Detecting tampering in assets and authenticating authorized users

ABSTRACT

In some implementations, a wireless sensing system may receive sensor data associated with an asset. The sensor data may be associated with a tampering event and the tampering event may include an action performed on the asset. The wireless sensing system may further determine whether the tampering event is performed by an authorized user of the wireless sensing system. The wireless sensing system may further determine whether the tampering event is performed within an authorized location of the wireless sensing system. The wireless sensing system may transmit a notification to a user of the wireless sensing system. The notification may alert the user of the wireless sensing system that the tampering event has occurred.

RELATED APPLICATIONS

This application claims priority to U.S. Patent Application Ser. No.63/029,675, titled “Tamper Detecting Disposable Covert Tape”, filed May25, 2020, and to U.S. Patent Application Ser. No. 63/085,992, titled“Detecting Tampering in Assets and Authenticating Authorized Users,”filed Sep. 30, 2020, each of which are incorporated herein in theirentirety by reference.

BACKGROUND

In asset management, assets often contain sensitive, private, or otherinformation or materials that are not meant to be accessed, except byauthorized users. Additionally, businesses such as airports, hospitals,and the like may include wards, rooms, storage areas or storagecontainers, or buildings that contain sensitive or private informationor materials that is not meant to be accessed by authorized users.Unauthorized access to assets or areas is considered to be a tamperingevent. It is valuable in asset and business management to determine whenand where tampering events occur.

SUMMARY OF THE INVENTION

In an embodiment, a method for a wireless sensing system receives sensordata from a sensor associated with an asset. The sensor data representsa tampering event of the asset. The wireless sensing system determineswhether the tampering event was authorized. The wireless sensing systemdetermines whether the tampering event occurred at an authorized area.In response to one or both of: (1) the tampering event beingunauthorized, and (2) the tampering event being performed within anunauthorized area, the wireless sensing system transmits a notificationof the tampering event to a mobile device wirelessly connected to thewireless sensing system.

In an embodiment, a server is associated with a wireless sensing systemthat has a network of wireless nodes, that includes at least oneprocessor and one memory communicatively coupled with the at least oneprocessor, and stores machine-readable instructions that, when executedby the processor, cause the processor to receive a signal from arecently-activated wireless node of the network of wireless nodes at theserver. The processor further adds an identifier of therecently-activated tape node to indicate that the recently-activatedwireless node has joined the network of wireless nodes to a database,according to a classification of the tape node.

In an embodiment, a method for operating a wireless sensing systemincludes a first tape node attached to a first parcel. The first tapenode has a first type of wireless communication interface and a secondtype of wireless communication interface that has a longer range thanthe first type of wireless communication interface. A second tape nodeis capable of communicating with the first tape node. A serverestablishes a wireless communication connection with the second type ofwireless communication interface of the first tape node. The serverdesignates the first tape node as a master node of the second tape node.

In an embodiment, a wireless sensing system has a primary electroniclogging device (ELD) and a secondary ELD. The secondary ELD includes atleast one processor and a memory communicatively coupled with the atleast one processor and stores machine-readable instructions that, whenexecuted by the processor, cause the processor to receive tape node datafrom a tape node associated with an asset proximate to the secondaryELD, the tape node data representing a tampering event performed on theasset. The processor compares the tape node data to a list ofpredetermined events, stored within the memory. The list ofpredetermined events includes one or more predetermined events andcorresponding elements of tape node data associated with each of the oneor more predetermined events. The processor determines, based on thecomparison, that the tampering event does not match a predeterminedevent within the list of predetermined events. The processor executes,in response to the determination that the tampering event does not matcha predetermined event, a particular contingency plan, based on thetampering event.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1A is a diagrammatic view of a segment of an example adhesive tapeplatform dispensed from a roll used to detect tampering of an asset,according to an embodiment.

FIG. 1B is a diagrammatic top view of a portion of the segment of theexample adhesive tape platform shown in FIG. 1A.

FIG. 2 is a diagrammatic view of an example of an envelope carrying asegment of an example adhesive tape platform dispensed from a backingsheet, according to an embodiment.

FIG. 3 is a schematic view of an example segment of an adhesive tapeplatform, according to an embodiment.

FIG. 4 is a diagrammatic top view of a length of an example adhesivetape platform, according to an embodiment.

FIGS. 5A-5C show diagrammatic cross-sectional side views of portions ofdifferent respective adhesive tape platforms, according to anembodiment.

FIG. 6 is a diagrammatic view of an example of a network environmentsupporting communications with segments of an adhesive tape platform,according to an embodiment.

FIG. 7 is a diagrammatic view of a hierarchical communications networkincluding an adhesive tape platform, according to an embodiment.

FIG. 8 is a flow diagram of a method of creating the hierarchicalcommunications network, according to an embodiment.

FIGS. 9A-9E are diagrammatic views showing example use cases for adistributed agent operating system, according to an embodiment.

FIG. 10A-B are diagrammatic top views of a length of an example trackingadhesive tape product, according to an embodiment.

FIG. 11A-11C show example illustrations of adhesive tape platformaffixed to assets configured to detect tampering events and toauthenticate authorized users, according to an embodiment.

FIG. 12 is a flow diagram of one example method for detecting tamperingby a segment of an adhesive tape platform, according to an embodiment.

FIG. 13 is a schematic diagram a segment of an adhesive tape platformthat communicates with one or more network services, duringtransportation, according to an embodiment.

FIG. 14 is a block diagram of a set of example tractor managementmodules in an example of a primary electronic logging device (ELD),according to an embodiment.

FIG. 15 is a flow diagram of an example method for responding to anevents, that was detected by a node, associated with assets in alogistic facility, according to an embodiment.

FIG. 16 is flow diagram of an example method for determiningcompatibility between a primary electric logging device and a secondarylogging device that is in wireless communication with nodes, accordingto an embodiment.

FIG. 17 is a schematic view of example method of resolving an eventdetected by the adhesive tape node and relayed to the secondaryelectronic device, according to an embodiment.

FIG. 18 is an example of a safe zone where the adhesive tape node maydetermine to lower some functionality to save battery life, according toan embodiment.

FIG. 19 is a block diagram of an example computer apparatus, accordingto an embodiment.

DETAILED DESCRIPTION OF THE EMBODIMENTS

In the following description, like reference numbers are used toidentify like elements. Furthermore, the drawings are intended toillustrate major features of exemplary embodiments in a diagrammaticmanner. The drawings are not intended to depict every feature of actualembodiments nor relative dimensions of the depicted elements, and arenot drawn to scale.

As used herein, the term “or” refers an inclusive “or” rather than anexclusive “or.” In addition, the articles “a” and “an” as used in thespecification and claims mean “one or more” unless specified otherwiseor clear from the context to refer the singular form.

The terms “wireless node” or “tape node” may be used interchangeably incertain contexts, and refer to an adhesive tape platform or a segmentthereof that is equipped with sensor, processor, memory, energysource/harvesting mechanism, and wireless communications functionality,where the adhesive product has a variety of different form factors,including a multilayer roll or a sheet that includes a plurality ofdivisible adhesive segments. Once deployed, each tape node or wirelessnode can function, for example, as an adhesive tape, label, sticker,decal, or the like, and as a wireless communications device. A“peripheral” tape node or wireless node, also referred to as an outernode, leaf node, or terminal node, refers to a node that does not haveany child nodes.

In certain contexts, the terms “wireless sensing system,” “hierarchicalcommunications network,” “distributed agent operating system,” and thelike are used interchangeably herein to refer to a system or network ofwireless nodes.

An adhesive tape platform includes a plurality of segments that may beseparated from the adhesive product (e.g., by cutting, tearing, peeling,or the like) and adhesively attached to a variety of different surfacesto inconspicuously implement any of a wide variety of different wirelesscommunications-based network communications and transducing (e.g.,sensing, actuating, etc.) applications. Examples of such applicationsinclude event detection applications, monitoring applications, securityapplications, notification applications, and tracking applications,including inventory tracking, package tracking, person tracking, animal(e.g., pet) tracking, manufactured parts tracking, and vehicle tracking.In example embodiments, each segment of an adhesive tape platform isequipped with an energy source, wireless communication functionality,transducing functionality (e.g., sensor and energy harvestingfunctionality), and processing functionality that enable the segment toperform one or more transducing functions and report the results to aremote server or other computer system directly or through a network oftapes. The components of the adhesive tape platform are encapsulatedwithin a flexible adhesive structure that protects the components fromdamage while maintaining the flexibility needed to function as anadhesive tape (e.g., duct tape or a label) for use in variousapplications and workflows. In addition to single function applications,example embodiments also include multiple transducers (e.g., sensingand/or actuating transducers) that extend the utility of the platformby, for example, providing supplemental information and functionalityrelating characteristics of the state and/or environment of, forexample, an article, object, vehicle, or person, over time.

Systems and processes for fabricating flexible multifunction adhesivetape platforms in efficient and low-cost ways also are described in USPatent Application Publication No. US-2018-0165568-A1. For example, inaddition to using roll-to-roll and/or sheet-to-sheet manufacturingtechniques, the fabrication systems and processes are configured tooptimize the placement and integration of components within the flexibleadhesive structure to achieve high flexibility and ruggedness. Thesefabrication systems and processes are able to create useful and reliableadhesive tape platforms that can provide local sensing, wirelesstransmitting, and positioning functionalities. Such functionalitytogether with the low cost of production is expected to encourage theubiquitous deployment of adhesive tape platform segments and therebyalleviate at least some of the problems arising from gaps inconventional infrastructure coverage that prevent continuous monitoring,event detection, security, tracking, and other logistics applicationsacross heterogeneous environments.

FIG. 1A shows an asset 10 that is sealed for shipment using an exampleadhesive tape platform 12 that includes embedded components of awireless transducing circuit 14 (collectively referred to herein as a“tape node”). In this example, a segment 13 of the adhesive tapeplatform 12 is dispensed from a roll 16 and affixed to the asset 10. Theadhesive tape platform 12 includes an adhesive side 18 and anon-adhesive side 20. The adhesive tape platform 12 may be dispensedfrom the roll 16 in the same way as any conventional packing tape,shipping tape, or duct tape. For example, the adhesive tape platform 12may be dispensed from the roll 16 by hand, laid across the seam wherethe two top flaps of the asset 10 meet, and cut to a suitable lengtheither by hand or using a cutting instrument (e.g., scissors or anautomated or manual tape dispenser). Examples of such tapes includetapes having non-adhesive sides 20 that carry one or more coatings orlayers (e.g., colored, light reflective, light absorbing, and/or lightemitting coatings or layers).

Referring to FIG. 1B, in some examples, the non-adhesive side 20 of thelength of the adhesive tape platform 12 includes writing or othermarkings that convey instructions, warnings, or other information to aperson or machine (e.g., a bar code reader), or may simply be decorativeand/or entertaining. For example, different types of adhesive tapeplatforms may be marked with distinctive colorations to distinguish onetype of adhesive tape platform from another. In the illustrated example,the length of the adhesive tape platform 12 includes a two-dimensionalbar code 22 (e.g., a QR Code), written instructions 24 (i.e., “CutHere”), and an associated cut line 26 that indicates where the usershould cut the adhesive tape platform 12. The written instructions 24and the cut line 26 typically are printed or otherwise marked on the topnon-adhesive side 20 of the adhesive tape platform 12 duringmanufacture. The two-dimensional bar code 22, on the other hand, may bemarked on the non-adhesive side 20 of the adhesive tape platform 12during the manufacture of the adhesive tape platform 12 or,alternatively, may be marked on the non-adhesive side 20 of the adhesivetape platform 12 as needed using, for example, a printer or othermarking device.

In order to avoid damage to the functionality of the segments of theadhesive tape platform 12, the cut lines 26 typically demarcate theboundaries between adjacent segments at locations that are free of anyactive components of the wireless transducing circuit 14. The spacingbetween the wireless transducing circuit 14 and the cut lines 26 mayvary depending on the intended communication, transducing and/oradhesive taping application. In the example illustrated in FIG. 1A, thelength of the adhesive tape platform 12 that is dispensed to seal theasset 10 corresponds to a single segment of the adhesive tape platform12. In other examples, the length of the adhesive tape platform 12needed to seal an asset or otherwise serve the adhesive function forwhich the adhesive tape platform 12 is being applied may includemultiple segments 13 of the adhesive tape platform 12, one or more ofwhich segments 13 may be activated upon cutting the length of theadhesive tape platform 12 from the roll 16 and/or applying the length ofthe adhesive tape platform to the asset 10.

In some examples, the transducing circuit 14 that are embedded in one ormore segments 13 of the adhesive tape platform 12 are activated when theadhesive tape platform 12 is cut along the cut line 26. In theseexamples, the adhesive tape platform 12 includes one or more embeddedenergy sources (e.g., thin film batteries, which may be printed, orconventional cell batteries, such as conventional watch style batteries,rechargeable batteries, or other energy storage device, such as a supercapacitor or charge pump) that supply power to the transducing circuit14 in one or more segments of the adhesive tape platform 12 in responseto being separated from the adhesive tape platform 12 (e.g., along thecut line 26).

In some examples, each segment 13 of the adhesive tape platform 12includes its own respective energy source including energy harvestingelements that can harvest energy from the environment. In some of theseexamples, each energy source is configured to only supply power to thecomponents in its respective adhesive tape platform segment regardlessof the number of contiguous segments 13 that are in a given length ofthe adhesive tape platform 12. In other examples, when a given length ofthe adhesive tape platform 12 includes multiple segments 13, the energysources in the respective segments 13 are configured to supply power tothe transducing circuit 14 in all of the segments 13 in the given lengthof the adhesive tape platform 12. In some of these examples, the energysources are connected in parallel and concurrently activated to powerthe transducing circuit 14 in all of the segments 13 at the same time.In other examples, the energy sources are connected in parallel andalternately activated to power the transducing circuit 14 in respectiveones of the adhesive tape platform segments 13 at different timeperiods, which may or may not overlap.

FIG. 2 shows an example adhesive tape platform 30 that includes a set ofadhesive tape platform segments 32 each of which includes a respectiveset of embedded wireless transducing circuit components 34, and abacking sheet 36 with a release coating that prevents the adhesivesegments 32 from adhering strongly to the backing sheet 36. Eachadhesive tape platform segment 32 includes an adhesive side facing thebacking sheet 36, and an opposing non-adhesive side 40. In this example,a particular segment 32 of the adhesive tape platform 30 has beenremoved from the backing sheet 36 and affixed to an envelope 44. Eachsegment 32 of the adhesive tape platform 30 can be removed from thebacking sheet 36 in the same way that adhesive labels can be removedfrom a conventional sheet of adhesive labels (e.g., by manually peelinga segment 32 from the backing sheet 36). In general, the non-adhesiveside 40 of the segment 32 may include any type of writing, markings,decorative designs, or other ornamentation. In the illustrated example,the non-adhesive side 40 of the segment 32 includes writing or othermarkings that correspond to a destination address for the envelope 44.The envelope 44 also includes a return address 46 and, optionally, apostage stamp or mark 48.

In some examples, segments of the adhesive tape platform 12 are deployedby a human operator. The human operator may be equipped with a mobilephone or other device that allows the operator to authenticate andinitialize the adhesive tape platform 12. In addition, the operator cantake a picture of a parcel including the adhesive tape platform and anybarcodes associated with the parcel and, thereby, create a persistentrecord that links the adhesive tape platform 12 to the parcel. Inaddition, the human operator typically will send the picture to anetwork service and/or transmit the picture to the adhesive tapeplatform 12 for storage in a memory component of the adhesive tapeplatform 12.

In some examples, the wireless transducing circuit components 34 thatare embedded in a segment 32 of the adhesive tape platform 12 areactivated when the segment 32 is removed from the backing sheet 36. Insome of these examples, each segment 32 includes an embedded capacitivesensing system that can sense a change in capacitance when the segment32 is removed from the backing sheet 36. As explained in detail below, asegment 32 of the adhesive tape platform 30 includes one or moreembedded energy sources (e.g., thin film batteries, common disk-shapedcell batteries, or rechargeable batteries or other energy storagedevices, such as a super capacitor or charge pump) that can beconfigured to supply power to the wireless transducing circuitcomponents 34 in the segment 32 in response to the detection of a changein capacitance between the segment 32 and the backing sheet 36 as aresult of removing the segment 32 from the backing sheet 36.

