Cluster-based container lifecycle tracker

ABSTRACT

The disclosure is related to monitoring integrity of cargo in a container on a trans-oceanic voyage and cargo on truck or trains. The method includes determining, by a trigger from at least one remote processor, that a system including the at least one remote processor in a network with at least one local processor is activated by an opening or a closing of a container door. At least one environment camera is activated to provide an environment media. At least one data retrieving component is activated to retrieve and to provide data associated with a tracking marker of cargo associated with the container. At least one satellite receiver is activated to receive location information for the at least one local processor. One or more of the environment media, the data, and the location information is packaged for a bit stream. The bit stream is communicated to a remote device.

RELATED APPLICATION

The present disclosure is related to and claims priority from U.S.Provisional Application 62/688,267, titled CLUSTER-BASED CONTAINERLIFECYCLE TRACKER, filed on Jun. 21, 2018, the entirety of thedisclosure of which is incorporated by reference herein.

BACKGROUND

Containers used in trans-oceanic shipping contain valuable cargo that issubject to sophisticated thefts, scams, and to, subsequently,complicated insurance claim processes. For example, there are manystages from when the cargo is received for shipping till when the cargois delivered at its destination. While bill of lading, seals, and otherprocesses are in place to provide some form of security and tracking tothe cargo at each transfer stage, there are many instances ofdisappearance of cargo with a perfect bill of lading and with the sealson a container lock intact. There have also been instances of theft onhigh seas, with vessel-to-vessel transfer of cargo from within acontainer with the container then returned to their initial condition.In the end, merely securing and tracking cargo at each transfer stagewith seals, locks, and a bill or receipt, even if provided in soft copyand by scanning at each transfer stage, still does not ensure securepassage for the cargo. Moreover, losses resulting from such theft orscams take months or years of investigation to rule out improprietiesand to receive insurance payouts.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments in accordance with the present disclosure will bedescribed with reference to the drawings, in which:

FIG. 1 illustrates a general overview of several cargo transfer stagesin accordance with various embodiments.

FIG. 2 illustrates an example application of a cluster-based containerlifecycle tracker in accordance with various embodiments.

FIG. 3 illustrates an example container at one transfer stage andincorporating a cluster-based container lifecycle tracker in accordancewith various embodiments.

FIG. 4 illustrates an example cluster-based container lifecycle trackerinstalled in a container at a transfer stage and related trackingprocesses enabled by it, in accordance with aspects of this disclosure.

FIG. 5 illustrates an example cluster-based container lifecycletracking, in accordance with aspects of this disclosure.

FIG. 6 illustrates an example system of cluster-based containerlifecycle tracking, in accordance with aspects of this disclosure.

FIG. 7 illustrates an example method of cluster-based containerlifecycle tracking, in accordance with aspects of this disclosure.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. Forpurposes of explanation, specific configurations and details are setforth in order to provide a thorough understanding of the embodiments.However, it will also be apparent to one skilled in the art that theembodiments may be practiced without the specific details. Furthermore,well-known features may be omitted or simplified in order not to obscurethe embodiment being described.

Systems and methods in accordance with various embodiments of thepresent disclosure may overcome one or more of the aforementioned andother deficiencies experienced in conventional approaches to maintainingsecurity and integrity of cargo in trans-oceanic shipping processes. Inan example, a system is disclosed as including at least one localprocessor and at least one remote processor. The at least one localprocessor may be in one container of a cluster of containers or may belocated on a vessel transporting the cluster of containers. Further,each of the processors may be similar or may incorporate variations, butthat operate in the same or similar standards so that they cancommunicate with each other using similar codes, for instance. Stillfurther, each of the processors may be a part of its own system—that maybe a sub-system of the above reference system—and may include one ormore additional components as described herein. As such, the system mayinclude the components of the sub-system, as they function as a clusterfor most intents and purposes.

As used herein, a cluster refers to network of same or similar devicesthat are in a network or in a communication with each other in a mannerthat each of the same or similar devices can directly communicate withanother one of the same or similar devices. As such, unlike certaincentral architecture-based networks, the cluster works to a commonobjective set for the same or similar devices. In another distinctiongenerally observed, the same or similar devices in the cluster may beaware of what the other devices in the cluster are doing.

The system also includes at least one environment camera, at least onedata retrieving component, at least one satellite receiver, at least onetransmitter or transceiver, and at least one memory includinginstructions that when executed in the at least one local processorcause the system to perform functions incorporating one or more of theabove-referenced hardware. For example, the functions include adetermination that the system is activated by an opening or a closing ofa container door. This may be by a trigger from the at least one remoteprocessor that is detachably installed to a container, such as by ahardware or software trigger when the container door of the container isopened. Meanwhile, the at least one local processor may be on adifferent container and may perform similar operations as the at leastone remote processor, but as to the different container on which it isdetachably installed.

The functions include activation of the at least one environment camerato provide an environment media and the at least one data retrievingcomponent to retrieve and to provide data associated with a location ofthe at least one remote processor—at the container, and perhaps, lookingoutwards but within a visual frame of the entire front area once thecontainer door is opened. The at least one data retrieving component isalso able to retrieve and to provide available data for the cargo. Inthis configuration, the environment media (videos, burst images, etc.)provides at least multiple burst images or a single predetermined timedimage of the entire front area of the container door. In an example theat least one environment camera includes night vision, and,alternatively or along with such night vision cameras, a continuouslight or flash light is provided to capture a clear view of the entirefront area once the container door is open. In addition, the at leastone data retrieving equipment includes semiconductor memory, such as aflash memory, for non-volatile storage that may be written over afterpredetermined durations. The at least one data retrieving equipmentretrieves logs of timing, location, and identifier information for thecontainer hosting the at least one data retrieving equipment and storesit in a memory. In an example, the location is transmitted for one ormore of the other sub-systems in the cluster. As the cluster isgenerally on the same vessel, the location is to a global positioningsystem (GPS) location of the vessel. The environment media and the dataprovided to the at least one local processor.

