TW201224960A - Object tracking - Google Patents

Object tracking Download PDF

Info

Publication number
TW201224960A
TW201224960A TW100126741A TW100126741A TW201224960A TW 201224960 A TW201224960 A TW 201224960A TW 100126741 A TW100126741 A TW 100126741A TW 100126741 A TW100126741 A TW 100126741A TW 201224960 A TW201224960 A TW 201224960A
Authority
TW
Taiwan
Prior art keywords
checkpoint
tracking
control system
value
timer
Prior art date
Application number
TW100126741A
Other languages
Chinese (zh)
Inventor
Manuel Haag
Bertrand Spaeth
Original Assignee
Swisscom Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swisscom Ag filed Critical Swisscom Ag
Publication of TW201224960A publication Critical patent/TW201224960A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention relates to a method of tracking an object (101) for an object tracking system comprising a tracking module (103) connected to the object (101) to be tracked, a control system (107) and a customer terminal (109). The method comprises the following steps performed by the control system (107): (a) defining checkpoints for the object (101); (b) defining a timer value for at least certain checkpoints; (c) receiving location information from the tracking module (103) for tracking by the control system (107) the path travelled by the object (101); and (d) between a first checkpoint and a second checkpoint, disclosing, before the object (101) reaches the second checkpoint, the path travelled by the object only until the expiration of the timer value related to the first checkpoint.

Description

201224960201224960

發 【發明所屬之技術領域】 本發明係關於一種 目的地之新方 種追踪物件且藉此判定物件是否到達其 σ 涵 去。本發明亦係關於一種對應的電腦程式產 :件、及—種物件追踪系統。 L无則技術】 已提出各種解、如 所謂之資產、方案來追踪諸如載具之類的物件。此等 之麵沾分 足卞***’通常係基於諸如全球定位系統(GPS) 之頰的衛星定 收器之_、、 死。在此等解決方案中,將諸如GPS接 ^ ^早70附接至位置將被跟蹤的器件。GPS接 器二2^=__號,且可因此判定GPS接收 通信器件,將一,接收器已判定了位置,其便可藉助於 此資訊可為服Γ資訊傳輪至中央單元,而自該中央單元, 服務之用戶所用。 亦可以將感挪器安 至追踪單元。此裳二。 或载具上,使感測器連接 變’諸如,裁具門之?:器可谓洌與載具有闕之條件的改 載具卸下貨物,。^'關閉、貨物裝載至載具中或自 之信號提供至追碌單元,=k可接著將指示此等事件 等事件報告給中央么 4综單元可接著進-步將竽 所之操作條件的資訊量。 產追踪系統中關於載具處 在資產追踪***中報告並處 100126741 午之了犯缺點,包括所BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a new type of tracking object for a destination and thereby determining whether an object has reached its σ culvert. The invention also relates to a corresponding computer program product: a piece, and an object tracking system. L No Technology] Various solutions, such as so-called assets and programs, have been proposed to track objects such as vehicles. These are closely related to the ankle system', which is usually based on satellite receivers such as the GPS (the GPS). In such solutions, a device such as GPS is attached 70 to the device where the location will be tracked. The GPS connector 2 2 = __ number, and can therefore determine the GPS receiving communication device, one, the receiver has determined the location, which can use this information to transfer the service information to the central unit, This central unit is used by the users of the service. The sensor can also be attached to the tracking unit. This is the second. Or on the vehicle, make the sensor connection change, such as the cutting door? : The device can be said to be loaded with the carrier with the shackles. ^ 'Close, cargo loading into the vehicle or from the signal to the tracking unit, = k can then report events indicating such events to the central unit 4 can then proceed to the operating conditions of the The amount of information. In the production tracking system, the vehicle is reported in the asset tracking system and is in the afternoon of 100126741.