FIG. 3 shows a block diagram of the components of an example wirelesstransducing circuit 70 that includes a number of communication systems72, 74. Example communication systems 72, 74 include a GPS system thatincludes a GPS receiver circuit 82 (e.g., a receiver integrated circuit)and a GPS antenna 84, and one or more wireless communication systemseach of which includes a respective transceiver circuit 86 (e.g., atransceiver integrated circuit) and a respective antenna 88. Examplewireless communication systems include a cellular communication system(e.g., GSM/GPRS), a Wi-Fi communication system, an RF communicationsystem (e.g., LoRa), a Bluetooth communication system (e.g., a BluetoothLow Energy system), a Z-wave communication system, and a ZigBeecommunication system. The wireless transducing circuit 70 also includesa processor 90 (e.g., a microcontroller or microprocessor), one or moreenergy storage devices 92 (e.g., non-rechargeable or rechargeableprinted flexible battery, conventional single or multiple cell battery,and/or a super capacitor or charge pump), one or more transducers 94(e.g., sensors and/or actuators, and, optionally, one or more energyharvesting transducer components). In some examples, the conventionalsingle or multiple cell battery may be a watch style disk or button cellbattery that is associated electrical connection apparatus (e.g., ametal clip) that electrically connects the electrodes of the battery tocontact pads on the flexible circuit 116.

Examples of sensing transducers 94 include a capacitive sensor, analtimeter, a gyroscope, an accelerometer, a temperature sensor, a strainsensor, a pressure sensor, a piezoelectric sensor, a weight sensor, anoptical or light sensor (e.g., a photodiode or a camera), an acoustic orsound sensor (e.g., a microphone), a smoke detector, a radioactivitysensor, a chemical sensor (e.g., an explosives detector), a biosensor(e.g., a blood glucose biosensor, odor detectors, antibody basedpathogen, food, and water contaminant and toxin detectors, DNAdetectors, microbial detectors, pregnancy detectors, and ozonedetectors), a magnetic sensor, an electromagnetic field sensor, and ahumidity sensor. Examples of actuating (e.g., energy emitting)transducers 94 include light emitting components (e.g., light emittingdiodes and displays), electro-acoustic transducers (e.g., audiospeakers), electric motors, and thermal radiators (e.g., an electricalresistor or a thermoelectric cooler).

In some examples, the wireless transducing circuit 70 includes a memory96 for storing data, including, e.g., profile data, state data, eventdata, sensor data, localization data, security data, and one or moreunique identifiers (ID) 98 associated with the wireless transducingcircuit 70, such as a product ID, a type ID number (TIN), and a mediaaccess control (MAC) ID, and control code 99. In some examples, thememory 96 may be incorporated into one or more of the processor 90 ortransducers 94 or may be a separate component that is integrated in thewireless transducing circuit 70 as shown in FIG. 3. The control codetypically is implemented as programmatic functions or program modulesthat control the operation of the wireless transducing circuit 70,including a tape node communication manager that manages the manner andtiming of tape node communications, a tape node power manager thatmanages power consumption, and a tape node connection manager thatcontrols whether connections with other tape nodes are secureconnections or unsecure connections, and a tape node storage managerthat securely manages the local data storage on the node. The tape nodeconnection manager ensures the level of security required by the endapplication and supports various encryption mechanisms. The tape nodepower manager and tape communication manager work together to optimizethe battery consumption for data communication. In some examples,execution of the control code by the different types of tape nodesdescribed herein may result in the performance of similar or differentfunctions. In some examples, the example wireless transducing circuit 70may be a peripheral wireless network node, as described herein.

FIG. 4 is a top view of a portion of an example flexible adhesive tapeplatform 100 that shows a first tape node 102 (the first tape node maybe a first segment of the adhesive tape platform 100) and a portion of asecond tape node 104 (the second tape node may be a second segment ofthe adhesive tape platform 100). Each segment 102, 104 of the flexibleadhesive tape platform 100 includes a respective set 106, 108 of thecomponents of the wireless transducing circuit 70. The segments 102, 104and their respective sets of components 106, 108 typically are identicaland configured in the same way. In some other embodiments, however, thesegments 102, 104 and/or their respective sets of components 106, 108are different and/or configured in different ways. For example, in someexamples, different sets of the segments of the flexible adhesive tapeplatform 100 have different sets or configurations of tracking and/ortransducing components that are designed and/or optimized for differentapplications, or different sets of segments of the flexible adhesivetape platform may have different ornamentations (e.g., markings on theexterior surface of the platform) and/or different (e.g., alternating)lengths.

An example method of fabricating the adhesive tape platform 100 (seeFIG. 4) according to a roll-to-roll fabrication process is described inconnection with FIGS. 6, 7A, and 7B of U.S. patent application Ser. No.15/842,861, filed Dec. 14, 2017, the entirety of which is incorporatedherein by reference.

The instant specification describes an example system of adhesive tapeplatforms (also referred to herein as “tape nodes”) that can be used toimplement a low-cost wireless network infrastructure for performingmonitoring, tracking, and other logistic functions relating to, forexample, parcels, persons, tools, equipment and other physical assetsand objects. The example system includes a set of three different typesof tape nodes that have different respective functionalities anddifferent respective cover markings that visually distinguish thedifferent tape node types from one another. In one non-limiting example,the covers of the different tape node types are marked with differentcolors (e.g., white, green, and black). In the illustrated examples, thedifferent tape node types are distinguishable from one another by theirrespective wireless communications capabilities and their respectivesensing capabilities.

FIG. 5A shows a cross-sectional side view of a portion of an examplesegment 102 of the flexible adhesive tape platform 100 that includes arespective set of the components of the wireless transducing circuit 106corresponding to the first tape node type (i.e., white). The flexibleadhesive tape platform segment 102 includes an adhesive layer 112, anoptional flexible substrate 110, and an optional adhesive layer 114 onthe bottom surface of the flexible substrate 110. If the bottom adhesivelayer 114 is present, a release liner (not shown) may be (weakly)adhered to the bottom surface of the adhesive layer 114. In someexamples, the adhesive layer 114 includes an adhesive (e.g., an acrylicfoam adhesive) that has a high bond strength that is sufficient toprevent removal of the adhesive segment 102 from a surface on which theadhesive layer 114 is adhered without destroying the physical ormechanical integrity of the adhesive segment 102 and/or one or more ofits constituent components. In some examples, the optional flexiblesubstrate 110 is implemented as a prefabricated adhesive tape thatincludes the adhesive layers 112, 114 and the optional release liner. Inother examples, the adhesive layers 112, 114 are applied to the top andbottom surfaces of the flexible substrate 110 during the fabrication ofthe adhesive tape platform 100. The adhesive layer 112 bonds theflexible substrate 110 to a bottom surface of a flexible circuit 116,that includes one or more wiring layers (not shown) that connect theprocessor 90, a low power wireless communication interface 81 (e.g., aZigbee, Bluetooth® Low Energy (BLE) interface, or other low powercommunication interface), a timer circuit 83, transducers and/or energyharvesting component(s) 94 (if present), the memory 96, and othercomponents in a device layer 122 to each other and to the energy storagecomponent 92 and, thereby, enable the transducing, tracking and otherfunctionalities of the flexible adhesive tape platform segment 102. Thelow power wireless communication interface 81 typically includes one ormore of the antennas 84, 88 and one or more of the wireless circuits 82,86.

FIG. 5B shows a cross-sectional side view of a portion of an examplesegment 103 of the flexible adhesive tape platform 100 that includes arespective set of the components of the wireless transducing circuit 106corresponding to the second tape node type (i.e., green). In thisexample, the flexible adhesive tape platform segment 103 differs fromthe segment 102 shown in FIG. 5A by the inclusion of a medium powercommunication interface 85 (e.g., a LoRa interface) in addition to thelow power communications interface that is present in the first tapenode type (i.e., white). The medium power communication interface haslonger communication range than the low power communication interface.In some examples, one or more other components of the flexible adhesivetape platform segment 103 differ, for example, in functionality orcapacity (e.g., larger energy source).

FIG. 5C shows a cross-sectional side view of a portion of an exampletape node 105 of the flexible adhesive tape platform 100 that includes arespective set of the components of the wireless transducing circuit 106corresponding to the third tape node type (i.e., black). In thisexample, the flexible adhesive tape platform segment 105 includes ahigh-power communications interface 87 (e.g., a cellular interface;e.g., GSM/GPRS) and an optional medium and/or low power communicationsinterface 85. The high-power communication range provides globalcoverage to available infrastructure (e.g. the cellular network). Insome examples, one or more other components of the flexible adhesivetape node 105 differ, for example, in functionality or capacity (e.g.,larger energy source).

FIGS. 5A-5C show examples in which the flexible cover 128 of theflexible adhesive tape platform 100 includes one or more interfacialregions 129 positioned over one or more of the transducers 94. Inexamples, one or more of the interfacial regions 129 have features,properties, compositions, dimensions, and/or characteristics that aredesigned to improve the operating performance of the platform 100 forspecific applications. In some examples, the flexible adhesive tapeplatform 100 includes multiple interfacial regions 129 over respectivetransducers 94, which may be the same or different depending on thetarget applications. Example interfacial regions include an opening, anoptically transparent window, and/or a membrane located in theinterfacial region 129 of the flexible cover 128 that is positioned overthe one or more transducers and/or energy harvesting components 94.Additional details regarding the structure and operation of exampleinterfacial regions 129 are described in U.S. Provisional PatentApplication No. 62/680,716, filed Jun. 5, 2018, and U.S. ProvisionalPatent Application No. 62/670,712, filed May 11, 2018.

In some examples, a flexible polymer layer 124 encapsulates the devicelayer 122 and thereby reduces the risk of damage that may result fromthe intrusion of contaminants and/or liquids (e.g., water) into thedevice layer 122. The flexible polymer layer 124 also planarizes thedevice layer 122. This facilitates optional stacking of additionallayers on the device layer 122 and also distributes forces generated in,on, or across the adhesive tape platform segment 102 so as to reducepotentially damaging asymmetric stresses that might be caused by theapplication of bending, torqueing, pressing, or other forces that may beapplied to the flexible adhesive tape platform segment 102 during use.In the illustrated example, a flexible cover 128 is bonded to theplanarizing polymer 124 by an adhesive layer (not shown).

The flexible cover 128 and the flexible substrate 110 may have the sameor different compositions depending on the intended application. In someexamples, one or both of the flexible cover 128 and the flexiblesubstrate 110 include flexible film layers and/or paper substrates,where the film layers may have reflective surfaces or reflective surfacecoatings. Example compositions for the flexible film layers includepolymer films, such as polyester, polyimide, polyethylene terephthalate(PET), and other plastics. The optional adhesive layer on the bottomsurface of the flexible cover 128 and the adhesive layers 112, 114 onthe top and bottom surfaces of the flexible substrate 110 typicallyinclude a pressure-sensitive adhesive (e.g., a silicon-based adhesive).In some examples, the adhesive layers are applied to the flexible cover128 and the flexible substrate 110 during manufacture of the adhesivetape platform 100 (e.g., during a roll-to-roll or sheet-to-sheetfabrication process). In other examples, the flexible cover 128 may beimplemented by a prefabricated single-sided pressure-sensitive adhesivetape and the flexible substrate 110 may be implemented by aprefabricated double-sided pressure sensitive adhesive tape; both kindsof tape may be readily incorporated into a roll-to-roll orsheet-to-sheet fabrication process. In some examples, the flexiblepolymer layer 124 is composed of a flexible epoxy (e.g., silicone).

In some examples, the energy storage device 92 is a flexible batterythat includes a printed electrochemical cell, which includes a planararrangement of an anode and a cathode and battery contact pads. In someexamples, the flexible battery may include lithium-ion cells ornickel-cadmium electro-chemical cells. The flexible battery typically isformed by a process that includes printing or laminating theelectro-chemical cells on a flexible substrate (e.g., a polymer filmlayer). In some examples, other components may be integrated on the samesubstrate as the flexible battery. For example, the low power wirelesscommunication interface 81 and/or the processor(s) 90 may be integratedon the flexible battery substrate. In some examples, one or more of suchcomponents also (e.g., the flexible antennas and the flexibleinterconnect circuits) may be printed on the flexible battery substrate.

In some examples, the flexible circuit 116 is formed on a flexiblesubstrate by printing, etching, or laminating circuit patterns on theflexible substrate. In some examples, the flexible circuit 116 isimplemented by one or more of a single-sided flex circuit, a doubleaccess or back bared flex circuit, a sculpted flex circuit, adouble-sided flex circuit, a multi-layer flex circuit, a rigid flexcircuit, and a polymer thick film flex circuit. A single-sided flexiblecircuit has a single conductor layer made of, for example, a metal orconductive (e.g., metal filled) polymer on a flexible dielectric film. Adouble access or back bared flexible circuit has a single conductorlayer but is processed so as to allow access to selected features of theconductor pattern from both sides. A sculpted flex circuit is formedusing a multi-step etching process that produces a flex circuit that hasfinished copper conductors that vary in thickness along their respectivelengths. A multilayer flex circuit has three of more layers ofconductors, where the layers typically are interconnected using platedthrough holes. Rigid flex circuits are a hybrid construction of flexcircuit consisting of rigid and flexible substrates that are laminatedtogether into a single structure, where the layers typically areelectrically interconnected via plated through holes. In polymer thickfilm (PTF) flex circuits, the circuit conductors are printed onto apolymer base film, where there may be a single conductor layer ormultiple conductor layers that are insulated from one another byrespective printed insulating layers.

In the example flexible adhesive tape platform segments 102, 103, 105shown in FIGS. 5A-5C, the flexible circuit 116 is a single access flexcircuit that interconnects the components of the adhesive tape platformon a single side of the flexible circuit 116. In other examples, theflexible circuit 116 is a double access flex circuit that includes afront-side conductive pattern that interconnects the low powercommunications interface 81, the timer circuit 83, the processor 90, theone or more transducers 94 (if present), and the memory 96, and allowsthrough-hole access (not shown) to a back-side conductive pattern thatis connected to the flexible battery (not shown). In these examples, thefront-side conductive pattern of the flexible circuit 116 connects thecommunications circuits 82, 86 (e.g., receivers, transmitters, andtransceivers, with respect to FIG. 3) to their respective antennas 84,88 (with respect to FIG. 3) and to the processor 90, and also connectsthe processor 90 to the one or more transducers 94 and the memory 96.The backside conductive pattern connects the active electronics (e.g.,the processor 90, the communications circuits 82, 86 (with respect toFIG. 3) and the transducers) on the front-side of the flexible circuit116 to the electrodes of the flexible battery (not shown) via one ormore through holes in the substrate of the flexible circuit 116.

Depending on the target application, the wireless transducing circuits70 are distributed across the flexible adhesive tape platform 100according to a specified sampling density, which is the number ofwireless transducing circuits 70 for a given unit size (e.g., length orarea) of the flexible adhesive tape platform 100. In some examples, aset of multiple flexible adhesive tape platforms 100 are provided thatinclude different respective sampling densities in order to sealdifferent asset sizes with a desired number of wireless transducingcircuits 70. In particular, the number of wireless transducing circuitsper asset size is given by the product of the sampling density specifiedfor the adhesive tape platform and the respective size of the adhesivetape platform 100 needed to seal the asset. This allows an automatedpackaging system to select the appropriate type of flexible adhesivetape platform 100 to use for sealing a given asset with the desiredredundancy (if any) in the number of wireless transducer circuits 70. Insome example applications (e.g., shipping low value goods), only onewireless transducing circuit 70 is used per asset, whereas in otherapplications (e.g., shipping high value goods) multiple wirelesstransducing circuits 70 are used per asset. Thus, a flexible adhesivetape platform 100 with a lower sampling density of wireless transducingcircuits 70 can be used for the former application, and a flexibleadhesive tape platform 100 with a higher sampling density of wirelesstransducing circuits 70 can be used for the latter application. In someexamples, the flexible adhesive tape platforms 100 are color-coded orotherwise marked to indicate the respective sampling densities withwhich the wireless transducing circuits 70 are distributed across thedifferent types of adhesive tape platforms 100.

FIG. 6 shows an example network communications environment 400 thatincludes a network 402 that supports communications between one or morenetwork service servers 404 executing one or more applications of anetwork service 408, mobile gateways 410, 412, a stationary gateway 414,and various types of tape nodes that are associated with various assets(e.g., parcels, equipment, tools, persons, and other things). In someexamples, the network 402 includes one or more network communicationsystems and technologies, including any one or more of wide areanetworks, local area networks, public networks (e.g., the internet),private networks (e.g., intranets and extranets), wired networks, andwireless networks. For example, the network 402 includes communicationsinfrastructure equipment, such as a geolocation satellite system of awireless communication unit 416 (e.g., GPS, GLONASS, and NAVSTAR),cellular communication systems (e.g., GSM/GPRS), Wi-Fi communicationsystems, RF communication systems (e.g., LoRa), Bluetooth communicationsystems (e.g., a Bluetooth Low Energy system), Z-wave communicationsystems, and ZigBee communication systems.