The function at the last least one local processor include activatingthe at least one satellite receiver to receive location information forthe at least one local processor. The at least one satellite receivermay be a fixed and/or a mobile receiver, such as a user terminal and/ora very small aperture terminal satellite (VSat). As such the use ofmultiple systems ensures continuous tracking as the systems are capableof switching from one to another depending on the availability of asignal. For example, the VSat provides economical tracking, which maythen transfer control to a mobile communications-based tracking, such asvia standard 3G, 4G, LTE, 5G, Global System for Mobile Communications(GSM®), Code Division Multiple Access (CDMA), or a satellitecommunication standards for communicating the bit stream. Trackinginformation is packaged to include one or more of the environment media,the data, and the location information. The packing incorporates thetracking information into a bit stream for use with the at least onetransmitter or transceiver. A final function communicates the bit streamto a remote device when the at least one transmitter or transceiver isprovided with access for the communicating.

Various other functions can be implemented within the variousembodiments as well as discussed and suggested elsewhere herein.

FIG. 1 illustrates a general overview 100 of several cargo transferstages in accordance with various embodiments. The general overview 100is a port side view of container, cargo, craning, and shippingoperations. Cargo 135 including one or more boxes or oddly shaped itemsmay be received from truck 130 in a tagged manner. Such a tag mayincorporate radio-frequency identification (RFID) for reference andtracking purposes. The RFID reader, in an example may be a Tagmaster®ETC Reader. Barcodes, including QR codes, and near field communication(NFC) tags are also applicable as reference, identification, or trackingtags for the cargo described herein and applicable for reading by theexample system disclosed herein. The cargo 135 is typically then takenby forklift or other lifting devices 145 to fill a container 140. In analternative implementation, the container is filled at the cargolocation and brought to the port side for shipping. In such animplementation the present system is at least partly deployed in thecontainer at the cargo location. Ships 105, 110 are illustrated asincluding newly arrived containers 115 for shipping. The containers 140,125 may be loaded to the ships 105, 110 via gantry cranes or containercranes, e.g., 120.

FIG. 2 illustrates an example application 200 of a cluster-basedcontainer lifecycle tracker in accordance with various embodiments. InFIG. 2, certain aspects of FIG. 1 are maintained, but with the additionof aspects of the present system. As in the case of FIG. 1, in FIG. 2,cargo 235 including one or more boxes or oddly shaped items may bereceived from truck 230 in a tagged manner. Alternatively, tags areapplied at the port side operation, on arrival at the port side area. Asin FIG. 1, in the same of FIG. 2, the tag may incorporateradio-frequency identification (RFID) for reference and trackingpurposes. Barcodes, including QR codes, are also applicable asreference, identification, or tracking tags for the cargo 235 describedherein and applicable for reading by the example system 200 disclosedherein. The cargo 235 is typically then taken by forklift or otherlifting devices 245 to fill a container 240. In an alternativeimplementation, the container 240 is filled at the cargo location andbrought to the port side for shipping. In such an implementation thepresent system 200 is at least partly deployed in the container at thecargo location. Ships 205, 210 are illustrated as including newlyarrived containers 215, 250, for shipping. The containers 215, 225, 250may be loaded to the ships 205, 210 via gantry cranes or containercranes, e.g., 220.

In addition, FIG. 2 illustrates that the containers shipped, e.g.,container 250, in departed vessel 210 may include a sub-system of asystem for cluster-based container lifecycle tracking. Particularly, thesub-system may include a device attached to the container, approximatelyat the container door area, and approximately on the inside portion ofthe container door area. For example, the sub-system may be asillustrated in FIG. 4, with the system illustrated in FIGS. 5 & 6. Thesystem communicates with first satellite 260, antenna or secondsatellite 225, cloud servers 265, and one or more remote users oradministrators 270, 275. First satellite 260 may be restricted to onlyproviding location information for one more requesting devices, such asa GPS module within the system. As such, containers 250 may include oneor more sub-systems, such as VSat and/or standard mobile phonecommunication, functioning together in a cluster network to form asingle system that is supported by one or more of the components 255,260, 265, 270, 275. Alternatively, a trigger caused by a physical changeto the container (e.g., opening of a door, a latch, a change in visiblelight into the container may alert the system to initiatecommunications. In addition, one or more of the sub-systems may beprovided to support both, an internal network among clustered devices,and an external network between a lead processor for one of theclustered devices to the satellite and/or VSat system. As such, latencyissues from bandwidth and satellite availability in a high-communicationdensity location may be alleviated by selection of an appropriatesub-system for communication using a software or hardware switchsupported by a proximity-based protocol to determine the selection ofthe appropriate sub-system. In an example, as discussed elsewhere inthis disclosure, a flag setting (e.g., flags 630A & 630B in FIG. 6illustrated for understanding and is not literal as the flags may besoftware flags, transistor switches, or circuit jumpers) providesselection of a mobile satellite system and/or VSat over a standardmobile communication subsystem, such as GSM or CDMA (Code DivisionMultiple Access). The sub-systems may be polled and a rat-race ofresponsive signals from the polled subs-systems may be used to determinethe flag setting. The polled sub-systems may be required to ping for asignal (or an antenna) and as some sub-systems may not be able to reachtheir corresponding antenna or find a corresponding signal fortransmission, the may take longer to provide their correspondingresponsive signals in the rat-rate—such as waiting till timeout of theping to respond. A default flag, however, may be set for the mobilesatellite system and/or VSat in the event that a sub-system fails torespond.

