`
`(12)
`
`United States Patent
`Cervinka et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,053,823 B2
`May 30, 2006
`
`(54) SYSTEM AND METHOD FOR CARGO
`PROTECTION
`
`(75) Inventors: Alexandre Cervinka, Montreal (CA);
`assistant A);
`s
`s
`Yvan Castilloux, Montreal (CA)
`(73) Assignee: Newtrak Technologies, Inc., Montreal
`(CA)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 315 days.
`
`1-1.
`(22) Filed:
`(65)
`
`(21) Appl. No.: 10/613,773
`9
`Jul. 3, 2003
`Prior Publication Data
`US 2005/0017899 A1
`Jan. 27, 2005
`Foreign Application Priority Data
`(30)
`Jul. 3, 2002
`(CA)
`2392326
`ll. , 44
`- A) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`(51) Int. Cl.
`(2006.01)
`GOIS 5/14
`(2006.01)
`GSB 3/4
`(2006.01)
`GSB 23/00
`(52) U.S. Cl. ........................... 342/357.07: 342/357.14;
`340/568. 1; 340/572.1
`(58) Field of Classification Search
`342/357.07
`342/357.14 340,426.18.426 19 53913.
`• u. Is
`• u. Yos
`701 727
`See application file for complete search histo
`pp
`p
`ry.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`3,961,166 A
`6, 1976 Stobart ....................... 701. 217
`4,107,689 A * 8/1978 Jellinek ...................... 340,991
`4,254,465. A
`3/1981 Land .......................... TO1,220
`4,758,959 A
`7, 1988 Thoone et al. .............. TO1,221
`4,838,570 A
`6, 1989 Toikka et al. ............... 280/507
`
`5,142,278 A
`5,223,844 A
`5,311,173 A
`
`8/1992 Moallemi et al. ........... 340,436
`6/1993 Mansell et al. ........ 342,357. O7
`5/1994 Komura et al. ........ 340,995.22
`
`2. A
`al- - - - - - - - - - - - - - - - - - - -7 3.
`E. Me
`wwal
`TOyle et al. . . . . . . . . . . . . . . .
`5,870,029 A * 2/1999 Otto et al. .....
`340,825.36
`5,941,934 A
`8/1999 Sato ........................... TO1,213
`5,986,543 A 1 1/1999 Johnson ................. 340,426.19
`5.991,692 A 11, 1999 S
`II et al. ......... 701/217
`6,024,655 A
`2/2000
`is team 473/4O7
`6,067,007 A
`5/2000 Gioia .................... 340,426.19
`6,111,539 A
`8/2000 Mannings et al. ..... 342,357.09
`6,150,923 A 1 1/2000 Johnson et al. .......... 340,384.6
`6,169,515 B1
`1/2001 Mannings et al. ....... 342,357.1
`6,188,959 B1
`2/2001 Schupfner ................... 701. 217
`6,308,134 B1
`10/2001 Croyle et al. .....
`... 701 (220
`6,317,683 B1
`11/2001 Ciprian et al. ...
`... 701 118
`6,327,533 B1
`12/2001 Chou ......................... 7O1/2O7
`6,339,370 B1
`1/2002 Riihl et al. .................. 340,436
`6,367,888 B1
`4/2002 Kee et al. ..................... 303,89
`6,378,959 B1
`4/2002 Lesesky et al. ........ 303,122.02
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`O814346 A1 * 12/1997
`(Continued)
`Primary Examiner—Gregory C. Issing
`(74) Attorney, Agent, or Firm Robert Brouillette
`
`(57)
`
`ABSTRACT
`
`Y
`A method and system for the detection, notification and
`tracking of cargo theft proposes to install, inside cargo to be
`protected, a tracking device having communication and dead
`reckoning capabilities. As long as the tracking device senses
`that it is within a virtual fence generated by an access point,
`it lays dormant. When the tracking device senses that it is no
`longer within the virtual fence it activates the dead reckon
`ing capabilities and communicates with a central server to
`Supply dead reckoning data thereto. The central server
`processes this data and determines the current location of the
`CargO.