In some examples, the one or more network service applications 406leverage the above-mentioned communications technologies to create ahierarchical wireless network of tape nodes that improves assetmanagement operations by reducing costs and improving efficiency in awide range of processes, from asset packaging, asset transporting, assettracking, asset condition monitoring, asset inventorying, and assetsecurity verification. Communication across the network is secured by avariety of different security mechanisms. In the case of existinginfrastructure, the communication uses the infrastructure securitymechanisms. In case of communications among tapes nodes, thecommunication is secured through a custom security mechanism. In certaincases, tape nodes can also be configured to support block chain toprotect the transmitted and stored data.

A set of tape nodes can be configured by the network service 408 tocreate hierarchical communications network. The hierarchy can be definedin terms of one or more factors, including functionality (e.g., wirelesstransmission range or power), role (e.g., master tape node vs.peripheral tape node), or cost (e.g., a tape node equipped with acellular transceiver vs. a peripheral tape node equipped with aBluetooth LE transceiver). Tape nodes can be assigned to differentlevels of a hierarchical network according to one or more of theabove-mentioned factors. For example, the hierarchy can be defined interms of communication range or power, where tape nodes with higherpower or longer communication range transceivers are arranged at ahigher level of the hierarchy than tape nodes with lower power or lowerrange transceivers. In another example, the hierarchy is defined interms of role, where, e.g., a master tape node is programmed to bridgecommunications between a designated group of peripheral tape nodes and agateway node or server node. The problem of finding an optimalhierarchical structure can be formulated as an optimization problem withbattery capacity of nodes, power consumption in various modes ofoperation, desired latency, external environment, etc. and can be solvedusing modern optimization methods e.g. neural networks, artificialintelligence, and other machine learning computing systems that takeexpected and historical data to create an optimal solution and cancreate algorithms for modifying the system's behavior adaptively in thefield.

The tape nodes may be deployed by automated equipment or manually. Inthis process, a tape node typically is separated from a roll or sheetand adhered to a parcel, or other stationary or mobile object (e.g., astructural element of a warehouse, or a vehicle, such as a deliverytruck) or stationary object (e.g., a structural element of a building).This process activates the tape node and causes the tape node tocommunicate with the one or more network service servers 404 of thenetwork service 408. In this process, the tape node may communicatethrough one or more other tape nodes in the communication hierarchy. Inthis process, the one or more network service servers 404 executes thenetwork service application 406 to programmatically configure tape nodesthat are deployed in the environment 400. In some examples, there aremultiple classes or types of tape nodes, where each tape node class hasa different respective set of functionalities and/or capacities.

In some examples, the one or more network service servers 404communicate over the network 402 with one or more gateways that areconfigured to send, transmit, forward, or relay messages to the network402 and activated tape nodes that are associated with respective assetsand within communication range. Example gateways include mobile gateways410, 412 and a stationary gateway 414. In some examples, the mobilegateways 410, 412, and the stationary gateway 414 are able tocommunicate with the network 402 and with designated sets or groups oftape nodes.

In some examples, the mobile gateway 412 is a vehicle (e.g., a deliverytruck or other mobile hub) that includes a wireless communications unit416 that is configured by the network service 408 to communicate with adesignated set of tape nodes, including a peripheral tape node 418 inthe form of a label that is adhered to an asset 420 contained within aparcel 421 (e.g., an envelope), and is further configured to communicatewith the network service 408 over the network 402. In some examples, theperipheral tape node 418 includes a lower power wireless communicationsinterface of the type used in, e.g., tape node 102 (shown in FIG. 5A),and the wireless communications unit 416 is implemented by a tape node(e.g., one of tape node 103 or tape node 105, respectively shown inFIGS. 5B and 5C that includes a lower power communications interface forcommunicating with tape nodes within range of the mobile gateway 412 anda higher power communications interface for communicating with thenetwork 402. In this way, the tape node 418 and wireless communicationunit 416 create a hierarchical wireless network of nodes fortransmitting, forwarding, bridging, relaying, or otherwise communicatingwireless messages to, between, or on behalf of the peripheral tape node418 and the network service 408 in a power efficient and cost-effectiveway.

In some examples, the mobile gateway 410 is a mobile phone that isoperated by a human operator and executes a client application 422 thatis configured by the network service 408 to communicate with adesignated set of tape nodes, including a master tape node 424 that isadhered to a parcel 426 (e.g., a box), and is further configured tocommunicate with the network service 408 over the network 402. In theillustrated example, the parcel 426 contains a first parcel labeled orsealed by a tape node 428 and containing a first asset 430, and a secondparcel labeled or sealed by a tape node 432 and containing a secondasset 434. As explained in detail below, the master tape node 424communicates with each of the peripheral tape nodes 428, 432 andcommunicates with the mobile gateway 410, 412 in accordance with ahierarchical wireless network of tape nodes. In some examples, each ofthe peripheral tape nodes 428, 432 includes a lower power wirelesscommunications interface of the type used in, e.g., tape node 102 (shownin FIG. 5A), and the master tape node 424 is implemented by a tape node(e.g., tape node 103, shown in FIG. 5B) that includes a lower powercommunications interface for communicating with the peripheral tapenodes 428, 432 contained within the parcel 426, and a higher powercommunications interface for communicating with the mobile gateway 410.The master tape node 424 is operable to relay wireless communicationsbetween the tape nodes 428, 432 contained within the parcel 426 and themobile gateway 410, and the mobile gateway 410 is operable to relaywireless communications between the master tape node 424 and the networkservice 408 over the wireless network 402. In this way, the master tapenode 424 and the peripheral tape nodes 428 and 432 create a hierarchicalwireless network of nodes for transmitting, forwarding, relaying, orotherwise communicating wireless messages to, between, or on behalf ofthe peripheral tape nodes 428, 432 and the network service 408 in apower efficient and cost-effective way.

In some examples, the stationary gateway 414 is implemented by a serverexecuting a server application that is configured by the network service408 to communicate with a designated set 440 of tape nodes 442, 444,446, 448 that are adhered to respective parcels containing respectiveassets 450, 452, 454, 456 on a pallet 458. In other examples, thestationary gateway 414 is implemented by a tape node (e.g., one of tapenode 103 or tape node 105, respectively shown in FIGS. 5B and 5C) thatis adhered to, for example, a wall, column, or other infrastructurecomponent of the environment 400, and includes a lower powercommunications interface for communicating with tape nodes within rangeof the stationary gateway 414 and a higher power communicationsinterface for communicating with the network 402. In one embodiment,each of the tape nodes 442-448 is a peripheral tape node and isconfigured by the network service 408 to communicate individually withthe stationary gateway 414, which relays communications from the tapenodes 442-448 to the network service 408 through the stationary gateway414 and over the communications network 402. In another embodiment, oneof the tape nodes 442-448 at a time is configured as a master tape nodethat transmits, forwards, relays, or otherwise communicate wirelessmessages to, between, or on behalf of the other tape nodes on the pallet458. In this embodiment, the master tape node may be determined by thetape nodes 442-448 or designated by the network service 408. In someexamples, the tape node with the longest range or highest remainingpower level is determined to be the master tape node. In some examples,when the power level of the current master tape node drops below acertain level (e.g., a fixed power threshold level or a threshold levelrelative to the power levels of one or more of the other tape nodes),another one of the tape nodes assumes the role of the master tape node.In some examples, a master tape node 459 is adhered to the pallet 458and is configured to perform the role of a master node for the tapenodes 442-448. In these ways, the tape nodes 442-448, 458 areconfigurable to create different hierarchical wireless networks of nodesfor transmitting, forwarding, relaying, bridging, or otherwisecommunicating wireless messages with the network service 408 through thestationary gateway 414 and over the network 402 in a power-efficient andcost-effective way.

In the illustrated example, the stationary gateway 414 also isconfigured by the network service 408 to communicate with a designatedset of tape nodes, including a master tape node 460 that is adhered tothe inside of a door 462 of a shipping container 464, and is furtherconfigured to communicate with the network service 408 over the network402. In the illustrated example, the shipping container 464 contains anumber of parcels labeled or sealed by respective peripheral tape nodes466 and containing respective assets. The master tape node 460communicates with each of the peripheral tape nodes 466 and communicateswith the stationary gateway 414 in accordance with a hierarchicalwireless network of tape nodes. In some examples, each of the peripheraltape nodes 466 includes a lower power wireless communications interfaceof the type used in, e.g., tape node 102 (shown in FIG. 5A), and themaster tape node 460 is implemented by a tape node (e.g., tape node 103,shown in FIG. 5B) that includes a lower power communications interfacefor communicating with the peripheral tape nodes 466 contained withinthe shipping container 464, and a higher power communications interfacefor communicating with the stationary gateway 414.

In some examples, when the doors of the shipping container 464 areclosed, the master tape node 460 is operable to communicate wirelesslywith the peripheral tape nodes 466 contained within the shippingcontainer 464. In an example, the master tape node 460 is configured tocollect sensor data from the peripheral tape nodes and, in someembodiments, process the collected data to generate, for example, one ormore histograms from the collected data. When the doors of the shippingcontainer 464 are open, the master tape node 460 is programmed to detectthe door opening (e.g., with an accelerometer component of the mastertape node 460) and, in addition to reporting the door opening event tothe network service 408, the master tape node 460 is further programmedto transmit the collected data and/or the processed data in one or morewireless messages to the stationary gateway 414. The stationary gateway414, in turn, is operable to transmit the wireless messages receivedfrom the master tape node 460 to the network service 408 over thewireless network 402.

Alternatively, in some examples, the stationary gateway 414 also isoperable to perform operations on the data received from the master tapenode 460 with the same type of data produced by the master tape node 460based on sensor data collected from the tape nodes 442-448. In this way,the master tape node 460 and the peripheral tape nodes 466 create ahierarchical wireless network of nodes for transmitting, forwarding,relaying, or otherwise communicating wireless messages to, between, oron behalf of the peripheral tape nodes 466 and the network service 408in a power-efficient and cost-effective way. In some examples, themaster tape node 460 may take inventory of all the peripheral tape nodes466 and may further send an alert to each of the peripheral tape nodes466 that tampering may have occurred. When a, e.g., client device (of anauthorized user) or peripheral tape nodes 466 scan or interact with it,a flag may be raised to the client device. The flag may be relayed to aserver (e.g., one or more network service servers 404, with reference toFIG. 6). Continuing the example, if a tampered-with-asset continues onits route for delivery to an end-customer, it can still be detected at alater checkpoint (e.g., the parcel delivery can be stopped/aborted lateron, even if it accidentally slips through).

In an example of the embodiment shown in FIG. 6, there are three classesof tape nodes: a short-range tape node, a medium range tape node, and along-range tape node, as respectively shown in FIGS. 5A-5C. Theshort-range tape nodes typically are adhered directly to parcelscontaining assets. In the illustrated example, the tape nodes 418, 428,432, 442-448, 466 are short-range tape nodes. The short-range tape nodestypically communicate with a low power wireless communication protocol(e.g., Bluetooth LE, Zigbee, or Z-wave). The medium range tape nodestypically are adhered to objects (e.g., a parcel 426 and a shippingcontainer 464) that are associated with multiple parcels that areseparated from the medium range tape nodes by a barrier or a largedistance. In the illustrated example, the tape nodes 424 and 460 aremedium range tape nodes. The medium range tape nodes typicallycommunicate with a medium power wireless communication protocol (e.g.,LoRa or Wi-Fi). The long-range tape nodes typically are adhered tomobile or stationary infrastructure of the wireless communicationenvironment 400.

In the illustrated example, the mobile gateway tape node 412 and thestationary gateway 414 are long-range tape nodes. Wireless communicationunit 416 is a long-range tape node and includes a lower powercommunications interface for communicating with tape nodes within rangeof the mobile gateway 412. The long-range tape nodes (e.g., wirelesscommunication unit 416) typically communicate with other nodes using ahigh-power wireless communication protocol (e.g., a cellular datacommunication protocol). In some examples, the mobile gateway tape node436 is adhered to a mobile vehicle (e.g., a truck). In these examples,the mobile gateway 412 may be moved to different locations in theenvironment 400 to assist in connecting other tape nodes to the one ormore network service servers 404. In some examples, the stationarygateway 414 is a tape node that may be attached to a stationarystructure (e.g., a wall) in the environment 400 with a known geographiclocation. In these examples, other tape nodes in the environment candetermine their geographic location by querying the stationary gateway414.

FIG. 7 shows an example hierarchical wireless communications network oftape nodes 470. In this example, the short-range tape node 472 and themedium range tape node 474 communicate with one another over theirrespective low power wireless communication interfaces 476, 478. Themedium range tape node 474 and the long-range tape node 480 communicatewith one another over their respective medium power wirelesscommunication interfaces 478, 482. The long-range tape node 480 and theone or more network service servers 404 communicate with one anotherover the high-power communication interface 484. In some examples, thelow power communication interfaces 476, 478 establish wirelesscommunications with one another in accordance with the Bluetooth LEprotocol, the medium power communication interfaces 486, 482 establishwireless communications with one another in accordance with the LoRacommunications protocol, and the high-power communication interface 484establishes wireless communications with the one or more network serviceservers 404 in accordance with a cellular communications protocol.

In some examples, the different types of tape nodes are deployed atdifferent levels in the communications hierarchy according to theirrespective communications ranges, with the long-range tape nodesgenerally at the top of the hierarchy, the medium range tape nodesgenerally in the middle of the hierarchy, and the short-range tape nodesgenerally at the bottom of the hierarchy. In some examples, thedifferent types of tape nodes are implemented with different featuresets that are associated with component costs and operational costs thatvary according to their respective levels in the hierarchy. This allowssystem administrators flexibility to optimize the deployment of the tapenodes to achieve various objectives, including cost minimization, assettracking, asset localization, and power conservation.

In some examples, one or more network service servers 404 of the networkservice 408 designates a tape node at a higher level in a hierarchicalcommunications network as a master node of a designated set of tapenodes at a lower level in the hierarchical communications network. Forexample, the designated master tape node may be adhered to a parcel(e.g., a box, pallet, or shipping container) that contains one or moretape nodes that are adhered to one or more packages containingrespective assets. In order to conserve power, the tape nodes typicallycommunicate according to a schedule promulgated by the one or morenetwork service servers 404 of the network service 408. The scheduleusually dictates all aspects of the communication, including the timeswhen particular tape nodes should communicate, the mode ofcommunication, and the contents of the communication. In one example,the one or more network service servers 404 transmits programmaticGlobal Scheduling Description Language (GSDL) code to the master tapenode and each of the lower-level tape nodes in the designated set. Inthis example, execution of the GSDL code causes each of the tape nodesin the designated set to connect to the master tape node at a differentrespective time that is specified in the GSDL code, and to communicate arespective set of one or more data packets of one or more specifiedtypes of information over the respective connection. In some examples,the master tape node simply forwards the data packets to the one or morenetwork service servers 404, either directly or indirectly through agateway tape node (e.g., the long-range wireless communication unit 416adhered to the mobile gateway 412 (which could be a vehicle, ship,plane, etc.) or the stationary gateway 414 is a long-range tape nodeadhered to an infrastructure component of the environment 400). In otherexamples, the master tape node processes the information contained inthe received data packets and transmits the processed information to theone or more network service servers 404.

FIG. 8 shows an example method of creating a hierarchical communicationsnetwork. In accordance with this method, a first tape node is adhered toa first parcel in a set of associated parcels, the first tape nodeincluding a first type of wireless communication interface and a secondtype of wireless communication interface having a longer range than thefirst type of wireless communication interface (FIG. 8, block 490). Asecond tape node is adhered to a second parcel in the set, the secondtape node including the first type of wireless communication interface,wherein the second tape node is operable to communicate with the firsttape node over a wireless communication connection established betweenthe first type of wireless communication interfaces of the first andsecond tape nodes (FIG. 8, block 492). An application executing on acomputer system (e.g., the one or more network service servers 404 of anetwork service 408) establishes a wireless communication connectionwith the second type of wireless communication interface of the firsttape node, and the application transmits programmatic code executable bythe first tape node to function as a master tape node with respect tothe second tape node (FIG. 8, block 494).

As used herein, the term “node” refers to both a tape node and anon-tape node unless the node is explicitly designated as a “tape node”or a “non-tape node.” In some embodiments, a non-tape node may have thesame or similar communication, sensing, processing and otherfunctionalities and capabilities as the tape nodes described herein,except without being integrated into a tape platform. In someembodiments, non-tape nodes can interact seamlessly with tape nodes.Each node is assigned a respective unique identifier.

