throbber
US007053823B2
`
`(12)
`
`United States Patent
`Cervinka et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,053,823 B2
`May 30, 2006
`
`(54) SYSTEM AND METHOD FOR CARGO
`PROTECTION
`
`(75) Inventors: Alexandre Cervinka, Montreal (CA);
`assistant A);
`s
`s
`Yvan Castilloux, Montreal (CA)
`(73) Assignee: Newtrak Technologies, Inc., Montreal
`(CA)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 315 days.
`
`1-1.
`(22) Filed:
`(65)
`
`(21) Appl. No.: 10/613,773
`9
`Jul. 3, 2003
`Prior Publication Data
`US 2005/0017899 A1
`Jan. 27, 2005
`Foreign Application Priority Data
`(30)
`Jul. 3, 2002
`(CA)
`2392326
`ll. , 44
`- A) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`(51) Int. Cl.
`(2006.01)
`GOIS 5/14
`(2006.01)
`GSB 3/4
`(2006.01)
`GSB 23/00
`(52) U.S. Cl. ........................... 342/357.07: 342/357.14;
`340/568. 1; 340/572.1
`(58) Field of Classification Search
`342/357.07
`342/357.14 340,426.18.426 19 53913.
`• u. Is
`• u. Yos
`701 727
`See application file for complete search histo
`pp
`p
`ry.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`3,961,166 A
`6, 1976 Stobart ....................... 701. 217
`4,107,689 A * 8/1978 Jellinek ...................... 340,991
`4,254,465. A
`3/1981 Land .......................... TO1,220
`4,758,959 A
`7, 1988 Thoone et al. .............. TO1,221
`4,838,570 A
`6, 1989 Toikka et al. ............... 280/507
`
`5,142,278 A
`5,223,844 A
`5,311,173 A
`
`8/1992 Moallemi et al. ........... 340,436
`6/1993 Mansell et al. ........ 342,357. O7
`5/1994 Komura et al. ........ 340,995.22
`
`2. A
`al- - - - - - - - - - - - - - - - - - - -7 3.
`E. Me
`wwal
`TOyle et al. . . . . . . . . . . . . . . .
`5,870,029 A * 2/1999 Otto et al. .....
`340,825.36
`5,941,934 A
`8/1999 Sato ........................... TO1,213
`5,986,543 A 1 1/1999 Johnson ................. 340,426.19
`5.991,692 A 11, 1999 S
`II et al. ......... 701/217
`6,024,655 A
`2/2000
`is team 473/4O7
`6,067,007 A
`5/2000 Gioia .................... 340,426.19
`6,111,539 A
`8/2000 Mannings et al. ..... 342,357.09
`6,150,923 A 1 1/2000 Johnson et al. .......... 340,384.6
`6,169,515 B1
`1/2001 Mannings et al. ....... 342,357.1
`6,188,959 B1
`2/2001 Schupfner ................... 701. 217
`6,308,134 B1
`10/2001 Croyle et al. .....
`... 701 (220
`6,317,683 B1
`11/2001 Ciprian et al. ...
`... 701 118
`6,327,533 B1
`12/2001 Chou ......................... 7O1/2O7
`6,339,370 B1
`1/2002 Riihl et al. .................. 340,436
`6,367,888 B1
`4/2002 Kee et al. ..................... 303,89
`6,378,959 B1
`4/2002 Lesesky et al. ........ 303,122.02
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`O814346 A1 * 12/1997
`(Continued)
`Primary Examiner—Gregory C. Issing
`(74) Attorney, Agent, or Firm Robert Brouillette
`
`(57)
`
`ABSTRACT
`
`Y
`A method and system for the detection, notification and
`tracking of cargo theft proposes to install, inside cargo to be
`protected, a tracking device having communication and dead
`reckoning capabilities. As long as the tracking device senses
`that it is within a virtual fence generated by an access point,
`it lays dormant. When the tracking device senses that it is no
`longer within the virtual fence it activates the dead reckon
`ing capabilities and communicates with a central server to
`Supply dead reckoning data thereto. The central server
`processes this data and determines the current location of the
`CargO.
`
`25 Claims, 8 Drawing Sheets
`
`THE ACCESS POINT PERIODICALLY
`RECEIVES A GPS POSITIONSIGNAL
`
`ite
`
`THE ACCESS POINT PERIODICALLY TRANSMITS
`THE GPS POSITIONSIGNATO THE TRACKING
`DEVICE WIA THE RELESSIAN TRANSCEIVER
`
`fif
`
`ISHE TRACKNG DECE STL,
`NHE VIRTUAL FENCE
`
`
`
`
`
`
`
`
`
`
`
`DOES THE
`RACKN DECE
`YESYFROM THE ACCESS
`PDIN
`
`fa
`
`START DATA ACQUISTION FROM
`THE DEAD RECKONING SENSORS
`
`
`
`ff
`
`IFNOTALREADY DONE, START
`DATA ACQUISTION FROM THE
`DEAD RECKONING SENSORS
`
`TRANSMIT THEAST RECEIVED
`CPS POSITION DATA AND THE
`DEAD RECKONING DATA TO THE
`CENTRAL SERVER WIA A
`CELULAR LINK
`
`
`
`ifa
`
`ffs
`
`IPR2020-01192
`Apple EX1009 Page 1
`
`