`
`25 Claims, 8 Drawing Sheets
`
`THE ACCESS POINT PERIODICALLY
`RECEIVES A GPS POSITIONSIGNAL
`
`ite
`
`THE ACCESS POINT PERIODICALLY TRANSMITS
`THE GPS POSITIONSIGNATO THE TRACKING
`DEVICE WIA THE RELESSIAN TRANSCEIVER
`
`fif
`
`ISHE TRACKNG DECE STL,
`NHE VIRTUAL FENCE
`
`
`
`
`
`
`
`
`
`
`
`DOES THE
`RACKN DECE
`YESYFROM THE ACCESS
`PDIN
`
`fa
`
`START DATA ACQUISTION FROM
`THE DEAD RECKONING SENSORS
`
`
`
`ff
`
`IFNOTALREADY DONE, START
`DATA ACQUISTION FROM THE
`DEAD RECKONING SENSORS
`
`TRANSMIT THEAST RECEIVED
`CPS POSITION DATA AND THE
`DEAD RECKONING DATA TO THE
`CENTRAL SERVER WIA A
`CELULAR LINK
`
`
`
`ifa
`
`ffs
`
`IPR2020-01192
`Apple EX1009 Page 1
`
`
`
`US 7,053,823 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`6,738,628 B1* 5/2004 McCall et al. ........... 455,456.1
`6,801,159 B1 * 10/2004 Swope et al. .......... 342.357.14
`6,850,844 B1* 2/2005 Walters et al. .............. TO1,216
`6.961,001 B1 * 1 1/2005 Chang et al. ..
`340,573.4
`6,975,229 B1* 12/2005 Carrender ................ 340,572.4
`2002fOO59075 A1
`5/2002 Schick et al. .................. 70.5/1
`2002/0113735 A1* 8/2002 Spratt ............
`342/.464
`2002/0115436 A1
`8/2002 Howell et al. .............. 455.426
`2002/0177476 A1* 11/2002 Chou ......................... 455,574
`2003/0006931 A1* 1/2003 Mages ................... 342.357.06
`
`
`
`2003/009101.0 A1* 5/2003 Garahi et al. ............... 370,338
`2004/0021569 A1* 2/2004 Lepkofker et al. ....... 340,568.1
`FOREIGN PATENT DOCUMENTS
`
`EP
`GB
`WO
`WO
`WO
`
`6, 1999
`O 919 442 A2
`2025 185 A * 1, 1980
`OO62664
`10, 2000
`OO62664 A1 10, 2000
`O2,39063
`5, 2002
`
`* cited by examiner
`
`IPR2020-01192
`Apple EX1009 Page 2
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 1 of 8
`
`US 7,053,823 B2
`
`07
`
`
`
`NJSd
`
`NOINLOGINN00
`
`IPR2020-01192
`Apple EX1009 Page 3
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 2 of 8
`
`US 7,053,823 B2
`
`
`
`NJSd
`
`NOINLOGINN00
`
`IPR2020-01192
`Apple EX1009 Page 4
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 3 of 8
`
`US 7,053,823 B2
`
`
`
`26
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`f4
`
`DEAD RECKONING
`MODULE
`
`r r - - - - - - - - - - - - - - - - - - - -
`
`re- or me - - - - - - - - - - - - - - - - - -
`
`- - - - - - - - - - - - - - - - - - as an
`
`arm - - - - - - - - - - - - - - - - - -
`
`- - - - - - - - - - - - - - - - - - - - - -
`
`r r - - - - - - - - -
`
`- - - - - - - - -
`
`ELECTROLYTIC
`TILT SENSOR
`THERMISTOR r
`
`- - - - - - - - - - - - - - - - - - - - -
`
`-----------------
`
`-----------------
`
`TRACKING DEVICE
`Fras
`
`30
`
`---.59
`
`--39
`
`--- 40
`
`IPR2020-01192
`Apple EX1009 Page 5
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 4 of 8
`
`US 7,053,823 B2
`
`
`
`12
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`GPS
`RECEIVER
`
`WIRELESS
`LAN
`TRANSCEIVER
`
`CELLULAR