In an example, each sub-subsystem is located on one container ofcontainers 250. The sub-system provides wireless and satellitecommunication for relaying information from the sub-system to each otherand to remote devices outside the vessel 210. As such, the sub-systemmay function as a system to communicate to remote devices outside thevessel 210, but function as a sub-system for internal communicationswith other sub-systems, forming a cluster network. When the clusternetwork is operational, it forms a dynamic layout network, with eachsub-system including its own internet protocol address or Media AccessControl (MAC) identifier. In an example, once random containers,unassociated with each other—and from one or more different entities—arebrought together, their respective sub-systems are turned on. Whenturned on, the sub-systems may begin polling each other till all othersub-systems within range of each other's wireless (or othercommunication standards) reach is exhausted. Wireless reach hereinrefers to the signal strength of each broadcasting sub-system. In anexample, wireless standards such as a WiFi® (e.g., IEEE 802.11),wireless LAN, wireless WAN, and mobile broadband (e.g., 3G, 4G, LTE, 5G,CDMA) are applicable to provide the cluster network. The communicationoutside the cluster, and enabled in each of the containers, may rely onthe satellite and/or VSat features of the respective container'ssub-system. As such, each sub-system first polls out to seek assignmentof a position in the cluster network.

In an example, a first sub-system sends a signal with its identifier,its system time, its encryption status, its software status, and anyrelated information deemed essential to recognize, acknowledge, andauthenticate the sub-system. A handshake may be established by a secondsub-system acknowledging the signal and providing a second signal withits own identifier. Thereafter, unless the first and the secondsub-systems encounter signals with different identifiers, they do notrespond. However, the first and the second sub-systems are capable ofcommunicating more than identifiers once the handshake has beenestablished and the sub-systems are now known sub-systems (known to eachother, for instance). In an example, each sub-system maintains a log ofother sub-systems, and time of each and every signal pinged out of thesub-system and received at the sub-system. For efficiency purposes, sucha log may be able to determine significant events—such as a start ofcommunication, a location ping, an established handshake, etc. In anexample, a location ping may be used to triangulate the location of anode in the network by individual sub-systems. Other events may beregarded as insignificant and may be written over after a period oftime. Thereafter at steady intervals, each sub-system may ping asub-system to ensure that the known sub-system is still active and inthe same state or same location (based on a comparison of thetriangulation previous obtained with a new triangulation). In an aspect,the location and signal strength may be correlated so that thetriangulation calculation need not be performed often—thereby savingresources and power. Location information may be garnered from thestrength of the signal sensed from the known sub-system. In animplementation, once the sub-systems have known sub-systems, the clusternetwork formed from these sub-systems may communicate information. Forexample, when one sub-system is able to receive location informationfrom a GPS update, it may relay this location information to the othersub-systems.

The cluster network forms a collection of electronic devices in eachsub-system that are communicating with each other. As such, eachsub-system may be a node. There are multiple nodes in the cluster thatwork together, and the nodes monitor, maintain consistency, and transferinformation from one node to other as previously described. The clusternetwork may also poll to elect a responsible node that may head thecluster network for select external communications—such as GPS location.This may be done to preserve power or for data efficiency purposes in asingle system. As such, any received information is shared to the othernodes. Further, all information from other nodes are required to beprovided to the responsible node. The responsible node may also provideinformation outside the system—to the remote devices 265, 270, 275, forinstance. This also efficient tracking of information and allow thesystem to operative effectively. In a further implementation, the GPSlocation may form a basis to transfer communication control between amobile satellite system, VSat, and/or standard mobile phonecommunication. For example, when the GPS location is indicative of aproximity to a shore, a standard mobile phone communication sub-systemis turned on and begins to handshake with a shore-based antenna tosecure a communication channel. Thereafter, tracking is provided via thestandard mobile phone communication sub-system. When a location obtainedduring a triangulation (for example), via the standard mobile phonecommunication sub-system, is indicative of the vessel moving away fromthe shore, then the standard mobile phone communication sub-systemtransfers control back to the mobile satellite system and/or VSat forGPS tracking and communication. Alternatively, each sub-system pings fora receiver at various time intervals and is able to turn on and requestcontrol internally when it has the strongest signals or when it has apreferred signal. Particularly, the standard mobile phone communicationsub-system may be preferred from a price and technology view, while theVSat may be in a second preference with the mobile satellite system in athird preference.

FIG. 3 illustrates an example container 300 at one transfer stage andincorporating a cluster-based container lifecycle tracker in accordancewith various embodiments. As illustrated, the container 305 is notrequired to be modified in any way. The present sub-system may bedetachably installed to the inner portion of the container atapproximately the container door area. FIG. 4 illustrates such anexample 400 of a cluster-based container lifecycle tracker 410 installedin a container 405 at a transfer stage for tracking cargo 425, 435, 445.In an example, the transfer stage may be the cargo handler, the portside, or a distributor of the cargo. As such, the sub-system 410 is notrequired to be proprietary to the cargo handler, the port side, or adistributor, or even the vessel on which the cargo is transported. In anexample, the cluster-based container lifecycle tracker 410 is asub-system that, when networked with other similar sub-systems for asystem of a cluster network. Sub-system 410 is provided with proprietarykey-pair encoding to communicate with an administrator 270, 275, or toupload tracking information to cloud servers 265. In an example, theproprietary key-pair may be updated in a first communication with thesub-system 410, from the moment it is turned on to accept polling toparticipate in a cluster network. Such an update may be provided by afirst communication via data communication systems 255, upon switchingon the sub-system. Alternatively, an update to the key-pair may beforced at every instance of a stable data communications network.

In FIG. 4, tags 420A-420D may be picked up by a data retriever componentof the sub-system 410. For example, the data retriever component may bean RFID reader, an NFC reader, or a barcode reader within the proximityof the tags 420A-420D. These readers may read the tags as the cargo 425,435, 445 are moved into the container 405. The sub-system 410 issufficiently close to the doors 415, but does not interrupt with theopening and the closing of the doors. The doors 415 need not be modifiedin the present implementation and the sub-system 410 would be placed inconsideration of any latch system existing on the doors. Further, when aforklift 430 moves pallet 440 with cargo into the container, the pallet440 itself may include a tab 420C that may be read and may be correlatedagainst a fixed amount of cargo 435. Each time the tag is read, thesub-system 410 is also configured to initiate a request for locationinformation of the container (or the vessel). This way, when the door isopened or when the cargo is moved out, the sub-system 410 is able tocapture an image of the environment, is able to capture information fromthe tag, and is able to capture location information of its geographiclocation (or the vessel's geographic location). As such, if the door isopen mid-voyage for a theft under progress, plenty evidence is gatheredand provided instantly to a remote device. Even if the tags are removed,prior to movement of the cargo, the image of the environment is capturedand provided to the remote device, along with the location information.To prevent the sub-system from being compromised, the evidence gatheredmay be disbursed throughout the other sub-systems and stored in thesub-systems, the locations of which are not completely known to theentity committing the theft. For example, some containers may not betargeted in the theft and those containers may retain critical evidenceshared from the container being targeted—even if the sub-system in thatcontainer is immediately damaged prior to transmitting information to aremote device.

