B2 |
7394361 | Twitchell, Jr. | Jul 2008 | B1 |
7423535 | Chung et al. | Sep 2008 | B2 |
7467032 | Kane et al. | Dec 2008 | B2 |
7471203 | Worthy et al. | Dec 2008 | B2 |
7479877 | Mortenson | Jan 2009 | B2 |
7482920 | Joao | Jan 2009 | B2 |
RE40642 | Harrison et al. | Feb 2009 | E |
7498938 | Ulrich | Mar 2009 | B2 |
7499997 | Hancock et al. | Mar 2009 | B2 |
7525484 | Dupray et al. | Apr 2009 | B2 |
7536321 | Takahashi et al. | May 2009 | B2 |
7538672 | Lockyer | May 2009 | B2 |
7612669 | Brigham | Nov 2009 | B2 |
7616116 | Ehrensvard et al. | Nov 2009 | B2 |
7623033 | Ainsworth et al. | Nov 2009 | B2 |
7633389 | Mantovani et al. | Dec 2009 | B2 |
7639131 | Mock et al. | Dec 2009 | B2 |
7643823 | Shamoon et al. | Jan 2010 | B2 |
7652576 | Crossno et al. | Jan 2010 | B1 |
7657468 | Whiteley et al. | Feb 2010 | B1 |
7668532 | Shamoon et al. | Feb 2010 | B2 |
7688207 | Fritchie et al. | Mar 2010 | B2 |
7707076 | Whiteley et al. | Apr 2010 | B1 |
7714778 | Dupray | May 2010 | B2 |
7724138 | Horwitz et al. | May 2010 | B2 |
7746228 | Sensenig et al. | Jun 2010 | B2 |
7760103 | Frank | Jul 2010 | B2 |
7764231 | Karr et al. | Jul 2010 | B1 |
7822580 | Mustonen | Oct 2010 | B2 |
7825803 | Neff et al. | Nov 2010 | B2 |
7830852 | Twitchell, Jr. | Nov 2010 | B2 |
7853480 | Taylor et al. | Dec 2010 | B2 |
7864061 | Frank | Jan 2011 | B2 |
7903029 | Dupray | Mar 2011 | B2 |
7936266 | Francis et al. | May 2011 | B2 |
7937244 | Kadaba | May 2011 | B2 |
7967467 | Devaney et al. | Jun 2011 | B2 |
7973536 | Kojovic et al. | Jul 2011 | B2 |
7986238 | Cho | Jul 2011 | B2 |
7990270 | Mostov | Aug 2011 | B2 |
7990947 | Twitchell et al. | Aug 2011 | B2 |
8032153 | Dupray et al. | Oct 2011 | B2 |
8064935 | Shamoon et al. | Nov 2011 | B2 |
8068023 | Dulin et al. | Nov 2011 | B2 |
8068027 | Auerbach et al. | Nov 2011 | B2 |
8082094 | Gao | Dec 2011 | B2 |
8082096 | Dupray | Dec 2011 | B2 |
8135413 | Dupray | Mar 2012 | B2 |
8164458 | Mostov | Apr 2012 | B2 |
8217785 | Steer | Jul 2012 | B2 |
8228192 | Eckert et al. | Jul 2012 | B2 |
8593280 | Tan | Nov 2013 | B2 |
20010022558 | Karr, Jr. et al. | Sep 2001 | A1 |
20020030625 | Cavallaro et al. | Mar 2002 | A1 |
20020075291 | Van Gestel et al. | Jun 2002 | A1 |
20020100300 | Reeb et al. | Aug 2002 | A1 |
20020104013 | Ghazarian | Aug 2002 | A1 |
20020111819 | Li et al. | Aug 2002 | A1 |
20020113704 | Hess | Aug 2002 | A1 |
20020177476 | Chou | Nov 2002 | A1 |
20030055689 | Block | Mar 2003 | A1 |
20030106917 | Shetler | Jun 2003 | A1 |
20030126024 | Crampton et al. | Jul 2003 | A1 |
20030137968 | Lareau et al. | Jul 2003 | A1 |
20030146871 | Karr et al. | Aug 2003 | A1 |
20030171948 | Thomas et al. | Sep 2003 | A1 |
20030195791 | Waller et al. | Oct 2003 | A1 |
20030200100 | Wen et al. | Oct 2003 | A1 |
20030222820 | Karr et al. | Dec 2003 | A1 |
20030227392 | Ebert et al. | Dec 2003 | A1 |
20030233189 | Hsiao et al. | Dec 2003 | A1 |
20040024644 | Gui | Feb 2004 | A1 |
20040055345 | Moore | Mar 2004 | A1 |
20040088107 | Seligmann | May 2004 | A1 |
20040100379 | Boman et al. | May 2004 | A1 |
20040113783 | Yagesh | Jun 2004 | A1 |
20040113933 | Guler | Jun 2004 | A1 |
20040124977 | Biffar | Jul 2004 | A1 |
20040126015 | Hadell | Jul 2004 | A1 |
20040181334 | Blumbergs et al. | Sep 2004 | A1 |
20040183673 | Nageli | Sep 2004 | A1 |