`TRANSCEIVER
`
`49
`
`60
`
`62
`
`MOBILE ACCESS POINT
`
`is 4A
`
`IPR2020-01192
`Apple EX1009 Page 6
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 5 of 8
`
`US 7,053,823 B2
`
`
`
`POWER
`SOURCE
`
`CONTROLLER
`AND
`MEMORY
`
`WIRELESS
`LAN
`TRANSCEIVER
`
`CELLULAR
`TRANSCEIVER
`
`£4
`
`60
`
`£52
`
`FIXED ACCESS POINT
`
`FEEF-4E,
`
`IPR2020-01192
`Apple EX1009 Page 7
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 6 of 8
`
`US 7,053,823 B2
`
`
`
`
`
`POSITIONNING AT LEAST ONE ACCESS POINT
`SO THAT A WIRTUAL FENCE IS CREATED;
`THE VIRTUAL FENCE BEING GENERATED
`BY THE RANGE OF THE WIRELESS LAN
`TRANSCEIVERS OF THE AT LEAST ONE ACCESS POINT
`
`f00
`
`
`
`ENERGIZING ATRACKING DEWICE AND
`PLACING IT WHITHIN THE VIRTUAL FENCE
`
`f(22
`
`PLACING THE OPERATIONAL TRACKING
`DEVICE IN A CARGO TO BE PROTECTED
`
`
`
`104
`
`Fras F.
`
`IPR2020-01192
`Apple EX1009 Page 8
`
`
`
`U.S. Patent
`
`May 30, 2006
`
`Sheet 7 of 8
`
`US 7,053,823 B2
`
`THE ACCESS POINT PERIODICALLY - 16
`RECEIVES A GPS POSITION SIGNAL
`
`THE ACCESS POINT PERIODICALLY TRANSMITS
`THE GPS POSITION SIGNAL TO THE TRACKING
`DEWICE WIA THE WIRELESS LAN TRANSCEIVER
`
`106
`
`170
`
`IS THE TRACKING DEWICE STILL
`IN THE WIRTUAL FENCE 2
`
`NO
`
`116
`
`DOES THE
`TRACKING DEVICE
`RECEIVES GPS INFORMATION
`FROM THE ACCESS
`POINT 2
`
`
`
`IF NOT ALREADY DONE, START
`DATA ACQUISITION FROM THE
`DEAD RECKONING SENSORS
`
`START DATA ACQUISITION FROM
`THE DEAD RECKONING SENSORS
`
`TRANSMIT THE LAST RECEIVED
`GPS POSITION DATA AND THE
`DEAD RECKONING DATA TO THE
`CENTRAL SERVER WIA A
`CELLULAR LINK
`
`f/4
`
`f/6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2020-01192
`Apple EX1009 Page 9
`
`
`
`U.S. Patent
`
`May 30
`
`2006
`
`Sheet 8 of 8
`
`US 7,053,823 B2
`
`Á?
`
`(7/.
`
`HGHAHHS
`
`
`
`NJSd.
`
`NOIJ,00HNN00
`
`IPR2020-01192
`Apple EX1009 Page 10
`
`
`
`US 7,053,823 B2
`
`1.
`SYSTEMAND METHOD FOR CARGO
`PROTECTION
`
`FIELD OF THE INVENTION
`
`The present invention generally relates to theft detection,
`notification and tracking. More specifically, the present
`invention is concerned with a system and method for the
`detection, notification and tracking of cargo theft.
`
`BACKGROUND OF THE INVENTION
`
`2
`reckoning module; the communication module being con
`figured to communicate with a central server; and
`an access point including a movement detector and a
`communication module configured to communicate with the
`tracking device communication module; the access point
`being so configured as to periodically communicate with the
`tracking device;
`wherein the tracking device is so configured that when the
`communication between the tracking module and the access
`point is lost, dead reckoning data from the dead reckoning
`module are transmitted by the tracking module to the central
`server via the communication module of the tracking device.