S 4 201224960 涉及之器件(例如’追踪單元及其感測器)的高電力消耗。 亦已提出了使用事件遮蔽規則,該等規則可在資產追踪 單兀處及/或在中央台處應用,以判定是否要報告由資產追 知單元偵測到之事件《舉例而言,此類型之一項規則可規 定:僅在不預期發生载具門打開及/或關閉事件之某幾個小 時期間’才報告此等活動。 亦已提出了程式化資產追踪單元以觀測「地理柵欄 (geo-fence)」。此意謂:只要追踪單元所附接至的載具脫離 預定地理區域或進入預定地理區域,資產追踪單元便宣告 事件(例如,產生一報告給中央台)。可藉由在某些時間 遮蔽地理柵攔事件,來進一步改進地理柵攔概念。舉例而 吕,在工作時間期間,可允許載具脫離地理柵欄區域而不 報告事件。 存在有數種資產追踪系統之應用。舉例而言,資產追踪 可用於追踪在去往目的地地址之路線上的包裹。對於實際 位置判疋而言,不使用衛星定位,而基於無線定位的若干 其他技術亦為可能的’諸如’無線保真(WiFi,wirdess fidelity)、射頻識別(RFID,radi〇 frequency identificati〇n)、 基於蜂巢式通信網路的定位,等等。然而,已知的追踪系 統通常需要複雜的基礎結構。舉例而言,RFID之使用可能 要求在整個配送鏈中使用標記讀取器或條碼掃描器。如此 導致高成本,尤其係在全世界部署時。此外,可能濫用已 100126741 5 201224960 知的追踪方法,你丨如 ^ , 、 ’精由將追踪單元附接至某人之衣服 或所有物,且接著使用該系統來追踪此人之移動。因此’ 在已知的解決方荦中 r 使用者之隱私並不總是能以最佳方 式得到保護。 【發明内容】 種克服上文指出的短處的物件追 本發明之目標為提供一 踪解決方案。 很據本發明之第一態樣,提供一種用於物件追踪系統1 追踪物件之料,軸件追料統包含: 件的追踪模組、控制系缔^ 不, 匕制糸統、及第三方系統,此方法包含〗 控制系統執行之以下步驟: 定義針對物件之檢查點; 定義用於至少某些檢查點之定時器數值; 接收關於追踪握έ 物件所行進之路而藉由控制系統以❸ 方=第一檢查點有關的定時器數值期滿之前,向第; 方糸、絲示在物件到達 二檢查點⑼的_。 υ之祕第—檢查點㈣ 所提出之方法提 者隱私而|需人u 安全及/或使用 方式。若:― 或昂貴的基礎結構的廉價且可靠的 100126741 點,則-旦物:Γ點及第—檢查點為所謂之受信任檢查 一到達第二檢查點,便可向使用者終端機揭 201224960 不该兩個檢查點之間可能隱藏的路徑。此使得使用者終端 機可疋全地追踪物件在該兩個檢查點之間的路徑,而無任 何濫用追踪服務之危險。 根據本發明之第二態樣,提供一種電腦程式產品,用於 在追踪系統之控制系統之電腦構件上在載入及執行時,實 施本發明之第一態樣之方法之步驟。 根據本發明之第三態樣,提供一種用於追踪物件之物件 追踪系統的控制系統,此控制系統包含以下功能手段: 定義針對物件之檢查點; 定義用於至少某些檢查點之定時器數值; 接收關於連接至物件的追踪模組的位置資訊,而藉由控 制系統以追踪物件所行進之路徑;及 僅在與第一檢查點有關的定時器數值期滿之前,向第三 方系統揭示在第一檢查點與第二檢查點之間、且在物件到 達第二檢查點之前物件所行進之路彳说。 根據本發明之第四態樣,提供〜種用於追踪物件之物件 追踪系統,此物件追踪系統包含本發明之第三態樣之控制 糸統® 在所附之附屬請求項中敍述本發明之其他態樣。 【實施方式】 參看附圖,本發明之其他特徵及優黠將根據對非限制 性、例示性具體例之以下描^清楚顯系。 100126741 7 201224960 在下文參看附圖來更詳細地描述本發明之具體例。將在 將包裹送往目的地之上下文中,描述此具體例,但請注意, 本發明之教示決非限於此應用。 圖1 §兒明展示一些元件的簡化方塊圖,而該等元件係涉 及於本發明之物件追踪方法中。在圖丨中,包裹或小包1〇1 含有一個追踪單元或模組103,其係用於經由無線電介面 而與蜂巢式通信網路105進行單向或雙向通信,在此實例 中,蜂巢式通信網路1 〇 5為全球行動通信系統(G s M)網路。 追踪模組103亦可含有(例如)用於開啟/關閉或用於給出其 他指令的按鈕。其亦可含有感測器,例如,溫度或運動感 測器。追踪模組103可在包裹101内部,或可附接於包裹 ιοί之外部上。實際的無線電通信發生在追踪模組1〇3 : 天線與基地台(BS)之間,而該基地台包括:傳輸器、接收 器、及用於以無線電介面直接與追踪模組1()3通信的信號 傳輸設備。在此上下文中,不再詳細地福述蜂巢式通^ 路’係因為理解到此網路之架構在本發明中為不重要的’。 此外,本發明之教示不限於使科巢式通信網路。 在圖1中,進-步展示控制系,统107,在此實例中為中 央單元1G7 ’其在此實例中為GSM網路之部分。 !〇7當然可由若干網路元件所組成。追踪模組iQ3被配置 成為經由無線電介面而與令央單元1〇7通信。中央單元 被配置成為接收關於追踪模組103之 7 位置貝讯,且因此保 100126741 8 201224960 持追踪追踪模組則之行縱。中央單元ι〇7被進一步配置 成為較佳地經由無線電介面而與第三方系統(諸如,使用者 終端機贈,其可例如為個人數位助理(pDA))通信。中央 單凡107被配置成為將包裹1〇1之位置資訊選擇性地傳輪 至使用者終端機109,如稍後將更詳細地描述。請注意, 中央單το 107及使用者終端機1〇9實際上可為單一的實體 〇g 一 單兀。 本發明係基m想法:將追踪模組1G3嵌人於(例如) 郵政^運中’使得,追踪模組1〇3及/或中央單元1〇7能夠 基於事件(諸如,地理位置、感測器值料)來自動地偵測 檢查點或導航點,而不必依賴於複雜的基礎結構,例如, 涉及到RFID或條石馬掃描器。接著,使用對檢查點之摘測 來(例如)觸發警報/通知、或啟用/停用對郵政貨運之追踪, 且使此追踪可為客戶所用。 追示模、'且103及/或中央單元能夠自動地债測檢查 點。、檢查點為在包裹1〇1之旅程期間出現的關注點或關注 區域或事件。在包裹⑻之旅程期間,追踪模組103可到 達右干檢查點。若滿足以下條件中之一或多者,便到達檢 查點: •進入被定義的地理區域(地理柵攔); -離開被定義的地理區域(地理柵欄); -在給疋時間内在被定義的地理區域内部為靜止的(不動 匕. 100126741 9 201224960 的), -在給定時間内移動(非靜止); -偵測到感測器事件,諸如,振動或溫度臨限值; -偵測到使用者事件,諸如,追踪模組103上之按鈕或鍵 盤輸入; -偵測到包裹101周邊上之事件; -偵測到來自第三方系統及周邊的事件,例如,偵測到第 三方糸統掃描追踪模組103上之條碼;及 -偵測到基於商業邏輯之其他事件,例如,偵測到追踪模 組103上之特定數目次按鈕按壓。 對於每一檢查點,定義出相關的動作/功能、及/或值。其 可為: -諸如定時器數值之類的變數(到下一個檢查點的時間、 保留時間等等); -旗標(開,關);及 -功能啟用/停用(追踪、飛行模式等等)。 基於檢查點,可實現加值服務,諸如,追踪、通知、警 報、或甚至飛行模式選擇。此外,由於基於檢查點之追踪, 可防止追踪資訊之濫用,如下文更詳細地解釋。 在其旅程期間,包裹101將經過若干預先定義的檢查 點,直至其到達其最終目的地為止。然而,檢查點之次序 並非預先定義的。每一檢查點可觸發追踪模組103及/或中 100126741 10 201224960 扒:7G 107上之功症性。