20040193466 | Kull et al. | Sep 2004 | A1 |
20040198386 | Dupray | Oct 2004 | A1 |
20040199411 | Bertram et al. | Oct 2004 | A1 |
20040202154 | Aklepi et al. | Oct 2004 | A1 |
20040210847 | Berson et al. | Oct 2004 | A1 |
20040227630 | Shannon et al. | Nov 2004 | A1 |
20040246130 | Lambright et al. | Dec 2004 | A1 |
20040249722 | Sugamura | Dec 2004 | A1 |
20040257225 | Webb, Sr. et al. | Dec 2004 | A1 |
20040266457 | Dupray | Dec 2004 | A1 |
20050055237 | Schmidtberg et al. | Mar 2005 | A1 |
20050091091 | Bjerre et al. | Apr 2005 | A1 |
20050154527 | Ulrich | Jul 2005 | A1 |
20050156736 | Rajapakse et al. | Jul 2005 | A1 |
20050159883 | Humphries et al. | Jul 2005 | A1 |
20050171856 | Takahashi | Aug 2005 | A1 |
20050190097 | Hsu | Sep 2005 | A1 |
20050219037 | Huang | Oct 2005 | A1 |
20050231365 | Tester | Oct 2005 | A1 |
20050248454 | Hanson et al. | Nov 2005 | A1 |
20050256731 | Mougey et al. | Nov 2005 | A1 |
20060047379 | Schullian et al. | Mar 2006 | A1 |
20060054705 | Garton et al. | Mar 2006 | A1 |
20060101897 | Masuya et al. | May 2006 | A1 |
20060105760 | Shamoon et al. | May 2006 | A1 |
20060109109 | Rajapakse et al. | May 2006 | A1 |
20060109114 | Watts et al. | May 2006 | A1 |
20060116893 | Carnes et al. | Jun 2006 | A1 |
20060123766 | Wassenhoven | Jun 2006 | A1 |
20060145837 | Horton et al. | Jul 2006 | A1 |
20060155591 | Altaf et al. | Jul 2006 | A1 |
20060164232 | Waterhouse et al. | Jul 2006 | A1 |
20060184290 | Kane et al. | Aug 2006 | A1 |
20060200560 | Waugh | Sep 2006 | A1 |
20060202824 | Carroll et al. | Sep 2006 | A1 |
20060202825 | Rajapakse et al. | Sep 2006 | A1 |
20060224398 | Lakshman | Oct 2006 | A1 |
20060229895 | Kodger | Oct 2006 | A1 |
20060232398 | Nedblake et al. | Oct 2006 | A1 |
20060237490 | Twitchell | Oct 2006 | A1 |
20060238332 | Carle et al. | Oct 2006 | A1 |
20060255934 | Easley et al. | Nov 2006 | A1 |
20060276201 | Dupray | Dec 2006 | A1 |
20060288744 | Smith | Dec 2006 | A1 |
20070001854 | Chung et al. | Jan 2007 | A1 |
20070043538 | Johnson et al. | Feb 2007 | A1 |
20070046459 | Silverman et al. | Mar 2007 | A1 |
20070056369 | Griffin et al. | Mar 2007 | A1 |
20070115902 | Shamoon et al. | May 2007 | A1 |
20070120381 | Ehrensvard et al. | May 2007 | A1 |
20070132547 | Jung | Jun 2007 | A1 |
20070145130 | Danilewitz | Jun 2007 | A1 |
20070150379 | Vernaci et al. | Jun 2007 | A1 |
20070155379 | Shamoon et al. | Jul 2007 | A1 |
20070167179 | Shamoon et al. | Jul 2007 | A1 |
20070182556 | Rado | Aug 2007 | A1 |
20070216542 | Brosius et al. | Sep 2007 | A1 |
20070222232 | Held | Sep 2007 | A1 |
20070222674 | Tan et al. | Sep 2007 | A1 |
20070241888 | Mantovani et al. | Oct 2007 | A1 |
20070247366 | Smith et al. | Oct 2007 | A1 |
20070252696 | Belisle et al. | Nov 2007 | A1 |
20070262861 | Anderson et al. | Nov 2007 | A1 |
20070285232 | Bohman et al. | Dec 2007 | A1 |
20070287473 | Dupray | Dec 2007 | A1 |
20080002488 | Hasegawa | Jan 2008 | A1 |
20080006696 | Piersol et al. | Jan 2008 | A1 |
20080039019 | Eskin | Feb 2008 | A1 |
20080039020 | Eskin | Feb 2008 | A1 |
20080040244 | Ricciuti et al. | Feb 2008 | A1 |
20080040272 | Eskin | Feb 2008 | A1 |
20080041124 | Rudd | Feb 2008 | A1 |
20080042809 | Watts et al. | Feb 2008 | A1 |
20080074265 | Schoen | Mar 2008 | A1 |
20080086391 | Maynard et al. | Apr 2008 | A1 |