`According to a third aspect of the present invention, there
`is provided a system for the protection of cargo comprising:
`cargo tracking means including communication means
`and dead reckoning means; the communication means being
`configured to communicate with a central server; and
`means for creating a virtual fence around the cargo; the
`virtual fence creating means including means for receiving
`GPS position data and communication means configured to
`communicate with the communication means of the cargo
`tracking means; the virtual fence creating means being so
`configured as to periodically supply GPS position data to the
`cargo tracking means;
`wherein when the communication between the cargo
`tracking means and the virtual fence creating means is lost,
`a last received GPS position data and dead reckoning data
`from the dead reckoning means are transmitted to the central
`server via the cargo tracking means communication means.
`According to yet another aspect of the present invention
`there is provided a method for the protection of cargo
`comprising the acts of:
`providing a cargo tracking device to a cargo; the cargo
`tracking device including a communication module and a
`dead reckoning module;
`creating a virtual fence around the cargo;
`providing GPS position data to the cargo tracking device
`while the cargo is within the virtual fence;
`when the cargo exits the virtual fence:
`obtaining dead reckoning data from the dead reckoning
`module;
`transmitting a last received GPS position data to a central
`server via the communication module of the cargo tracking
`device; and
`transmitting dead reckoning data to a central server via
`the communication module of the cargo tracking device.
`It is to be noted that the expression “GPS is to be
`construed herein and in the appended claims as both the
`conventional Global Positioning System and as any similar
`system adequate to Supply the absolute position of an object.
`It is also to be noted that the expression “virtual fence” is
`to be construed herein and in the appended claims as a the
`outer perimeter of a single “bubble' or as the outer perimeter
`of a plurality of intersecting bubbles as will be further
`described hereinbelow.
`Other objects, advantages and features of the present
`invention will become more apparent upon reading of the
`following non-restrictive description of preferred embodi
`ments thereof, given by way of example only with reference
`to the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the appended drawings:
`FIG. 1 is a diagram illustrating a system for cargo
`protection according to an embodiment of the present inven
`tion where the cargo is within a transport trailer;
`
`With the increasing popularity of the Global Positioning
`System (hereinafter “GPS) finding the absolute position of
`an object above ground is now a relatively easy task. By
`combining a GPS receiver and a cellular phone transceiver
`and mounting the resulting device to a vehicle, it is also
`relatively easy to supply the position of the vehicle to a
`central location when the vehicle is reported as being stolen.
`Accordingly, the prior art is replete with documents
`describing Such systems and improvements to Such systems.
`U.S. patent application Ser. No.2002/0115436A1 entitled
`“Telematic System” and published on Aug. 22, 2002; and
`U.S. Pat. No. 5,986,543 entitled “Programmable vehicle
`monitoring and security system having multiple access
`verification devices’ issued on Nov. 16, 1999 are good
`examples of Such documents.
`Since these methods and systems aim at tracking vehicles,
`it is possible to position the GPS receiver antenna so that it
`can receive the faint GPS signals used to compute the
`absolute position of the vehicle. However, such systems may
`not be used to track a device concealed in cargo since cargo
`is usually contained in enclosed spaces, such as trailers or
`warehouses, thereby further attenuating the already faint
`GPS signals.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`OBJECTS OF THE INVENTION
`
`An object of the present invention is therefore to provide
`a system and method for cargo protection.
`
`40
`
`SUMMARY OF THE INVENTION
`
`45
`
`More specifically, in accordance with the present inven
`tion, there is provided a system for the protection of cargo
`comprising:
`a tracking device to be inserted in a cargo; the tracking
`device including a communication module and a dead
`reckoning module; the communication module being con
`50
`figured to communicate with a central server; and
`an access point including a GPS receiver and a commu
`nication module configured to communicate with the track
`ing device communication module; the access point being so
`configured as to periodically supply GPS position data to the
`tracking device;
`wherein the tracking device is so configured that when the
`communication between the tracking module and the access
`point is lost, a last received GPS position data and dead
`reckoning data from the dead reckoning module are trans
`mitted by the tracking module to the central server via the
`communication module of the tracking device.