Embodiments of the present disclosure further describe a distributedsoftware operating system that is implemented by distributed hardwarenodes executing intelligent agent software to perform various tasks oralgorithms. In some embodiments, the operating system distributesfunctionalities (e.g., performing analytics on data or statisticscollected or generated by nodes) geographically across multipleintelligent agents that are bound to logistic items (e.g., parcels,containers, packages, boxes, pallets, a loading dock, a door, a lightswitch, a vehicle such as a delivery truck, a shipping facility, a port,a hub, etc.). In addition, the operating system dynamically allocatesthe hierarchical roles (e.g., master and slave roles) that nodes performover time in order to improve system performance, such as optimizingbattery life across nodes, improving responsiveness, and achievingoverall objectives. In some embodiments, optimization is achieved usinga simulation environment for optimizing key performance indicators(PKIs).

In some embodiments, the nodes are programmed to operate individually orcollectively as autonomous intelligent agents. In some embodiments,nodes are configured to communicate and coordinate actions and respondto events. In some embodiments, a node is characterized by its identity,its mission, and the services that it can provide to other nodes. Anode's identity is defined by its capabilities (e.g., battery life,sensing capabilities, and communications interfaces). A node may bedefined by the respective program code, instructions, or directives itreceives from another node (e.g., a server or a master node) and theactions or tasks that it performs in accordance with that program code,instructions, or directives (e.g., sense temperature every hour and sendtemperature data to a master node to upload to a server). A node'sservices may be defined by the functions or tasks that it is permittedto perform for other nodes (e.g., retrieve temperature data from aperipheral node and send the received temperature data to the server).At least for certain tasks, once programmed and configured with theiridentities, missions, and services, nodes can communicate with oneanother and request services from and provide services to one anotherindependently of the server.

Thus, in accordance with the runtime operating system every agent knowsits objectives (programmed). Every agent knows whichcapabilities/resources it needs to fulfill objective. Every agentcommunicates with every other node in proximity to see if it can offerthe capability. Examples include communicate data to the server,authorize going to lower-power level, temperature reading, send an alertto local hub, send location data, triangulate location, any boxes insame group that already completed group objectives.

Nodes can be associated with logistic items. Examples of a logistic itemincludes, for example, a package, a box, pallet, a container, a truck orother conveyance, infrastructure such as a door, a conveyor belt, alight switch, a road, or any other thing that can be tracked, monitored,sensed, etc. or that can transmit data concerning its state orenvironment. In some examples, a server or a master node may associatethe unique node identifiers with the logistic items.

Communication paths between tape and/or non-tape nodes may berepresented by a graph of edges between the corresponding logistic items(e.g., a storage unit, truck, or hub). In some embodiments, each node inthe graph has a unique identifier. A set of connected edges betweennodes is represented by a sequence of the node identifiers that definesa communication path between a set of nodes.

Referring to FIG. 9A, a node 520 (Node A) is associated with a package522 (Package A). In some embodiments, the node 520 may be implemented asa tape node that is used to seal the package 522 or it may beimplemented as a label node that is used to label the package 522;alternatively, the node 520 may be implemented as a non-tape node thatis inserted within the package 522 or embedded in or otherwise attachedto the interior or exterior of the package 522. In the illustratedembodiment, the node 520 includes a low power communications interface524 (e.g., a Bluetooth Low Energy communications interface). Anothernode 526 (Node B), which is associated with another package 530 (PackageB), is similarly equipped with a compatible low power communicationsinterface 528 (e.g., a Bluetooth Low Energy communications interface).

In an example scenario, in accordance with the programmatic code storedin its memory, node 526 (Node B) requires a connection to node 520 (NodeA) to perform a task that involves checking the battery life of Node A.Initially, Node B is unconnected to any other nodes. In accordance withthe programmatic code stored in its memory, Node B periodicallybroadcasts advertising packets into the surrounding area. When the othernode 520 (Node A) is within range of Node B and is operating in alistening mode, Node A will extract the address of Node B andpotentially other information (e.g., security information) from anadvertising packet. If, according to its programmatic code, Node Adetermines that it is authorized to connect to Node B, Node A willattempt to pair with Node B. In this process, Node A and Node Bdetermine each other's identities, capabilities, and services. Forexample, after successfully establishing a communication path 532 withNode A (e.g., a Bluetooth Low Energy formatted communication path), NodeB determines Node A's identity information (e.g., master node), Node A'scapabilities include reporting its current battery life, and Node A'sservices include transmitting its current battery life to other nodes.In response to a request from Node B, Node A transmits an indication ofits current battery life to Node B.

Referring to FIG. 9B, a node 534 (Node C) is associated with a package535 (Package C). In the illustrated embodiment, the Node C includes alow power communications interface 536 (e.g., a Bluetooth Low Energycommunications interface), and a sensor 537 (e.g., a temperaturesensor). Another node 538 (Node D), which is associated with anotherpackage 540 (Package D), is similarly equipped with a compatible lowpower communications interface 542 (e.g., a Bluetooth Low-Energycommunications interface).

In an example scenario, in accordance with the programmatic code storedin its memory, Node D requires a connection to Node C to perform a taskthat involves checking the temperature in the vicinity of Node C.Initially, Node D is unconnected to any other nodes. In accordance withthe programmatic code stored in its memory, Node D periodicallybroadcasts advertising packets in the surrounding area. When Node C iswithin range of Node D and is operating in a listening mode, Node C willextract the address of Node D and potentially other information (e.g.,security information) from the advertising packet. If, according to itsprogrammatic code, Node C determines that it is authorized to connect toNode D, Node C will attempt to pair with Node D. In this process, Node Cand Node D determine each other's identities, capabilities, andservices. For example, after successfully establishing a communicationpath 544 with Node C (e.g., a Bluetooth Low Energy formattedcommunication path), Node D determines Node C's identity information(e.g., a peripheral node), Node C's capabilities include retrievingtemperature data, and Node C's services include transmitting temperaturedata to other nodes. In response to a request from Node D, Node Ctransmits its measured and/or locally processed temperature data to NodeD.

Referring to FIG. 9C, a pallet 550 is associated with a master node 551that includes a low-power communications interface 552, a GPS receiver554, and a cellular communications interface 556. In some embodiments,the master node 551 may be implemented as a tape node or a label nodethat is adhered to the pallet 550. In other embodiments, the master node551 may be implemented as a non-tape node that is inserted within thebody of the pallet 550 or embedded in or otherwise attached to theinterior or exterior of the pallet 550.

The pallet 550 provides a structure for grouping and containing packages559, 561, 563 each of which is associated with a respective peripheralnode 558, 560, 562 (Node E, Node F, and Node G). Each of the peripheralnodes 558, 560, 562 includes a respective low power communicationsinterface 564, 566, 568 (e.g., Bluetooth Low Energy communicationsinterface). In the illustrated embodiment, each of the nodes E, F, G,and the master node 551 are connected to each of the other nodes over arespective low power communications path (shown by dashed lines).

In some embodiments, the packages 559, 561, 563 are grouped togetherbecause they are related. For example, the packages 559, 561, 563 mayshare the same shipping itinerary or a portion thereof. In an examplescenario, the master pallet node 551 scans for advertising packets thatare broadcasted from the peripheral nodes 558, 560, 562. In someexamples, the peripheral nodes broadcast advertising packets duringrespective scheduled broadcast intervals. The master node 551 candetermine the presence of the packages 559, 561, 563 in the vicinity ofthe pallet 550 based on receipt of one or more advertising packets fromeach of the nodes E, F, and G. In some embodiments, in response toreceipt of advertising packets broadcasted by the peripheral nodes 558,560, 562, the master node 551 transmits respective requests to theserver to associate the master node 551 and the respective peripheralnodes 558, 560, 562. In some examples, the master tape node requestsauthorization from the server to associate the master tape node and theperipheral tape nodes. If the corresponding packages 559, 561, 563 areintended to be grouped together (e.g., they share the same itinerary orcertain segments of the same itinerary), the server authorizes themaster node 551 to associate the peripheral nodes 558, 560, 562 with oneanother as a grouped set of packages. In some embodiments, the serverregisters the master node and peripheral tape node identifiers with agroup identifier. The server also may associate each node ID with arespective physical label ID that is affixed to the respective package.

In some embodiments, after an initial set of packages is assigned to amulti package group, the master node 551 may identify another packagearrives in the vicinity of the multi-package group. The master node mayrequest authorization from the server to associate the other packagewith the existing multi-package group. If the server determines that theother package is intended to ship with the multi-package group, theserver instructs the master node to merge one or more other packageswith currently grouped set of packages. After all packages are groupedtogether, the server authorizes the multi-package group to ship. In someembodiments, this process may involve releasing the multi-package groupfrom a containment area (e.g., customs holding area) in a shipmentfacility.

In some embodiments, the peripheral nodes 558, 560, 562 includeenvironmental sensors for obtaining information regarding environmentalconditions in the vicinity of the associated packages 559, 561, 563.Examples of such environmental sensors include temperature sensors,humidity sensors, acceleration sensors, vibration sensors, shocksensors, pressure sensors, altitude sensors, light sensors, andorientation sensors.

In the illustrated embodiment, the master node 551 can determine its ownlocation based on geolocation data transmitted by a satellite-basedradio navigation system 570 (e.g., GPS, GLONASS, and NAVSTAR) andreceived by the GPS receiver 554 component of the master node 551. In analternative embodiment, the location of the master pallet node 551 canbe determined using cellular based navigation techniques that use mobilecommunication technologies (e.g., GSM, GPRS, CDMA, etc.) to implementone or more cell-based localization techniques. After the master node551 has ascertained its location, the distance of each of the packages559, 561, 563 from the master node 551 can be estimated based on theaverage signal strength of the advertising packets that the master node551 receives from the respective peripheral node. The master node 551can then transmit its own location and the locations of the packagenodes E, F, and G to a server over a cellular interface connection witha cellular network 572. Other methods of determining the distance ofeach of the packages 559, 561, 563 from the master node 551, such asReceived Signal-Strength Index (RSSI) based indoor localizationtechniques, also may be used.

In some embodiments, after determining its own location and thelocations of the peripheral nodes, the master node 551 reports thelocation data and the collected and optionally processed (e.g., eitherby the peripheral nodes peripheral nodes 558, 560, 562 or the masternode 551) sensor data to a server over a cellular communication path 571on a cellular network 572.

In some examples, nodes are able to autonomously detect logisticsexecution errors if packages that are supposed to travel together nolonger travel together and raise an alert. For example, a node (e.g.,the master node 551 or one of the peripheral nodes 558, 560, 562) alertsthe server when the node determines that a particular package 559 isbeing or has already been improperly separated from the group ofpackages. The node may determine that there has been an improperseparation of the particular package 559 in a variety of ways. Forexample, the associated peripheral node 558 that is bound to theparticular package 559 may include an accelerometer that generates asignal in response to movement of the package from the pallet. Inaccordance with its intelligent agent program code, the associatedperipheral node 558 determines that the master node 551 has notdisassociated the particular package 559 from the group and thereforebroadcasts advertising packets to the master node, which causes themaster node 551 to monitor the average signal strength of theadvertising packets and, if the master node 551 determines that thesignal strength is decreasing over time, the master node 551 will issuean alert either locally (e.g., through a speaker component of the masternode 551) or to the server.

Referring to FIG. 9D, a truck 580 is configured as a mobile node ormobile hub that includes a cellular communications interface 582, amedium-power communications interface 584, and a low powercommunications interface 586. The communications interfaces 580-586 maybe implemented on one or more tape and non-tape nodes. In anillustrative scenario, the truck 580 visits a logistic storage facility,such as a warehouse 588, to wirelessly obtain temperature data generatedby temperature sensors in the medium range nodes 590, 592, 594. Thewarehouse 588 contains nodes 590, 592, and 594 that are associated withrespective logistic containers 591, 593, 595. In the illustratedembodiment, each node 590-594 is a medium range node that includes arespective medium power communications interface 596, 602, 608, arespective low power communications interface 598, 604, 610 and one ormore respective sensors 600, 606, 612. In the illustrated embodiment,each of the package nodes 590, 592, 594 and the truck 580 is connectedto each of the other ones of the package nodes through a respectivemedium power communications path (shown by dashed lines). In someembodiments, the medium power communications paths are LoRa formattedcommunication paths.

In some embodiments, the communications interfaces 584 and 586 (e.g., aLoRa communications interface and a Bluetooth Low Energy communicationsinterface) on the node on the truck 580 is programmed to broadcastadvertisement packets to establish connections with other network nodeswithin range of the truck node. A warehouse 588 includes medium rangenodes 590, 592, 594 that are associated with respective logisticcontainers 591, 593, 595 (e.g., packages, boxes, pallets, and the like).When the truck node's low power interface 586 is within range of any ofthe medium range nodes 590, 592, 594 and one or more of the medium rangenodes is operating in a listening mode, the medium range node willextract the address of truck node and potentially other information(e.g., security information) from the advertising packet. If, accordingto its programmatic code, the truck node determines that it isauthorized to connect to one of the medium range nodes 590, 592, 594,the truck node will attempt to pair with the medium range node. In thisprocess, the truck node and the medium range node determine each other'sidentities, capabilities, and services. For example, after successfullyestablishing a communication path with the truck node (e.g., a BluetoothLow Energy formatted communication path 614 or a LoRa formattedcommunication path 617), the truck node determines the identityinformation for the medium range node 590 (e.g., a peripheral node), themedium range node's capabilities include retrieving temperature data,and the medium range node's services include transmitting temperaturedata to other nodes. Depending of the size of the warehouse 588, thetruck 580 initially may communicate with the nodes 590, 592, 594 using alow power communications interface (e.g., Bluetooth Low Energyinterface). If any of the anticipated nodes fails to respond to repeatedbroadcasts of advertising packets by the truck 580, the truck 580 willtry to communicate with the non-responsive nodes using a medium powercommunications interface (e.g., LoRa interface). In response to arequest from the medium-power communication interface 584, the mediumrange node 590 transmits an indication of its measured temperature datato the truck node. The truck node repeats the process for each of theother medium range nodes 592, 594 that generate temperature measurementdata in the warehouse 588. The truck node reports the collected (andoptionally processed, either by the medium range nodes 590, 592, 594 orthe truck node) temperature data to a server over a cellularcommunication path 616 with a cellular network 618.

Referring to FIG. 9E, a master node 630 is associated with a logisticitem 632 (e.g., a package) and grouped together with other logisticitems 634, 636 (e.g., packages) that are associated with respectiveperipheral nodes 638, 640. The master node 630 includes a GPS receiver642, a medium power communications interface 644, one or more sensors646, and a cellular communications interface 648. Each of the peripheralnodes 638, 640 includes a respective medium power communicationsinterface 650, 652 and one or more respective sensors 654, 656. In theillustrated embodiment, the peripheral and master nodes are connected toone another other over respective pairwise communications paths (shownby dashed lines). In some embodiments, the nodes 630, 638, 640communicate through respective LoRa communications interfaces over LoRaformatted communications paths 658, 660, 662.

In the illustrated embodiment, the master and peripheral nodes 630, 638,640 include environmental sensors for obtaining information regardingenvironmental conditions in the vicinity of the associated logisticitems 632, 634, 636. Examples of such environmental sensors includetemperature sensors, humidity sensors, acceleration sensors, vibrationsensors, shock sensors, pressure sensors, altitude sensors, lightsensors, and orientation sensors.

In accordance with the programmatic code stored in its memory, themaster node 630 periodically broadcasts advertising packets in thesurrounding area. When the peripheral nodes 638, 640 are within range ofmaster node 630, and are operating in a listening mode, the peripheralnodes 638, 640 will extract the address of master node 630 andpotentially other information (e.g., security information) from theadvertising packets. If, according to their respective programmaticcode, the peripheral nodes 638, 640 determine that they are authorizedto connect to the master node 630, the peripheral nodes 638, 640 willattempt to pair with the master node 630. In this process, theperipheral nodes 638, 640 and the master node 630 determine each other'sidentities, capabilities, and services. For example, after successfullyestablishing a respective communication path 658, 660 with each of theperipheral nodes 638, 640 (e.g., a LoRa formatted communication path),the master node 630 determines certain information about the peripheralnodes 638, 640, such as their identity information (e.g., peripheralnodes), their capabilities (e.g., measuring temperature data), and theirservices include transmitting temperature data to other nodes.

After establishing LoRa formatted communications paths 658, 660 with theperipheral nodes 638, 640, the master node 630 transmits requests forthe peripheral nodes 638, 640 to transmit their measured and/or locallyprocessed temperature data to the master node 630.