In a further example, when the sub-system is outside of range, such asin a trans-oceanic voyage, each of the sub-systems may rely on the lastprovided key-pairs. The encryption is such that the other sub-systemsrecognize the keys provided by each sub-system in the group. In anexample, the key-pair provides public keys for each sub-system during anupdate, and the public keys correspond to private keys of the respectivesub-systems. Alternatively, a backup key-pair may be provided for backupcommunication when a determination is made that the key-pair existing inthe sub-system is outdated. For example, during long voyages, it may bethe case that a sub-system was not updated. However, it should also thenbe the case that the other sub-systems in a single system were also notupdated, as they were all together during the voyage. In such asituation, the sub-systems continue to communicate with each other usingthe last updated key-pairs. When it is determined, however, that onesub-system is updated and others are not or that one sub-system is notupdated, then the non-updated sub-systems may proceed to use the backupkey pair for communication till it can receive a viable update, whichalso updates the backup key pair. As such, the initial communication,during polling by any of the sub-systems may include each sub-systemproviding their identifier, and then (or concurrently) providingsupporting information such as the key-pair (encryption information),including version, date, and lifetime available, as well as current timeinformation to ensure that all sub-systems are clocking similarly.

FIG. 5 illustrates an example 500 cluster-based container lifecycletracking, in accordance with aspects of this disclosure. In a vessel 515including five containers 505A-505D and 510, the sub-systems in each ofcontainers 505A-505D and 510 may for part of a cluster network withinthe vessel 515. In an alternate implementation, multiple clusternetworks may exist within the vessel depending on their proximity anddepending on the size of the vessel. For simplicity, reference to thecontainers 505A-505D and 510 is a reference to respective sub-systems inthese containers, unless otherwise stated. In the example of FIG. 5, asub-system in container 510 is polled with sub-systems in containers505A-D and a cluster network is established for these containers.Container 510 may be designated as a responsible node in the clusternetwork. As such, FIG. 5, in one aspect, provides bold lines for animplementation of the cluster network of the containers 505A-505D withresponsible node as container 510. It is also appreciated thatinformation shared between the nodes—e.g., the signal strength ofcontainer 510, the power remaining and access to power resources, aswell as the software status (key-pair validity, update date, andtime)—may contribute to a determination of the responsible node amongthe available nodes in a cluster network.

In an example, while the responsible node is solely a designation tosave resources in a cluster environment, a person of ordinary skill,upon reading the present disclosure will understand that the individualnodes may include instructions to perform their own communicationoutside the cluster network (to users 535 and cloud servers 530 and inthe event that a polling to the responsible node does not secure aresponse. In addition, such a communication may include the status ofother nodes in the cluster network. Such a communication may also beprovided from the responsible node at intervals outside of when thecontainer doors are opened, for instance. In another aspect of thisdisclosure, a protected setup system may be provided in each sub-systemto allow a manual input to trigger the sub-system into a responsiblenode position. In addition, the protected setup may function inaccordance with the Wi-Fi Protected Setup (WPS) standard, which allowsconnection to multiple devices from a router. In the presentimplementation, the sub-systems include multiple modem chips capable ofsupporting multiple (and simultaneous) wireless connections. As such,the responsible node is able to provide network for the other nodes inthe cluster network, once the cluster network is established.

FIG. 5 also illustrates an example 500 (reference to the dotted lines)that a sub-system may be permanent deployed on the vessel 515. As such,in another aspect, a cluster network may be formed with the sub-systemof the vessel 515 and the sub-systems from any containers 505A-505D and510 that are loaded on the vessel 515. The sub-system on vessel 515 maythen be a more powerful variant of the sub-system—with wide rangingwireless capability that may be supported by repeaters throughout thevessel 515. In an example, the sub-system on vessel 515 may include aconstant power source and may be the designated responsible node for thecluster network at all times. In both embodiments of FIG. 5, the GPSsatellite 520 provides GPS position information at designated intervalsor at requested times. Such GPS position information is illustrated asprovided to the sub-system on the vessel 515 or the sub-system oncontainer 510. However, the GPS position information is available to anyof the requesting sub-systems, and the requesting sub-systems may thenshare the GPS position information with its counterparts in the clusternetwork, forming a system. All external communications to the cloudserver 530 and user 535 may be via the communications networks 525,which may be by radio, satellite, and mobile broadband communications.

FIG. 6 illustrates an example system 600 of cluster-based containerlifecycle tracking, in accordance with aspects of this disclosure. FIG.6 illustrates multiple sub-systems 605A, 605B . . . 605N, eachillustrates as being in a cluster network with each other via bold lines665B or daisy chained, via dotted lines 655A. The illustration of FIG. 6is merely for example purposes and appropriate clustering designed fitfor a specific number of sub-systems may be available to provide asystem for cluster-based container lifecycle tracking. In FIG. 6, thesub-system 605A is further illustrated as including multiple components.A person of ordinary skill in the art would understand that othercomponents that not shown are readily understood as part of thesub-system 605A or as readily available to perform functions with thesub-system 605A, and that not all components are shown, but also thatsuch understanding is made upon reading the present disclosure.

