Note: Descriptions are shown in the official language in which they were submitted.
CA 02518974 2005-09-09
NETWORK AND INVENTORY MANAGEMENT SYSTEM
The network is comprised of wireless and wired infrastructure and communicates
primarily using 2.4GHz ISM band DSSS (Direct Sequence Spread Spectrum) radio
technology. The wireless portion of the network is comprised of several
different
types of base stations as well as central office locations used to
communicate,
transport and relay information as well as information received by end points.
The
base stations and central office locations can also communicate using other
types
of wireless and wired technologies. Wireless links can include GSM/CDMA/GPRS
cellular radios, microwave repeaters and UHF or VHF radios. Wired links can
include cable access points and land line networks. End points are wireless
devices used to collect, transmit receive and relay data from customer points
of
service. The need for a low cost alternative to the higher bandwidth networks
being used to collect and transport small amounts of data such as meter
reading is
great. This type of network provides for ultra low cost customizable hardware
(end
points), infrastructure and services for a virtually unlimited number of low
data
applications and services.
PRODUCTS AND SERVICES BY CATEGORY
SECURITY
People track (handheld sniffer w/rssi)
Data link backup
Security system monitoring and backup
Geo fencing (car rentals, generators etc... )
Valuable asset monitoring
Home monitoring (in home patient)
SAAQ Registrations expiry (criminal record etc... )
CA 02518974 2005-09-09
2
Short range tracking (school bag, laptop, keys)
Hydro electric pole monitoring (hot spots, transformers, pinpoint failures...
)
Mobile locating services (avalanche victim, lost individual, kidnapping,
special
event)
Throw away data collection (volcano temperature, life threatening toxic air
conditions)
Tamper warning (overnight container facility, construction site tool shed... )
Remote monitoring for 3rd party security companies (industrial park
surveillance)
SAFETY
Traffic sign monitoring
Automated lighting (replace photo sensors)
Air quality monitoring (C02 levels/Propane leaks/construction site)
Seismic activity monitoring
Throw away sensing for toxic emission measurements in a fire
COMMERCIAL AND CONSUMER SERVICES
Credit TAG (monitor short term financed inventory)
Hotel (weather/clock reset)
Bell Boy
Weather monitoring
Special package tracking in real time
Fleet management
Favorite songs/shows
Truck idle monitoring (Freightliner, UPS)
Courier velocity monitoring (high acceleration followed by fast breaking)
Humidity sensors for lawn care (golf courses, city parks, etc.)
CA 02518974 2005-09-09
3
Satellite TV
DVD Return (beep... )
Temperature monitoring (Food/pharmaceutical)
AUTOMATION
Automatic meter reading
Inventory management (pallet)
Stock level monitoring and replenishment (vending machine)
Mail box notification
Garbage container level notification
Automated sprinkler (Farmers etc... )
MARKETING
Geo marketing (where are products moving, trends... )
Piggyback cell phone battery pack
Flight time data & Information
PRODUCTS
Low cost text pager
Kit cadeau
Network vehicle/equipment starter (irrigation pumps)
Wireless pool temperature and chemical monitor (includes add quantities...)
Wireless OBD2 data information
CA 02518974 2005-09-09
4
Base Stations (see diactram)
1: Master base station
The master base station is used to communicate information via wireless
and or wired links back to the central. The information is collected from
slave and or lower tier base stations as well as end-points. The time at
which the information will be communicated to the central is based on its
priority level. Information that is not time sensitive can be buffered and
sent
at a time when data traffic levels are lower thus maximizing network
bandwidth. The master base stations will also be responsible for network
channel assignments (control channel) as well as various information
updates to other base stations and end points.
2: 2"d tier base station
The second tier base station is used to communicate with master base
stations. This base station will communicate with the master base station
based on the priority level of the information received from end points.
Information that is not time sensitive can also be buffered and sent at a time
when data traffic levels are lower thus maximizing network bandwidth. This
type of base station will operate using channel assignments received from
master base stations.
3: Combination base station
The combination base station can communicate with central offices, master
base stations and 2"d tier base stations via wireless and or wired links. It
can also operate as a standalone unit not requiring information and or
CA 02518974 2005-09-09
instructions from either a central office or other base stations
(customer/application site specific base station). This type of base station
could be used in an application requiring limited geographical area
coverage and no network support.