In the illustrated embodiment, the master node 630 can determine its ownlocation based on geolocation data transmitted by a satellite-basedradio navigation system 666 (e.g., GPS, GLONASS, and NAVSTAR) andreceived by the GPS receiver 642 component of the master node 630. In analternative embodiment, the location of the master node 630 can bedetermined using cellular based navigation techniques that use mobilecommunication technologies (e.g., GSM, GPRS, CDMA, etc.) to implementone or more cell-based localization techniques. After the master node630 has ascertained its location, the distance of each of the logisticitems 634, 636 from the master node 630 can be estimated based on theaverage signal strength of the advertising packets that the master node630 receives from the respective peripheral node. The master node 630can then transmit its own location and the locations of the packagenodes H, J, and I to a server over a cellular interface connection witha cellular network 672. Other methods of determining the distance ofeach of the logistic items 634, 636 from the master node 630, such asReceived Signal-Strength Index (RSSI) based indoor localizationtechniques, also may be used.

In some embodiments, after determining its own location and thelocations of the peripheral nodes, the master node 630 reports thelocation data, the collected and optionally processed (e.g., either bythe peripheral nodes peripheral nodes 638, 640 or the master node 630)sensor data to a server over a cellular communication path 670 on acellular network 672.

Referring to FIG. 10A, in some examples, each of one or more of thesegments 270, 272 of a tracking adhesive product 274 includes arespective circuit 275 that delivers power from the respective energysource 276 to the respective tracking circuit 278 (e.g., a processor andone or more wireless communications circuits) in response to an event.In some of these examples, the wake circuit 275 is configured totransition from an off state to an on state when the voltage on the wakenode 277 exceeds a threshold level, at which point the wake circuittransitions to an on-state to power-on the segment 270. In theillustrated example, this occurs when the user separates the segmentfrom the tracking adhesive product 274, for example, by cutting acrossthe tracking adhesive product 274 at a designated location (e.g., alonga designated cut-line 280). In particular, in its initial, un-cut state,a minimal amount of current flows through the resistors R1 and R2. As aresult, the voltage on the wake node 277 remains below the thresholdturn-on level. After the user cuts across the tracking adhesive product274 along the designated cut-line 280, the user creates an open circuitin the loop 282, which pulls the voltage of the wake node above thethreshold level and turns on the wake circuit 275. As a result, thevoltage across the energy source 276 will appear across the trackingcircuit 278 and, thereby, turn on the segment 270. In particularembodiments, the resistance value of resistor R1 is greater than theresistance value of R2. In some examples, the resistance values ofresistors R1 and R2 are selected based on the overall design of theadhesive product system (e.g., the target wake voltage level and atarget leakage current).

In some examples, each of one or more of the segments of a trackingadhesive product includes a respective sensor and a respective wakecircuit that delivers power from the respective energy source to therespective one or more components of the respective tracking circuit 278in response to an output of the sensor. In some examples, the respectivesensor is a strain sensor that produces a wake signal based on a changein strain in the respective segment. In some of these examples, thestrain sensor is affixed to a tracking adhesive product and configuredto detect the stretching of the tracking adhesive product segment as thesegment is being peeled off a roll or a sheet of the tracking adhesiveproduct. In some examples, the respective sensor is a capacitive sensorthat produces a wake signal based on a change in capacitance in therespective segment. In some of these examples, the capacitive sensor isaffixed to a tracking adhesive product and configured to detect theseparation of the tracking adhesive product segment from a roll or asheet of the tracking adhesive product. In some examples, the respectivesensor is a flex sensor that produces a wake signal based on a change incurvature in the respective segment. In some of these examples, the flexsensor is affixed to a tracking adhesive product and configured todetect bending of the tracking adhesive product segment as the segmentis being peeled off a roll or a sheet of the tracking adhesive product.In some examples, the respective sensor is a near field communicationssensor that produces a wake signal based on a change in inductance inthe respective segment.

FIG. 10B shows another example of a tracking adhesive product 294 thatdelivers power from the respective energy source 276 to the respectivetracking circuit 278 (e.g., a processor and one or more wirelesscommunications circuits) in response to an event. This example issimilar in structure and operation as the tracking adhesive product 294shown in FIG. 13A, except that the wake circuit 275 is replaced by aswitch 296 that is configured to transition from an open state to aclosed state when the voltage on the switch node 277 exceeds a thresholdlevel. In the initial state of the tracking adhesive product 294, thevoltage on the switch node is below the threshold level as a result ofthe low current level flowing through the resistors R1 and R2. After theuser cuts across the tracking adhesive product 294 along the designatedcut-line 280, the user creates an open circuit in the loop 282, whichpulls up the voltage on the switch node above the threshold level toclose the switch 296 and turn on the tracking circuit 278.

A wireless sensing system includes a plurality of wireless nodesconfigured to detect tampering in assets. Tampering may include, but isnot limited to, opening assets such as boxes, containers, storage, ordoors, moving the asset without authorization, moving the asset to anunintended location, moving the asset in an unintended way, damaging theasset, shaking the asset in an unintended way, orienting an asset in away that it is not meant to be oriented. In many cases, these actionsmay compromise the integrity or safety of assets. Wireless nodesassociated with the asset are configured to detect a tampering event. Inan embodiment, a tampering event is associated with an action, a time,and a location. In an embodiment, the wireless nodes communicate thetampering event to the wireless sensing system. The wireless sensingsystem is configured to provide a notification or alert to a user of thewireless sensing system. In some embodiments, a wireless node maydirectly transmit the notification or alert to the user. In otherembodiments, a wireless node may include a display that indicateswhether or not a tampering event has occurred (e.g., the display may bean indicator light or LED).

Alerts may be transmitted to server/cloud, other wireless nodes, aclient device, or some combination thereof. For example, in anembodiment, a wireless node of the wireless sensing system capturessensor data, detects a tampering event, and transmits an alarm to a userof the wireless sensing system (e.g., without communicating with aserver or cloud of the wireless sensing system). In another embodiment,a wireless node of the wireless sensing system captures sensor data andtransmits the sensor data to a gateway, parent node (e.g., black tape),or client device. The gateway, parent node, or client device detects atampering event based on the received sensor data and transmits an alarmto a user of the wireless sensing system. In another embodiment, thewireless node of the wireless sensing system captures sensor data,detects a tampering event, and transmits information describing thetampering event to a server or cloud of the wireless sensing system. Theserver or cloud of the wireless sensing system transmits an alarm to auser of the wireless sensing system.

FIG. 11A illustrates an example embodiment wherein an asset 1005 isassociated with two wireless nodes 1010A, B that detect each of theother wireless nodes by proximity, such that when a distance between thewireless nodes increases, an asset is considered to have been opened anda tampering event is recorded. For example, a first wireless node 1010Acommunicates with a second wireless node 1010B. The second wireless node1010B determines a distance between the second wireless node and thefirst wireless node 1010A, e.g., based on signal strength of thereceived communication. Responsive to the distance being within athreshold (e.g., 6 in.), the second wireless node 1010B determines thatthe asset has not been opened and that a tampering event has notoccurred.

In the example of FIG. 11A, the asset 1005 is a sealed box. In otherexamples, the asset 1005 may be another type of package, a door to abuilding, storage container, safe, or the like. In other examples,thresholds may be less than or greater than the example shown in FIG.11A and may be configured by a user based on the asset type, dimension,or other associated factors.

In some embodiments, there may be a single tape node (e.g., trackingadhesive product 274, 294, with respect to FIGS. 10A, B) across each ofthe two flaps of the asset 1005, such that when the asset is opened, andthe flaps are separated, a tear results in the circuitry of the tapenode (e.g., designated cut-line 280 may be a designated tear line). Thistearing may disable the tape node, alerting the server (e.g., server404) or a master tape node (e.g., master tape node 424) that the assethas been opened and that a tampering event has occurred. In someembodiments, the tape node may, in response to the tear, determine thata tampering event has occurred. In some embodiments, there may be one ormore tape nodes attached to the asset 1005 that include an accelerometerfor when the flaps are opened, the accelerometer may detect the angularacceleration of the flaps opening. The tape node may determine theacceleration has satisfied a predetermined threshold and, from this,determine that a tampering event has occurred.

In some embodiments, there may be three or more tape nodes positioned onthe asset 1005, such that a server or the positioned tape nodes are ableto triangulate the location of the tape nodes, with respect to eachother, or the location of the asset. When one of the tape nodes aremoved, such that the tape nodes are no longer able to establish alocation of the asset 1005 or the other tape nodes, this may trigger thetape nodes, or a server, to determine that a tampering event hasoccurred.

FIG. 11B illustrates an example embodiment wherein an asset 1005associated with two wireless nodes 1010A′, B′ experiences a tamperingevent. The first wireless node 1010A′ communicates with the secondwireless node 1010B′. The second wireless node 1010B′ determines adistance between the second wireless node and the first wireless node1010A′. Responsive to the distance exceeding a threshold, the secondwireless node 1010B′ determines that the asset has been opened and thata tampering event has occurred. In an embodiment, the second wirelessnode 1010B′ communicates to a mobile device of a user or to a gatewaynode that the tampering event has occurred to notify the user of thewireless sensing system. A notification of the tampering event mayinclude an alarm, a location of the asset during the tampering event,and a time of the tampering event. In other embodiments, additional,fewer, or different information may be included in the notification.

In other embodiments, a wireless node comprises an orientation sensorand a tampering event is determined based on an asset being moved to orbeyond a specified orientation or a range of orientations (e.g., turnedupside down). The orientation of the asset may be determined by placinga wireless node (comprising an orientation sensor) on each of two ormore different surfaces of the asset (e.g., opposite sides of the asset,if the asset has a shape corresponding to a polyhedron).

In other embodiments, a wireless node comprises a vibration sensor and atampering event is determined based on sensor signals corresponding totampering actions such as drilling through a portion of the asset,cutting through a portion of the asset, damaging a portion of the asset,denting a portion of the asset, striking the portion of an asset with atool (e.g., hammer or crowbar), opening a portion of the asset (e.g., alid, door, or cap), shaking the asset, other movement, or somecombination thereof. In other embodiments, a wireless node adhered tothe inside of an asset comprises a light sensor and a tampering event isdetermined responsive to the optical sensor detecting light (e.g., anasset being opened and exposed to natural or artificial light). In otherembodiments, a wireless node comprises an acoustic sensor and atampering event is determined responsive to noise levels exceeding athreshold amount. In other embodiments, a wireless node is adheredacross an opening of an asset (e.g., across a lid of a box, across adoorway) or applied to an asset in such a way that tampering with theasset requires tearing or cutting the wireless node (e.g., appliedacross or around the handle of a lever), and a tampering event isdetermined responsive to the wireless node being torn or broken. Incertain embodiments, tearing the wireless node results in a circuit ofthe wireless node being altered (e.g., an open circuit state, shortcircuit state, other alteration of the circuit), and the tearing of thewireless node is detected based on the alteration of the circuit. Inother embodiments, tearing of the wireless node may be detected based ona functionality of the wireless node changing (e.g., the wireless nodeno longer transmits a signal to the sensing system). In otherembodiments, a wireless node is placed on the interior of or adhered toan internal surface of a metal asset (e.g., a trailer or truck; a metalcontainer; machinery), wherein connection between the wireless nodewithin the metal asset and other nodes or gateways of the wirelesssensing system outside of the metal asset is restricted within the metalasset (e.g., due to electromagnetic shielding), and a tampering event isdetermined responsive to a connection being re-established between thewireless node within the metal asset and other nodes or gateways of thewireless sensing system, indicating that a portion of the metal assethas been opened. In other embodiments, combinations of the above orother sensors may be used to identify tampering.

Waveforms or signatures of signals from sensors in a wireless nodecorresponding to an asset may correlate to specific tampering events.For example, drilling a hole in a portion of an asset may have acorresponding waveform that is sensed by a vibration sensor on awireless node adhered to the asset. A tampering event may be detected bydetermining that a signal from the vibration sensor has a waveformcorresponding to the drilling waveform. Signals from the sensors used todetect tampering events may be input to a trained machine learning modelwhich classifies events based on input signals. For example, a waveformof vibrations measured by a vibration sensor over time may be input to atrained machine learning model which outputs whether or not the waveformcorresponds to an occurrence of a tampering event. For example, thetrained machine leaning model may differentiate between the vibrationfrom a truck engine and tampering of the asset. The machine learningmodel may be trained using sensor signals from one or more wirelessnodes.

The wireless sensing system includes a plurality of wireless nodesfurther configured to authenticate authorized users and/or safe zones(e.g., an authorized area). Authorized users are, for example, employeesor individuals authorized to access, open, or otherwise handle assetscontaining sensitive or private information or materials. For example,in an airport, border patrol personnel may be designated as authorizedindividuals that may open and inspect assets. Safe zones are areas inwhich assets may be accessed, opened, or otherwise handled. For example,an airport may designate a security area as a safe zone (e.g., anauthorized area) wherein assets may be opened and handled for inspectionpurposes.

FIG. 11C illustrates an example embodiment wherein wireless nodes1010A″, B″ associated with assets 1005 communicate with wireless nodesor devices 1025 associated with a user 1020 to provide authentication.In the embodiment of FIG. 11C, a tampering event is detected by thewireless nodes 1010A″ and 1010B″ as discussed previously in conjunctionwith FIG. 11B. A wireless node 1010B″ further receives a communicationfrom a wireless node associated with an authorized user 1020 of thewireless sensing system or a device 1025 of a user 1020 of the wirelesssensing system. The device 1025 may be a client device (e.g., asmartphone), a wireless node of the wireless sensing system, a wearabledevice (e.g., a smartwatch), a badge (e.g., that includes an RFID chip,Bluetooth, or NFC), another device, or some combination thereof. In anembodiment, the communication includes an authorization key,identification of the user 1020, an encryption key, or another type ofauthorization information. Based on the received information, thewireless node 1010B″ determines that the event is not a tampering event(e.g., is an official inspection of the asset 1005) and that the eventshould not cause an alert and/or should not be reported. In someembodiments, the device 1025 may notify the wireless nodes 1010A″ and1010B″ that tampering may be “allowed” for a period of time (e.g., fiveor ten minutes) or for as long as the asset 1005 is within an authorizedzone (e.g., the safe zone 1802, with reference to FIG. 18).

In other embodiments, devices 1025 may include local gateways associatedwith safe zones or locations, wireless nodes associated with wearable orportable smart devices (e.g., smart phones or watches), or otherelectronic devices. In another embodiment, devices 1025 may includegateways or black tapes adhered to trucks, trailers, other vehicles, orother transport containers including assets having wireless nodes.

In some embodiments, the wireless sensing system tracks and maintainsinformation describing a line of custody, a history of authorized userinteractions, a history of tampering events, and/or a history ofmovement and/or locations during transport. In an embodiment, thewireless sensing system transmits information to transit locations orend destinations of an asset prior to arrival of the asset at thetransit locations or end destinations to provide, for example,authorization to handle and inspect the asset or other informationassociated with the asset. In some embodiments, the above information isincluded in a log. The log or a portion of the log may be transmitted toa client device, and a user may use the client device to inspectactivity associated with the asset to determine if a tampering event hasoccurred.

According to some embodiments, a user (also referred to as a humanoperator, herein) of the wireless sensing system may locate an assetthat has an associated wireless node using a client device, where atampering event associated with the asset has been detected. Thelocation of the asset may be displayed to the user on a user interfaceof the client device (e.g., the asset with the tampering event may beindicated on a map, floor plan, some other indicator of the asset'slocation, or some combination thereof). In some embodiments, the clientdevice indicates the proximity of the user to the asset based on asignal strength of a connection with the wireless node associated withthe asset. This way, the user may physically locate the asset that hasbeen tampered with and manually inspect it upon receiving a notificationof the tampering event.

FIG. 12 is a flow diagram of a method of detecting tampering in assets.A wireless node of a wireless sensing system detects a tampering event,wherein the tapering event comprises accessing or handling an asset(FIG. 12, block 1102). The wireless sensing system determines if thetampering event is performed by an authorized user (FIG. 12, block1104). Responsive to the determination, the wireless sensing systemstores information associated with the tampering event (FIG. 12, block1106) and transmits the information describing the tampering event (FIG.12, block 1108). In an embodiment, responsive to determining that thetampering event is not performed by an authorized user, the wirelesssensing system transmits a notification to a user of the wirelesssensing system to indicate that a tampering event has occurred.

In other embodiments, the method may include additional, fewer, ordifferent steps, and the steps may be performed in a different order. Inother embodiments, steps of the method may be performed by differentcomponents of the wireless sensing system. For example, in anembodiment, a wireless node of the wireless sensing system performs thedetecting, the determining, the storing, and the transmitting.