20080086455 | Meisels et al. | Apr 2008 | A1 |
20080094209 | Braun | Apr 2008 | A1 |
20080094256 | Koen | Apr 2008 | A1 |
20080111693 | Johnson et al. | May 2008 | A1 |
20080113672 | Karr et al. | May 2008 | A1 |
20080133126 | Dupray | Jun 2008 | A1 |
20080143516 | Mock et al. | Jun 2008 | A1 |
20080143604 | Mock et al. | Jun 2008 | A1 |
20080150698 | Smith et al. | Jun 2008 | A1 |
20080157974 | Boss et al. | Jul 2008 | A1 |
20080167049 | Karr et al. | Jul 2008 | A1 |
20080186166 | Zhou et al. | Aug 2008 | A1 |
20080224875 | Phillips et al. | Sep 2008 | A1 |
20080231459 | Corder | Sep 2008 | A1 |
20080234923 | Young | Sep 2008 | A1 |
20080248813 | Chatterjee | Oct 2008 | A1 |
20080252428 | Robinson et al. | Oct 2008 | A1 |
20080281618 | Mermet et al. | Nov 2008 | A1 |
20080309487 | Chao | Dec 2008 | A1 |
20090015400 | Breed | Jan 2009 | A1 |
20090030715 | Robb et al. | Jan 2009 | A1 |
20090060349 | Linaker et al. | Mar 2009 | A1 |
20090083123 | Powell et al. | Mar 2009 | A1 |
20090102657 | Evans et al. | Apr 2009 | A1 |
20090102660 | Evans et al. | Apr 2009 | A1 |
20090121877 | Henderson | May 2009 | A1 |
20090134999 | Dobson et al. | May 2009 | A1 |
20090135000 | Twitchell, Jr. | May 2009 | A1 |
20090135015 | Dobson et al. | May 2009 | A1 |
20090140886 | Bender | Jun 2009 | A1 |
20090146805 | Joao | Jun 2009 | A1 |
20090146832 | Ebert et al. | Jun 2009 | A1 |
20090167536 | Clark et al. | Jul 2009 | A1 |
20090177394 | Walz et al. | Jul 2009 | A1 |
20090201169 | d'Hont et al. | Aug 2009 | A1 |
20090216775 | Ratliff et al. | Aug 2009 | A1 |
20090234493 | Pandit et al. | Sep 2009 | A1 |
20090289786 | Koch | Nov 2009 | A1 |
20090303052 | Aklepi et al. | Dec 2009 | A1 |
20090308000 | Corcoran | Dec 2009 | A1 |
20090316682 | Twitchell et al. | Dec 2009 | A1 |
20090322510 | Berger et al. | Dec 2009 | A1 |
20090326971 | Piccinini et al. | Dec 2009 | A1 |
20100012653 | Ulrich et al. | Jan 2010 | A1 |
20100039284 | Hall et al. | Feb 2010 | A1 |
20100045436 | Rinkes | Feb 2010 | A1 |
20100066501 | Ulrich et al. | Mar 2010 | A1 |
20100066561 | Ulrich et al. | Mar 2010 | A1 |
20100073229 | Pattabiraman et al. | Mar 2010 | A1 |
20100076902 | Kraft | Mar 2010 | A1 |
20100090822 | Benson et al. | Apr 2010 | A1 |
20100095864 | Forbes | Apr 2010 | A1 |
20100102964 | Steer | Apr 2010 | A1 |
20100116932 | Helou, Jr. | May 2010 | A1 |
20100141393 | Daniel | Jun 2010 | A1 |
20100141445 | Venkatasubramaniyam et al. | Jun 2010 | A1 |
20100145739 | Erhart et al. | Jun 2010 | A1 |
20100234045 | Karr et al. | Sep 2010 | A1 |
20100237711 | Parsons | Sep 2010 | A1 |
20100238032 | Greene | Sep 2010 | A1 |
20100277280 | Burkart et al. | Nov 2010 | A1 |
20100312715 | Esque et al. | Dec 2010 | A1 |
20100319261 | Beck | Dec 2010 | A1 |
20110012731 | Stevens | Jan 2011 | A1 |
20110025496 | Cova et al. | Feb 2011 | A1 |
20110046775 | Bailey et al. | Feb 2011 | A1 |
20110050397 | Cova | Mar 2011 | A1 |
20110050423 | Cova et al. | Mar 2011 | A1 |
20110050424 | Cova et al. | Mar 2011 | A1 |
20110054979 | Cova et al. | Mar 2011 | A1 |
20110120199 | Auerbach et al. | May 2011 | A1 |
20110128143 | Daniel | Jun 2011 | A1 |
20110133932 | Tan et al. | Jun 2011 | A1 |
20110163914 | Seymour | Jul 2011 | A1 |
20110258930 | Francis et al. | Oct 2011 | A1 |
20110260867 | McCracken | Oct 2011 | A1 |