`

`US 7,053,823 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`6,738,628 B1* 5/2004 McCall et al. ........... 455,456.1
`6,801,159 B1 * 10/2004 Swope et al. .......... 342.357.14
`6,850,844 B1* 2/2005 Walters et al. .............. TO1,216
`6.961,001 B1 * 1 1/2005 Chang et al. ..
`340,573.4
`6,975,229 B1* 12/2005 Carrender ................ 340,572.4
`2002fOO59075 A1
`5/2002 Schick et al. .................. 70.5/1
`2002/0113735 A1* 8/2002 Spratt ............
`342/.464
`2002/0115436 A1
`8/2002 Howell et al. .............. 455.426
`2002/0177476 A1* 11/2002 Chou ......................... 455,574
`2003/0006931 A1* 1/2003 Mages ................... 342.357.06
`
`
`
`2003/009101.0 A1* 5/2003 Garahi et al. ............... 370,338
`2004/0021569 A1* 2/2004 Lepkofker et al. ....... 340,568.1
`FOREIGN PATENT DOCUMENTS
`
`EP
`GB
`WO
`WO
`WO
`
`6, 1999
`O 919 442 A2
`2025 185 A * 1, 1980
`OO62664
`10, 2000
`OO62664 A1 10, 2000
`O2,39063
`5, 2002
`
`* cited by examiner
`
`IPR2020-01192
`Apple EX1009 Page 2
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 1 of 8
`
`US 7,053,823 B2
`
`07
`
`
`
`NJSd
`
`NOINLOGINN00
`
`IPR2020-01192
`Apple EX1009 Page 3
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 2 of 8
`
`US 7,053,823 B2
`
`
`
`NJSd
`
`NOINLOGINN00
`
`IPR2020-01192
`Apple EX1009 Page 4
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 3 of 8
`
`US 7,053,823 B2
`
`
`
`26
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`f4
`
`DEAD RECKONING
`MODULE
`
`r r - - - - - - - - - - - - - - - - - - - -
`
`re- or me - - - - - - - - - - - - - - - - - -
`
`- - - - - - - - - - - - - - - - - - as an
`
`arm - - - - - - - - - - - - - - - - - -
`
`- - - - - - - - - - - - - - - - - - - - - -
`
`r r - - - - - - - - -
`
`- - - - - - - - -
`
`ELECTROLYTIC
`TILT SENSOR
`THERMISTOR r
`
`- - - - - - - - - - - - - - - - - - - - -
`
`-----------------
`
`-----------------
`
`TRACKING DEVICE
`Fras
`
`30
`
`---.59
`
`--39
`
`--- 40
`
`IPR2020-01192
`Apple EX1009 Page 5
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 4 of 8
`
`US 7,053,823 B2
`
`
`
`12
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`GPS
`RECEIVER
`
`WIRELESS
`LAN
`TRANSCEIVER
`
`CELLULAR
`TRANSCEIVER
`
`49
`
`60
`
`62
`
`MOBILE ACCESS POINT
`
`is 4A
`
`IPR2020-01192
`Apple EX1009 Page 6
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 5 of 8
`
`US 7,053,823 B2
`
`
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`WIRELESS
`LAN
`TRANSCEIVER
`
`CELLULAR
`TRANSCEIVER
`
`£4
`
`60
`
`£52
`
`FIXED ACCESS POINT
`
`FEEF-4E,
`
`IPR2020-01192
`Apple EX1009 Page 7
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 6 of 8
`
`US 7,053,823 B2
`
`
`
`
`
`POSITIONNING AT LEAST ONE ACCESS POINT
`SO THAT A WIRTUAL FENCE IS CREATED;
`THE VIRTUAL FENCE BEING GENERATED
`BY THE RANGE OF THE WIRELESS LAN
`TRANSCEIVERS OF THE AT LEAST ONE ACCESS POINT
`
`f00
`
`
`
`ENERGIZING ATRACKING DEWICE AND
`PLACING IT WHITHIN THE VIRTUAL FENCE
`
`f(22
`
`PLACING THE OPERATIONAL TRACKING
`DEVICE IN A CARGO TO BE PROTECTED
`
`
`
`104
`
`Fras F.
`
`IPR2020-01192
`Apple EX1009 Page 8
`
`

