1. Field of the Present Invention
The present invention relates generally to a system for monitoring smart cargo containers and more specifically to providing a method for auto-pairing a RFID tagged container with an asset monitoring device. Further, the present invention provides a method for authorizing and confirming secure communications through a centralized data processing hub or remote monitoring station (“RMS”) for normalizing system functions from container to container.
2. Background of the Invention
Radio Frequency Identification (RFID) tags are now a common and increasingly fundamental aspect of supply chain management. In conjunction with RFID tags. RFID readers are associated with smart containers and employed to access and track RFID tagged items.
Smart containers are shipping containers which include some sort of Asset Monitoring Device to monitor the interior status of the container. Such monitoring systems generally include: a sensing system for monitoring the contents of the container as well as the exterior environment of the container; an on-board processing system comprising a signal receiving element for receiving sensor data from the sensing system; a communication system; a memory for storing predetermined conditions; and a control element for analyzing received sensor data and declaring security alerts. An example of an exemplary smart container system is disclosed in U.S. Provisional Application 61/454,606 which is hereby incorporated by reference herein.
With the increasing sophistication and inter-networking of smart containers, there is a growing concern about rogue RFID readers gaining unauthorized access to data programmed into RFID tags. Further, there is growing concern regarding the security of communications between RFID readers and between smart containers themselves. Accordingly, there is a strong need for a new method to establish communications between smart container devices. More specifically, a method is needed to efficiently grant an interrogating RFID reader access to the data of a monitored container.
To address the shortcomings of the prior art, the present invention provides a method for automatically pairing a first container monitoring device equipped with a RFID reader and a second container in which stored data is embedded within an RFID tag or data storage device. The present invention provides a protocol for secure access between the first container monitoring device and the second container monitoring device utilizing an authorizing remote monitoring station.
The accompanying drawings, which are incorporated in and constitute part of the specification, illustrate various embodiments of the present invention and together with the description, serve to explain the principles of the present invention.
For the purposes of promoting an understanding of the principles of the present invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the present invention is hereby intended and such alterations and further modifications in the illustrated devices are contemplated as would normally occur to one skilled in the art.
The terms “program,” “computer program,” “software application,” and the like as used herein, are defined as a sequence of instructions designed for execution on a computer system. A program, computer program, or software application may include a subroutine, a function, a procedure, an object implementation, an executable application, an applet, a servlet, a source code, an object code, a shared library, a dynamic load library and/or other sequence of instructions designed for execution on a computer system. A data storage means, as defined herein, includes many different types of computer readable media that allow a computer to read data therefrom and that maintain the data stored for the computer to be able to read the data again. Such data storage means can include, for example, non-volatile memory, such as ROM, Flash memory, battery backed-up RAM, Disk drive memory, CD-ROM, DVD, and other permanent storage media. However, even volatile storage such a RAM, buffers, cache memory, and network circuits are contemplated to serve as such data storage means according to different embodiments of the present invention.
With reference now to
With access granted, the targeted device and the interrogating device may then conduct two-way communications 116 from which the interrogator may then extract the targeting device details and sensor updates. The information may then be relayed to the RMS for backend analysis.
In some instances, it will be preferable for an interrogator device to access and direct a target device's processing system 118 to perform specific tasks. For instance, this action may be necessary as a means of conserving overall energy within the system or as a means of establishing a master coordinating system within a local network to connect into a larger meshed network. In other instances, the interrogating device may select another asset monitoring device as its next target for automatic pairing 124.
Once the devices complete the automatic pairing protocol, the function of the devices may include functioning as a relay node within a larger meshed network of devices. For example, if an asset monitoring device encounters obstructions in transmitting to the RMS, the monitoring device may seek other nearby asset monitoring devices to act as a relay node.
Additional steps in the protocol of automatically pairing devices within a container suite may include the RMS receiving updates and details from the interrogating device 126 to which the RMS applies backend analysis and provides information and updates as ongoing support to the shipping companies and other clients 128.
While the above descriptions regarding the present invention contain much specificity, these should not be construed as limitations on the scope, but rather as examples. Many other variations are possible. Accordingly, the scope should be determined not by the embodiments illustrated, but by the appended claims and their legal equivalents.
Number | Name | Date | Kind |
---|---|---|---|
7378960 | Binding et al. | May 2008 | B1 |
8874734 | Straz | Oct 2014 | B1 |
20060290491 | Wagner et al. | Dec 2006 | A1 |
20080117040 | Peel et al. | May 2008 | A1 |
20090201152 | Karr et al. | Aug 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
61481636 | May 2011 | US |