每一檢查點具有 檢查點之相關聯的逾時或定時器數值 1達下一個 到達下一個檢杳點,Μι 在其逾時内不能 運卜個檢查上則可觸發追踪模組1〇3 一 107上之功能。舉例而 或中央早兀 ϋ浐哭杜夕阶雄、* °在貫施安全特徵(諸如,對濫用 T D D日’此為有用的。若不到達預先定義的;^ 查點,則意謂著追踪模纟 料疋義的檢 且,出於安全原因,c其既定路途上,而 乂肩V用遣踪。在某些應 數值為足夠高到在正常條件下到達下-個檢㈣,且2 低到在濫用之情況下停用追踪。 —』且足夠 ::接:ί某些參數值(諸如,信任級別)與檢查點相關 \概等參數絲定義_數值。舉例而言, 、十檢:點之4任值可意謂著高逾時數值,而針對檢查 點之低彳§任值可能S謂著低料數值。亦可以將逾時數值 定義為與某-檢查點相關聯的參數。在此種情況下,可基 i夺數值來疋義k任值。舉例而言,成為檢查點的配送 中心對發自檢查點所處之國家的包裹可具有高的信任級 別’而同-配送中心對於發自外國之包裹可具有低的信任 級別。基於逾時數值(且因此亦基於信任級別),檢查點可 為受信任或不受信任的。可向使用者揭示兩個受信任的檢 查點之間的追踪資訊,而不受信任的撿查點之間的追踪可 經受限制。 自客戶之觀點而言’本發明之追综係基於兩個追踪概 100126741 201224960 念’亦即, 前向追㈣1追踪(或,即時_及_追踪。在執行 服務之使^時的(或實質上即時的)追踪資料提供至 相關聯的t 在每—檢查點處,僅在㈣特定檢查點㈣ 到達下限時間段内,㈣前向追踪。若在 提供至使心—點(化求前tn_,料料訊不再被 使用(如下文h但仍儲存於中央單元1〇7上,以待稍候再 零,則僅將一回溯追踪之概念時加以解釋)。若^為 著’向客戶/固單一點(實際位置)提供至使用者。此意謂 查點(CP 追踪資訊被立即停用,直至到達下-個檢 動追踪 止。—旦到達心且“大於零,便重新啟 在到達 用者八Μ n前tn已流逝之情況下,追踪f訊不向使 存於中央單元107内部。—到達^, CP 下條件下向使用者透露錯過的路徑(在CPn^ 作二^:t,tn+1>〇且tn>〇。根據本發明,此概念被稱 任的’下右、或tn為零,則對應的檢查點並非可信 因此,回溯追踪不可為使用者所用。換言之,僅 查點及前—個檢查點均為受•時,才可回溯性 /吏用者展示當前檢查點與前-個檢查點之間的隱藏路 徑0 因此,在追踪模組103經過受信任的檢查點(例如,已知 的配运中心)時,若與此檢查料_㉔找值大於零, 100126741S 4 201224960 The high power consumption of the devices involved, such as the 'tracking unit and its sensors. It has also been proposed to use event masking rules, which can be applied at the asset tracking unit and/or at the central station to determine whether to report an event detected by the asset tracking unit. For example, this type One rule may stipulate that such activities are only reported during certain hours of the event that the opening and/or closing of the vehicle door is not expected to occur. A stylized asset tracking unit has also been proposed to observe "geo-fence". This means that the asset tracking unit announces the event (e.g., generates a report to the central station) as long as the vehicle to which the tracking unit is attached deviates from the predetermined geographic area or enters the predetermined geographic area. The concept of geographic barriers can be further improved by masking geographic barrier events at certain times. For example, during work hours, the vehicle can be allowed to leave the geofence area without reporting an event. There are several applications for asset tracking systems. For example, asset tracking can be used to track packages on the route to the destination address. For actual location determination, satellite positioning is not used, and several other technologies based on wireless positioning are also possible, such as 'wirds fidelity, radio frequency identification (RFID, radi〇frequency identificatiati) , based on the positioning of the cellular communication network, and so on. However, known tracking systems often require complex infrastructure. For example, the use of RFID may require the use of a tag reader or barcode scanner throughout the distribution chain. This leads to high costs, especially when deployed around the world. In addition, it is possible to abuse the tracking method known as 100126741 5 201224960, for example, ^, , 'send the tracking unit to someone's clothes or belongings, and then use the system to track the movement of the person. Therefore, in a known solution, the privacy