`

`U.S. Patent
`
`May 30, 2006
`
`Sheet 7 of 8
`
`US 7,053,823 B2
`
`THE ACCESS POINT PERIODICALLY - 16
`RECEIVES A GPS POSITION SIGNAL
`
`THE ACCESS POINT PERIODICALLY TRANSMITS
`THE GPS POSITION SIGNAL TO THE TRACKING
`DEWICE WIA THE WIRELESS LAN TRANSCEIVER
`
`106
`
`170
`
`IS THE TRACKING DEWICE STILL
`IN THE WIRTUAL FENCE 2
`
`NO
`
`116
`
`DOES THE
`TRACKING DEVICE
`RECEIVES GPS INFORMATION
`FROM THE ACCESS
`POINT 2
`
`
`
`IF NOT ALREADY DONE, START
`DATA ACQUISITION FROM THE
`DEAD RECKONING SENSORS
`
`START DATA ACQUISITION FROM
`THE DEAD RECKONING SENSORS
`
`TRANSMIT THE LAST RECEIVED
`GPS POSITION DATA AND THE
`DEAD RECKONING DATA TO THE
`CENTRAL SERVER WIA A
`CELLULAR LINK
`
`f/4
`
`f/6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2020-01192
`Apple EX1009 Page 9
`
`

`

`U.S. Patent
`
`May 30
`
`2006
`
`Sheet 8 of 8
`
`US 7,053,823 B2
`
`Á?
`
`(7/.
`
`HGHAHHS
`
`
`
`NJSd.
`
`NOIJ,00HNN00
`
`IPR2020-01192
`Apple EX1009 Page 10
`
`