`According to another aspect of the present invention,
`there is provided a system for the protection of cargo
`comprising:
`a tracking device to be inserted in a cargo; the tracking
`device including a communication module and a dead
`
`55
`
`60
`
`65
`
`IPR2020-01192
`Apple EX1009 Page 11
`
`
`
`US 7,053,823 B2
`
`3
`FIG. 2 is a diagram illustrating the system of FIG. 1 where
`the cargo is within a warehouse;
`FIG. 3 is a block diagram of a tracking device that is part
`of the system of FIG. 1;
`FIG. 4A is a block diagram of a mobile access point that
`is part of the system of FIG. 1;
`FIG. 4B is a block diagram of a fixed access point that is
`part of the system of FIG. 2;
`FIG. 5 is a flowchart illustrating the setup of the system
`of FIG. 1;
`FIG. 6 is a flowchart illustrating the operation of the
`system of FIG. 1; and
`FIG. 7 is a diagram illustrating a plurality of stolen cargo
`in a trailer not provided with an access point.
`
`DETAILED DESCRIPTION
`
`10
`
`15
`
`25
`
`30
`
`4
`inserted in a cargo to be protected in any orientation. The use
`of a thermistor 40 is also interesting since it allows a better
`modeling of the sensors present in the dead reckoning
`module. It is also to be noted that the number and nature of
`the dead reckoning sensors used in the dead reckoning
`module 32 may vary, for example in function of the sensi
`bility and precision of the various sensors.
`The controller 24 is supplied by the power source 22 and
`is connected to both the communication module 26 and to
`the dead reckoning module. As it will be further described
`hereinbelow, the controller 24 may send and receive data
`to/from the access point 12 via the communication module
`26 and receive dead reckoning data from the dead reckoning
`module 32 and store this data in its memory and/or send it
`via the communication module 26.
`The tracking device 14 could be equipped with other
`elements such as a high-frequency sound generator, to help
`retrieve the device 14 once it is no longer required, and
`status LEDs.
`A tracking device could be designed using a controller
`made by Texas Instruments under part number TMS320
`5470; a MEMS (microelectromechanical system) acceler
`ometer made by Analog Devices under part number
`ADLX203 (mounted in 3D); a MEMS gyroscope made by
`Analog Devices under part number ADXRS150 (mounted in
`3D), a magnetometer made by Honeywell under part num
`ber HMC 1052 (mounted in 3D), an electronic compass
`made by Phillips under part number KMZ 51 (mounted in
`3D), and an electrolytic tilt sensor made by Fredericks under
`part number 0717-4304 (mounted on 6 faces of a cube).
`The wireless LAN transceiver 28 could use 802.11b,
`Bluetooth or proprietary spread-spectrum or ultra-wideband
`communication schemes. For example, the wireless LAN
`transceiver Spectrum24 made by Symbol could be used.
`The cellular transceiver 30 could use IS-95 based CDMA
`(Code Division Multiple Access). For example, the cellular
`transceiver CDM-820-B made by Semax Wireless could be
`used. Of course, the cellular technology used should be
`compatible with the cellular network 16.
`Turning now to FIG. 4A of the appended drawings the
`various elements forming a mobile access point 12 will be
`described.
`The mobile access point 12 includes a power Source 42,
`usually in the form of a connection to a battery of the vehicle
`to which the access point 12 is to be mounted, a controller
`44 including memory, a GPS receiver 46 connected to the
`controller 44 and a communication module 48 also con
`nected to the controller 44.
`The communication module 48 includes a wireless LAN
`transceiver 50 and a cellular transceiver 52.
`The controller 44 is supplied by the power source 42 and
`receives GPS position data from the GPS receiver 46 and
`may send and receive data to/from the tracking device 14
`and to/from the central server 10 via the communication
`module 48.
`A mobile access point could be made using a controller
`made Texas Instruments under part number TMS320-5470
`and a GPS receiver made by Trimble under part number
`Lassen LP. As it will easily be understood by one skilled in
`the art, the wireless LAN transceiver 50 uses the same
`technology as the wireless LAN transceiver 26 of the
`tracking device 14.