In the example 600 of FIG. 6, the sub-system 605A includes antenna 610for GPS module 620; camera module(s) 615; power source 625 (includingnon-rechargeable or rechargeable batteries 625A, persistent source625B—plug-in, generator, alternator, etc.—solar source 625C, andthermoelectric generator 625D); microcontroller/processor 630; SIMmodule(s) 635 and its supporting antenna 640; networked input/output645B (including a network interface card (NIC), WPS components, andstandard support chips for wireless broadband, Wi-Fi, and satellitecommunications); physical input/output 645A (including one or more ofkeyboard, access card readers, alphanumeric inputs, touchscreen inputs,retina input, and voice input for the input aspects, and display, voicereadout, or haptic feedback for the output aspects); RFID reader 650;features monitor 670 (for environment within the container—such asmoisture, temperature, etc.); and hardware/software switch 655 foractivating the microcontroller/processor 630 from any state in which itmay be.

In the example 600 of FIG. 6, the microcontroller/processor 630 formsthe at least one local processor, with memory 660 including aninstructions area and a storage area. The instructions area isupdateable via remote updates to the networked input/output module 645B,while local updates are also possible via physical input/output module645A. In an example, Cat5, Cat5e, Cat6, Fiber Optic Adapters, Firewire®Connectors, Modular Jacks, Modular Plugs, or USB Connectors are providedas part of the physical input/output module 645A. The instructions whenexecuted on the microcontroller/processor 630 causes the system inexample 600—i.e., sub-systems 605A-605N—to perform functions asdescribed throughout the disclosure. Further, reference numerals 665Aand 665B are provided to illustrations of the types of wirelessinterconnectivity obtained from in the system of example 600. Thecluster network may allow all sub-systems to communicate with each other(e.g., reference numeral 665B, or may allow a daisy chain 665A ofcommunications, but may not restrict communications through each node.In an example, the communications may include a header with thedestination node identifier. In an example, short forms of theidentifier for each node may be used as the system is limited to thesize of the vessel, so a chance of confusion is decreased.

FIG. 6 illustrates the at least one remote processor in any one ofsub-systems 605B-605N. A person of ordinary skill reading thisdisclosure would recognize that each of sub-systems 605B-605N have theremote processor. As each sub-system 605B-605N also includes at leastone environment camera (e.g., module 615), at least one data retrievingcomponent (e.g., RFID reader 650); at least one satellite receiver(e.g., GPS module 620); at least one transmitter or transceiver (e.g.,physical input/output 645A or networked input/output 645B); and at leastone memory (e.g., memory 660) including instructions that are availablefor execution in the at least one local processor cause the system 600,including sub-system 605A, to perform functions described throughoutthis disclosure. The instructions are provided in the descriptive formthroughout this disclosure, and in the flowchart of FIG. 7. Theinstructions breathe life into the system 600 by bringing together thevarious components of sub-system 605A (and of each of the othersub-systems), but also to allow the sub-systems to network together.Further, as used herein, the at least one transmitter or transceiver(e.g., physical input/output 645A or networked input/output 645B)incorporates semiconductor-based chips to process and package data intoa bit stream for 3G, 4G, LTE, 5G, CDMA, satellite, or Wi-Fi basedtransmission, but also includes the physical modules for transmittingthe information. In an example, the antenna 640 provides direct orindirect (via SIM module 635) access for such transmission.

The microcontroller/processor 630 executes the instructions from memory660 to perform a determination that the system is activated by anopening or a closing of a container door. This may be by a trigger fromthe at least one remote processor (e.g., in containers 605B-605N). Inaddition, this may be by a physical manipulation of an example hardwareswitch 655, except that the physical manipulation is as to a similarswitch in containers 605B-605N. Such a manipulation may be a movement ofthe door past a predetermined limit from its closed position or anopening of a lock or a latch. Alternatively, a software switch may beused—such as a motion detector, an infrared detector, a noise detection,etc. Once the hardware/software switch of the at least one remoteprocessor is activated, the above referenced determination, that thesystem is activated, occurs. Further, the instructions cause activationof at least one environment camera (in the container with the open door)to provide an environment image and cause at least one data retrievingcomponent (in the same container) to provide data associated with atracking marker of cargo associated with the container, the environmentimage and the data provided to the at least one local processor. Theenvironment image and the data are provided to the at least one localprocessor. The instructions then cause activation of the at least onesatellite receiver to receive location information for the at least onelocal processor. Tracking information is packaged, either bymicrocontroller/processor 630 or a processing chip in the input/outputcomponent 645B. The tracking information includes one or more of theenvironment image, the data, and the location information for a bitstream using the input/output component 645B. Thereafter, theinstructions cause the microcontroller/processor 630 to imitate theinput/output component 645B to communicate the bit stream to a remotedevice when the input/output component 645B is provided with access forthe communicating.

FIG. 6 also illustrates that thermoelectric generator 625D is availableto provide power source 625—this may be an attachment of a thermocoupleagainst the metal frame of the container and using a change in atemperature endured by walls of the container, during the voyage, tocharge the battery source 625A, or to directly supply power.Alternatively, a solar source 625C may be provided external to thecontainer with a capacitive or inductive coupling for trickle charge tobattery source 625A, or to the remaining sub-system components withinthe container. A miniature wind turbine is available in a similarmanner—located external to the container but allowing for capacitive orinductive coupling for a trickle charge to the battery source.Furthermore, refrigerated containers support charging options forcharging the battery source 625A. Wireless charging from within therefrigerated container to an external lock can provide the tricklecharge for the battery source over extended voyages. As such a wirelesscharge transmitter is provided from a power point of the refrigerationunit of the refrigerated container and a lock or the sub-system of thepresent disclosure, each includes a wireless charge receiver to receivethe charge signals and to trickle charge or charge the battery source.The battery source may also be removed and replaced at a subscriptionfee or under guarantee of services as part of a subscription oractivation the use of the present tracking services.