`

`US 7,053,823 B2
`
`1.
`SYSTEMAND METHOD FOR CARGO
`PROTECTION
`
`FIELD OF THE INVENTION
`
`The present invention generally relates to theft detection,
`notification and tracking. More specifically, the present
`invention is concerned with a system and method for the
`detection, notification and tracking of cargo theft.
`
`BACKGROUND OF THE INVENTION
`
`2
`reckoning module; the communication module being con
`figured to communicate with a central server; and
`an access point including a movement detector and a
`communication module configured to communicate with the
`tracking device communication module; the access point
`being so configured as to periodically communicate with the
`tracking device;
`wherein the tracking device is so configured that when the
`communication between the tracking module and the access
`point is lost, dead reckoning data from the dead reckoning
`module are transmitted by the tracking module to the central
`server via the communication module of the tracking device.
`According to a third aspect of the present invention, there
`is provided a system for the protection of cargo comprising:
`cargo tracking means including communication means
`and dead reckoning means; the communication means being
`configured to communicate with a central server; and
`means for creating a virtual fence around the cargo; the
`virtual fence creating means including means for receiving
`GPS position data and communication means configured to
`communicate with the communication means of the cargo
`tracking means; the virtual fence creating means being so
`configured as to periodically supply GPS position data to the
`cargo tracking means;
`wherein when the communication between the cargo
`tracking means and the virtual fence creating means is lost,
`a last received GPS position data and dead reckoning data
`from the dead reckoning means are transmitted to the central
`server via the cargo tracking means communication means.
`According to yet another aspect of the present invention
`there is provided a method for the protection of cargo
`comprising the acts of:
`providing a cargo tracking device to a cargo; the cargo
`tracking device including a communication module and a
`dead reckoning module;
`creating a virtual fence around the cargo;
`providing GPS position data to the cargo tracking device
`while the cargo is within the virtual fence;
`when the cargo exits the virtual fence:
`obtaining dead reckoning data from the dead reckoning
`module;
`transmitting a last received GPS position data to a central
`server via the communication module of the cargo tracking
`device; and
`transmitting dead reckoning data to a central server via
`the communication module of the cargo tracking device.
`It is to be noted that the expression “GPS is to be
`construed herein and in the appended claims as both the
`conventional Global Positioning System and as any similar
`system adequate to Supply the absolute position of an object.
`It is also to be noted that the expression “virtual fence” is
`to be construed herein and in the appended claims as a the
`outer perimeter of a single “bubble' or as the outer perimeter
`of a plurality of intersecting bubbles as will be further
`described hereinbelow.
`Other objects, advantages and features of the present
`invention will become more apparent upon reading of the
`following non-restrictive description of preferred embodi
`ments thereof, given by way of example only with reference
`to the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the appended drawings:
`FIG. 1 is a diagram illustrating a system for cargo
`protection according to an embodiment of the present inven
`tion where the cargo is within a transport trailer;
`
`With the increasing popularity of the Global Positioning
`System (hereinafter “GPS) finding the absolute position of
`an object above ground is now a relatively easy task. By
`combining a GPS receiver and a cellular phone transceiver
`and mounting the resulting device to a vehicle, it is also
`relatively easy to supply the position of the vehicle to a
`central location when the vehicle is reported as being stolen.
`Accordingly, the prior art is replete with documents
`describing Such systems and improvements to Such systems.
`U.S. patent application Ser. No.2002/0115436A1 entitled
`“Telematic System” and published on Aug. 22, 2002; and
`U.S. Pat. No. 5,986,543 entitled “Programmable vehicle
`monitoring and security system having multiple access
`verification devices’ issued on Nov. 16, 1999 are good
`examples of Such documents.
`Since these methods and systems aim at tracking vehicles,
`it is possible to position the GPS receiver antenna so that it
`can receive the faint GPS signals used to compute the
`absolute position of the vehicle. However, such systems may
`not be used to track a device concealed in cargo since cargo
`is usually contained in enclosed spaces, such as trailers or
`warehouses, thereby further attenuating the already faint
`GPS signals.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`OBJECTS OF THE INVENTION
`
`An object of the present invention is therefore to provide
`a system and method for cargo protection.
`
`40
`
`SUMMARY OF THE INVENTION
`
`45
`
`More specifically, in accordance with the present inven
`tion, there is provided a system for the protection of cargo
`comprising:
`a tracking device to be inserted in a cargo; the tracking
`device including a communication module and a dead
`reckoning module; the communication module being con
`50
`figured to communicate with a central server; and
`an access point including a GPS receiver and a commu
`nication module configured to communicate with the track
`ing device communication module; the access point being so
`configured as to periodically supply GPS position data to the
`tracking device;
`wherein the tracking device is so configured that when the
`communication between the tracking module and the access
`point is lost, a last received GPS position data and dead
`reckoning data from the dead reckoning module are trans
`mitted by the tracking module to the central server via the
`communication module of the tracking device.
`According to another aspect of the present invention,
`there is provided a system for the protection of cargo
`comprising:
`a tracking device to be inserted in a cargo; the tracking
`device including a communication module and a dead
`
`55
`
`60
`
`65
`
`IPR2020-01192
`Apple EX1009 Page 11
`
`