`Turning now briefly to FIG. 4B of the appended drawings,
`a fixed access point 12" will be described. It is to be noted
`that since the fixed access point 12' is very similar to the
`mobile access point 12 described hereinabove and illustrated
`
`In a nutshell, an embodiment of the present invention
`proposes to install, inside cargo to be protected, a tracking
`device having communication and dead reckoning capabili
`ties. As long as the tracking device senses that it is within a
`virtual fence generated by at least one access point, it lays
`dormant. When the tracking device senses that it is no longer
`within the virtual fence it activates the dead reckoning
`capabilities and communicates with a central server to
`Supply dead reckoning data thereto. The central server
`processes this data and determines the current location of the
`CargO.
`FIGS. 1 and 2 of the appended drawings illustrate a
`system for cargo protection where the cargo is located in a
`transport trailer and in a warehouse, respectively.
`The cargo protection system includes a central server 10,
`an access point 12 and a tracking device 14. The central
`server 10 is in communication with a cellular network
`(represented by a cellular tower 16), for example via a PSTN
`35
`(public switched telephone network) line. Optionally, the
`central server also has a link to a computer network Such as
`the internet 18 and has other PSTN communication capa
`bilities.
`The access point 12 receives data from a GPS network 20
`and may communicate with the central server 10 via the
`cellular network 16. As it will be further described herein
`below, the reception of data from a GPS network by the
`access point 12" of FIG. 2 is optional since the access point
`12' is a so-called fixed access point.
`The tracking device 14 communicates with the access
`point 12, via a wireless LAN (Local Area Network) for
`example, and with the central server 10 via the cellular
`network 16.
`Turning now to FIG. 3 of the appended drawings, the
`various elements forming a tracking device 14 will be
`described.
`The tracking device 14 includes a power source 22,
`usually in the form of a rechargeable battery, a controller 24
`including memory, a communication module 26 including a
`wireless LAN transceiver 28 and a cellular transceiver 30
`and a dead reckoning module 32 including various dead
`reckoning sensors such as, for example a 3D accelerometer
`34, a 3D gyroscope 36, a 3D magnetometer 37, a 3D
`electronic compass 38, a 3D electrolytic tilt sensor 39 and a
`thermistor 40.
`It is to be noted that dead reckoning techniques are
`believed well known in the art. Accordingly, these tech
`niques will not be discussed in detail herein. However, it is
`to be noted that the use of 3D sensors such as accelerom
`eters, gyroscopes, magnetometers and electronic compasses
`is advantageous since it allows the tracking device to be
`
`55
`
`40
`
`45
`
`50
`
`60
`
`65
`
`IPR2020-01192
`Apple EX1009 Page 12
`
`
`
`US 7,053,823 B2
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`5
`in FIG. 4A, only the differences between these access points
`will be described hereinbelow.
`The fixed access point 12' does not include a GPS receiver
`since it is not supposed to move. Indeed, as illustrated in
`FIG. 2, the fixed access point 12' is intended to be mounted
`to a warehouse or other similar fixed objects.
`For security purposes, the fixed access point 12" includes
`a movement detector 54 connected to the controller 44 so
`that the controller 44 receives an alarm signal should some
`body try to move the fixed access point 12 without proper
`authorization. One skilled in the art will understand that the
`movement detector 54 could be an accelerometer, a gyro
`scope, a tilt sensor or even a GPS receiver that sends the
`appropriate alarm signal to the controller 44 should move
`ment be detected. Of course, other movement sensing tech
`nologies could be used.
`The setup of the cargo protection system will now be
`described with reference to FIG. 5 which is a general block
`diagram thereof.
`In a first step 100, a virtual fence is generated by at least
`one access point 12. More specifically, the virtual fence is
`generated by the “bubbles' creates by the range of the
`wireless LAN transceiver 50 of the access point. In other
`words, the tracking device 14 will know that it is within the
`virtual fence when the wireless LAN transceiver 28 detects
`the wireless LAN transceiver 50. The access point 12 is
`therefore carefully positioned. As it will be understood by
`one skilled in the art, the size of the bubble may be adjusted
`by adjusting the range of the wireless LAN transceiver 50.
`As will easily be understood by one skilled in the art the
`bubble could be created by other means. For example,
`should a predetermined perimeter of bubble be desired, the
`propagating time of RF signals from the tracking device to
`the access point could be measured by the tracking device
`and/or the access point to determine if the tracking device is
`within the bubble.