of the user is not always protected in an optimal manner. SUMMARY OF THE INVENTION An object of the present invention that overcomes the shortcomings noted above is to provide a tracking solution. According to a first aspect of the present invention, there is provided a material for tracking an object by an object tracking system, and the shaft chasing system includes: a tracking module of the component, a control system, a control system, and a third party. System, this method includes the following steps performed by the control system: defining a checkpoint for the object; defining a timer value for at least some of the checkpoints; receiving a path for tracking the gripper object by means of the control system Before the expiration of the timer value related to the first checkpoint, the ; to the first checkpoint and the silk indicate that the object reaches the checkpoint of the second checkpoint (9).秘 秘 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If: - or an expensive and reliable infrastructure of 100,126,741 points, then - the object: the point and the first checkpoint is the so-called trusted inspection. Once the second checkpoint is reached, the user terminal can be uncovered 201224960 There should be no hidden paths between the two checkpoints. This allows the user terminal to track the path of the object between the two checkpoints without any risk of misusing the tracking service. In accordance with a second aspect of the present invention, a computer program product is provided for performing the steps of the method of the first aspect of the present invention upon loading and executing on a computer component of a control system of a tracking system. According to a third aspect of the present invention, there is provided a control system for an item tracking system for tracking an object, the control system comprising the following functional means: defining a checkpoint for the object; defining a timer value for at least some of the checkpoints Receiving location information about the tracking module connected to the object, and controlling the system to track the path traveled by the object; and revealing to the third party system only before the expiration of the timer value associated with the first checkpoint The path between the first checkpoint and the second checkpoint, and before the object reaches the second checkpoint, says. According to a fourth aspect of the present invention, there is provided an object tracking system for tracking an object, the object tracking system comprising the third aspect of the present invention, the invention is described in the accompanying claims. Other aspects. BRIEF DESCRIPTION OF THE DRAWINGS Other characteristics and advantages of the present invention will be apparent from the following description of the non-limiting and exemplary embodiments. 