`

`US 7,053,823 B2
`
`3
`FIG. 2 is a diagram illustrating the system of FIG. 1 where
`the cargo is within a warehouse;
`FIG. 3 is a block diagram of a tracking device that is part
`of the system of FIG. 1;
`FIG. 4A is a block diagram of a mobile access point that
`is part of the system of FIG. 1;
`FIG. 4B is a block diagram of a fixed access point that is
`part of the system of FIG. 2;
`FIG. 5 is a flowchart illustrating the setup of the system
`of FIG. 1;
`FIG. 6 is a flowchart illustrating the operation of the
`system of FIG. 1; and
`FIG. 7 is a diagram illustrating a plurality of stolen cargo
`in a trailer not provided with an access point.
`
`DETAILED DESCRIPTION
`
`10
`
`15
`
`25
`
`30
`
`4
`inserted in a cargo to be protected in any orientation. The use
`of a thermistor 40 is also interesting since it allows a better
`modeling of the sensors present in the dead reckoning
`module. It is also to be noted that the number and nature of
`the dead reckoning sensors used in the dead reckoning
`module 32 may vary, for example in function of the sensi
`bility and precision of the various sensors.
`The controller 24 is supplied by the power source 22 and
`is connected to both the communication module 26 and to
`the dead reckoning module. As it will be further described
`hereinbelow, the controller 24 may send and receive data
`to/from the access point 12 via the communication module
`26 and receive dead reckoning data from the dead reckoning
`module 32 and store this data in its memory and/or send it
`via the communication module 26.
`The tracking device 14 could be equipped with other
`elements such as a high-frequency sound generator, to help
`retrieve the device 14 once it is no longer required, and
`status LEDs.
`A tracking device could be designed using a controller
`made by Texas Instruments under part number TMS320
`5470; a MEMS (microelectromechanical system) acceler
`ometer made by Analog Devices under part number
`ADLX203 (mounted in 3D); a MEMS gyroscope made by
`Analog Devices under part number ADXRS150 (mounted in
`3D), a magnetometer made by Honeywell under part num
`ber HMC 1052 (mounted in 3D), an electronic compass
`made by Phillips under part number KMZ 51 (mounted in
`3D), and an electrolytic tilt sensor made by Fredericks under
`part number 0717-4304 (mounted on 6 faces of a cube).
`The wireless LAN transceiver 28 could use 802.11b,
`Bluetooth or proprietary spread-spectrum or ultra-wideband
`communication schemes. For example, the wireless LAN
`transceiver Spectrum24 made by Symbol could be used.
`The cellular transceiver 30 could use IS-95 based CDMA
`(Code Division Multiple Access). For example, the cellular
`transceiver CDM-820-B made by Semax Wireless could be
`used. Of course, the cellular technology used should be
`compatible with the cellular network 16.
`Turning now to FIG. 4A of the appended drawings the
`various elements forming a mobile access point 12 will be
`described.
`The mobile access point 12 includes a power Source 42,
`usually in the form of a connection to a battery of the vehicle
`to which the access point 12 is to be mounted, a controller
`44 including memory, a GPS receiver 46 connected to the
`controller 44 and a communication module 48 also con
`nected to the controller 44.
`The communication module 48 includes a wireless LAN
`transceiver 50 and a cellular transceiver 52.
`The controller 44 is supplied by the power source 42 and
`receives GPS position data from the GPS receiver 46 and
`may send and receive data to/from the tracking device 14
`and to/from the central server 10 via the communication
`module 48.
`A mobile access point could be made using a controller
`made Texas Instruments under part number TMS320-5470
`and a GPS receiver made by Trimble under part number
`Lassen LP. As it will easily be understood by one skilled in
`the art, the wireless LAN transceiver 50 uses the same
`technology as the wireless LAN transceiver 26 of the
`tracking device 14.
`Turning now briefly to FIG. 4B of the appended drawings,
`a fixed access point 12" will be described. It is to be noted
`that since the fixed access point 12' is very similar to the
`mobile access point 12 described hereinabove and illustrated
`
`In a nutshell, an embodiment of the present invention
`proposes to install, inside cargo to be protected, a tracking
`device having communication and dead reckoning capabili
`ties. As long as the tracking device senses that it is within a
`virtual fence generated by at least one access point, it lays
`dormant. When the tracking device senses that it is no longer
`within the virtual fence it activates the dead reckoning
`capabilities and communicates with a central server to
`Supply dead reckoning data thereto. The central server
`processes this data and determines the current location of the
`CargO.
`FIGS. 1 and 2 of the appended drawings illustrate a
`system for cargo protection where the cargo is located in a
`transport trailer and in a warehouse, respectively.
`The cargo protection system includes a central server 10,
`an access point 12 and a tracking device 14. The central
`server 10 is in communication with a cellular network
`(represented by a cellular tower 16), for example via a PSTN
`35
`(public switched telephone network) line. Optionally, the
`central server also has a link to a computer network Such as
`the internet 18 and has other PSTN communication capa
`bilities.
`The access point 12 receives data from a GPS network 20
`and may communicate with the central server 10 via the
`cellular network 16. As it will be further described herein
`below, the reception of data from a GPS network by the
`access point 12" of FIG. 2 is optional since the access point
`12' is a so-called fixed access point.
`The tracking device 14 communicates with the access
`point 12, via a wireless LAN (Local Area Network) for
`example, and with the central server 10 via the cellular
`network 16.
`Turning now to FIG. 3 of the appended drawings, the
`various elements forming a tracking device 14 will be
`described.
`The tracking device 14 includes a power source 22,
`usually in the form of a rechargeable battery, a controller 24
`including memory, a communication module 26 including a
`wireless LAN transceiver 28 and a cellular transceiver 30
`and a dead reckoning module 32 including various dead
`reckoning sensors such as, for example a 3D accelerometer
`34, a 3D gyroscope 36, a 3D magnetometer 37, a 3D
`electronic compass 38, a 3D electrolytic tilt sensor 39 and a
`thermistor 40.
`It is to be noted that dead reckoning techniques are
`believed well known in the art. Accordingly, these tech
`niques will not be discussed in detail herein. However, it is
`to be noted that the use of 3D sensors such as accelerom
`eters, gyroscopes, magnetometers and electronic compasses
`is advantageous since it allows the tracking device to be
`
`55
`
`40
`
`45
`
`50
`
`60
`
`65
`
`IPR2020-01192
`Apple EX1009 Page 12
`
`