FIG. 7 illustrates an example method 700 of cluster-based containerlifecycle tracking, in accordance with aspects of this disclosure.Sub-process 705 provides a feature for determining, by a trigger from atleast one remote processor, that a system comprising the at least oneremote processor in a network with at least one local processor isactivated by an opening or a closing of a container door. In sub-process710 an activating feature occurs, by the at least one remote processor,for at least one environment camera to provide an environment image. Insub-process 715 another activating feature is by the at least one remoteprocessor for at least one data retrieving component to retrieve and toprovide data associated with a tracking marker of cargo associated withthe container. The environment image and the data are provided to the atleast one local processor. Sub-process 720 receives, by the at least onelocal processor, the environment image and the data provided from the atleast one remote processor. In sub-process 725, activation by the atleast one local processor occurs, so that at least one satellitereceiver is activated to receive location information for the at leastone local processor. Sub-process 730 performs packaging for trackinginformation that includes one or more of the environment image, thedata, and the location information for a bit stream using at least onetransmitter or transceiver. Sub-process 735 determines whether accesshas been granted for satellite transmission to the at least onetransmitter or transceiver. When such access has been granted,sub-process 745 communicates the bit stream to a remote device. Whensuch access is pending, sub-process 740 waits or performs further stepsto request for the satellite access. In an alternate implementation,video access is provided at certain predetermined times, which may bedifferent from times at which image capture is provided. For example,during the packing of the containers, capturing of data images may beactivated, while when the lock is set or the container is locked, thecapturing of videos or burst images, at a predetermined time range orperiods, is activated.

As such, the above implementations describe a system, sub-systems, and amethod where an onboard device—the system on a container of a vessel—cantransmit location and container security information to a remote devicevia a satellite. The satellite communicates with the remote device via acell phone connection, where available, and to a computer network, suchas the Internet. The system can also communicate by short-range wirelessconnection when it is within range of a fixed communications device or acell tower. For example, such a connection may be a tethered connectionthat uses fixed communications device, such as cell phone signal toconnect to a cell phone tower, which in turn communicates with theremote device via a computer network from the cell service provider.Alternatively, the system herein can communicate directly using cellsignal (via the SIM module) and its associated cellular telephone tower.The cell phone or other handheld device, when applicable, may includeany portable device with a cell service, such as a personal digitalassistance (PDA). Further, the handheld device may be used to initializeand update the onboard device—such as to update key-pairs, to initiatethe cluster network, to select the responsible node, etc.

When loading of the container is completed, a manifest of loaded goods,bill of lading, purchase order, shipping order, commercial invoiceinformation, packing list, forwarder's cargo receipt (FCR) and apre-planned routing guide for shipping the container may be communicatedfrom the handheld device to the sub-system. The doors of the containerare then closed. A “close door” command is selected in the handhelddevice, initiating the transmission of a command to the sub-system thatthe container is complete and that the sub-system may proceed to, atintervals, seek to join a cluster network. The physical doors of thecontainers may be closed by the operator at the same time.

The sub-system recognizes the door closing and, if all is okay, a “doorsclosed successfully” message is transmitted to the handheld device. Inanother implementation, the sub-system is part of a lock attached to thecontainer. The container is now closed and the sensors—including theenvironment camera and the data retrieval component are armed.Unauthorized opening of the container will result in an intrusion alertby way of the discussed media and data provided to a remote device. Inanother example, activation of a door close switch and/or other built-insensors (e.g., movement, sound, impact, or light detecting sensors),cause the sub-system to determine that the doors of the container areclosed and to enters into an “armed” state. As such, a “close door”command is not required. All the sensors are then alert to containerconditions, such as appearance of light, change in humidity, change intemperature and vibration. The sub-system may transmit an alert viasatellite and/or phone connection if a sensor input exceeds predefinedthresholds or, in another implementation, if the container positiondeviates from a pre-planned routing guide by predetermined thresholds(e.g. geographic position, duration of transport between locations orvibration in part of the routing where vibration is not expected). Thisimplementation allows for other monitoring aspects outside the dooractivation aspect.

The system herein provides container security including at least thefollowing features: (1) container monitoring at all times; (2)pre-screening of containers before they arrive at ports; (3) usingcontinuous monitoring technology to pre-screen high-risk containers; and(4) supporting development of smart and secure containers; (5)establishing security criteria to identify high-risk containers; (6)cargo monitoring at all times; (7) supporting customs requirements ofeach country; (9) supporting weight inspection for cargo and containerrestrictions (e.g., embedded into the tracking information placed on thecargo at the time the cargo is sealed or an augmented reality featureallowing the camera in each sub-system to track location of corners forthe dimensions of each package and a weight scale in the containertracking a weight of each added cargo to the container for thesub-system); (10) temperature and humidity monitoring. The shippingcontainers of the present disclosure are therefore configured to includesensors for detecting hazardous conditions associated with the shippingcontainers. In accordance with an embodiment, the container alsoincludes other sensors operative to sense conditions within the shippingcontainer and to transmit this information. In addition to temperatureand humidity, this may include carbon dioxide, infra-red emissions andtemperature. The hazardous condition sensed by any shipping container ona ship may also be transmitted through the network to a satellitetransmitter and/or a radio transmitter for reporting to the remotedevice. In addition, even though the examples herein provide animplementation of board ships, a person of ordinary skill wouldrecognize that the implementation in the containers may be applied tocontainers shipped via trains or trucks.

The container may also include a shipping container body havingassociated modified doors to support sensor—such as an internalcomponent attached to the physical hinges to trigger a switch for theassociated sub-system. The transmitter or transceiver may,alternatively, be mounted in a secure location of the sub-system, withthe sub-system located outside the shipping container. As such, thesub-system is operative to wireless transmit information to a remotemonitor regarding the status of an electronic device has a lockingsensor element for confirming locking the doors. This may be by theenvironment camera located within the sub-system capturing an image atthe time of locking.

Example environments discussed herein for implementing aspects inaccordance with various embodiments may include web-based environmentsfor remotely providing data collected by the measurement devices and/orthe measurement probes. Different environments may be used, asappropriate, to implement various embodiments. The devices in thefigures, for example, that are used to interact with various embodimentsfor data collection and transmission can include any appropriate deviceoperable to send and receive requests, messages, or information over anappropriate network and convey information back to a user of the device.The network to connect these devices can include any appropriatenetwork, including an intranet, the Internet, a cellular network, alocal area network, or any other such network or combination thereof.Components used for such a system can depend at least in part upon thetype of network and/or environment selected. Protocols and componentsfor communicating via such a network are well known and will not bediscussed herein in detail. Communication over the network can beenabled by wired or wireless connections, and combinations thereof.