FIG. 13 is a schematic diagram of an example vehicle 1310 (e.g., asemi-trailer truck) transporting a pallet 1312 of parcels 1314containing goods or other things. In some embodiments, a tertiarywireless network node 1313 is fixed to the pallet 1312 and is configuredto communicate wirelessly with the peripheral nodes 1340 that areattached to assets, and with the secondary electronic logging device1322. In this example, the vehicle 1310 is a semi-trailer truck thatincludes a tractor unit 1316 and a semi-trailer 1318 that carriesfreight loaded through doors 1319 and 1321. In general, the vehicle 1310may be any type of vehicle that can transport goods or other things fromone place to another, including any type of motorcycle, car, truck, van,train, ship, or aircraft. In some embodiments, the peripheral nodes 1340may be tracking adhesive products 274 or 294 (with reference to FIGS.10A, B, respectively) or segment 13 (with reference to FIG. 1A, B), andmay be tapped to the boxes containing assets and that are within thesemi-trailer.

In the illustrated example, the tractor unit 1316 includes a primaryelectronic logging device 1320 (i.e., ELD 1, hereinafter may be referredto as primary ELD) and the semi-trailer 1318 includes a secondaryelectronic logging device 1322 (i.e., ELD 2, hereinafter may be referredto as secondary ELD). In some examples, the primary ELD 1320 and thesecondary ELD 1322 each includes one or more of Cellular and GPScapability, wireless transceivers, processors, and memory devicesstoring programmatic instructions that enable wireless communicationsover multiple different wireless communications protocols andtechnologies across different power levels and ranges, such as, but notlimited to, GSM, CDMA, Cellular, TDMA, WCDMA, EDGE, OFDM, GPRS, EV-DO,LTE, WiFi, LoRaWAN, Bluetooth LE, Z-wave, and Zigbee. The secondary ELD1322 typically includes wireless communications interfaces that havelower power and shorter range than the communications interfaces in theprimary ELD. The primary ELD 1320 and the secondary ELD 1322 have atleast one communications interface (e.g., Bluetooth, LoRaWAN, and/orwired connection) in common so that they can communicate with oneanother.

In some embodiments, the primary ELD and the secondary ELD may betracking adhesive products 274 or 294 (with reference to FIGS. 10A, B,respectively) or tape node segment 13 (with reference to FIG. 1A, B).Continuing this embodiment, the primary ELD and secondary ELD may have ahigher storage capacity, battery, and processing power than theperipheral nodes 1340 attached to the assets. In some embodiments, theprimary ELD and the secondary ELD may be mobile gateways (e.g., themobile gateways 410, 412, with reference to FIG. 6).

In the illustrated example, the primary ELD 1320 (“ELD 1”) wirelesslycommunicates with a server 1324 of a first network service 1326 andserver 1328 of a second network service 1330 over respective cellularconnections 1332 with a cell tower gateway 1334 and over acommunications network 1336, which may be a private network or a publicnetwork (e.g., the Internet). Each of the network services 1326, 1330includes respective ones of the network servers 1324, 1328 executing oneor more applications and storing and retrieving data from respectivedata stores 1325, 1329. The network services 1326, 1330 may be, forexample, a driver performance assessment service and a logisticsmanagement service.

In the illustrated example, the primary ELD 1320 in the tractor unit1316 typically communicates with the first and second network services1326, 1330 over one or more high-power, long-range communicationsinterfaces. In addition, the primary ELD 1320 wirelessly communicateswith the secondary ELD 1322 (“ELD 2”) in the semi-trailer 1318 over alower power, shorter-range wireless communications interface, such asLoRaWAN or Bluetooth LE. In some examples, the primary ELD 1320 also maycommunicate with the secondary ELD 1322 over a wired connection througha controller area network (CAN) bus system 1323, which is a vehicle busstandard designed to allow microcontrollers and devices to communicatewith each other in applications using a message-based protocol without ahost computer. The CAN bus system 1323 also may connect the primary ELD1320 to the communications interface of a cellular modem that isinstalled in some embodiments of the tractor unit 1316 of the vehicle1310, thereby enabling the primary ELD 1320 to share the cellularmodem's existing cellular subscription service.

The parcels 1314 are associated with peripheral wireless network nodedevices that include wireless communications, processing, sensing, anddata storage capabilities. In some examples, these peripheral wirelessnetwork node devices are implemented as wireless electronic tags thatare carried in or otherwise attached to or integrated with therespective ones of the parcels 1314. Other examples incorporate thewireless communications, processing, sensing, and data storagecapabilities into a low-cost, multi-function adhesive tape platform 100with a form factor that unobtrusively integrates the components usefulfor implementing a combination of different logistic functions and alsois able to perform a useful ancillary function that otherwise would haveto be performed with the attendant need for additional materials, labor,and expense. In some examples, the primary ELD 1320 and the secondaryELD 1322 are implemented as one or more segments of respective types ofthe adhesive tape platform described in US Patent ApplicationPublication No. US-2018-0165568-A1, which was published on Jun. 14,2018, and is incorporated in its entirety herein.

In an aspect, the adhesive tape platform is implemented as a collectionof adhesive products that integrate wireless communications and sensingcomponents within a flexible adhesive structure in a way that not onlyprovides a cost-effective platform for interconnecting, optimizing, andprotecting the components of the tracking system but also maintains theflexibility needed to function as an adhesive product that can bedeployed seamlessly into various logistic applications and workflows,including person and object tracking applications, and asset managementworkflows such as manufacturing, storage, shipping, delivery, and otherlogistics associated with moving products and other physical objects,including logistics, sensing, tracking, positioning, warehousing,parking, safety, construction, event detection, road management andinfrastructure, security, and healthcare. In some examples, the adhesivetape platforms are used in various aspects of logistics management,including sealing parcels, transporting parcels, tracking parcels,monitoring the conditions of parcels, inventorying parcels, andverifying package security. In these examples, the sealed parcelstypically are transported from one location to another by truck, train,ship, or aircraft or within premises, e.g., warehouses by forklift,trolleys etc.

FIG. 14 is a block diagram of a set of example tractor managementmodules in an example of a primary electronic logging device (ELD) 1320(with reference to FIG. 13). The primary ELD 1320 includes a tractormanagement module 1450 that includes a vehicle status module 1452 andvehicle parameters 1454. Further, the primary ELD 1320 includes an eventdetection module 1460, a location tracker (GPS) 1470, and a contingencyoptimization module 1492. The primary ELD 1320 further includes afacility scan module 1474, that includes a gateway module (e.g.,cellular) 1476, a gateway module (e.g., LoRaWAN) 1478, a short-rangemodule (Bluetooth) 1480, and a logistic module 1482.

The vehicle status module 1452 may include the vehicle parameters 1454,that includes parameters of the vehicle, such as speed, backgroundvibration from the engine or road, engine status, etc. The eventdetection module 1460 may collect data from the secondary ELD 1322regarding detecting a tampering event, such as sensor data, such asvibration data, or any of the data discussed herein. The locationtracker 1470 may track the location of the tractor 1316 (with referenceto FIG. 13). The contingency module 1492 may include a list ofcontingency plans that correspond to particular tampering events. Eachcontingency plan may include indicia of certain sensor data thatcorresponding to a particular type of tampering. When the secondary ELDor the primary ELD receive sensor data, from the peripheral nodes 1340about a tampering event, the sensor data may be categorized and thencompared to corresponding sensor data for each contingency plan in thelist of contingency plans. The contingency module 1492 may select aparticular contingency plan is the received sensor data and the storedsensor data for a particular contingency plan satisfy a threshold. Thecontingency module 1492 may then execute the particular contingency planto address the tampering event.

The facility scan module 1474 may be in wireless communication with theperipheral wireless network nodes 1340, collecting sensor data andscanning the trailer 1318 for indicia of a tampering event. The facilitymodule 1474 may use gateway modules 1476, 1478, and short-range module1480 to wirelessly communicate with the peripheral wireless networknodes 1340. The logistic schedule module 1482 may include a list of allassets and destinations for the assets, within the trailer 1318. Theprimary ELD 1320 may consult the logistic schedule module 1480, upon anoccurrence of a tampering event, to determine that an asset should orshouldn't be tampered with. A further discussion of the set of exampletractor management modules of the primary ELD 1320, shown in FIG. 14,will be included in the discussion of FIG. 15.

FIG. 15 is a flow diagram of an example method for responding to adetection of a tampering event, by tape nodes, associated with assets ina logistic facility. FIGS. 14 and 15 are best viewed together with thefollowing description. As shown in FIG. 15, after scanning (e.g.,periodically) the trailer 1318 (block 1584), the primary ELD 1320 storesand analyzes the scan results (block 1586). The scan results may confirmthat all the parcels listed in the logistic schedule module 1482 (FIG.14) are in the trailer 1318. Alternatively, the scan results may revealthe occurrence of one or more predefined events relating to the parcelslisted in the logistic schedule module 1482. For example, a “missingparcel” event occurs when a parcel listed in the logistic schedulemodule 1482 does not respond to a ping packet or is not in the trailer1318. A “misrouted parcel” event occurs when a parcel is loaded on thewrong vehicle. An “unfit parcel” event occurs when a parcel listed inthe logistic schedule module 1482 is damaged or otherwise unfit fordelivery to the end customer. An “improper joinder” event occurs when aparcel is incorrectly designated as part of a group of parcels. An“improper removal” event occurs when a parcel is improperly removed froma designated group. The logistics management network service 1330 maydefine other events as needed.

Based on the analysis of the stored scan results and the eventdefinitions, the primary ELD 1320 on the tractor unit 1316 of thevehicle 1310 determines whether any of the predetermined events havebeen detected (FIG. 15, block 1588).

For each event that has been detected, the primary ELD 1320 determineswhether or not the event can be resolved locally, without theintervention of the logistics management network service 1330 (FIG. 15,block 1590). In some examples, the primary ELD 1320 accesses acontingency optimization module 1492 (shown in FIG. 14). In someexamples, the contingency optimization module 1492 contains a set ofprogrammatic instructions or rules for resolving events (i.e., acontingency plan) without the intervention of the logistics managementnetwork service 1330.

For example, in response to the detection of a “missing parcel” event,the primary ELD 1320 logs the event type and other details relating tothe event in memory and, based on a mapping between the “missing parcel”event type and the instructions contained in the contingencyoptimization module 1492, the primary ELD 1320 executes the relevantinstructions in the contingency optimization module 1492. In some cases,the primary ELD 1320 may be instructed to re-broadcast ping packets tothe peripheral wireless network node associated with the non-responsiveparcel using a different (e.g., higher) power level and/or a differentcommunications protocol in an attempt to resolve the event (FIG. 15,block 1594).

In another example, in response to a “misrouted parcel” event, theprimary ELD 1320 logs the event type and other details relating to theevent in memory and, based on a mapping between the “missing parcel”event type and the instructions contained in the contingencyoptimization module 1592, the primary ELD 1320 executes the relevantinstructions in the contingency optimization module 1492. In some cases,the primary ELD 1320 may be instructed to broadcast across the trailer1318 ping packets that include the identifier of the peripheral wirelessnetwork node associated with the parcel of the same type that wasmisrouted in an attempt to resolve the event (FIG. 15, block 1594).

In another example, in response to the detection of an “unfit parcel”event resulting from exposure of a parcel to, for example, a temperatureor an acceleration level greater than the respective threshold levels,the primary ELD 1320 executes the relevant instructions in thecontingency optimization module 1492. Based on the current geographiclocation of the vehicle 1310, the location of the nearest replacementpart, and the timing of the next scheduled delivery for the vehicle1310, the contingency optimization module 1492 instructs primary ELD1320 to broadcast to the trailer 1318 ping packets that include one ormore identifiers of replacement parcels of the same type of the unfitparcel in an attempt to resolve the event (FIG. 15, block 1594). Theprimary ELD 1320 may also instruct the vehicle's driver interface systemto display instructions to turn back to the last facility visited andobtain the replacement part instead of continuing directly to the nextfacility.

If the event is not resolvable locally (FIG. 15, block 1590), theprimary ELD 1320 transmits the relevant data relating to the detectedevent to the logistics management network service 1330 over a long-range(e.g., cellular) communications interface. The logistics managementnetwork service 1330 evaluates the event data (FIG. 15, block 1596) andresolves the event (FIG. 15, block 1598). In some examples, thelogistics management network service 1330 executes a logisticsoptimization program that takes into account the current locations andcosts of vehicles, facilities, and package contents, road and trafficconditions, costs of late or failed delivery, and other factors todetermine a global optimal solution for resolving the event.

For example, in response to a “improper joinder” event, the primary ELD1320 logs the event type and other details relating to the event inmemory and, based on a mapping between the “improper joinder” event typeand the instructions contained in the contingency optimization module1492, the primary ELD 1320 executes the relevant instructions in thecontingency optimization module 1492. In some cases, the primary ELD1320 may be instructed to log information retrieved from the improperlyjoined wireless tape node and report the improper inclusion of theidentified wireless tape node to the logistics management networkservice 1330 in an attempt to resolve the event (FIG. 15, block 1594).

In another example, in response to a “improper removal” event, theprimary ELD 1320 logs the event type and other details relating to theevent in memory and, based on a mapping between the “improper removal”event type and the instructions contained in the contingencyoptimization module 1492, the primary ELD 1320 executes the relevantinstructions in the contingency optimization module 1492. In some cases,the primary ELD 1320 may be instructed to log information retrieved fromthe improperly removed wireless tape node and parcel, and report theimproper removal of the identified wireless tape node to the logisticsmanagement network service 1330 in an attempt to resolve the event (FIG.15, block 1598). In some embodiments, the primary ELD will report to theimproper removal to a client device (e.g., an authorized smart phone ofa delivery driver).

Referring to FIG. 16, a processor of the secondary ELD 1322 executes thetractor compatibility module (not shown) to communicate with the primaryELD 1320 in the tractor unit 1316. In one example, to communicate withthe primary ELD 1320, the secondary ELD 1322 advertises its presencewith a specific authentication identifier and credentials (FIG. 16,block 1610). When the primary ELD 1320 receives data from the secondaryELD 1322, the primary ELD 1320 establishes a handshake with thesecondary ELD 1322 on the corresponding advertisement channel (FIG. 16,block 1612). Then the primary ELD 1320 hands off communication with thesecondary ELD 1322 to a data channel (e.g., a Bluetooth LE datachannel). The primary ELD 1320 learns the secondary ELD's 1322 productidentification number (PIN) and type identification number (TIN) of thesecondary ELD 1322 (FIG. 16, block 1612) and transmits that informationto the logistics management service 1330 to let it know that the primaryELD 1320 is communicating with the secondary ELD 1322 (FIG. 16, block1614).

The secondary ELD 1320 executes the facility scan module 1474 and thelogistic schedule module 1482 to perform wireless communicationsoperations, including wirelessly identifying parcels and wirelesslydetermining the states of the parcels in the semi-trailer 1318. In someexamples, the facility scan module 1474 communicates with peripheralwireless network nodes that are associated with the parcels in thesemi-trailer 1318 over a short-range communications interface (e.g.,Bluetooth LE).

In some embodiments, the secondary ELD 1322 transmits trailer parametersand requirements to the primary ELD 1320 (FIG. 16, block 1616). Thetrailer parameters and requirements may be transmitted, e.g., inresponse to a request made by the primary ELD 1320. In some embodiments,the primary ELD 1320 transmits tractor parameters and requirements tothe secondary ELD 1322 (FIG. 6, block 1618). The trailer parameters andrequirements may be transmitted from the primary ELD 1320 to thesecondary ELD 1322, e.g., in response to a request made by the secondaryELD 1322.

As shown in FIG. 16, the primary ELD 1320 may determine whether thetransmitted tractor parameters and requirements, as well as thetransmitted trailer parameters and requirements, meet compatibilityrequirements (FIG. 16, decision block 1620). For example, thetransmitted tractor and trailer parameters and requirements may be inthe form of a numerical value or translated, by the primary ELD 1320, tothe form of a numerical value. The primary ELD 1320 may then compareboth the transmitted tractor and trailer parameters and requirements toa compatibility threshold. And, if the compared values of the parameterssatisfy a predetermined threshold, the primary ELD 1320 may determinethat the transmitted parameters and requirements meet compatibilityrequirements (“yes”), ending the inquiry.

However, if the primary ELD 1320 determines that the, e.g., comparedvalues of the parameters do not satisfy the predetermined threshold, andthe compatibility requirements are not met (“no”), the secondary ELD1322 may determine if the incompatibility may be resolved locally,without the intervention of the logistics management network service1330 (FIG. 13, decision block 1622). In some examples, the secondary ELD1322 accesses the contingency optimization module 1492 (FIG. 14), whichcontains a set of programmatic instructions or rules for resolvingevents without the intervention of the logistics management networkservice 1330. If the secondary ELD 1322 determines that theincompatibility may be resolved locally (“yes”), the inquiry may end.However, if the secondary ELD 1322 determines that the incompatibilitymay not be resolved locally (“no”), the secondary ELD 1322 may notifythe logistics management network service 30 to resolve theincompatibility (FIG. 16, block 1628).