5
4. Mobile base station
The mobile base station can communicate with master, 2nd tier and
combination base stations as well as with a central office once setup. This
type of base station can be used in a temporary application such as special
events and special tracking applications. Mobile base stations can also be
used in vehicles such as service and repair or monitoring vehicles for
remote data collection and processing. The mobile base station can also
operate as a standalone unit.
Central office
The central office is used to provide main operational support to the network.
It
can communicate with the base stations via wireless and wired links. The
central
office can also be used to communicate information serviced by the network
directly to customers and or various service providers. The central office can
communicate directly with 3rd parties and can also be used as a dispatching
service provider for applications requiring such services. The central office
will also
handle miscellaneous task such as automated billing services and so on.
CA 02518974 2005-09-09
6
End Point
The "end-point" is a wireless device used to collect, communicate, receive and
relay data to the network. The data is collected from the host to which it is
interfaced. An end point can be fully customized based on its intended use.
Depending on the application the device interface will be customized to the
host
specifications. The end point can be made to operate using AC or DC power
sources. The data transmitted by an end-point can be given a priority setting
that
will determine when where and how the data will be carried and routed by the
network. A high priority message would include alarm monitoring data where as
a
low level priority message could include weather or vending machine data. The
end-point device can also be comprised of several radio modules, larger memory
blocs and different sensors. The housing can also be customized in order to
withstand harsh operating conditions.
Protocol items
Data transfer (routing and destination info)
Packet structure and build
Base station types and their functionalities
TAG/End point functionality
Priority level
Priority handling/routing
Channel assignment table
Star/Mesh and (Distress or Critical) Topology
Jam sensing
Environment learning / Dynamic networking
CA 02518974 2005-09-09
7
Architecture items to define further
Base station types - Descriptions+locations+coverage+functionality
Central - Description+functionality
High level network protocol and architecture points
- Alarm monitoring data can be verified at different intervals based on
network traffic. The verifications can also be sporadic.
- Data routing can be customized based on message priority. A critical
message will be sent via a more direct route, etc.
- End points will send "distress" message to "all" within its vicinity if it
has not
heard from its local base station in a set amount of time.
- End points will also accelerate and increase the number of transmissions.
- End point can move from a networked scenario (relay it's information via a
base station and so on) to a point to point scenario (relay info via other end
points within range). Selection of which end point to send to will be based
on the RSSI.
- Communication between 2 end points can be done in several different
manners based on RSSI levels Tower IDs and destination ID.
- Ex: The 2 end points will communicate to each other without sending
through a base station if RSSI level is high = Point to point.
CA 02518974 2005-09-09
8
- Ex: 2 end points will communicate with each other via a base station if Rssi
level is to low and the tower IDs contained in the messages match. = Point
to Base station to point.
- Ex: 2 end points will communicate with each other via the full network if
the
messages have different tower iDs = Point to base station to central to
point.
- Packets can contain the following:
Header/Priority level/Tower id/Endpoint id/DATA/status/RSSI
info/1/oltage/Destination ID
- Endpoints can move from STAR to MESH topology based on RSSI
levels/message priority/specific routing instructions/jamming sensor, etc.
- End points have "ENVIRONMENT SENSING & LEARNING" or "DYNAMIC
NETWORKING" capability. An endpoint learns "acquires the location or IDs
of other end points and base stations within range. This is done in order to
establish the most efficient mode of information routing. It is also done in
order to establish an emergency routing scenario "in case"...The end point
can also send its "acquired knowledge" back to the central.
- JAM Sensing: An end point or ANY network element can sense jamming
equipment based on RSSI level fluctuations. These elements can react by
selecting alternate channels/using back up routing and call also accelerate
and increase the transmissions. These elements can also power up or
down the output power of the radio.
CA 02518974 2005-09-09
9
- (Preliminary) End points will be controlled using 3 main control channels:
Timing info (yr/mm/dd/hr/mn/sec/ms) and traffic/weather (used to
give battery powered end points a time slot to transmit and receive
so as to save battery life and avoid network and spatial saturation.
Special commands to individual and or groups (all quiet/all power up-
down, etc.