It should be understood from the present disclosure that there can beseveral application servers, layers, or other elements, processes, orcomponents, which may be chained or otherwise configured, which caninteract to perform tasks as discussed and suggested herein. As such thedata herein may be stored in a data store for later transmission orbuffered for continuous transmission. Such a data store refers to anydevice or combination of devices capable of storing, accessing, andretrieving data, which may include any combination and number of dataservers, databases, data storage devices, and data storage media, in anystandard, distributed, or clustered environment. The handling of allrequests and responses, as well as the delivery of content betweendevices and receiving resources, can be handled by intermediate server.

A data store, as used herein, can include several separate data tables,databases, or other data storage mechanisms and media for storing datarelating to a particular aspect. The data store is operable, throughlogic associated therewith, to receive instructions from a server, andobtain, update, or otherwise process data in response thereto. In oneexample, the data store is available for searching of the collecteddata. A user might submit a search request for a certain type of thecollected data. In this case, the data store might access the userinformation to verify the identity of the user, and can access thecollected data to obtain information for the search request. Theinformation then can be returned to the user, such as in a resultslisting on a web page that the user is able to view via a browser on auser device. Information for particular collected data can be viewed ina dedicated page or window of the browser.

Each device referenced above, including servers, may include anoperating system that provides executable program instructions for thegeneral administration and operation of that server, and may include anon-transitory computer-readable medium storing instructions that, whenexecuted by a processor of the devices or servers, allow the devices orservers to perform its intended functions. Suitable implementations forthe operating system and functionality of the servers are readilyunderstood upon reading the present disclosure.

The environment in FIG. 5 may be, in one embodiment, a distributedcomputing environment utilizing several computer systems and componentsthat are interconnected via communication links, using one or morecomputer networks or direct connections. However, it will be appreciatedby those of ordinary skill in the art that such a system could operateequally well in a system having fewer or a greater number of componentsthan are described. Thus, the depictions of various systems and servicesherein should be taken as being illustrative in nature, and not limitingto the scope of the disclosure.

Various aspects can be implemented as part of at least one service orweb service, such as may be part of a service-oriented architecture.Services such as web services can communicate using any appropriate typeof messaging, such as by using messages in extensible markup language(XML) format and exchanged using an appropriate protocol such as SOAP(derived from the “Simple Object Access Protocol”). Processes providedor executed by such services can be written in any appropriate language,such as the Web Services Description Language (WSDL). Using a languagesuch as WSDL allows for functionality such as the automated generationof client-side code in various SOAP frameworks.

In embodiments utilizing a server, the server can run any of a varietyof server or mid-tier applications, including HTTP servers, FTP servers,CGI servers, data servers, Java servers, and business applicationservers. The server(s) also may be capable of executing programs orscripts in response requests from user devices, such as by executing oneor more Web applications that may be implemented as one or more scriptsor programs written in any programming language, such as Java®, C, C# orC++, or any scripting language, such as Perl, Python®, or Tool CommandLanguage (TCL), as well as combinations thereof. The server(s) may alsoinclude database servers, including without limitation thosecommercially available from Oracle®, Microsoft®, Sybase®, and IBM®.

The environment can include a variety of data stores and other memoryand storage media as discussed above. These can reside in a variety oflocations, such as on a storage medium local to (and/or resident in) oneor more of the computers or remote from any or all of the computersacross the network. In a particular set of embodiments, the informationmay reside in a storage-area network (“SAN”) familiar to those skilledin the art. Similarly, any necessary files for performing the functionsattributed to the computers, servers, or other network devices may bestored locally and/or remotely, as appropriate. Where a system includescomputerized devices, each such device can include hardware elementsthat may be electrically coupled via a bus, the elements including, forexample, at least one central processing unit (CPU), at least one inputdevice (e.g., a mouse, keyboard, controller, touch screen, or keypad),and at least one output device (e.g., a display device, printer, orspeaker). Such a system may also include one or more storage devices,such as disk drives, optical storage devices, and solid-state storagedevices such as random access memory (“RAM”) or read-only memory(“ROM”), as well as removable media devices, memory cards, flash cards,etc.

Such devices also can include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired), an infrared communication device, etc.), and working memory asdescribed above. The computer-readable storage media reader can beconnected with, or configured to receive, a computer-readable storagemedium, representing remote, local, fixed, and/or removable storagedevices as well as storage media for temporarily and/or more permanentlycontaining, storing, transmitting, and retrieving computer-readableinformation. The system and various devices may also include a number ofsoftware applications, modules, services, or other elements locatedwithin at least one working memory device, including an operating systemand application programs, such as a client application or web browser.It should be appreciated that alternate embodiments may have numerousvariations from that described above. For example, customized hardwaremight also be used and/or particular elements might be implemented inhardware, software (including portable software, such as applets), orboth. Further, connection to other computing devices such as networkinput/output devices may be employed.

Storage media and other non-transitory computer readable media forcontaining code, or portions of code, can include any appropriate mediaknown or used in the art, including storage media and communicationmedia, such as but not limited to volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information such as computer readable instructions, datastructures, program modules, or other data, including RAM, ROM, EEPROM,flash memory or other memory technology, CD-ROM, digital versatile disk(DVD) or other optical storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the a system device. Based on the disclosure andteachings provided herein, a person of ordinary skill in the art willappreciate other ways and/or methods to implement the variousembodiments.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that various modifications and changes may be made thereuntowithout departing from the broader spirit and scope of the invention asset forth in the claims.