`Bubbles are schematically illustrated in dashed lines in
`FIGS. 1 and 2. In FIG. 1, the mobile access point 12 is
`mounted on the roof of the trailer 58 so that the bubble 60
`covers the entire trailer 58. It is to be noted that the GPS
`40
`antenna (not shown), which can be integrated within the
`body of the access point 12 or connected to the access point
`12 via a wire, is mounted outside the trailer 58 to improve
`GPS signals reception. In FIG. 2, the fixed access point 12
`is mounted on the roof of a warehouse 62 so that the bubble
`64 covers the entire warehouse 62.
`As noted hereinabove, a virtual fence may be created by
`more than one access point. Indeed, since each access point
`creates a bubble, a virtual fence would be the outer limit of
`the intersecting bubbles. Seamless roaming between over
`lapping access point coverage does not cause an alarm.
`Accordingly, when a trailer equipped with an access point 12
`is so positioned that its bubble intersects the bubble of the
`access point 12 of a warehouse and that a tracking device
`containing cargo is transferred from the warehouse to the
`trailer, or Vice-versa, no alarm is generated. Therefore, the
`virtual fence may be viewed as extending from one ware
`house to another via an access point equipped trailer.
`In other words, if the owner of a cargo protection system
`according to the present invention has equipped each ware
`house and trailer with an access point, the virtual fence of the
`system covers the entire area where the cargo may be stored
`with the owner's premises and moved therebetween.
`Accordingly, the movement of tracking devices within the
`virtual fence will not cause alarms to be triggered.
`It is also to be noted that while the bubbles are illustrated
`as having a generally spherical shape, it is not always the
`
`50
`
`45
`
`55
`
`60
`
`65
`
`6
`case. Indeed, the shape and coverage of the “bubble' created
`by each access point depend on the antenna of the wireless
`LAN transceiver. For instance, a standard omni-directional
`antenna will broadcast in all directions (as illustrated in the
`appended figures), an array of two antennas will produce an
`8 shape etc. Accordingly, it is not necessary to install the
`access point on the roof to cover the warehouse or trailer.
`The same effects could be achieved by placing the wireless
`LAN transceiver on the floor. Furthermore, in the case of the
`mobile access points, only the antenna of the GPS receiver
`need to be installed on the roof of the trailer to better receive
`the faint GPS signals; the rest of the access point could be
`installed inside the trailer. A major difference with the
`protection systems of the prior art is that the access point
`need not be concealed but could be positioned in plain sight,
`since the disabling of the access point automatically causes
`the tracking devices to generate alarm signals.
`A second step 102 consists in powering a tracking device
`14. When an operating tracking device 14 enters a virtual
`fence, it will initiate the communication with the access
`point 12 since an operating tracking device 14 periodically
`scans its environment to find a virtual fence. When in a
`virtual fence, the tracking device 14 will authenticate itself
`by sending its ID to the nearest access point and periodically
`receive authentication (ID) data from the access point 12 via
`their respective wireless LAN transceivers.
`The next step is the insertion of the operational tracking
`device 14 in the cargo to be protected. Since the dead
`reckoning sensors used are advantageously 3D sensors, the
`orientation of the tracking device 14 inside the cargo is not
`critical. Therefore, it is easier to hide the tracking device 14
`in the cargo. It is also to be noted that since the tracking
`device does not receive GPS signals or other such signals
`requiring a line-of-sight between the sender and the receiver,
`the tracking device 14 may be inserted inside the cargo.
`FIGS. 1 and 2 illustrate the tracking device 14 inserted in
`a cargo 66 in the form of a pallet of boxes.
`Once the setup of the system is completed, the operation
`of the cargo protection system may begin.
`FIG. 6 of the appended drawings shows a general block
`diagram of the operation of the system when a mobile access
`point 12 is used.
`Block 106 indicates that the access point 12 periodically
`receives position data from the GPS network 20. More
`specifically, the GPS position data is received by the CPS
`receiver 46 and transferred to the controller 44.
`Block 108 indicates that the GPS position data received
`from the GPS receiver 46 is retransmitted to the tracking
`device 14. More specifically, the controller 44 supplies the
`GPS position data to the wireless LAN transceiver 50 that
`transmits it to any and all tracking devices 14 within the
`bubble 60.