20110266338 | Babcock et al. | Nov 2011 | A1 |
20110283750 | Will | Nov 2011 | A1 |
20110289320 | Twitchell et al. | Nov 2011 | A1 |
20120009872 | Lane et al. | Jan 2012 | A1 |
20120058775 | Dupray et al. | Mar 2012 | A1 |
20120068846 | Dalzell | Mar 2012 | A1 |
20120069131 | Abelow | Mar 2012 | A1 |
20120094638 | Shamoon et al. | Apr 2012 | A1 |
20120154163 | Jones | Jun 2012 | A1 |
20120182180 | Wolf et al. | Jul 2012 | A1 |
20120190380 | Dupray et al. | Jul 2012 | A1 |
20120303498 | Cova et al. | Nov 2012 | A1 |
20120310854 | Cova et al. | Dec 2012 | A1 |
20130314233 | Stevens | Nov 2013 | A1 |
20150134557 | Cova | May 2015 | A1 |
Number | Date | Country |
---|---|---|
1676842 | Oct 2005 | CN |
1989513 | Jun 2007 | CN |
101251886 | Aug 2008 | CN |
2 368 174 | Apr 2002 | GB |
2 448 482 | Oct 2008 | GB |
2003275022 | Sep 2003 | JP |
2005092746 | Apr 2005 | JP |
2005092746 | Apr 2005 | JP |
2011080908 | Jul 2011 | KR |
2011099470 | Sep 2011 | KR |
541176 | Aug 2005 | NZ |
WO 9801772 | Jan 1998 | WO |
WO 9848396 | Oct 1998 | WO |
WO 03098175 | Nov 2003 | WO |
WO 2004013731 | Feb 2004 | WO |
WO2006053566 | May 2006 | WO |
WO 2006078285 | Jul 2006 | WO |
WO 2007121508 | Nov 2007 | WO |
WO 2010077688 | Jul 2010 | WO |
WO 2011008871 | Jan 2011 | WO |
WO 2011008884 | Jan 2011 | WO |
WO 2011014708 | Feb 2011 | WO |
WO 2011025821 | Mar 2011 | WO |
WO 2011025829 | Mar 2011 | WO |
WO 2011025987 | Mar 2011 | WO |
Entry |
---|
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/045776, Oct. 8, 2010, 10pp. |
Reid Simmons et al., “Learning to Predict Driver Route and Destination Intent” , Sep. 17-20, 2006, Proceedings of the 2006 IEEE Intelligent Transportation System Conference, pp. 127-132. |
U.S. Appl. No. 13/569,862, filed Aug. 8, 2012, Cova et al. |
U.S. Appl. No. 13/569,884, filed Aug. 8, 2012, Cova et al. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2009/067210, received Feb. 4, 2010, 9 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2009/067210, received Jun. 23, 2011, 8 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/041994 filed Jul. 14, 2010, received Sep. 14, 2010, 12 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/041994 filed Jul. 14, 2010, received Jan. 17, 2012, 11 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/047042 filed Aug. 27, 2010, received Dec. 27, 2010, 11 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/047042 filed Aug. 27, 2010, received Feb. 28, 2012, 8 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/043795 filed Jul. 29, 2010, received Sep. 17, 2010, 11 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/043795 filed Jul. 29, 2010, received Jan. 31, 2012, 9 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/045776 filed Aug. 17, 2010, received Feb. 21, 2012, 9 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/042014 filed Jul. 14, 2010, Received Sep. 14, 2010, 8 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/042014 filed Jul. 14, 2010, Received Jan. 17, 2012, 7 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/046655, mailed Oct. 20, 2010, 9 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/046655, mailed Mar. 8, 2012, 8 pp. |
International Search Report and Written Opinion of the International Searching Authority, PCT Application Serial No. PCT/US2010/046640 filed Aug. 25, 2010, mailed Oct. 18, 2010, 9 pp. |