`

`US 7,053,823 B2
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`5
`in FIG. 4A, only the differences between these access points
`will be described hereinbelow.
`The fixed access point 12' does not include a GPS receiver
`since it is not supposed to move. Indeed, as illustrated in
`FIG. 2, the fixed access point 12' is intended to be mounted
`to a warehouse or other similar fixed objects.
`For security purposes, the fixed access point 12" includes
`a movement detector 54 connected to the controller 44 so
`that the controller 44 receives an alarm signal should some
`body try to move the fixed access point 12 without proper
`authorization. One skilled in the art will understand that the
`movement detector 54 could be an accelerometer, a gyro
`scope, a tilt sensor or even a GPS receiver that sends the
`appropriate alarm signal to the controller 44 should move
`ment be detected. Of course, other movement sensing tech
`nologies could be used.
`The setup of the cargo protection system will now be
`described with reference to FIG. 5 which is a general block
`diagram thereof.
`In a first step 100, a virtual fence is generated by at least
`one access point 12. More specifically, the virtual fence is
`generated by the “bubbles' creates by the range of the
`wireless LAN transceiver 50 of the access point. In other
`words, the tracking device 14 will know that it is within the
`virtual fence when the wireless LAN transceiver 28 detects
`the wireless LAN transceiver 50. The access point 12 is
`therefore carefully positioned. As it will be understood by
`one skilled in the art, the size of the bubble may be adjusted
`by adjusting the range of the wireless LAN transceiver 50.
`As will easily be understood by one skilled in the art the
`bubble could be created by other means. For example,
`should a predetermined perimeter of bubble be desired, the
`propagating time of RF signals from the tracking device to
`the access point could be measured by the tracking device
`and/or the access point to determine if the tracking device is
`within the bubble.
`Bubbles are schematically illustrated in dashed lines in
`FIGS. 1 and 2. In FIG. 1, the mobile access point 12 is
`mounted on the roof of the trailer 58 so that the bubble 60
`covers the entire trailer 58. It is to be noted that the GPS
`40
`antenna (not shown), which can be integrated within the
`body of the access point 12 or connected to the access point
`12 via a wire, is mounted outside the trailer 58 to improve
`GPS signals reception. In FIG. 2, the fixed access point 12
`is mounted on the roof of a warehouse 62 so that the bubble
`64 covers the entire warehouse 62.
`As noted hereinabove, a virtual fence may be created by
`more than one access point. Indeed, since each access point
`creates a bubble, a virtual fence would be the outer limit of
`the intersecting bubbles. Seamless roaming between over
`lapping access point coverage does not cause an alarm.
`Accordingly, when a trailer equipped with an access point 12
`is so positioned that its bubble intersects the bubble of the
`access point 12 of a warehouse and that a tracking device
`containing cargo is transferred from the warehouse to the
`trailer, or Vice-versa, no alarm is generated. Therefore, the
`virtual fence may be viewed as extending from one ware
`house to another via an access point equipped trailer.
`In other words, if the owner of a cargo protection system
`according to the present invention has equipped each ware
`house and trailer with an access point, the virtual fence of the
`system covers the entire area where the cargo may be stored
`with the owner's premises and moved therebetween.
`Accordingly, the movement of tracking devices within the
`virtual fence will not cause alarms to be triggered.
`It is also to be noted that while the bubbles are illustrated