`Block 106 and 108 are repeated as long as the GPS
`receiver 46 receives GPS position data from the GPS
`network 20.
`While the blocks 106 and 108 are repeated, the tracking
`device 14 periodically verifies that it is within the bubble 60.
`In other words, the tracking device 14 verifies that its
`wireless LAN transceiver 28 detects the wireless LAN
`transceiver 50 of the access point 12. Block 110 illustrates
`this step.
`If the tracking device 14 detects that it is still within the
`bubble 60, it verifies that it still receives GPS position data
`from the access point 12 (block 112).
`If the GPS position data is still received the system goes
`back to block 110.
`
`IPR2020-01192
`Apple EX1009 Page 13
`
`
`
`US 7,053,823 B2
`
`8
`7
`of the cargo via the PSTN capabilities of the server 10; the
`Should the tracking device 14 detect that it no longer
`driver of the tractor-trailer could be contacted via the cellular
`receives GPS position data from the access point 12, it starts
`network 16 to ensure that it is not a false alarm and/or the
`data acquisition from the dead reckoning sensors (block
`owner of the cargo could be contacted via the internet 18.
`114). More specifically, the controller 24 energizes the dead
`When the system uses a fixed access point 12" as illus
`reckoning module 32 and the various dead reckoning sen- 5
`trated in FIG. 2, the operation of the system for cargo
`sors included in this module start sending dead reckoning
`protection is very similar. The main difference resides in the
`data to the controller 24 that stores it in its memory. Of
`lack of a GPS receiver in the fixed access point 12'. When
`course, to be useful, the dead reckoning data is time-stamped
`a tracking device containing cargo leaves the bubble 64, the
`by the controller 24.
`While many non-alarming reasons exist for the loss of 10 tracking device 14 sends the known location of the ware
`reception of GPS position data, such as for example, the
`house 62 and the dead reckoning data acquired through the
`passage of the trailer through a tunnel, the loss of GPS
`dead reckoning module 32. It is to be noted that the cargo is
`position data can also be caused by an attempt to steal the
`free to be moved within the bubble without triggering an
`cargo. For example, the first step of an attempt to steal the
`alarm.
`cargo could be to damage the exposed GPS receiver antenna 15
`It is to be noted that while only one cargo containing a
`(not shown) that is usually positioned on top of the trailer.
`tracking device 14 is illustrated in FIGS. 1 and 2, many such
`It is therefore interesting to start the dead reckoning data
`cargos could be shipped in the same trailer or stored in the
`acquisition as soon as the GPS position data reception is
`same warehouse. Furthermore, when more than one tracking
`stopped.
`device is present in the same bubble, they may communicate
`Should the GPS position data reception resume, the 20 with one another via their respective wireless LAN trans
`controller 24 erases the stored dead reckoning data.
`ceiver to create an ad-hoc network of tracking devices. This
`If, in block 110, the tracking device 14 detects that it is no
`may prove interesting since they may share dead reckoning
`longer within the bubble, the dead reckoning module 32 is
`data to improve accuracy. Similarly, the tracking devices
`energized and dead reckoning data acquisition is started
`may take turn at contacting the central server 10 via the
`(block 116), if it was not already started in block 114.
`25 cellular network to thereby decrease overall power con
`In block 118, the last received GPS position data and the
`Sumption and increase their respective battery life.
`acquired dead reckoning data is sent to the central server 10.
`FIG. 7 of the appended drawings schematically illustrates
`More specifically, the controller 24 transmits this data to the
`a trailer 200 in which three cargo. 66A, 66B and 66C
`central server 10 via the cellular transceiver 30 that com-
`equipped with respective tracking devices 14A, 14B and
`municates with the cellular network 16. It is to be noted that 30 14C. Since the tracking devices are no longer within the
`the system of the present invention may include anti-
`virtual fence, their dead reckoning capabilities are enabled.
`jamming features to ensure that the cellular communication
`As can be seen from this Figure the three tracking devices
`between the transceiver 30 and the cellular network 16 is
`communicate their dead reckoning data and control infor
`establ