100126741 7 201224960 Specific examples of the invention are described in more detail below with reference to the accompanying drawings. This specific example will be described in the context of delivering a package to a destination, but it is noted that the teachings of the present invention are by no means limited to this application. Figure 1 shows a simplified block diagram of some of the components involved in the object tracking method of the present invention. In the figure, the package or packet 101 includes a tracking unit or module 103 for communicating unidirectionally or bidirectionally with the cellular communication network 105 via a radio interface, in this example, cellular communication Network 1 〇 5 is a Global System for Mobile Communications (G s M) network. Tracking module 103 can also contain, for example, buttons for turning on/off or for giving other commands. It may also contain a sensor, such as a temperature or motion sensor. The tracking module 103 can be internal to the package 101 or can be attached to the exterior of the package ιοί. The actual radio communication takes place between the tracking module 1〇3: the antenna and the base station (BS), and the base station includes: a transmitter, a receiver, and a radio interface directly with the tracking module 1 () 3 Signal transmission equipment for communication. In this context, the cellular architecture is not described in detail because it is understood that the architecture of the network is not important in the present invention. Moreover, the teachings of the present invention are not limited to enabling a nested communication network. In Figure 1, the control system, in turn, is the central unit 1G7' which in this example is part of the GSM network. !〇7 can of course consist of several network elements. The tracking module iQ3 is configured to communicate with the command unit 1 to 7 via a radio interface. The central unit is configured to receive the 7-position of the tracking module 103, and thus maintain the tracking of the tracking module at 100126741 8 201224960. The central unit ι 7 is further configured to preferably communicate with a third party system (such as a user terminal, which may be, for example, a personal digital assistant (pDA)) via a radio interface. The central unit 107 is configured to selectively route the location information of the parcel 1 to 1 to the user terminal 109, as will be described in more detail later. Please note that the central single το 107 and the user terminal 1〇9 can actually be a single entity 〇g a single 兀. The invention is based on the idea of embedding the tracking module 1G3 in, for example, the postal service, so that the tracking module 1〇3 and/or the central unit 1〇7 can be based on events (such as geographic location, sensing) The device value is used to automatically detect checkpoints or navigation points without having to rely on complex infrastructure, for example, involving RFID or a stone scanner. Next, use a checkpoint of the checkpoint to, for example, trigger an alert/notification, or enable/disable tracking of postal shipments, and make this tracking available to the customer. The tracking mode, 'and 103 and/or the central unit can automatically check the checkpoint. The checkpoint is the point of interest or area of interest or event that occurs during the journey of the parcel. During the journey of the package (8), the tracking module 103 can reach the right checkpoint. If one or more of the following conditions are met, the checkpoint is reached: • Entering the defined geographical area (geographic barrier); - Departing the defined geographical area (geo-barrier); - Being defined during the given time The interior of the geographic area is stationary (not moving. 