`as having a generally spherical shape, it is not always the
`
`50
`
`45
`
`55
`
`60
`
`65
`
`6
`case. Indeed, the shape and coverage of the “bubble' created
`by each access point depend on the antenna of the wireless
`LAN transceiver. For instance, a standard omni-directional
`antenna will broadcast in all directions (as illustrated in the
`appended figures), an array of two antennas will produce an
`8 shape etc. Accordingly, it is not necessary to install the
`access point on the roof to cover the warehouse or trailer.
`The same effects could be achieved by placing the wireless
`LAN transceiver on the floor. Furthermore, in the case of the
`mobile access points, only the antenna of the GPS receiver
`need to be installed on the roof of the trailer to better receive
`the faint GPS signals; the rest of the access point could be
`installed inside the trailer. A major difference with the
`protection systems of the prior art is that the access point
`need not be concealed but could be positioned in plain sight,
`since the disabling of the access point automatically causes
`the tracking devices to generate alarm signals.
`A second step 102 consists in powering a tracking device
`14. When an operating tracking device 14 enters a virtual
`fence, it will initiate the communication with the access
`point 12 since an operating tracking device 14 periodically
`scans its environment to find a virtual fence. When in a
`virtual fence, the tracking device 14 will authenticate itself
`by sending its ID to the nearest access point and periodically
`receive authentication (ID) data from the access point 12 via
`their respective wireless LAN transceivers.
`The next step is the insertion of the operational tracking
`device 14 in the cargo to be protected. Since the dead
`reckoning sensors used are advantageously 3D sensors, the
`orientation of the tracking device 14 inside the cargo is not
`critical. Therefore, it is easier to hide the tracking device 14
`in the cargo. It is also to be noted that since the tracking
`device does not receive GPS signals or other such signals
`requiring a line-of-sight between the sender and the receiver,
`the tracking device 14 may be inserted inside the cargo.
`FIGS. 1 and 2 illustrate the tracking device 14 inserted in
`a cargo 66 in the form of a pallet of boxes.
`Once the setup of the system is completed, the operation
`of the cargo protection system may begin.
`FIG. 6 of the appended drawings shows a general block
`diagram of the operation of the system when a mobile access
`point 12 is used.
`Block 106 indicates that the access point 12 periodically
`receives position data from the GPS network 20. More
`specifically, the GPS position data is received by the CPS
`receiver 46 and transferred to the controller 44.
`Block 108 indicates that the GPS position data received
`from the GPS receiver 46 is retransmitted to the tracking
`device 14. More specifically, the controller 44 supplies the
`GPS position data to the wireless LAN transceiver 50 that
`transmits it to any and all tracking devices 14 within the
`bubble 60.
`Block 106 and 108 are repeated as long as the GPS
`receiver 46 receives GPS position data from the GPS
`network 20.
`While the blocks 106 and 108 are repeated, the tracking
`device 14 periodically verifies that it is within the bubble 60.
`In other words, the tracking device 14 verifies that its
`wireless LAN transceiver 28 detects the wireless LAN
`transceiver 50 of the access point 12. Block 110 illustrates
`this step.
`If the tracking device 14 detects that it is still within the
`bubble 60, it verifies that it still receives GPS position data
`from the access point 12 (block 112).
`If the GPS position data is still received the system goes
`back to block 110.
`
`IPR2020-01192
`Apple EX1009 Page 13
`
`