FIG. 17 shows an example method of detecting and responding to eventsinvolving assets in a trailer. The peripheral wireless network nodes(e.g., transducing circuit 70, as described with respect to FIG. 3)typically are associated with respective parcels in the semi-trailer1318. In some examples, the logistics management network service 1330programs the logistic schedule module 1482 with programmatic code thatis executed by the secondary ELD 1322 in the semi-trailer 1318 to scanperipheral wireless network nodes according to a fixed and/or a dynamicschedule. For example, the scheduled scan times may be one or acombination of irregular scan intervals, regular (e.g., periodic)intervals, and ad hoc intervals triggered, for example, by detectedevents.

In some examples, the secondary ELD 1322 executes the facility scanmodule 1474 to read the IDs of the peripheral wireless network nodes inthe semi-trailer 1318 and also collect sensor data stored in thememories 96 of the peripheral wireless network nodes (e.g., the wirelesstransducing circuit 70, as described with respect to FIG. 3) in thesemi-trailer 1318 (FIG. 17, block 1762). In some examples, the secondaryELD 1322 aggregates the collected sensor data by data type (FIG. 17,block 1764).

After scanning the semi-trailer 1318, the secondary ELD 1322 stores andanalyzes the scan results to detect events (FIG. 17, block 1766). Basedon the analysis of the scan results and the event definitions, thesecondary ELD processor in the semi-trailer 1318 of the vehicle 1310determines whether any events have been detected. The scan results mayconfirm, for example, that all the parcels listed in the logisticschedule module 1482 are in the semi-trailer 1318. Alternatively, thescan results may reveal that one or more predefined events relating tothe parcels occurred. For example, a “missing parcel” event occurs whena parcel listed in the logistic schedule module 1482 does not respond toa ping packet broadcasted by the secondary ELD 1322 or when such aparcel is not in the semi-trailer 1318. An “unfit parcel” event occurs,for example, when a parcel listed in the logistic schedule module 1482is damaged or otherwise unfit for delivery to the end customer. Forexample, when a temperature sensor in a peripheral wireless network nodeassociated with a parcel registers one or more temperature readings thatexceed or fall below a specified threshold temperature over a specifiedperiod of time, the contents of that parcel will be designated as beingunfit for delivery. Similarly, when an acceleration or shock sensor in aperipheral wireless network node (e.g., the wireless transducing circuit70, as described with respect to FIG. 3) associated with a parcelregisters one or more acceleration or shock levels that exceed thespecified threshold acceleration or shock levels over a specified periodof time, the contents of that parcel will be designated as being unfitfor delivery. The logistics management network service 1330 may defineother semi-trailer events as needed.

For each detected event (FIG. 17, block 1766), the secondary ELD 1322stores the relevant data in memory (FIG. 17, block 1768) and reports theevent to the primary ELD 1320 in the tractor unit 1316 (FIG. 17, block1770). For each event that has been detected, the primary ELD 1320determines whether or not the event can be resolved locally, without theintervention of the logistics management network service 1330 (FIG. 17,block 1772). In some examples, the primary ELD 1320 accesses thecontingency optimization module 1492 (FIG. 14), which contains a set ofprogrammatic instructions or rules for resolving events without theintervention of the logistics management network service 1330.

For example, in response to the detection of a “missing parcel” event,the primary ELD 1320 in the tractor unit 1316 logs the event type andother details relating to the event in memory and, based on a mappingbetween the “missing parcel” event type and the instructions containedin the contingency optimization module 1492, the primary ELD 1320executes the relevant instructions in the contingency optimizationmodule 1492. In some cases, the primary ELD 1320 may be instructed bythe contingency optimization module 1492 to re-broadcast ping packets tothe peripheral wireless network node associated with the non-responsiveparcel using a different (e.g., higher) power level and/or a differentcommunications protocol in an attempt to resolve the event (FIG. 17,block 1774).

In another example, in response to the detection of an “unfit parcel”event resulting from exposure to a temperature or an acceleration levelgreater than the respective threshold levels for these parameters, theprimary ELD 1320 executes the relevant instructions in the contingencyoptimization module 1492. Based on the current geographic location ofthe vehicle 1310, the location of the nearest replacement part, and thetiming of the next scheduled delivery for the vehicle 1310, the primaryELD 1320 may be instructed to broadcast to the facility ping packetsthat include one or more identifiers associated with replacement parcelsof the same type of the unfit parcel in an attempt to resolve the event(FIG. 17, block 1774). In another example, the primary ELD 1320 mayinstruct the vehicle's driver interface system to display instructionsto turn back to the last facility visited and obtain the replacementitems instead of directly continuing on to the next facility on thescheduled route.

If the event is not resolvable locally (FIG. 17, block 1772), theprimary ELD 1320 transmits the relevant data relating to the detectedevent to the logistics management network service 1330 over a long-range(e.g., cellular) communications interface. The logistics managementnetwork service 1330 evaluates the event data (FIG. 17, block 1776) andresolves the event (FIG. 17, block 1778). In some examples, thelogistics management network service 1330 executes a logisticsoptimization program that takes into account the current locations ofvehicles and facilities, their respective contents, road and trafficconditions, and other resources to determine a global optimal solutionfor resolving the event.

FIG. 18 shows an example safe zone 1802 (e.g., an authorized area),where a container 1804 and one or more tape nodes 1806, attached topackages, within the container 1804. The tape nodes 1806 may determinethey are located within the safe zone 1802 and reduce batteryconsumption by, e.g., disabling some functionality of the tape nodes1806. The tape nodes 1806 may disable their functionality because theremay not be a need to actively collet sensor data and check for tamperingbecause the tape nodes 1806 are located within a safe zone. For example,the tape node 1806 may temporarily, or at least until a time when thetape nodes are moved outside the safe zone 1802, stop collecting sensordata. In some embodiments, the disabling of functionality may be due toprivacy concerns of an owner of the safe zone not wanting the sensorscollecting private or confidential information.

In some embodiments, the safe-zone 1802 may be a geo-fenced area that isdetermined according to map data of a specific area. Each of the tapenodes 1806, master node (e.g., master node 424), or the server (e.g.,server 404) may have preprogrammed instructions that include a perimeteroutlining a safe-zone that defines the geo-fenced area. Upon enteringthe geo-fenced area, the tape nodes 1806 or master node (e.g., masternode 424), e.g., may reference the map data against a current locationof the tape nodes 1806 or master node (e.g., master node 424), and thendisable some functionality while within the geo-fenced area. In someembodiments, the server (e.g., server 404) may determine, based oncollecting the location data of the tape nodes 1806, that the tape nodes1806 are within the geo-fenced area by referencing the map data againstthe location data. In this embodiment, the server may instruct the tapenodes 1806 to disable some functionality until the server determinesthat the tape nodes 1806 have left the geo-fenced area.

In some embodiments, the tape nodes may disable some functionality inresponse to a safe time, that may be based on referencing a schedule logstored locally on any of the tape nodes 1806 or master node (e.g.,master node 424). For example, the schedule log may list that thecontainer 1804 (or an asset) is scheduled to arrive at a location on afirst date and may enter a checkpoint, in route to the location, on asecond date for a duration of time. The check point may be a securedarea. The tape nodes 1806 or master node (e.g., master node 424) mayreference the schedule log and determine that a current time is withinthe duration of time for the second date, and, in response, disable somefunctionality until the end of the time duration. In some embodiments,the server (e.g., server 404) may have a copy of the schedule log storedin a database (e.g., database 408) and may reference a current timeagainst the schedule log. The server may determine that the current timeis within the duration of time of the second date and may instruct thetape nodes 1806 or master node (e.g., master node 424) to disable somefunctionality until expiration of the time duration.

FIG. 19 shows an example embodiment of computer apparatus 1920 that,either alone or in combination with one or more other computingapparatus, is operable to implement one or more of the computer systemsdescribed in this specification.

The computer apparatus 1920 includes a processing unit 1922, a systemmemory 1924, and a system bus 1926 that couples the processing unit 1922to the various components of the computer apparatus 1920. The processingunit 1922 may include one or more data processors, each of which may bein the form of any one of various commercially available computerprocessors. The system memory 1924 includes one or morecomputer-readable media that typically are associated with a softwareapplication addressing space that defines the addresses that areavailable to software applications. The system memory 1924 may include aread only memory (ROM) that stores a basic input/output system (BIOS)that contains start-up routines for the computer apparatus 1920, and arandom-access memory (RAM). The system bus 1926 may be a memory bus, aperipheral bus, or a local bus, and may be compatible with any of avariety of bus protocols, including PCI, VESA, Microchannel, ISA, andEISA. The computer apparatus 1920 also includes a persistent storagememory 1928 (e.g., a hard drive, a floppy drive, a CD ROM drive,magnetic tape drives, flash memory devices, and digital video disks)that is connected to the system bus 1926 and contains one or morecomputer-readable media disks that provide non-volatile or persistentstorage for data, data structures and computer-executable instructions.

A user may interact (e.g., input commands or data) with the computerapparatus 1920 using one or more input devices 1930 (e.g. one or morekeyboards, computer mice, microphones, cameras, joysticks, physicalmotion sensors, and touch pads). Information may be presented through agraphical user interface (GUI) that is presented to the user on adisplay monitor 1932, which is controlled by a display controller 1934.The computer apparatus 1920 also may include other input/output hardware(e.g., peripheral output devices, such as speakers and a printer). Thecomputer apparatus 1920 connects to other network nodes through anetwork adapter 1936 (also referred to as a “network interface card” orNIC).

A number of program modules may be stored in the system memory 1924,including application programming interfaces 1938 (APIs), an operatingsystem (OS) 1940 (e.g., the Windows® operating system available fromMicrosoft Corporation of Redmond, Wash. U.S.A.), software applications1941 including one or more software applications programming thecomputer apparatus 1920 to perform one or more of the steps, tasks,operations, or processes of the positioning and/or tracking systemsdescribed herein, drivers 1942 (e.g., a GUI driver), network transportprotocols 1944, and data 1946 (e.g., input data, output data, programdata, a registry, and configuration settings).

Examples of the subject matter described herein, including the disclosedsystems, methods, processes, functional operations, and logic flows, canbe implemented in data processing apparatus (e.g., computer hardware anddigital electronic circuitry) operable to perform functions by operatingon input and generating output. Examples of the subject matter describedherein also can be tangibly embodied in software or firmware, as one ormore sets of computer instructions encoded on one or more tangiblenon-transitory carrier media (e.g., a machine-readable storage device,substrate, or sequential access memory device) for execution by dataprocessing apparatus.

The details of specific implementations described herein may be specificto particular embodiments of particular inventions and should not beconstrued as limitations on the scope of any claimed invention. Forexample, features that are described in connection with separateembodiments may also be incorporated into a single embodiment, andfeatures that are described in connection with a single embodiment mayalso be implemented in multiple separate embodiments. In addition, thedisclosure of steps, tasks, operations, or processes being performed ina particular order does not necessarily require that those steps, tasks,operations, or processes be performed in the particular order; instead,in some cases, one or more of the disclosed steps, tasks, operations,and processes may be performed in a different order or in accordancewith a multi-tasking schedule or in parallel.

Changes may be made in the above methods and systems without departingfrom the scope hereof. It should thus be noted that the matter containedin the above description or shown in the accompanying drawings should beinterpreted as illustrative and not in a limiting sense. The followingclaims are intended to cover all generic and specific features describedherein, as well as all statements of the scope of the present method andsystem, which, as a matter of language, might be said to falltherebetween.

Combination of Features

The following embodiments are specifically contemplated, as well as anycombinations of such embodiments that are compatible with one another:

(A1) A method for a wireless sensing system that receives sensor datafrom a sensor associated with an asset. The sensor data represents atampering event of the asset. The wireless sensing system determineswhether the tampering event was authorized. The wireless sensing systemdetermines whether the tampering event occurred at an authorized area.In response to one or both of: (1) the tampering event beingunauthorized, and (2) the tampering event being performed within anunauthorized area, the wireless sensing system transmits a notificationof the tampering event to a mobile device wirelessly connected to thewireless sensing system.

(A2) In the embodiment denoted by (A1), the tampering event occurswithin an area of a storage container.

(A3) In either of the embodiment denoted by (A1) or (A2), the wirelesssensing system determines whether the tampering event is authorized. Anode of the wireless sensing system attached to the asset communicateswith a plurality of nodes attached to corresponding asset of a pluralityof assets, the plurality of nodes tracking the plurality of assets. Thenode of the wireless sensing system receives inventory of the pluralityof nodes. The node of the wireless sensing system transmits an alert toother nodes attached to other assets in the proximity of the asset. Thealert causes the other nodes to set a flag indicative of the tamperingeach of the plurality of nodes. The alert is a notification that atampering event may have occurred and includes an instruction for eachof the plurality of nodes to store the alert as a flag.

(A4) In any of the embodiments denoted by (A1) through (A3), the storedalert, within each of the plurality of nodes, is scannable by a userdevice.

(A5) In any of the embodiments denoted by (A1) through (A4), thewireless sensing system determines whether the tampering event isauthorized by communicating, by a node of the wireless sensing system,the node attached to the asset, with a user device associated with anauthorized user. The node of the wireless sensing system receives anauthorization key of the user device.

(A6) In any of the embodiments denoted by (A1) through (A5), thereceived sensor data for the tampering event is logged to a historicalrecord of tampering records, each logged tampering event includes a setof corresponding sensor data.

(A7) In the embodiments denoted by (A1) through (A6), the user device isa smart phone, and the node of the wireless sensing system determinesthat the tampering event is authorized in response to receiving theauthorization key of the user device.

(A8) In the embodiments denoted by (A1) through (A7), the user device isa badge that includes an RFID chip, the method further comprising:determining that the tampering event is authorized in response toreceiving, by the node of the wireless sensing system, the authorizationkey of the user device.

(A9) In any of the embodiments denoted by (A3) through (A8), the node ofthe wireless sensing system receives from the user device, a wirelesssignal that sets a period of time that a tampering event shall nottrigger the wireless sensing system.

(A10) In any of the embodiments denoted by (A1) through (A9), thewireless sensing system determines whether the tampering event occurredwithin an authorized area. The wireless sensing system receives, from alocal node of the wireless sensing system that is attached to the asset,a current location of the asset. The wireless sensing system determineswhether the current location of the asset is within the authorized area.

(A11) In any of the embodiments denoted by (A10), the local node of thewireless sensing system determines the current location of the asset iswithin the authorized area. The local node disables some functionalityof the local node to save battery life of the node.

(A12) In any of the embodiments denoted by (A1) through (A11), thesensor data includes one or more of: vibration data, optical data,acoustic data, temperature data, orientation data, pressure data,altitude data, biometric data, humidity data, radioactivity data, andchemical data.

(A13) In any of the embodiments denoted by (A1) through (A12), thesensor includes a capacitive sensor, an altimeter, a gyroscope, anaccelerometer, a temperature sensor, a strain sensor, a pressure sensor,a piezoelectric sensor, a weight sensor, an optical sensor, an acousticsensor, a smoke detector, a radioactivity sensor, a chemical sensor, abiosensor, a magnetic sensor, an electromagnetic field sensor, and ahumidity sensor.

(A14) In any of the embodiments denoted by (A1) through (A13), awireless node of the wireless sensing system is attached to the asset.The receiving sensor data, the determining whether the tampering eventwas authorized, the determining whether the tampering event occurred atan authorized area, and the transmitting the notification of thetampering event to a device registered with the wireless sensing system,are all performed by the wireless node of the wireless sensing system.

(A15) In any of the embodiments denoted by (A1) through (A14), In someaspects, a server is associated with the wireless sensing system, andthe receiving sensor data, the determining whether the tampering eventwas authorized, the determining whether the tampering event occurred atan authorized area, and the transmitting the notification of thetampering event to a device registered with the wireless sensing system,are all performed by a server of the wireless sensing system.

(B1) A wireless sensing system is associated with a wireless sensingsystem that has a network of wireless nodes, that includes at least oneprocessor and one memory communicatively coupled with the at least oneprocessor, and stores machine-readable instructions that, when executedby the processor, cause the processor to receive a signal from arecently-activated wireless node of the network of wireless nodes. Theprocessor further adds an identifier of the recently-activated tape nodeto indicate that the recently-activated wireless node has joined thenetwork of wireless nodes to a database, according to a classificationof the tape node.

(B2) In any of the embodiments denoted by (B1), the wireless sensingreceive, via the wireless sensing system, sensor data from a sensorassociated with an asset, the sensor data representing a tampering eventof the asset; determine whether the tampering event was authorized;determine whether the tampering event occurred within an authorizedarea; and in response to one or both of: (1) the tampering event isunauthorized, and (2) the tampering event is not performed within theauthorized area, transmit a notification indicating the tampering eventto a mobile device wirelessly connected to the wireless sensing systemin response to one or both of: (1) the tampering event is unauthorized,and (2) the tampering event is not performed within the authorized area,transmit a notification indicating the tampering event to a mobiledevice wirelessly connected to the wireless sensing system.

(B3) In any of the embodiments denoted by (B1) through (B2), where thememory storing further machine-readable instructions that, when executedby the processor, further cause the processor to receive, via thewireless sensing system, sensor data from a sensor associated with anasset, the sensor data representing a tampering event of the asset.Determine whether the tampering event was authorized. Determine whetherthe tampering event occurred within an authorized area. In response toone or both of: (1) the tampering event is unauthorized, and (2) thetampering event is not performed within the authorized area, transmit anotification indicating the tampering event to a mobile devicewirelessly connected to the wireless sensing system.

(B4) In any of the embodiments denoted by (B2) through (B3), the sensorincludes a capacitive sensor, an altimeter, a gyroscope, anaccelerometer, a temperature sensor, a strain sensor, a pressure sensor,a piezoelectric sensor, a weight sensor, an optical sensor, an acousticsensor, a smoke detector, a radioactivity sensor, a chemical sensor, abiosensor, a magnetic sensor, an electromagnetic field sensor, and ahumidity sensor.

(B5) In any of the embodiments denoted by (B2) through (B4), the sensordata includes one or more of: vibration data, optical data, acousticdata, temperature data, orientation data, pressure data, altitude data,biometric data, humidity data, radioactivity data, and chemical data.

(B6) In any of the embodiments denoted by (B1) through (B5), whereindetermining whether the tampering event was authorized comprises furthermachine-readable instructions that, when executed by the processor,cause the processor to cause the node of the wireless sensing system tocommunicate with the node attached to the asset, with a user deviceassociated with an authorized user. The node of the wireless sensingsystem receives an authorization key of the user device.

(B7) In any of the embodiments denoted by (B1) through (B6), thewireless sensing system determining whether the tampering event occurredwithin an authorized area includes the wireless sensing system and froma local node attached to the asset receiving a current location of theasset. The wireless sensing system determines whether the currentlocation of the asset is within the authorized area.

(B8) In any of the embodiments denoted by (B1) through (B7), thereceiving, the determining, and the transmitting are performed by awireless node of the wireless sensing system. The memory storing furthermachine-readable instructions that, when executed by the processor,further causes the processor to store, by the wireless sensing system,information describing the tampering event.

(B9) In any of the embodiments denoted by (B1) through (B8), A wirelessnode of the network of wireless nodes is attached to the asset. Thereceiving sensor data, the determining whether the tampering event wasauthorized, the determining whether the tampering event occurred at anauthorized area, and the transmitting the notification of the tamperingevent to a device registered with the wireless sensing system, are allperformed by the wireless node.

(B10) In any of the embodiments denoted by (B1) through (B9), aclassification defines a communication capability of therecently-activated tape node. The classification defines thecommunication capability of the one of a plurality of classificationseach defining different communication capabilities of a wirelesscommunication interface of each of the wireless nodes in the network ofwireless nodes.

(C1) A method for operating a wireless sensing system that includes afirst tape node attached to a first parcel. The first tape node has afirst type of wireless communication interface and a second type ofwireless communication interface that has a longer range than the firsttype of wireless communication interface. A second tape node is capableof communicating with the first tape node. A server establishes awireless communication connection with the second type of wirelesscommunication interface of the first tape node. The server designatesthe first tape node as a master node of the second tape node.

(C2) In any of the embodiments denoted by (C1), the wireless sensingsystem further includes a third tape node operable to communicate withthe first tape node and the second tape node. A hierarchical structurefor a communications network is created and includes at least the first,second, and third nodes which are defined by one or more factors. Thefirst, second, and third nodes are assigned to various levels of thecommunications network based on a classification for each of the first,second, and third nodes, according to the one or more factors.

(C3) In any of the embodiments denoted by (C1) through (C2), creatingthe hierarchical structure of the communications network furtherincludes utilizing one or more of a neural network, artificialintelligence method, and a machine learning computing systems.

(C4) In any of the embodiments denoted by (C1) through (C3), the secondand third tape nodes are each attached to opposing doors of a storagecontainer. One of the second and third tape nodes measures a change indistance between the second and third tape nodes. One of the second andthird tape nodes transmits an alert that a tampering event is occurring,in response to the change in distance between the second and third tapenodes satisfying a threshold.

(C5) In any of the embodiments denoted by (C1) through (C4), thewireless sensing system further includes one or more sensors. The one ormore sensors include a vibration sensor for detecting tampering thatcauses an increase of vibration compared to background vibration levels.

(D1) A wireless sensing system that has a primary electronic loggingdevice (ELD) and a secondary ELD. The secondary ELD includes at leastone processor and a memory communicatively coupled with the at least oneprocessor and stores machine-readable instructions that, when executedby the processor, cause the processor to receive tape node data from atape node associated with an asset proximate to the secondary ELD, thetape node data representing a tampering event performed on the asset.The processor compares the tape node data to a list of predeterminedevents, stored within the memory. The list of predetermined eventsincludes one or more predetermined events and corresponding elements oftape node data associated with each of the one or more predeterminedevents. The processor determines, based on the comparison, that thetampering event does not match a predetermined event within the list ofpredetermined events. The processor executes, in response to thedetermination that the tampering event does not match a predeterminedevent, a particular contingency plan, based on the tampering event.

(D2) In any of the embodiments denoted by (D1), the memory furthercauses the secondary ELD to determine whether the tampering event can beresolved locally.

(D3) In any of the embodiments denoted by (D1) through (D2), the memoryfurther causes the processor to retrieve, from a plurality of wirelessnodes associated with the asset, data relating to the tampering eventwhen the tampering event is not a predetermined event. The memoryfurther causes the processor to broadcast data, according to theparticular contingency plan, to the plurality of wireless nodesassociated with the asset. The memory further causes the processor totransmit a notification, to the primary ELD of the wireless sensingsystem, to notify a management system of the wireless sensing system,the notification alerting the management system of the wireless sensingsystem that the tampering event has occurred.

(D4) In any of the embodiments denoted by (D1) through (D3), thewireless sensing system transmits the notification alerting anauthorized user of the client device, to the client device.

(D5) In any of the embodiments denoted by (D1) through (D4), where thememory further causes the processor to transmit a request for assistancefrom the primary ELD.

(D6) In any of the embodiments denoted by (D1) through (D5), where thetampering event may be one of an improper asset, unfit asset, missingasset, and misrouted asset.

(D7) In any of the embodiments denoted by (D1) through (D6), where theprimary ELD is proximate to the secondary ELD, both of which are withina same vehicle.

(D8) In any of the embodiments denoted by (D1) through (D7), whereexecuting the contingency plan further includes the processor causingthe secondary ELD to identify the contingency plan as a particularcontingency plan, from a set of contingency plans, satisfying athreshold. Then compare the tampering event to a set of contingencyplans stored in the memory. Then determine, based on the comparison ofthe tampering event with the contingency plan satisfying a threshold, aparticular contingency plan. Then execute instructions contained withinthe particular contingency plan.

(D9) In any of the embodiments denoted by (D1) through (D8), where thewireless sensing system further includes a peripheral wireless networknode that is associated with a missing asset. The missing asset iswirelessly connected to the secondary ELD and proximate to the asset.The tampering event is a missing asset, and the particular contingencyplan includes instructions for wireless sensing system to re-broadcastping packets to the peripheral wireless network node associated with themissing asset using a different communications protocol.

(D10) In any of the embodiments denoted by (D1) through (D9), where thetampering event cannot be resolved locally. The memory includes furthercomputer-readable instructions that, when executed by the processor,further cause the secondary ELD to send the primary ELD a request for anoutside contingency plan.

(D11) In any of the embodiments denoted by (D1) through (D10), where theprimary ELD is the tape node designed to wirelessly communicate usingBluetooth, LoRa, Cellular, and GPS.

(D12) In any of the embodiments denoted by (D1) through (D11), where theprimary ELD is another tape node than the tape node and the primary ELDhas increased storage capacity, battery, and processing power than thetape node.

(D13) In any of the embodiments denoted by (D1) through (D12), where thetampering event occurred on a storage container.

The details of specific implementations described herein may be specificto particular embodiments of particular inventions and should not beconstrued as limitations on the scope of any claimed invention. Forexample, features that are described in connection with separateembodiments may also be incorporated into a single embodiment, andfeatures that are described in connection with a single embodiment mayalso be implemented in multiple separate embodiments. In addition, thedisclosure of steps, tasks, operations, or processes being performed ina particular order does not necessarily require that those steps, tasks,operations, or processes be performed in the particular order; instead,in some cases, one or more of the disclosed steps, tasks, operations,and processes may be performed in a different order or in accordancewith a multi-tasking schedule or in parallel.

Changes may be made in the above methods and systems without departingfrom the scope hereof. It should thus be noted that the matter containedin the above description or shown in the accompanying drawings should beinterpreted as illustrative and not in a limiting sense. The followingclaims are intended to cover all generic and specific features describedherein, as well as all statements of the scope of the present method andsystem, which, as a matter of language, might be said to falltherebetween.

What is claimed is:
 1. A method comprising: receiving, by a wirelesssensing system, sensor data from a sensor associated with an asset, thesensor data representing a tampering event of the asset; determining, bythe wireless sensing system, whether the tampering event was authorized;determining, by the wireless sensing system, whether the tampering eventoccurred at an authorized area; and in response to one or both of: (1)the tampering event being unauthorized, and (2) the tampering eventbeing performed within an unauthorized area, transmitting a notificationof the tampering event to a mobile device wirelessly connected to thewireless sensing system.
 2. The method of claim 1, wherein the tamperingevent occurred within an area of a storage container.
 3. The method ofclaim 1, wherein determining, by the wireless sensing system, whetherthe tampering event is authorized comprises: communicating, by a node ofthe wireless sensing system, the node attached to the asset, with aplurality of nodes attached to corresponding asset of a plurality ofassets, the plurality of nodes tracking the plurality of assets;receiving, by the node of the wireless sensing system, inventory of theplurality of nodes; and transmitting, by the node of the wirelesssensing system, an alert to other nodes attached to other assets inproximity of the asset, wherein the alert causes the other nodes to seta flag, indicative of the tampering event, at each of the plurality ofnodes, the alert is a notification that a tampering event may haveoccurred.
 4. The method of claim 3, wherein the stored alert, withineach of the plurality of nodes, is scannable by a user device.
 5. Themethod of claim 1, wherein determining, by the wireless sensing system,whether the tampering event is authorized comprises: communicating, by anode of the wireless sensing system, the node attached to the asset,with a user device associated with an authorized user; and receiving, bythe node of the wireless sensing system, an authorization key of theuser device.
 6. The method of claim 5, further comprising logging thereceived sensor data for the tampering event to a historical record oftampering records, each logged tampering event includes a set ofcorresponding sensor data.
 7. The method of claim 5, wherein the userdevice is a smart phone, the method further comprising: determining thatthe tampering event is authorized in response to receiving, by the nodeof the wireless sensing system, the authorization key of the userdevice.
 8. The method of claim 5, wherein the user device is a badgethat includes an RFID chip, the method further comprising: determiningthat the tampering event is authorized in response to receiving, by thenode of the wireless sensing system, the authorization key of the userdevice.
 9. The method of claim 5, further comprising: receiving, by thenode of the wireless sensing system, from the user device, a wirelesssignal that sets a period of time that a tampering event shall nottrigger the wireless sensing system.
 10. The method of claim 1, whereindetermining, by the wireless sensing system, whether the tampering eventoccurred within an authorized area comprises: receiving, from a localnode of the wireless sensing system that is attached to the asset, acurrent location of the asset; and determining whether the currentlocation of the asset is within the authorized area.
 11. The method ofclaim 10, wherein the local node of the wireless sensing systemdetermines the current location of the asset is within the authorizedarea, the method further comprising: disabling, by the local node, somefunctionality of the local node to save battery life of the local node.12. The method of claim 1, wherein a server is associated with thewireless sensing system, and wherein the receiving sensor data, thedetermining whether the tampering event was authorized, the determiningwhether the tampering event occurred at an authorized area, and thetransmitting the notification of the tampering event to a deviceregistered with the wireless sensing system, are all performed by aserver of the wireless sensing system.
 13. A wireless sensing systemhaving a network of wireless nodes, comprising, at least one processor;and memory communicatively coupled with the at least one processor andstoring machine-readable instructions that, when executed by theprocessor, cause the processor to: receive, at the wireless sensingsystem, a signal from a recently-activated wireless node of the networkof wireless nodes; and add, to a database and according to aclassification of the recently-activated wireless node, an identifier ofthe recently-activated wireless node to indicate that therecently-activated wireless node has joined the network of wirelessnodes.
 14. The wireless sensing system of claim 13, the memory storingfurther machine-readable instructions that, when executed by theprocessor, further cause the processor to: receive, via the wirelesssensing system, sensor data from a sensor associated with an asset, thesensor data representing a tampering event of the asset; determinewhether the tampering event was authorized; determine whether thetampering event occurred within an authorized area; and in response toone or both of: (1) the tampering event is unauthorized, and (2) thetampering event is not performed within the authorized area, transmit anotification indicating the tampering event to a mobile devicewirelessly connected to the wireless sensing system.
 15. The wirelesssensing system of claim 14, wherein said determine, by the wirelesssensing system, whether the tampering event occurred within anauthorized area comprises: receive, via the wireless sensing system andfrom a local node attached to the asset, a current location of theasset; and determine whether the current location of the asset is withinthe authorized area.
 16. The wireless sensing system of claim 13, aclassification defining a communication capability of therecently-activated wireless node and being one of a plurality ofclassifications each defining different communication capabilities of awireless communication interface of each wireless node in the network ofwireless nodes.
 17. A wireless sensing system having a primaryelectronic logging device (ELD) and a secondary ELD, comprising: thesecondary ELD comprising: at least one processor; and a memorycommunicatively coupled with the at least one processor and storingmachine-readable instructions that, when executed by the processor,cause the processor to: receive tape node data from a tape nodeassociated with an asset proximate to the secondary ELD, the tape nodedata representing a tampering event performed on the asset; compare thetape node data to a list of predetermined events, stored within thememory, the list of predetermined events includes one or morepredetermined events and corresponding elements of tape node dataassociated with each of the one or more predetermined events; determine,based on the comparison of the tape node data to a list of predeterminedevents, that the tampering event does not match a predetermined eventwithin the list of predetermined events; and execute, in response to thedetermination that the tampering event does not match a predeterminedevent, a particular contingency plan, based on the tampering event. 18.The wireless sensing system of claim 17, wherein the memory furthercauses the processor to: when the tampering event is not a predeterminedevent, retrieve, from a plurality of wireless nodes associated with theasset, data relating to the tampering event; broadcast data, accordingto the particular contingency plan, to the plurality of wireless nodesassociated with the asset; and transmit a notification, to the primaryELD of the wireless sensing system, to notify a management system of thewireless sensing system, the notification alerting the management systemof the wireless sensing system that the tampering event has occurred.19. The wireless sensing system of claim 18, wherein transmitting thenotification further includes transmitting to a client device, thenotification alerting an authorized user of the client device.
 20. Thewireless sensing system of claim 17, wherein said execute the particularcontingency plan further comprises the memory including furthercomputer-readable instructions that, when executed by the processor,further cause the secondary ELD to: identify the contingency plan as aparticular contingency plan, from a set of contingency plans, satisfyinga threshold, comprising: compare the tampering event to a set ofcontingency plans stored in the memory; determine, based on thecomparison of the tampering event with the contingency plan satisfying athreshold, a particular contingency plan; and execute instructionscontained within the particular contingency plan.
 21. The wirelesssensing system of claim 20, the wireless sensing system further includesa peripheral wireless network node that is associated with a missingasset, wirelessly connected to the secondary ELD, and proximate to theasset, wherein the tampering event is a missing asset, and theparticular contingency plan includes instructions for wireless sensingsystem to re-broadcast ping packets to the peripheral wireless networknode associated with the missing asset using a different communicationsprotocol.
 22. The wireless sensing system of claim 17, wherein theprimary ELD is the tape node designed to wirelessly communicate usingBluetooth, LoRa, Cellular, and GPS.
 23. The wireless sensing system ofclaim 17, wherein the primary ELD is another tape node than the tapenode and the primary ELD has increased storage capacity, battery, andprocessing power than the tape node.
 24. The wireless sensing system ofclaim 17, wherein the tampering event occurred on a storage container.