International Preliminary Report on Patentability, PCT Application Serial No. PCT/US2010/046640 filed Aug. 25, 2010, mailed Mar. 6, 2012, 8 pp. |
“Hercules “Zigbee” e-Seal Bolt”. Bolt eSeal Electronic Seals—TydenBrooks. Retrieved from the internet: URL<URL: http://www.tydenbrooks.com/Products/Electronic-Seals/Bolt-eSeal.aspx>, Aug. 2, 2012. 2 pages. |
Bajikar, Sundeep. “Trusted Platform Module (TPM) based Security on Notebook PCs—White Paper”, Jun. 20, 2002, Mobile Platforms Group, Intel Corporation. Retrieved from the internet: URL <http://www.intel.com/design/mobile/platform/downloads/Trusted—Platform—Module—White—Paper.pdf>, Aug. 2, 2012. 20 pages. |
Chin, Le-Pong, et al. “The Role of Electronic Container Seal (E-Seal) with RFID Technology in the Container Security Initiatives.” Proceedings of the International Conference on MEMS, NANO and Smart Systems 2004. ICMENS. Aug. 25-27, 2004. pp. 116-120. |
FAQ, Trusted Computing group—Developers. Retrieved from the Internet: URL<http://www.trustedcomputinggroup.org/faq/TPMFAQ/>, Oct. 19, 2010. 2 pages. |
GlobalTrak, “GlobalTrak+ Asset Monitoring Unit,” 2 pages. |
Liaw, M. and Cova, N., “Data Quality Delivered,” A Savi Networks White Paper, copyright 2006, 19 pages. |
Maersk Line, “Maersk Line Shipping Containers Worldwide”. Retrieved from internet: URL<http://www.maerskline.com/link/?page=brochure&path=/our—services/our—e-commerce—services/maerskline.com/the—shipping—process/tracking>, dated Aug. 19, 2009. 7 pages. |
Siror, Joseph, et al. “Impact of RFID Technology on Tracking of Export Goods in Kenya.” From Journal of Convergence Information Technology, vol. 5, No. 9. Nov. 2010. pp. 190-200. |
Hungarian Intellectual Property Office, Written Opinion, Application No. 201201127-6 mailed Dec. 6, 2012, 7 pages. |
Search Report; May 26, 2013; China; 201080031901.7; 4 pages. |
Hungarian Intellectual Property Office, Written Opinion, Singapore Application No. 201201127-6 mailed Aug. 1, 2013, 6 pages. |
U.S. Appl. No. 60/411,042, filed Sep. 17, 2002, 8 pages. |
Bohman, “How can electronic seals assure container integrity that mechanical seals cannot?” Mar. 3, 2003, 19 pages. |
Northwest International Trade Corridor Program Phase Three, “Electronic Container Seals Field Operational Test Project, Task #2, Technology Review Report,” Sep. 15, 2003, 34 pages. |
Science Applications International Corporation, “Container Seal Technologies and Process Phase 1,” Jul. 11, 2003, 114 pages. |
Williams, “Smart transport—a survey of tracking technologies for cargo containers and their transport platforms,” Sep. 2003, 85 pages. |
European Search Report in Application No. 09836733.7, dated Sep. 26, 2013, 3 pages. |
European Search Report in Application No. 13172053.4, dated Oct. 9, 2013, 3 pages. |
European Search Report; Dec. 3, 2012; European Patent Office (EPO); 10800498.7; 3 pages. |
GlobalTrak; GlobalTrak+ Asset Monitoring Unit; GlobalTrak Product Brochure/Datasheet; Pre-Oct. 1, 2009; 2 pages. |
European Search Report for App. No. EP 10 81 2680 dated Jul. 24, 2014, 5 pages. |
European Search Report for App. No. EP 10 81 2585 dated Sep. 24, 2014, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20110133888 A1 | Jun 2011 | US |
Number | Date | Country | |
---|---|---|---|
61234600 | Aug 2009 | US | |
61291232 | Dec 2009 | US |