What is claimed is:
 1. A system comprising: at least one local processorin a first container and at least one remote processor in a secondcontainer, the first container and the second container to be on a samevoyage; at least one environment camera; at least one data retrievingcomponent; at least one satellite receiver; at least one transmitter ortransceiver; and at least one memory including instructions that whenexecuted in the at least one local processor cause the system to:determine, by a trigger from the at least one remote processor, that thesystem is activated by an opening or a closing of a door of the secondcontainer; activate the at least one environment camera to provide anenvironment media and the at least one data retrieving component toretrieve and to provide data associated with a tracking marker of cargoassociated with the second container, the environment media and the dataprovided to the at least one local processor; activate the at least onesatellite receiver to receive location information for the at least onelocal processor; package tracking information comprising one or more ofthe environment media, the data, and the location information for a bitstream using the at least one transmitter or transceiver; andcommunicate the bit stream to a remote device when the at least onetransmitter or transceiver is provided with access for thecommunicating.
 2. The system according to claim 1, wherein the at leastone local processor and the at least one remote processor are detachablyinstalled in the first container and in the second container on a vesselassociated with the same voyage.
 3. The system according to claim 1,wherein the at least one local processor and the at least one remoteprocessor are networked together to form a cluster network for sharingthe environment media, the data, and the location information.
 4. Thesystem according to claim 1, wherein the at least one local processorand the at least one remote processor are networked together with eachhaving an assigned internet protocol address or each having an assignedmedia access control (MAC) address.
 5. The system according to claim 1,wherein the bit stream is encrypted with a private-public key-pairencryption and provided to the remote device that is capable of using acorresponding key-pair for decryption of the bit stream.
 6. The systemaccording to claim 1, further comprising at least one power module of abattery power source and a renewable power source, the renewable powersource being at least one of solar cells, a thermoelectric generator, ora miniature wind turbine.
 7. The system according to claim 1, whereinthe at least one local processor and the at least one remote processorare networked together, along with other remote processors, to form acluster network, and wherein the at least one local processor is aresponsible processor in the cluster network, the responsible processoridentified by at least one of: a manual setting, a strongest signaldefault setting for receiving a strongest or a most reliable satellitesignal, a location setting for being most accessible, a first devicesetting for being a first device activated in the cluster network, and apolling from each processor in the cluster network.
 8. The systemaccording to claim 1, wherein the at least one transmitter ortransceiver is a semiconductor component supporting one or more of: 3G,4G, LTE, 5G, Global System for Mobile Communications (GSM®), CodeDivisional Multiple Access (CDMA), or a satellite communicationstandards for communicating the bit stream.
 9. The system according toclaim 1, wherein the satellite receiver is a global positioning system(GPS) satellite receiver.
 10. The system according to claim 1, whereinthe at least one remote processor further comprises a hardware switch ora software switch, the hardware switch or the software switchresponsible for waking the at least one remote processor from any lowpower mode, and responsible for the activation of the at least oneenvironment camera and the at least one data retrieving component.
 11. Amethod comprising: determining, in a system comprising at least onelocal processor in a first container and at least one remote processorin a second container, that the system is activated by a trigger fromthe at least one remote processor on an opening or a closing of a doorof the second container, the first container and the second container tobe on a same voyage; activating, by the at least one remote processor,at least one environment camera to provide an environment media;activating, by the at least one remote processor, at least one dataretrieving component to retrieve and to provide data associated with atracking marker of cargo associated with the second container, theenvironment media and the data provided to the at least one localprocessor; receiving, by the at least one local processor, theenvironment media and the data provided from the at least one remoteprocessor; activating, by the at least one local processor, at least onesatellite receiver to receive location information for the at least onelocal processor; packaging tracking information comprising one or moreof the environment media, the data, and the location information for abit stream using at least one transmitter or transceiver; andcommunicating the bit stream to a remote device when the at least onetransmitter or transceiver is provided with access for thecommunicating.
 12. The method according to claim 11, wherein the atleast one local processor and the at least one remote processor aredetachably installed in the first container and in the second containeron a vessel associated with the same voyage.
 13. The method according toclaim 11, further comprising: providing a local network comprising theat least one local processor and the at least one remote processor, thelocal network forming a cluster network for sharing the environmentmedia, the data, and the location information; determining, at a time ofthe trigger, that the at least one local processor is positioned totransmit outside the cluster network; and providing the at least onelocal processor with the environment media, the data, and the locationinformation.
 14. The method according to claim 11, wherein the at leastone local processor and the at least one remote processor are networkedtogether with each having an assigned internet protocol address or eachhaving an assigned media access control (MAC) address.
 15. The methodaccording to claim 11, wherein the bit stream is encrypted with aprivate-public key-pair encryption and provided to the remote devicethat is capable of using a corresponding key-pair for decryption of thebit stream.
 16. The method according to claim 11, further comprising:providing at least one power module of a battery power source and arenewable power source, the renewable power source being at least one ofsolar cells, a thermoelectric generator, or a miniature wind turbine.17. The method according to claim 11, further comprising: providing acluster network comprising the at least one local processor and the atleast one remote processor, and at least one other remote processor;setting the at least one local processor as a lead processor in thecluster network, the lead processor provided with an externalcommunication identifier to transmit the bit stream to the remotedevice, the lead processor identified by at least one of: a manualsetting, a strongest signal default setting for receiving a strongest ora most reliable satellite signal, a location setting for being mostaccessible, a first device setting for being a first device activated inthe cluster network, and a polling from each processor in the clusternetwork.
 18. The method according to claim 11, wherein the at least onetransmitter or transceiver is a semiconductor component supporting oneor more of: 3G, 4G, LTE, 5G, Global Method for Mobile Communications(GSM®), Code Divisional Multiple Access (CDMA), or a satellitecommunication standard for communicating the bit stream.
 19. The methodaccording to claim 11, wherein the satellite receiver is a globalpositioning method (GPS) satellite receiver.
 20. The method according toclaim 11, further comprising: providing the at least one remoteprocessor with a hardware switch or a software switch, the hardwareswitch or the software switch responsible for waking the at least oneremote processor from any low power mode, and responsible for theactivation of the at least one environment camera and the at least onedata retrieving component.