`

`US 7,053,823 B2
`
`8
`7
`of the cargo via the PSTN capabilities of the server 10; the
`Should the tracking device 14 detect that it no longer
`driver of the tractor-trailer could be contacted via the cellular
`receives GPS position data from the access point 12, it starts
`network 16 to ensure that it is not a false alarm and/or the
`data acquisition from the dead reckoning sensors (block
`owner of the cargo could be contacted via the internet 18.
`114). More specifically, the controller 24 energizes the dead
`When the system uses a fixed access point 12" as illus
`reckoning module 32 and the various dead reckoning sen- 5
`trated in FIG. 2, the operation of the system for cargo
`sors included in this module start sending dead reckoning
`protection is very similar. The main difference resides in the
`data to the controller 24 that stores it in its memory. Of
`lack of a GPS receiver in the fixed access point 12'. When
`course, to be useful, the dead reckoning data is time-stamped
`a tracking device containing cargo leaves the bubble 64, the
`by the controller 24.
`While many non-alarming reasons exist for the loss of 10 tracking device 14 sends the known location of the ware
`reception of GPS position data, such as for example, the
`house 62 and the dead reckoning data acquired through the
`passage of the trailer through a tunnel, the loss of GPS
`dead reckoning module 32. It is to be noted that the cargo is
`position data can also be caused by an attempt to steal the
`free to be moved within the bubble without triggering an
`cargo. For example, the first step of an attempt to steal the
`alarm.
`cargo could be to damage the exposed GPS receiver antenna 15
`It is to be noted that while only one cargo containing a
`(not shown) that is usually positioned on top of the trailer.
`tracking device 14 is illustrated in FIGS. 1 and 2, many such
`It is therefore interesting to start the dead reckoning data
`cargos could be shipped in the same trailer or stored in the
`acquisition as soon as the GPS position data reception is
`same warehouse. Furthermore, when more than one tracking
`stopped.
`device is present in the same bubble, they may communicate
`Should the GPS position data reception resume, the 20 with one another via their respective wireless LAN trans
`controller 24 erases the stored dead reckoning data.
`ceiver to create an ad-hoc network of tracking devices. This
`If, in block 110, the tracking device 14 detects that it is no
`may prove interesting since they may share dead reckoning
`longer within the bubble, the dead reckoning module 32 is
`data to improve accuracy. Similarly, the tracking devices
`energized and dead reckoning data acquisition is started
`may take turn at contacting the central server 10 via the
`(block 116), if it was not already started in block 114.
`25 cellular network to thereby decrease overall power con
`In block 118, the last received GPS position data and the
`Sumption and increase their respective battery life.
`acquired dead reckoning data is sent to the central server 10.
`FIG. 7 of the appended drawings schematically illustrates
`More specifically, the controller 24 transmits this data to the
`a trailer 200 in which three cargo. 66A, 66B and 66C
`central server 10 via the cellular transceiver 30 that com-
`equipped with respective tracking devices 14A, 14B and
`municates with the cellular network 16. It is to be noted that 30 14C. Since the tracking devices are no longer within the
`the system of the present invention may include anti-
`virtual fence, their dead reckoning capabilities are enabled.
`jamming features to ensure that the cellular communication
`As can be seen from this Figure the three tracking devices
`between the transceiver 30 and the cellular network 16 is
`communicate their dead reckoning data and control infor
`establ

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket