Sensor based logistics system

ABSTRACT

Systems, methods, and computer program products are provided for accessing information regarding one or more shipments. There is provided a computer-implemented method for accessing information regarding one or more shipments. The method includes receiving sensor information associated with the one or more shipments at a tracking center. The method also includes analyzing rules associated with a party to determine whether the party is authorized to access the received sensor information. The method further includes restricting the party from accessing the received sensor information based on the analyzed rules.

TECHNICAL FIELD

The present invention generally relates to systems and methods for tracking items. More particularly, the present invention relates to systems and methods for tracking items using a sensor device.

BACKGROUND

Asset management has always been an important part of commerce. For example, tracking packages is important to organizations of all kinds, whether it be a company keeping track of inventory to be sold in its stores, or a package delivery provider keeping track of packages being transported through its delivery network. To provide quality service, an organization typically creates and maintains a highly organized network for tracking its packages. Effective management of such networks allows lower cost, reduced delivery time, and enhanced customer service.

In addition to tracking packages, parties that ship and receive packages may also need information regarding the conditions of the packages, such as the temperature and humidity of the package. For example, a customer that has ordered a box of wine may want to monitor the temperature of the contents of the box to determine if the temperature and/or humidity goes above or below a set range. Likewise, the party that ships the package may also want to monitor the conditions of the package to ensure that the content arrives in the proper condition.

Technological advances have enabled items to be tracked in ways that far exceed the functionality of a simple list. A rich information framework now can be applied to describe the item's interaction with its surroundings, such as transportation and custodial handoffs.

Bar codes are one way organizations keep track of items. A retailer, for example, may use bar codes on items in its inventory. For example, items to be sold in a retailer's store may each be labeled with a different bar code. In order to keep track of inventory, the retailer typically scans the bar code on each item. In addition, when an item is sold to a consumer, the bar code for that item is scanned.

Similarly, a package delivery provider may utilize bar codes by associating a bar code with packages to be delivered to a recipient. For example, a package may have a bar code corresponding to a tracking number for that package. Each time the package goes through a checkpoint (e.g., the courier taking initial control of the package, the package being placed in a storage facility, the package being delivered to the recipient, etc.), the package's bar code may be scanned. Bar codes, however, have the disadvantage that personnel must manually scan each bar code on each item in order to effectively track the items.

Radio-frequency identification (RFID) tags are an improvement over typical bar codes. RFID tags do not require manual scanning that is required by typical bar codes. For example, in a retail context, an RFID tag on an inventory item may be able to communicate with an electronic reader that detects items in a shopping cart and adds the cost of each item to a bill for the consumer. RFID tags have also been used to track things such as livestock, railroad cars, trucks, and even airline baggage. These tags typically only allow for basic tracking and do not provide a way to improve asset management using information about the environment in which the items are tracked.

Sensor-based tracking systems are also known which can provide more information than RFID systems. Such systems, however, can be expensive, and may provide extraneous and redundant item information.

Shippers, carriers, recipients, and other parties often wish to know the location, condition, and integrity of shipments before, during, and after transport to satisfy quality control goals, meet regulatory requirements, and optimize business processes. To address these requirements, a system is needed that may monitor data regarding shipments and present this data to a user in real-time or near real-time. Shippers, carriers, recipients, and other parties may have similar information needs during shipment, but the parties may have privacy or regulatory requirements that prevent them from sharing all of the information available from a monitoring system. To address these requirements, a system is needed that allows parties to specify what information they will share with other parties, including the frequency and timeliness of information updates. The system should compare information requirements from parties involved in a shipment and notify parties when conflicts exist and allow parties to adjust information sharing policies to address these conflicts.

SUMMARY

In one exemplary embodiment, there is provided a method for tracking one or more items. The method may include periodically detecting, by a sensor device, sensor information of the one or more items, and periodically transmitting, by the sensor device, the sensor information. The method may also include determining if the one or more parties is authorized to receive the sensor information. The method may also include transmitting the sensor information to the one or more authorized parties. The method may further include determining if the one or more parties is authorized to receive the sensor information and the periodically transmitting the sensor information to the one or more authorized parties based on a set of one or more permissions that grants or restricts access of the one or more parties to the sensor information based on the set of one or more permissions.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate various embodiments and aspects of the present invention. In the drawings:

FIG. 1 illustrates an exemplary computing system that can be used to implement embodiments of the invention;

FIG. 2 illustrates an exemplary tracking terminal that can be used to implement embodiments of the invention;

FIG. 3 illustrates an exemplary computing terminal that can be used to implement embodiments of the invention; and

FIG. 4 illustrates a flowchart of an exemplary method for tracking items consistent with an embodiment of the present invention.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the following description to refer to the same or similar parts. While several exemplary embodiments and features are described herein, modifications, adaptations and other implementations are possible, without departing from the spirit and scope of the invention. For example, substitutions, additions or modifications may be made to the components illustrated in the drawings, and the exemplary methods described herein may be modified by substituting, reordering or adding steps to the disclosed methods. Accordingly, the following detailed description does not limit the invention. Instead, the proper scope of the invention is defined by the appended claims.

System Architecture

By way of a non-limiting example, FIG. 1 illustrates a system 100 in which the features and principles of the present invention may be implemented. The number of components in system 100 is not limited to what is shown and other variations in the number of arrangements of components are possible, consistent with embodiments of the invention. The components of FIG. 1 may be implemented through hardware, software, and/or firmware. System 100 may include sensor devices 102 a-102 n, a tracking center 104, a network 106, and clients 108 a-108 n.

Network 106 provides communications between the various entities depicted in system 100. Network 106 may be a shared, public, or private network and may encompass a wide area or local area. Network 106 may be implemented through any suitable combination of wired and/or wireless communication networks (including Wi-Fi networks, GSM/GPRS networks, TDMA networks, CDMA networks, Bluetooth networks, or any other wireless networks). By way of example, network 106 may be implemented through a wide area network (WAN), local area network (LAN), an intranet, and/or the Internet. Further, the entities of system 100 may be connected to multiple networks 106, such as, for example, to a wireless carrier network, a private data network, and the public Internet.

Sensor devices 102 a-102 n may be devices for use in tracking various items, and may be attached to or included in the items that are to be tracked. For example, sensor device 102 a may be attached to or enclosed in a package that is being sent to a recipient using a delivery service such as Federal Express Corporation, (“FedEx”). Alternatively, sensor device 102 a may be attached to or enclosed in a container holding inventory being delivered to a retailer. The aforementioned items are exemplary and may comprise any deliverable elements.

Sensor device 102 a may store information associated with an item tracking number for a corresponding item. The item tracking number may be a FedEx tracking number or similar tracking number. Sensor device 102 a may also store information indicative of other sensor devices which are currently within a given proximity. For example, when an item with a corresponding sensor device 102 a is placed inside a vehicle or storage facility that includes at least one other sensor device 102 n, sensor device 102 a may sense that another sensor device 102 n is within a proximity that indicates that the corresponding item is now in the vehicle or storage facility. Information reflecting an association between sensor device 102 a and sensor device 102 n may then be stored in a memory located at one or more of sensor device 102 a, sensor device 102 n, and/or tracking center 104.

In one embodiment, sensor device 102 a may be capable of measuring or detecting one or more conditions such as location, temperature, light level, motion, pressure, humidity, acceleration, gas level, airflow, vibration, or other environmental conditions. Sensor device 102 a may also have the ability to directly transmit and receive information to/from tracking center 104 via network 106 by, for example, wireless communications. For example, sensor device 102 a may be implemented using a wireless sensor available from Crossbow Technology. One of ordinary skill in the art will appreciate that alternative sensor devices may be used.

Tracking center 104 may provide a platform for tracking items being delivered to a recipient. Tracking center 104 may be implemented using a combination of hardware, software, and/or firmware, and may be operable to receive and store sensor data from various sensor devices 102 a-102 n. For example, sensor device 102 a may periodically send tracking center 104 sensor data reflecting conditions measured or detected by sensor device 102 a. Such sensor data may include location, temperature, light level, motion, pressure, humidity, gas level, airflow, vibrations, or other environmental conditions.

Tracking center 104 is also operable to respond to requests for sensor data. For example, a customer may use client 108 a to enter a request for sensor data stored at tracking center 104. The request may include one or more triggering parameters, which can be used to find the requested sensor data. Exemplary triggering parameters may include a sensor identification number, item tracking number, location, temperature, light level, humidity, acceleration, pressure, gas level, airflow, vibrations, etc. Accordingly, by way of example, a customer may request temperature measurements within a certain range of a specific location. The distance from the specific location is the triggering parameter in that case.

When tracking center 104 receives a request for sensor data from client 108 a, tracking center 104 may search a database resident at tracking center 104 and return the requested sensor data, if found. Access to the sensor data may be managed or open. For example, if access is managed, client 108 a and/or the customer would need to be authenticated before sensor data is made available to client 108 a and/or the customer. In addition to or instead of searching a database for sensor data, tracking center 104 may request sensor data directly from the relevant sensor device 102 a.

Tracking center 104 may also provide updated and/or new programming for sensor device 102 a. Programming, for example, may specify the manner in which a device senses environmental conditions. Programming of the aforementioned device may be altered, for example, by storing new or modified instructions in a memory (not shown) located at the respective device. Programming changes may be made arbitrarily (e.g., at the discretion of a programmer) or in response to a detected condition. For example, suppose sensor device 102 a detects a temperature above a certain level. When sensor device 102 a reports the temperature level to tracking center 104, an alarm or alert may be triggered to bring this information to the attention of personnel associated with tracking center 104. Tracking center 104, in turn, may alter the programming of sensor device 102 a to check the temperature more frequently. One of ordinary skill in the art will appreciate that other parameters can be used as the basis for altering programming.

Clients 108 a-108 n provide users with an interface to network 106. By way of example, clients 108 a-108 n may be implemented using any device capable of accessing a data network, such as a general purpose computer or personal computer equipped with a modem or other network interface. Clients 108 a-108 n may also be implemented in other devices, such as a Blackberry™, Ergo Audrey™, mobile phones (with data access functions), Personal Digital Assistant (“PDA”) with a network connection, IP telephony phone, or generally any device capable of communicating over a data network.

Clients 108 a-108 n may be utilized by users to request sensor data from tracking center 104. For example, a user may subscribe to a service that allows the user to access up-to-date information about one or more sensors. Alternatively, a subscription to a service is not necessary to access the information. In order to request sensor data, the user may enter information on client 108 a indicative of the desired sensor data. For example, the user may enter information requesting the current location and temperature of all sensors within a certain radius of a specified sensor. After the customer enters this information, client 108 a may send a request to tracking center 104, which in turn may search its database or request the information directly from the sensors. When tracking center 104 finds the requested information, it may send the information back to client 108 a.

Sensor device 102 a may be operable to periodically determine whether there are any sensor devices 102 n within a certain proximity of sensor device 102 a. When sensor device 102 a determines that sensor device (e.g. sensor device 102 n) is within its range, sensor device 102 a may store information indicative of an association between the two devices. Sensor device 102 a may also send this information to tracking center 104 via network 106. When sensor device 102 a determines that sensor device 102 n is no longer within its range, it may update the stored information resident at sensor device 102 a and tracking center 104 to reflect that the devices are no longer associated with each other.

FIG. 2 is a diagram of an exemplary tracking center consistent with the present invention. Tracking center 104 may include at least a communication server 202, a user management database 204, a sensor device management database 206, a shipment management database 208, a data management database 210, an analysis database 212, an audit database 214, an archive database 216, a certificate server 218, and a rules engine 220. The number of components in tracking center 104 is not limited to what is shown and other variations in the number of arrangements of components are possible, consistent with embodiments of the invention.

Communication server 202 may be a web server that provides functionality for receiving traffic over a network, such as the internet. For example, communication server 202 may be a standard web server that a user may access at client 108 a using a web browser program, such as Safari, Internet Explorer, or Netscape Communicator. Communication server 202 is operable to receive requests for sensor data from clients, and pass the requests on to databases 204-216, certificate server 218, and/or rules engine 220 for processing. Communication server 202 may also send and receive messages for configuration, management, and monitoring of sensor devices 102 a-102 n.

User management database 204 may maintain a list of users of the system, user profiles, roles and permissions within the system, user organizations, and the relationship between users and/or other parties.

Sensor device management database 206 may maintain a per-party inventory of sensor devices 102 a-102 n used to provide monitoring information. Sensor device management database 206 may also store sensor data received from various sensor devices 102 a-102 n. Sensor device management database 206 may also store association information indicative of associations between sensor devices 102 a-102 n.

For example, sensor device 102 a may periodically send sensor data to tracking center 104, where it is stored in sensor device management database 206. Exemplary sensor data may include location, temperature, light level, motion, pressure, humidity, acceleration, gas level, airflow, vibrations, or other environmental conditions. Sensor data that is transmitted to sensor device management database 206 may be accompanied by information identifying the sensor device 102 a-102 n that detected the sensor data.

Association data stored by sensor device management database 206 may also be periodically sent by sensor devices 102 a-102 n. For example, when an activated sensor device 102 a becomes positioned within a predetermined proximity of another sensor device 102 n, sensor device 102 a and/or sensor device 102 n may locally store information reflecting this proximity association. Sensor device 102 a may then send tracking center 104 information indicative of the association. Additionally or alternatively, sensor device 102 n may send tracking center 104 information indicative of the association.

When tracking center 104 receives a request for sensor data from client 108 a, sensor device management database 206 may be searched for the requested data. If that data is found, it may be sent back to client 108 a.

Shipment management database 208 may contain configuration parameters for one or more shipments. Data management database 210 may contain data generated by the monitoring of the shipments. This data may be augmented by other systems such as third-party package tracking systems and border-crossing systems (not shown).

Analysis database 212 may contain an aggregation of all system information for use in analyzing past activities, adjusting configuration parameters, defining new monitoring activities, and predicting future trends. Audit database 214 may contain information that allows parties to review the monitoring of shipments for conformance to regulations and quality metrics. Archive database 216 may contain information that provides long-term storage and access of historical data, and a communication sub-system that sends and receives messages for configuration, management, and monitoring to sensor devices 102 a-102 n and network 106.

Certificate server 218 may be operable to control access to data resident in sensor device management database 206. For example, client 108 a or a user of client 108 a may only be authorized to receive sensor data that corresponds to sensor devices 102 a-102 n. When that user requests a set of sensor data that includes data for which the client or user has no authorization to access, certificate server 218 recognizes the lack of authorization and only allows tracking center 104 to send the client or user the portion of the requested sensor data for which the client or user has authorization.

Rules engine 220 may be operable to, among other things, send queries to sensor device management database 206 based on requests for sensor data from client 108 a, send requested sensor data to clients 108 a-108 n after receiving it from sensor device management database 206, process sensor data received from sensor devices 102 a-102 n, request sensor data from sensor devices 102 a-102 n, and alter the programming of sensor devices 102 a-102 n.

FIG. 3 illustrates an exemplary client 108 a that can be used to implement embodiments of the invention. The components and arrangement, however, are not critical to the invention. One of ordinary skill will recognize that embodiments of the invention may be implemented by computers or workstations organized as shown, organized in a distributed processing system architecture, or organized in myriad suitable combinations of software, hardware, and/or firmware.

For example, client 108 a may include components such as a central processing unit (CPU) 310, a memory 320, an input/output (I/O) device(s) 330, an application programming interlace (API) 340, and a database 350 that can be implemented in various ways. For example, an integrated platform (such as a workstation, personal computer, laptop, etc.) may comprise CPU 310, memory 320, I/O devices 330, API 340, and database 350, interconnected by a local bus 335. In such a configuration, components 310, 320, 330, 340, and 350 may connect through a local bus interface.

CPU 310 may be one or more known processing devices, such as a microprocessor from the Pentium family manufactured by Intel™ or a mainframe-class processor. Memory 320 may be one or more storage devices configured to store information used by CPU 310 to perform certain functions, operations, and steps related to embodiments of the present invention. Memory 320 may be a magnetic, semiconductor, tape, optical, or other type of storage device. In one embodiment, memory 320 includes one or more software application programs 325 that, when executed by CPU 310, perform various processes consistent with the present invention.

Methods, systems, and articles of manufacture consistent with the present invention are not limited to programs configured to perform dedicated tasks. For example, memory 320 may be configured with a program 325 that performs several functions consistent with the invention when executed by CPU 310. Alternatively, CPU 310 may execute one or more programs located remotely from client 108 a. For example, client 108 a may access one or more remote programs that, when executed, perform functions related to embodiments of the present invention. The configuration and number of programs implementing processes consistent with the invention are not critical to the invention.

Memory 320 may be also be configured with an operating system (not shown) that performs several functions well known in the art when executed by CPU 310. By way of example, the operating system may be Microsoft Windows™, Unix™, Linux™, an Apple™ operating system such as MAC OSX™, Personal Digital Assistant operating system such as Microsoft CE™, or other operating system. The choice of operating system, and even the use of an operating system, is not critical to the invention.

I/O device(s) 330 may comprise one or more input/output devices that allow data to be received and/or transmitted by client 108 a. For example, I/O device 330 may include one or more input devices, such as a network connection, keyboard, touch screen, mouse, microphone, disk reader, and the like, that enable data to be input or received from a user. Further, I/O device 330 may include one or more output devices, such as a network connection, display screen, printer, speaker devices, and the like, that enable data to be output or presented to a user. The configuration and number of input and/or output devices incorporated in I/O device 330 are not critical to the invention.

API 340 is an interface used by client 108 a to execute user requests. API 340 may be used in conjunction with I/O device 330 to define, for example, monitoring parameters, events, and notifications with respects to shipments. In addition, API 340 may query and receive information regarding shipments in response to information received at I/O device 330. API 340 may also update information stored in databases 204-216.

Database 350 may comprise one or more databases that store information and are accessed and managed through system 100. By way of example, database 350 may be an Oracle™ database, a Sybase™ database, or other relational database. As illustrated in FIG. 2, databases 204-216 may located within tracking center 104. However, the information stored in databases 204-216 may also be located in database 350.

Parties

According to one embodiment, a “party” may refer to an individual, a group, a division, a company, or any combination of individuals, groups, divisions, or companies. For example, when a user sends or receives a shipment, the user may join system 100. When the user joins, the user may enter his company name, and a party corresponding to the company may be created. After creation of the party, the user may be assigned to the party. When other users that belong to the same company join system 100, they may also be added to the party.

A party may use system 100 to collaborate with other business partners. To do so, the party may either identify other parties already present in the system via a search feature, or they can invite users into system 100. New parties may create collaboration profiles that specify their default policies for sharing information and access to their sensor devices. In addition, parties may also change their profiles at any time. For example, a party may change their profile on a per-shipment basis or may create profiles specific to one or more business partners. Collaboration profiles contain rules that may be invoked against a permission mechanism to enable and restrict access by business partners to information defined or created by other parties.

For example, a party may choose to make information about all of their monitored shipments available to all other parties in the system. Conversely, a party may restrict access to each monitored shipment to only the parties participating in the shipment (e.g. recipient and carrier). This may prevent other parties from accessing the information. The system also contains a mechanism used to govern the amount and level of detail of information access on a per-user basis; this mechanism is discussed further in this document.

The system may also allow the creation of communities of parties which cross organizational boundaries. To do so, users may search for other parties by name, description, or by settings in their collaboration profile that may indicate organizations willing to cooperate in fulfilling some need, such as providing intervention services to assure shipment integrity. To aid the collaborative process, party profiles may include information about the duration of a party's membership in the system and reputation information as expressed by their fellow members. The party profiles may also include operational information, such as the certificates or other configuration information necessary to leverage their telecommunications or computer networks. By granting access to their networks, a party may allow other parties to use them to transmit and receive monitoring and system data.

Permissions

System 100 may also include a permission mechanism that may be used to implement a set of permissions that grant or deny parties the ability to perform actions related to sensor devices 102 a-102 n and databases 204-216. The permission mechanism may be implemented by certificate server 218. For example, each party may have access to administrative functions that may include defining new parties in the system, adding or removing sensor devices 102 a-102 n, and/or the restricting or permitting access to party shipment information by other parties. Accordingly, permissions may allow a party to grant administrative functions to other parties, such that a party can, for instance, define a set of parties and restrict their ability to view, create, or update sensor devices 102 a-102 n, or to create, view, or update one or more shipments or sets of shipments.

This permission mechanism may be used to implement a set of collaboration policies within the system. Organizations, users, devices, shipments, and information stored within the system are created, viewed, modified, and deleted according to rules that take into account the object of the action and the entity performing the action. Rather than exhaustively specify the ability or inability of all other parties to perform such actions, these permissions can refer to roles that imply group membership (e.g. the set of all users belonging to a certain organization, all members of all organizations, all shipments in which a particular organization is a party, etc.). This system allows shared access to information and enables parties to act on this information. Parties collaborate by either actively seeking permission to access and act on data or by being passively granted permission by default. Collaboration policies specify what the default roles and permissions are for entities in the system.

Sensor Device

As previously stated, sensor device 102 a may be placed inside a package with the contents of the package. Sensor device 102 a may measure or detect one or more conditions such as location, temperature, light level, motion, pressure, humidity, gas level, airflow, vibrations, or other environmental conditions.

Sensor device 102 a may report data in several different ways. For example, sensor device 102 a may report data based on measurements of at least one of physical quantities (e.g. temperature of 72° F.), qualitative assessments (e.g. “hot”), relative observations based on a predetermined threshold (e.g. greater than 85° F.), a calculated threshold (e.g. average greater than 80° F.), and business-events provided by third-party systems (e.g. proof-of-delivery of a shipment). This data may be correlated with the shipment and may be used to report any changes in shipment status or a lack of changes in the status.

Depending upon the capabilities of sensor device 102 a, these measurements may be calculated directly by sensor device 102 a. However, other measurements may be calculated based on party requirements entered at I/O device 330 and processed by API 340. According to one embodiment, all observations are confirmed by API 340 because different measurements may be of interest to different parties. For example, a shipping party may wish to know when sensor device 102 a measures the presence of 50% relative humidity. However, a receiving party may wish to know when sensor device 102 a measures the presence of 80% relative humidity. If sensor device 102 a cannot be configured to report against multiple measurement thresholds, then API 340 may be responsible for performing these calculations.

Parties with sufficient permission can define new sensor devices 102 a-102 n within the system by creating a sensor profile. A sensor profile may include a list of monitoring capabilities of sensor device 102 a that may describe the conditions that sensor device 102 a may observe (e.g. temperature, humidity, location, movement, etc.), the frequency that sensor device 102 a may make observations, and the frequency that sensor device 102 a reports the observations.

Sensor device 102 a may be “owned” by a party because a party may govern access to data even if access is currently unrestricted. For example, some websites may publish weather information by ZIP code. This weather information may be correlated with temperature readings from another sensor device 102 a to warn one or more parties of weather conditions. In this example, access may simply be the availability of the website to respond to requests.

In another embodiments, sensor device 102 a may be “owned” by a party to the shipping process (e.g. a shipper, recipient, carrier, or logistics provider). In this embodiment, the sensor profile would indicate sensor device 102 a ownership and allow that ownership to transfer to a different party upon completion of use. For example, a shipper might use sensor device 102 a to assure the integrity of a high-value merchandise to a recipient. Upon proof of delivery to the recipient, the shipper may automatically transfer ownership of sensor device 102 a to the recipient. Conversely, a different shipper might want retain ownership of sensor device 102 a and this shipper may not transfer ownership of sensor device 102 a to the recipient. A shipper may not transfer ownership so that the shipper would be able to use sensor device 102 a to aid in a return of defective merchandise.

Some sensor devices 102 a-102 n may support inter-device communication using short-range communication mechanisms such as ZigBee. These sensor devices 102 a-102 n may use this capability to support business-level activities, such as ensuring the integrity of a set of shipments by mutual visibility and communication. Sensor device 102 a owners may also allow shared access to this feature by other sensor devices 102 n, particularly sensor devices that are owned by other parties. Sensor devices 102 a-102 n with networking capability may also transmit their observations using other sensor devices as communication gateways.

The system may also support profiles describing static (e.g. fixed) and configurable sensor devices 102 a-102 n. Via API 340, the system may define mechanisms and messages that may be used to configure sensor devices 102 a-102 n. These messages may include information used to identify the sensor device 102 a that is the subject of the message and parameters to define thresholds for measuring observations, reporting observations, and reporting frequency.

Whenever possible, sensor profiles include a description of the power requirements over time of particular monitoring functions, such as the use of a GPS sensor to determine location. When provided, this information can be used to estimate the total power usage over a set of monitoring functions, and this information may be used to estimate the maximum duration of monitoring by sensor device 102 a and may be used to assist a party in defining monitoring parameters. If this information cannot be provided, but sensor device 102 a can provide diagnostic information specifying the power usage or level over time, historical data may be used to estimate the power requirements for particular sets of commonly used monitoring parameters.

Depending upon the capabilities of sensor device 102 a, additional messages can be sent to sensor device 102 a providing power and cost management information. This information may include time or location-based periods during which sensor device 102 a functions may be reduced in frequency or idled, or during which communication can be restricted or switched to lower cost channels.

These messages may be sent during the initial receipt and setup of sensor device 102 a as part of an inventory management function. These messages may also be sent during configuration of sensor device 102 a dedicated to a specific kind of transport, storage, value chain production, or other logistics function. Sensor device 102 a configuration can be a one-time activity or real-time, dynamic activity reflecting changing conditions or needs of system users or in response to system calculations.

Sensor Device Configuration

The permission mechanism may govern access to particular sensor devices 102 a-102 n on a per-user basis, and the permission mechanism may also provide the ability to configure sensor devices 102 a-102 n. This configuration information may consist of specifying which capabilities should be used in monitoring information of a particular shipment (e.g. movement, temperature, and humidity) in addition to the actual observation and reporting frequency to employ when providing information. This configuration information may be transmitted to sensor devices 102 a-102 n via a device configuration system (not shown). Device configuration system may use an intermediate communication gateway as needed to communicate with sensor devices 102 a-102 n. Alternatively, sensor devices 102 a-102 n may be configured by a plug-in connection to a programming device, such as a PC having a computer-readable media reader.

After configuration, sensor device 102 a may transmit information to a data receiving system which may record the data and make that data available to parties with sufficient permission to view the data. The data may also be passed to a notification system that may compare the data against monitoring parameters. The notification system may also perform further actions, as needed, based on the result of the comparison. These actions may include triggering external system activities, performing calculations that result in new configuration information being sent to sensor device 102 a, performing calculations that result in new configuration information for use in further monitoring, and correlating data from sensor devices 102 a-102 n or historical data. The system may also supplement data provided by sensor devices 102 a-102 n with information provided by the carrier or other external systems, either by receiving messages via the API or by querying these systems for data. This information may be viewed as third-party information and it may be combined with the sensor information and presented to the appropriate parties.

In addition to configuring a single sensor device 102 a, the system may also transmit future configuration parameters for storage on sensor device 102 a based on the capabilities of sensor device 102 a. For example, if the monitoring frequency of sensor device 102 a should change during shipment to allow more precise monitoring of its location as it nears a destination of the recipient, these parameters may be sent to sensor device 102 a and sensor device 102 a may automatically modify the reporting configuration.

Sensor device 102 a configuration and access to data may be defined either collaboratively or on a per shipment basis. For example, in a particular shipment, both the shipper and the receiver may want to define monitoring parameters that may not be consistent. One way to accomplish this may be to use two sensor devices 102 a and 102 b, where sensor device 102 a provides data to the shipper and sensor device 102 b provides data to the receiver. However, using two sensor devices iis not efficient. Therefore, rather than using two sensor devices to monitor and transmit data, the shipper and the receiver may share a single sensor device 102 a.

Rules may be defined within the system that limit or force the shipper and the receiver to negotiate the implemented monitoring configuration parameters. The system can allow the shipper and the receiver to be effectively unaware that sensor device 102 a is being shared. This may be accomplished by restricting the data available to the shipper and the receiver by events and thresholds defined by each party. For example, a receiver may desire location reporting at city-level at half-hour intervals, and the shipper may desire address-level reporting at hourly intervals. Sensor device 102 a may be configured to report address-level reporting at half-hour intervals, but each party would only see information at the requested level (e.g. address vs. city) and requested frequency (e.g. half-hour vs. hour).

According to another embodiment, a shipper may define the reporting configuration of sensor device 102 a to restrict the receiver from viewing data regarding the shipment to certain locations or during certain times. In addition, the configuration of sensor device 102 a may also permit the receiver to view all data of the shipment once it has entered within a certain radius of the delivery location.

As previously stated, parties may define a shipment within the system. Examples of shipments may include the delivery of goods, the return shipment of any sensor device 102 a and/or goods to the shipment origin or other location, the shipment of multiple items from a common origin through common intermediate points to multiple independent destinations, the aggregation of multiple shipments from separate origins to a common destination, and combinations of these scenarios.

These events may range from simple matching (e.g. the temperature of sensor device 102 a has reached a certain threshold) to complex chains of independent or related events (e.g. a shipment has moved after 5PM on certain day and the temperature and humidity have not exceeded a certain threshold after 20 minutes of movement). Since the specification of these events may be limited based on the capabilities of sensor device 102 a, the system may prevent parties from attempting to specify events that cannot be provided by sensor device 102 a. A party that owns sensor device 102 a may modify the device's profile to limit the volume of monitoring observations provided to other parties. The party may also limit the specificity of data provided and the frequency of data reporting by specifying a delay before another party may view or interact with data from sensor device 102 a.

A party may also only partially specify the configuration information for later use. This configuration information may act as a template where certain values may be specified, such as the origin of the shipment, the type of sensor device 102 a to use for monitoring the shipment, and the type and frequency of monitoring data to collect. While this information may be specified during configuration, one of ordinary skill would appreciate that this information may be modified by the party during shipping.

Parties may also define relationships between shipments, such that two or more shipments originating from different locations and traveling to a common destination may be defined and queried by API 340 and viewed via UI 330 as a group. Likewise, multiple shipments traveling together from an origin to destination may be similarly grouped, and multiple shipments starting from a common point but ultimately arriving at more than one destination may be similarly grouped. This association of shipments may allow the party to define common configuration parameters across the group and may also simplify viewing, updating, and other operations. Multiple shipments may also be aggregated to provide a “safety net” feature. A “safety net” feature may be preferable when tracking shipments because this feature may reflect multiple activities, locations, and other monitoring data. Moreover, too great a variance in any of these data parameters could be used by a party to determine an error in the logistics process.

For example, a shipment of goods may be sent from three different plants A, B, and C and may all travel to a common intermediate point D (e.g. an assembly plant). Intermediate point D may ship the entire shipment of goods to a distributor E, and distributor E may separate the goods into three different shipments sending the goods to a return location F, a warehouse G, and a warehouse H. After return location F, warehouse G, and warehouse H receive the appropriate shipments, return location F may send the shipment back to plant A. In addition, warehouse G may send the shipment to a retailer I, and warehouse H may keep the shipment.

When defining common destination of multiple shipments, the system may optimize the use of sensor devices 102 a-102 n to meet the monitoring requirements of different parties while also minimizing the number of sensor devices 102 a-102 n in use. Optimizing the use of sensor devices 102 a-102 n may also minimize the overall power used by sensor devices 102 a-102 n and the aggregate number of communications required to report the status of the shipments. While the above examples have explained the use of a single sensor device 102 a to monitor several shipments, one of ordinary skill would appreciate that a party may choose to monitor a single shipment using multiple sensor devices 102 a-102 n to ensure monitoring parameters by calculating information from each of sensor devices 102 a-102 n or performing more sophisticated analysis based on known capabilities, accuracy, and precision of sensor devices 102 a-102 n.

According to another embodiment, sensor devices 102 a-102 n may each be placed in separate packages for shipping and may travel together when each of the packages is transported as a group (e.g. cartons on a pallet). In this embodiment, sensor devices 102 a-102 n may be configured to determine a master sensor device 102 a that may receive information from other sensor devices. Based on this configuration, sensor devices 102 a-102 n may all communicate with each other, but only sensor device 102 a transmits information to tracking center 104.

Sensor devices 102 a-102 n may also be configured to opportunistically take advantage of third-party communication networks, such as WiFi networks. Sensor devices 102 a-102 n may sense and report third-party communication networks that may provide compatible communication channels during transport back to tracking center 104. If these channels are open for communication, sensor devices 102 a-102 n may use them if other preferred channels are not open or if they can be used to reduce power consumption and/or cost. If these networks belong to parties in system 100, a party with sufficient permission may view these networks and obtain appropriate credentials to enable the use of these networks. If the credentials are approved, the information regarding these networks may be sent and downloaded by sensor devices 102 a-102 n.

Databases 204-216 may act as a feedback mechanism for sensor devices 102 a-102 n. Based on data transmitted from sensor devices 102 a-102 n to the databases 204-216, information derived from sensor devices 102 a-102 n either alone or in combination with information from other sensor devices 102 a-102 n, information derived from third party systems, or historical information from sensor devices 102 a-102 n used in monitoring similar shipments (e.g. matching the origin and destination of a current shipment or matching the shipper and recipient), system 100 may transmit new or updated configuration parameters to sensor devices 102 a-102 n.

For example, if system 100 notices that the temperature reported by a sensor device 102 a is trending upward, system 100 may reconfigure sensor device 102 a to increase the rate and/or precision of temperature measurement and reporting based on the capabilities of sensor device 102 a. This ability to reconfigure sensor device 102 a is especially important if a party indicated that the temperature should be monitored and sensor device 102 a should provide information if the temperature is approaching a critical threshold. System 100 may also use historical measurements to detect anomalous events. For example, an average transit time from origin to a particular mid-point may be 15 hours with a standard deviation of an hour based on historical data. However, a particular shipment may taking longer (e.g. 17 hours). If this occurs, parties monitoring the shipment may be alerted even though the parties had not requested notification of such an event in advance. Historical data may also be used to determine unusual data, such as delays in movement that might be the result of an accident.

Sensor device 102 a may also transmit other data to system 100 even though this data might not be individually identifiable or actionable. For example, sensor device 102 a may report the number and type of observations they have made using standard or custom units of measure (e.g. observations per hour). This data may be transmitted in the same manner as other sensor data. However, the party that currently “owns” sensor device 102 a (e.g. the party that is authorized to control sensor device 102 a) may choose whether this data is stored with the other data. If it is, the party may, based on the party profile, make this data available to other parties both during shipment and afterwards as historical data.

Parties may record information about communication networks, such as WiFi or other wireless networks, for use by sensor device 102 a for sending and receiving monitoring and other system information. This information may include the location of wireless access points or other communication gateway devices, security credentials, certificates, and other security information necessary to use the network. This information may also include specifications regarding limits on the amount of data that can be transferred by parties over the network, the duration of use within certain timeframes, and other information necessary to ensure proper use.

For system 100 to report the information about a shipment, an association may be made between the sensor device 102 a that is monitoring the shipment and a shipment identifier. This would typically be done at the time the shipment is created when a tracking number for the shipment is generated and the package is ready to be sealed. This process may occur at I/O 330 where the party may input or select a unique sensor identifier and a shipment identifier. The sensor identifier can be any unique number such as the hardware ID, SIM card number, or the device phone number. The shipment identifier can be the tracking number, freight shipment number, customer order number, or any unique identifier for that package. A sensor device 102 a may also be associated with groups of individual shipments or consolidated packages traveling together under one shipment, such as a pallet. Likewise, multiple sensors devices 102 a-102 n may be associated to a single shipment if, for example, battery life of one of sensors devices 102 a-102 n is inadequate to cover the entire route.

The association may also take place prior to the time a shipment is ready to be sent. This may occur if the shipper wants to monitor conditions during manufacturing or assembly but shipment details for the product have not been determined yet. In this example, the association could be between at least one of sensors devices 102 a-102 n and the shipper's internal order identifier. After the order has been completed and prepared for shipment, the shipment number could be added to the shipment to complete the associations. A similar process may also occur when monitoring a product after the end of a shipment.

The shipper may also define a termination point of the shipment (e.g. at the recipient). When the shipment arrives at the termination point, the association between sensor device 102 a and the shipment identifier would cease. At this time, sensor device 102 a may be available to be associated with another shipment. One of ordinary skill would appreciate that the termination point may be negotiable between the shipper and recipient if the detailed information about the shipment is of interest to both parties.

Real-Time Monitoring

After an association occurs, sensor device 102 a may report data on a periodic basis, and this data may be available to the appropriates parties via I/O 330. This data is presented as a set of information about that shipment and may include, for example, multiple environmental elements, location, progress of the shipment, and overall status. This information may be presented graphically, in table format, or via a map view.

The timeliness of the data is contingent both on network availability and latency. When cellular backhaul is the sole communication method, data availability may be impacted by network conditions. Short range communication options such as WiFi and Zigbee are also a possibility and may be used as either a primary transmission method or a secondary transmission method. When communication with a network is not possible, the data received by sensor device 102 a may be logged and stored in sensor device 102 a and transmitted when communication is available.

In addition to specified monitoring parameters (e.g. location, temperature, and humidity), sensor device 102 a may also transmit other data as part of the monitoring information. This data may be transmitted to system 100 via messages, and the message formats and receiving mechanisms may be specified by API 340 via I/O) 330. This data is stored as part of the monitoring information and is accessible to all parties having access to the shipment data.

The monitoring frequency may be determined by the party at the start of the shipment and may differ from the communication frequency. These frequencies may also be altered during the shipment if two-way communication with sensor device 102 a is available. During monitoring, if sensor device 102 a recognizes that its data storage space is limited, sensor device 102 a may be configured to cease monitoring, reduce the frequency of observation, begin overwriting past observations, calculate new observations that attempt to summarize the values of previous observations (e.g. the average temperature over multiple observations and location based on a set of latitude/longitude locations), or any combination.

Parties may also choose to view the information generated during the monitoring of a shipment using filters that limit or narrow the type and number of observations presented. For example, a party may choose to view information generated or calculated during a specific time period, or a party may chose to only view information that meets criteria such as a measurement being above a threshold value. Moreover, parties may also view lists of shipments, inventory, or other monitored goods using these same criteria. Parties may sort and filter these lists, which may provide for separate viewing of information regarding, for example, shipments that are in motion and shipments that have generated a notification.

Sensor device 102 a may also be used to observe the status of a package both before and after the shipping process. For example, sensor device 102 a may monitor the status of a package stored in a warehouse after manufacture or in a distribution center after delivery. This is useful for performing asset or inventory management. Monitoring a package after shipment may require additional configuration parameters, such as a delivery event notification via a third party API or manual intervention by the third party to determine when the monitoring period begins.

For example, a third party system may be a warehouse management system that tracks the arrival or departure of shipments from a facility. This information may be used as another source of shipment status (e.g. shipped, received) or as indication of location if GPS or other location sensors could not work due to building interference or other factors. Another example of a third party system may be a temperature monitoring system within a building that provides an network-accessible source of information regarding the temperature and humidity status of a room. This information may provide additional information (e.g. ambient environmental condition) or as a correlation factor in confirming the condition of a shipment.

When a third party system is used to provide monitoring information, this information must be correlated with other monitoring information and/or the shipment. For example, if the shipper uses a carrier with shipment tracking service, the tracking service may report information based on a shipment tracking number, rather than sensor device 102 a. Accordingly, when a third party system is used as a data source to provide additional information, the information may be transmitted to system 100 along with the shipment tracking number so that the information from the third party system may be correlated with the shipment.

Events and Notification

As appreciated by those of skill in the art, the monitoring process may include an active notification of parties or systems in response to a change in the status of a shipment. Notifications may be generated by system 100 based on the information collected by the sensor devices 102 a-102 n or based on non-sensor activities. These notifications may include a notification of new data that may include a signal indicating an alert condition (e.g. change in light, temperature, humidity). The timely departure from pre-defined location may generate a geofence notification (e.g. movement in or out of a specified area) whereas a temperature sensor reading exceeding the defined thresholds may trigger an environmental alert. These messages may be transmitted to the appropriate party or parties using multiple methods depending on the severity of the message. Notifications may be presented to the appropriate party or parties via email, Short Message Service (SMS), display on I/O 330, and presentation to a third party system via mechanisms specified by the appropriate party.

When defining a shipment, a party may specify start, intermediate, and end points based on either static or dynamic criteria. For example, a recipient may define the origin of a shipment as an address or a geofence boundary enclosing a particular area. In addition, the recipient may define the destination as the region “30 minutes” from a delivery address, where the “30 minute” boundary would be determined during shipment by the speed of sensor device 102 a, a vehicle containing the shipment, or some other mechanism. Start, intermediate, and end points may be defined using simple criteria, such as a reading from a clock, or by combining multiple criteria in complex ways. For example, the start of a shipment may be described as the movement of sensor device 102 a after a certain time. The definition of any of these conditions may be specified as requiring all of them (a logical AND), any one of them (logical OR), as following a pre-defined sequence of occurrence, or as the lack of an occurrence within a specified time window (logical NOT). The intermediate points may represent logistics process steps, such as distribution or manufacturing locations, or time periods where particular readings are expected.

Arbitrary regions may be also be defined by applying restrictions on shipment data visibility. For example, a carrier may wish to restrict visibility to its shipping network. Therefore, the carrier may define regions covering its facilities or time periods covering modes of shipment. These regions may be defined independent of any particular shipment and may then be applied to individual shipments or set as a default setting applying to all shipments that meet certain criteria.

Environmental thresholds and location boundaries may also be stored on sensor device 102 a and would not require activity from system 100. Sensor device 102 a may also alter its monitoring or reporting activity based on sensor data or location information. Other triggers for alerts may include movement as detected by sensor device 102 a, a schedule as calculated by system 100, or carrier information.

Alert settings for an individual shipment may be applied at the beginning of shipment and may be modified remotely by the party or automatically adjusted based on conditions detected by sensor device 102 a. System 100 may use these alerts to control monitoring as well. For instance, if a shipment is received at a customs clearing location and requires additional confirmation, sensor device 102 a may detect that the shipment is not moving and may transmit that information to system 100. Based on this information, system 100 may re-configure the sensor device 102 a to reduce power consumption, thus extending the monitoring ability of sensor device 102 a in an effort to guarantee that sensor device 102 a can still fulfill monitoring requirements once the shipment passes customs. If other shipments have sensor devices 102 a-102 n that monitor the package through customs, historical monitoring data may be used to estimate the duration of this period. This may result in a more accurate reconfiguration and may provide interested parties with information to better describe the logistics process.

Alert notifications to parties and system 100 may be configured to require an acknowledgement of receipt. Notifications that are not acknowledged within a pre-configured timeframe may automatically transition their recipient to other parties or trigger other actions such as executing rules, generating other notifications, and sending messages to other systems.

Data

Aside from monitoring data, parties can choose to store other unstructured data in data management database 210. This data may include documents representing agreements between parties, reports covering shipments, shipment documents such as bills or proof of delivery, sensor device 102 a proof of ownership, and other information useful in the logistics process. This data is subject to the same collaborative sharing access rules as other information stored in data management database 210.

Archive

The information gathered and calculated during the monitoring of shipments (e.g. historical data) may be available to the party that configured the monitoring parameters for a configurable period after the monitoring ends. The duration of the configurable period is set by a party in system 100 with sufficient administrative permission. If multiple parties are collaborating in the monitoring of a shipment, all parties can view and interact with this information for the defined period. At the end of the defined period, the information may be archived in archive database 216. When the information is archived, the shipment information and its associated data does not appear in any lists presented by I/O 330. Accordingly, archived data may be considered hidden from view. Parties may choose to prevent one or more shipments from being archived. In addition, parties may manually choose to archive shipments before system 100 would automatically archive the information or after having chosen previously to not archive the information. Archive database 216 may also aggregate all archived data for use in analysis by parties.

Historical data may also be used to create shipment “templates.” For example, when a shipper is configuring a shipment, the shipper may input numerous data elements (e.g. destination, carrier, etc.). However, some data elements may not be known until the shipping order is created (e.g. tracking number or date specific service levels like Saturday delivery). Accordingly, the shipment template, which is a named shipment configuration that has at least one of the shipment configuration elements input, may be missing data elements. Rather that spending the time and resources to recreate a shipment template, it may be easier to start with the configuration of a past, successful shipment and adjust or remove data elements as appropriate to adjust for other shipments that fit the intended profile. Alternatively, an automated process could cluster past, successful shipments based on configuration similarities to the shipment selected and assist the party by flagging the configuration values that are likely to require attention for a particular shipment.

By way of example, a shipper may notice that most shipments to a receiver are almost identical, and a data element corresponding to the carrier may depend on how quickly the receiver requires the shipment. Therefore, the shipper may create an shipment template based on a previous shipment, and the shipper may flag the carrier as unspecified in the shipment template so that the shipper may be required to set the carrier when he creates a new shipment.

According to another example, a shipper may have a new employee that may create a new shipment template for a shipment to a receiver. The employee may choose the wrong carrier. System 100 may access the historical data stored in archive database 216, and system 100 may notice that this shipment template is very similar to previous shipments, but the carrier has never been used before for this type of shipment. The shipper may then be prompted for confirmation that the carrier is correct. In response, the shipper may correct the mistake or, if he decides that the carrier is correct, he could confirm the selection.

In addition, access to historical data provides parties with the opportunity to detect deviations from specified monitoring parameters and to infer and suggest better parameters, such as more precise thresholds or more accurate location and time values. For example, a receiver may notice that a geofence describing the delivery destination encloses his entire distribution center, an area covering 15 acres. The historical data may indicate that the monitoring of the shipments ends within a much smaller area (e.g. several hundred square feet). The receiver may then update the parameters used to create new shipments with this smaller region. In addition, the carrier for these shipments may also realize that all shipments delivered to a particular address end up being delivering to a particular receiving dock location. The carrier may update their parameters to reflect this information.

Having access to historical data allows the opportunity to characterize recurring problems in similar shipments either by manual inspection or automatic data mining. For example, if a shipper is examining past shipments, he may discover that the percentage of packages above a predetermined temperature threshold increases during a certain time of year for ground shipments but not for express shipments. This information may alert the shipper to, for example, investigate if seasonal packaging with additional insulation is cheaper than simply switching the service level to express.

Analysis

In addition to viewing party data, sensor device 102 a, and shipment data, parties may also have access to historical data stored in analysis database 212. Subject to access permissions, parties may analyze current and historical data. For example, parties may view an aggregate depiction all of their organization's shipments. When other organizations create and monitor shipments, this data is also available for analysis, although these organizations may specify that their data is not identifiable. This may result in analysis database 212 replacing organization names and other identifiers with unique, generic values.

In addition to using GPS technology, the parties may also use Assisted GPS (A-GPS). A-GPS enhances the startup performance of a GPS satellite-based positioning system. In order to take advantage of A-GPS services, a receiver needs to have a general idea of its current position and a confidence interval that describes the confident the receiver has in knowing its current position. This allows the A-GPS service to determine what satellites the GPS receiver should be able to see, thereby allowing the receiver to avoid wasting resources searching the spectrum for satellites that are not currently visible to its location. Whenever a sensor device 102 a sends a GPS position to an application, a cell base station that is associated with sensor device 102 a is recorded along with identifying information for any other cell base station that is “visible” to, that is within some of sensor device 102 a. Since the upper limit on cell size is known, it is possible for the application to calculate positions and confidence intervals for sensor device 102 a using historical position data.

In order for this to occur, the application may build a graph using previously seen cell sites as points (nodes) and creates edges (lines) between points that have been reported as visible to sensor device 102 a at the same time. For example, if sensor device 102 a is associated with cell A but can also see cells B, C, and D, then the points for A, B, C, and D are all connected to each other by graph edges. Once the graph is created, a table may be created by visiting each point in the graph and determining how many edges must be traveled from the given point to the nearest point that has had a valid GPS reading associated with it. The confidence interval may then be calculated by adding one half to the number of edges traversed and multiplying the result by the expected cell diameter. If multiple GPS associated points are equidistant from the current point, the GPS readings may be averaged.

When sensor device 102 a first connects to the application, the application may access the information based on the cell sites currently visible to th sensor device 102 a. If any of the visible cell sites have been previously seen and associated with a GPS reading, the application may use the calculated position and confidence interval as the seed position and confidence interval required by the A-GPS service.

Flowchart

FIG. 4 illustrates a flowchart 400 of an exemplary method for tracking items, consistent with the principles of the present invention. Although the steps of the flowchart are described in a particular order, one skilled in the art will appreciate that these steps may be performed in a modified or different order, or that certain steps may be omitted. Further, one or more of the steps in FIG. 4 may be performed concurrently or in parallel.

One or more sensor devices 102 a-102 n are set up based on the requirements of a shipper (step 410). For example, a party may require specific programming (specifying, for example, the manner in which a device detects environmental conditions) for sensor devices 102 a-102 n that are to be associated with items to be sent to recipients. Alternatively, sensor devices 102 a-102 n may be configured based on default programming. A shipper who desires to send an item to a recipient may purchase or otherwise acquire one or more sensor devices 102 a-102 n to be attached to or placed in an item to be shipped. A shipper, for example, may be an item delivery company such as FedEx, a retailer, or a manufacturer that makes its own deliveries. One of ordinary skill in the art will appreciate that it is possible that the customer and the shipper are the same entity.

Sensor devices 102 a-102 n may be activated and associated with the item(s) being shipped (step 420). For example, a courier or other employee of the shipper may turn on sensor device 102 a and place it in or attach it to packaging associated with a corresponding item. The courier or other employee may also associate sensor device 102 a with an item tracking number. For example, the courier or other employee may cause information to be stored at tracking center 104 that specifies that the item tracking number is currently assigned to an identification number for the item tracking device. Alternatively, no item tracking number is associated with sensor device 102 a.

As noted above with reference to FIG. 1, sensor device 102 a may include sensors that measure or detect one or more conditions such as location, temperature, light level, motion, pressure, humidity, gas level, airflow, vibrations, or other environmental conditions. Sensor device 102 a that includes such sensors may transmit the sensor data either periodically, on a specified schedule, or on demand. The data is then received by tracking center 104 (step 430).

When tracking center 104 receives sensor data, if that data is indicative of a predetermined condition, tracking center 104 may trigger an appropriate alarm (step 440). For example, suppose sensor device 102 a detects a temperature above a certain level. When sensor device 102 a reports the temperature level to tracking center 104, an alarm or alert may be triggered to bring this information to the attention of personnel associated with tracking center 104. Personnel may then monitor the situation more closely or take another appropriate action. Alternatively or additionally, the pertinent courier or other party may be notified of the alarm condition via sensor device 102 a.

Tracking center 104 may also alter the programming of sensor device 102 a if necessary or desired (step 450). In the example of sensor device 102 a detecting a temperature above a certain level, tracking center 104 may, in turn, alter the programming of sensor device 102 a to check the temperature more frequently. One of ordinary skill in the art will appreciate that other parameters can be used as the basis for altering programming. Moreover, one of ordinary skill in the art will appreciate that programming may be altered for reasons other than the detection of predetermined conditions, and that the programming of the aforementioned devices may be altered without the intervention of tracking center 104.

Finally, when an item reaches its final destination (e.g., delivered to the recipient), the courier removes and may deactivate sensor device 102 a (step 460).

“Opt-In” Process

As previously stated, a party may use system 100 to collaborate with other parties. Within system 100, an application may provide the platform to allow parties that participate in the shipment of a package to control access to information in an automated way to meet the needs of each of the parties. The application may be stored on a computer-readable medium at, for example, tracking center 104. For example, parties may want to receive information regarding location, temperature, light level, motion, pressure, humidity, gas level, airflow, vibrations, or other environmental conditions at desired intervals (e.g. every hour). In addition to receiving information during the actual shipping of the package, parties may also want to receive information regarding the integrity of the package before and/or after the package is shipped. For example, the shipping party may want to receive information regarding the integrity of the package while the package is located in a warehouse before shipment. Moreover, the receiving party may want to receive information regarding the integrity of the package while the package is located in a warehouse after shipment.

Accordingly, parties may want to receive information during the entire journey of the package (e.g. before, during, and after shipment). Therefore, a party to a journey of a package (e.g. the shipper) may need to determine what type of information it wants to share with the other parties to the journey (e.g. the receiver). The parties may determine this information by negotiation with the other parties. Based on the negotiation, the parties may determine how the information is collected and what information is collected. The parties may also determine what information is available to them and what information is available to the other parties.

This agreement may be viewed as a collection of three, separate agreements that are part of the overall agreement. These three, separate agreements may be viewed as three layers. In the top layer, the agreement may contain constraints that generally cannot be negotiated by the parties. These constraints may be based on hardware, software, and/or legal constraints. Legal constraints may include, for example, information based on requirements of different countries and/or regions of the world. The restraints cannot change and may be viewed as a central base logistic system agreement that provides the parties with the ability to use the application.

The second layer may contain information sharing agreements between the parties. These agreements provide the ability for certain types of information to flow between the parties. The information sharing agreements are explained in greater detail below. The third layer may contain the journey agreement. This agreement may provide templates for the journey, such as filter, reporting, and/or alerts for a specific package (e.g. a pharmaceutical product). These three layers of agreements are all part of an overall agreement that governs how information is collected, reported, and shared with the parties.

In order to provide the “opt-in” ability, the parties may first determine their profiles. These profiles may be called a Sensor Information Sharing Profile (SISP), and the SISP may represent the information each party may share with the other parties in a journey. A party may create one or more than one SISP based on the role of the party in the journey (e.g. shipper, transporter, or receiver). In addition to creating one or more than one SISP for each role, a party may create more than one SISP for the same role (e.g. shipper). The SISP is used to create an Information Sharing Agreement (ISA). The ISA is contained within the second layer.

An SISP may be viewed as a default setting that specifies information, such as the conditions or circumstances that information is shared with other parties. This information may include both conditional settings and information availability settings. Examples of conditional settings may be origin region, destination region, the mode of transportation (e.g. land, sea, and/or air), container, and duration. Examples of information availability settings may be location, temperature, light level, motion, pressure, humidity, gas level, airflow, vibrations, or other environmental conditions. One of ordinary skill in the art will appreciate that other parameters can be used as the basis for providing conditional settings and information availability settings.

For example, the sending party may have an SISP created for land shipments, air shipments, and sea shipments. In addition, a receiving party may also have an SISP created for land shipments, air shipments, and sea shipments. Moreover, the parties may also have more than one SISP created for land, air, and/or sea shipments. Within each SISP, each party may also determine other settings listed above. When each party determines the settings for each SISP, each party may indicate if each setting is required.

For example, a shipper may want to provide only location and temperature information to the receiver. However, while the shipper may want to provide location and temperature information, the shipper may agree to also provide humidity information. Accordingly, providing humidity information is not required. A setting that is not required may be viewed as an allowed setting. Therefore, while the shipper may want to provide only location and temperature information, the shipper may agree to provide humidity information. Therefore, the setting selected by the shipper to provide humidity information is an allowed, but not required, setting.

Conversely, the shipper may want to only provide location and temperature information. However, the receiver may want to receive location, temperature, and humidity information, and the receiver may indicate that humidity temperature information is a required setting. One of ordinary skill in the art would appreciate that any party in the journey may create required settings in that party's one or more SISPs.

While an ISA may be generated using an SISP of each party, and SISP is not required. For example, one or more of the parties to a journey may not have an SISP. According to this example, an ISA could not be automatically created because one or more of the parties does not have an SISP. However, the parties may still negotiate the terms of the journey and create a corresponding ISA as described above.

Based on the settings contained in the SISP(s) of the each party, the SISP(s) may contain similar settings or may contain one or more different settings. If all settings match, there is no conflict between the SISP(s) of the each party. Therefore, an ISA may be automatically generated between the parties.

If one or more of the settings of the SISP(s) of the parties are not similar, a conflict exists, and an ISA cannot be automatically created. For example, a shipper of a package may indicate that it does not want to provide humidity information. This setting may be considered a required setting. However, the receiver may want to receive humidity information. This setting may also be considered a required setting. Therefore, a conflict exists, and the ISA cannot be automatically created. Because each party to the journey may have more than one SISP with different required settings, it may be difficult for the parties to determine which SISP to use to begin the negotiation process.

For example, if each SISP contains twenty settings, and each company has five SISPs, the conflicts between SISPs may vary depending on the different combinations. Accordingly, the application may use an algorithm to determine which SISP of each party to use to begin the negotiation process.

The algorithm may first determine the number of total matches. For example, if the SISP(s) of each party contains twenty settings, the algorithm may compare each SISP of each party to determine the SISP of each party that has the most settings is common. These SISPs may be viewed as the SISPs with the highest number of matches.

Next, the algorithm may determine the number of required settings of each SISP that match. As explained above, each party may determine any number of required settings within each SISP. In addition, each party may also determine any number of settings that are allowed, but not required. Based on the number of required settings of each SISP, the algorithm may determine the SISP from each party that contains the most number of required setting matches,

Next, the algorithm may determine a popularity. The popularity corresponds to the number of previously created ISAs for each SISP. As stated above, each party may create one or more SISP. Each SISP may be used to create one or more ISAs. Therefore, the algorithm may determine the number of ISA(s) that have been previously created for each SISP.

Finally, the algorithm may determine a date that was last utilized in an ISA that was part of a journey. Based on these four steps, the algorithm may determine the best SISP match.

After the best SISP match is determined for each of the parties, the parties may view the SISP from each other party that the algorithm determines is the best match to create the ISA. Based on the number of different setting requirements for each SISP, each party may need to negotiate with the other one or more parties to agree on an ISA. This negotiation may include updating the corresponding SISP or creating a new SISP so each party can agree on an ISA. If each party to a journey does not agree, an ISA cannot be created, and the journey cannot occur.

If the parties do agree to modify their SISP or create a new SISP, an ISA may be created. At this time, the parties seeking to “opt-in” to the agreement may negotiate changes to the conflicting setting(s). For example, if the shipper indicates that not reporting humidity information is a required setting, and the receiver indicates that humidity information is a required setting, the two parties may agree to report humidity information. Therefore, the shipper SISP that indicates that not reporting humidity information minutes is a required setting may be updated to indicate that reporting humidity information is not required, or allowed. One of ordinary skill would appreciate that one or more of the parties to a journey may modify its existing SISP or may create a new SISP based on the conflicts.

After each party to the journey agrees on each setting of its SISP, an ISA may be created. The ISA is a collection of two or more SISPs, and it sets the legal terms of the information that can be viewed across parties. Upon creation of the ISA, each party may receive and view the agreed information during the agreed interval(s).

The creation and agreement of an ISA occurs at the second layer of the overall agreement. At the third level, the parties may agree on a specific journey agreement. For example, the ISA in the second layer may indicate the rights for certain types of information to flow between parties (e.g. conditional settings, information availability settings, etc.). In the journey layer, corresponding to the third layer, the parties may determine templates for a specific journey. For example, if the shipper agrees to provide the receiver with temperature, light, and humidity information, the receiver may indicate that it wants to receive this information every thirty minutes. The shipper may agree to this reporting interval, or the shipper may propose a different reporting interval (e.g. every hour). One of ordinary would appreciate that each party may agree on numerous different settings as stated above and numerous different reporting intervals.

While the above example provides the ability for the parties to indicate specific parameters for a journey, the application may also provide these parameters within the SISP of each party. Therefore, if each party agrees to the parameters, and an ISA is created, the parties may create a journey without determining specific templates for the journey because this information is already contained in the agreed upon ISA.

In addition, it is possible for two or parties to agree and create and ISA, but not agree on the template for the journey. For example, if a receiver is receiving a medical device, the receiver may want to receive location information every thirty minutes during transportation until the device is within five miles of the receiver. At this time, the receiver may want to receive real-time location information. However, if the ISA that the receiver and shipper agreed upon does not provide for real-time location information reporting, the receiver may not be able to receive this location information. Accordingly, even though the parties agreed to an ISA, the journey template conflicts with the ISA. This conflict may be viewed as “out-of-bounds.” If desired information is “out-of-bounds” from the ISA (e.g. reporting location information real-time), the parties of the journey may need to create a new ISA that allows for real-time location information reporting. If the shipper agrees to provide real-time location information within five miles of the receiver location, the parties may agree to a new ISA. If the shipper does not agree to provide real-time location information within five miles of the receiver location, a new ISA will not be created and the journey will not occur.

If the parties agree to create a new ISA, the parties may agree on each of the parameters of the journey. Upon agreement, the parties have now agreed to the agreements on each of the three layers. Therefore, the journey of the package may begin at a desired time, and each of the parties to the agreement have agreed to “opt-in” to the agreement and they may receive the agreed upon information during to the journey of the package.

Documentation

During a journey, the information received and transmitted to the authenticated parties of the agreement may be stored in data management database 210 as stated above. As the information is stored in data management database 210, an application, that may be stored on a computer-readable medium at, for example, tracking center 104, may also present this information to the parties as a journey document related to the journey. As the information regarding the journey is updated, journey document objects related to each piece of information may be versioned to show an audit trail of any changes that may have been made as the package continues along the journey.

Journey document objects may include documentation that describes the object being shipped, the shipping transaction, the shipper, the carrier, and the receiver. In addition, the journey document may be in the form of an imaged journey document, electronically provided shipping information, and historical shipment data. Changes to the journey document may be made based on the role (e.g. shipper, carrier, receiver) and authorization of the party in the journey.

As a party uses the application over time, the application may monitor previous journey documents and may ensure that previous errors are not duplicated. The application may alert the party of previous errors or possible errors as described above. Accordingly, the system may monitor previous errors and create dynamic communities to improve journey documents.

While certain features and embodiments of the invention have been described, other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments of the invention disclosed herein. Furthermore, although aspects of embodiments of the present invention have been described as being associated with data stored in memory and other storage mediums, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, floppy disks, or a CD-ROM, or other forms of RAM or ROM. Further, the steps of the disclosed methods may be modified in various ways, including by reordering steps and/or inserting or deleting steps, without departing from the principles of the invention.

It is intended, therefore, that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims and their full scope of equivalents. 

1-12. (canceled)
 13. A computer-implemented method for accessing information regarding one or more shipments, the method comprising the steps of: receiving, at a tracking center, sensor information associated with the one or more shipments; analyzing rules associated with a party to determine whether the party is authorized to access the received sensor information; and restricting the party from accessing the received sensor information based on the analyzed rules.
 14. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party at a level of specificity that is less than a level of specificity of data collected by a sensor associated with the one or more shipments.
 15. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party at a frequency lower than collected by a sensor associated with the one or more shipments.
 16. The method of claim 14, wherein the sensor collects sensor information at a street address-level, the method further comprising: reporting the received sensor information to the party at a city-level.
 17. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information when one or more sensors associated with the one or more shipments is at a predetermined location.
 18. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information at a predetermined time.
 19. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party after a predetermined time delay.
 20. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party when a sensor associated with the one or more shipments is within a predetermined boundary relative to the delivery location of the one or more shipments.
 21. The method of claim 20, wherein the predetermined boundary is defined as either a predetermined distance relative to the delivery location or as a predetermined time to reach the delivery location.
 22. The method of claim 13, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information when a sensor associated with the one or more shipments is outside of a predetermined boundary relative to the originating location of the one or more shipments.
 23. The method of claim 22, wherein the predetermined boundary is defined as either a predetermined distance relative to the originating location or as a predetermined time away from the originating location.
 24. The method of claim 13 further comprising: reconfiguring one or more sensor devices associated with the one or more shipments to modify the frequency or precision of the received sensor information, wherein the reconfiguring occurs in response to an alert created by a reading of the sensor information.
 25. A non-transitory computer-readable medium storing instructions which, when executed by a processor, cause the processor to perform a method for accessing information regarding one or more shipments, the method comprising the steps of: receiving, at a tracking center, sensor information associated with the one or more shipments; analyzing rules associated with a party to determine whether the party is authorized to access the received sensor information; and restricting the party from accessing the received sensor information based on the analyzed rules.
 26. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party at a level of specificity that is less than a level of specificity of data collected by a sensor associated with the one or more shipments.
 27. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party at a frequency lower than collected by a sensor associated with the one or more shipments.
 28. The computer-readable medium of claim 26, wherein the sensor collects sensor information at a street address-level, the method further comprising: reporting the received sensor information to the party at a city-level.
 29. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information when one or more sensors associated with the one or more shipments is at a predetermined location.
 30. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information at a predetermined time.
 31. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party after a predetermined time delay.
 32. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: reporting the received sensor information to the party when a sensor associated with the one or more shipments is within a predetermined boundary relative to the delivery location of the one or more shipments.
 33. The computer-readable medium of claim 32, wherein the predetermined boundary is defined as either a predetermined distance relative to the delivery location or as a predetermined time to reach the delivery location.
 34. The computer-readable medium of claim 25, wherein restricting the party from accessing the received sensor information further comprises the step of: preventing the party from accessing the received sensor information when a sensor associated with the one or more shipments is outside of a predetermined boundary relative to the originating location of the one or more shipments.
 35. The computer-readable medium of claim 34, wherein the predetermined boundary is defined as either a predetermined distance relative to the originating location or as a predetermined time away from the originating location.
 36. The computer-readable medium of claim 25, the method further comprising: reconfiguring one or more sensor devices associated with the one or more shipments to modify the frequency or precision of the received sensor information, wherein the reconfiguring occurs in response to an alert created by a reading of the sensor information.
 37. A tracking center for accessing information regarding one or more shipments, comprising: an input unit configured to receive sensor information associated with the one or more shipments; and a processor configured to: analyze rules associated with a party to determine whether the party is authorized to access the received sensor information; and restrict the party from accessing the received sensor information based on the analyzed rules.
 38. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: reporting the received sensor information to the party at a level of specificity that is less than a level of specificity of data collected by a sensor associated with the one or more shipments.
 39. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: reporting the received sensor information to the party at a frequency lower than collected by a sensor associated with the one or more shipments.
 40. The tracking center of claim 38, wherein the sensor collects sensor information at a street address-level, and the processor configured to restrict the party from accessing the received sensor information is further configured to: reporting the received sensor information to the party at a city-level.
 41. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: preventing the party from accessing the received sensor information when one or more sensors associated with the one or more shipments is at a predetermined location.
 42. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: preventing the party from accessing the received sensor information at a predetermined time.
 43. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: reporting the received sensor information to the party after a predetermined time delay.
 44. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: reporting the received sensor information to the party when a sensor associated with the one or more shipments is within a predetermined boundary relative to the delivery location of the one or more shipments.
 45. The tracking center of claim 44, wherein the predetermined boundary is defined as either a predetermined distance relative to the delivery location or as a predetermined time to reach the delivery location.
 46. The tracking center of claim 37, wherein the processor configured to restrict the party from accessing the received sensor information is further configured to: preventing the party from accessing the received sensor information when a sensor associated with the one or more shipments is outside of a predetermined boundary relative to the originating location of the one or more shipments.
 47. The tracking center of claim 46, wherein the predetermined boundary is defined as either a predetermined distance relative to the originating location or as a predetermined time away from the originating location.
 48. The tracking center of claim 37, wherein the processor is further configured to: reconfigure one or more sensor devices associated with the one or more shipments to modify the frequency or precision of the received sensor information, wherein the reconfiguring occurs in response to an alert created by a reading of the sensor information. 