Locating IDs=low power endpoint to base station (sent to end point
and end point re-transmit to base station on command or
automatically)
This invention also pertains to an inventory management system (IMS). The IMS
is
comprised of numerous transmitters and or transceivers, fixed and or mobile
electronic readers (base stations) linked to a network/server and database. An
item is outfitted with one or more identifying tags (ID tags) which are
registered in
the database. These ID tags are used to remotely identify the item to which it
is
attached as well as its location.
An area is outfitted with location beacons that transmit location numbers or
IDs
which correlate to a specific area or location and that are received by the ID
tags
and then transmitted by the ID tags back to a base station and or central for
data
logging, locating and or identification purposes. In order to determine the
exact
coverage size and location for the location beacon, a location beacon can
operate
at different output power levels and can be outfitted with different types of
antennae such as directional or omni-directional antennae.
The system also includes remote data collectors or mobile base stations. These
devices are used when inventory or assets are moved from one location
(building ,etc.) to another. These devices constantly listen for ID tag
transmissions
CA 02518974 2005-09-09
and keep them in a buffer in order to upload the received information to a
central
or master base station. The mobile base stations can be used by service and
repair personnel, warehouse personnel, production personnel and so on.
5
System components detailed
ID Tag (Typically a battery operated transceiver): The ID Tag is a transceiver
that transmits a unique ID along with several other pieces of information.
This
10 information can include location number (number received from a location
beacon), status information, hour meter, temperature, etc. The type of
information
transmitted by the ID Tag is dependant upon what type of object that it is
either
installed on or interfaced to.
Ex: Pallet of food: This type of application would require the use of an ID
Tag
capable of measuring the temperature of the goods on the pallet and
transmitting
the information.
Ex: Rental equipment (lift truck): This type of application would require the
use of
an ID Tag capable of counting the number of (in use) hours and transmitting
the
information for billing purposes.
Location Beacon (Typically a battery operated transmitter): The location
beacon is a transmitter that constantly transmits a unique ID number on a
"reserved" channel. This ID correlates to a specific area or location. The ID
is
received and then re-transmitted by the ID Tag to a base station and or
central in
order to identify and be able to locate the item to which a particular ID Tag
is
affixed. In order to control the coverage area of a location beacon, the
beacon can
operate at different output power levels thus increasing or reducing the range
at
which the beacon ID can be received by an ID Tag. The location beacon can also
CA 02518974 2005-09-09
11
be equipped with various types of antennae including directional, semi-
directional
and omni-directional in order to establish a coverage area with greater
precision.
Fixed Base Station (Master transceiver): The Base station is a master
transceiver used to communicate with the mobile base stations, the ID Tags as
well as any location beacons that have receive capability. The base station is
interfaced to a pc via an RS232 or USB port and is controlled by a proprietary
GUl/program. The base station can request updated/real time location
information
from an ID Tag. It can also request an upload of information stored in a
mobile
base station (detailed further in this document). The base station can also be
used
in order to perform coverage tests and so on.
Mobile Base Station (mobile transceiver): The mobile transceiver is a device
used in order to receive and communicate with ID Tags and location beacons
found in remote locations (location other than the "home" location of an ID
Tag and
the mobile base station). When a mobile base station no longer hears its home
beacon it begins to listen for ID Tag transmissions and logs the data in its
memory
until it returns to its home area or location and hears an upload request from
a
master base station. It will then upload all of the ID Tag information stored
in its
memory to the master base station for system updating.
Ex: A Lift truck is rented to a warehouse. The rental service truck is
outfitted with a
mobile base station and is used to collect the remote information. As the
truck
leaves its home area and no longer hears its home locator beacon, it will
begin to
listen for ID Tags and will log any such transmissions in its memory. As the
truck
approaches the warehouse where the lift truck has been rented to, the mobile
base station will log the information sent by the ID Tag (ID number, Location
ID,
Hour counter "for billing", Tag status and so on) and will upload this
information
when it return to it's home location and hears the upload request.
CA 02518974 2005-09-09
12
Although the present invention has been explained hereinabove by way of a
preferred embodiment thereof, it should be pointed out that any modifications
to
this preferred embodiment within the scope of the appended claims is not
deemed
to alter or change the nature and scope of the present invention.