100126741 9 201224960), - moving in a given time (not stationary); - detecting sensor events, such as vibration or temperature thresholds; - detecting User events, such as button or keyboard input on the tracking module 103; - detection of events on the perimeter of the package 101; - detection of events from third party systems and surrounding, for example, detection of third party systems Scanning the bar code on the tracking module 103; and detecting other events based on the business logic, for example, detecting a specific number of button presses on the tracking module 103. For each checkpoint, the associated action/function, and/or value is defined. It can be: - variables such as timer values (time to next checkpoint, retention time, etc.); - flag (on, off); and - function enable/disable (tracking, flight mode, etc.) Wait). Based on checkpoints, value-added services such as tracking, notifications, alerts, or even flight mode selection can be implemented. In addition, due to the tracking of checkpoints, the abuse of tracking information can be prevented, as explained in more detail below. During its journey, parcel 101 will pass through a number of predefined checkpoints until it reaches its final destination. However, the order of checkpoints is not predefined. Each checkpoint can trigger the tracking module 103 and/or medium 100126741 10 201224960 扒: 7G 107. Each checkpoint has the associated timeout or timer value of the checkpoint 1 up to the next checkpoint, and Μι can trigger the trace module within its timeout to trigger the trace module 1〇3 The function on 107. For example, or the central early crying Du Xixiong, * ° in the implementation of security features (such as the abuse of TDD day 'this is useful. If you do not reach the predefined; ^ check point, it means tracking For the sake of safety, c is on its established route, while the shoulder V is used for relocation. In some cases, the value is high enough to reach the next condition under normal conditions (4), and 2 Low to disable tracing in case of abuse. - "And enough:: 接: ί Some parameter values (such as trust level) are related to the checkpoint \ arbitrarily parameter definition _ value. For example, ten The 4th value of the point can mean a high time-out value, and the value of the low-point § for the checkpoint may be a low-level value. The time-out value can also be defined as a parameter associated with a checkpoint. In this case, the value can be used to determine the value of K. For example, the distribution center that becomes the checkpoint can have a high level of trust for the parcel from the country where the checkpoint is located. The distribution center can have a low level of trust for parcels sent from foreign countries. Based on the time-out value (and therefore also Based on the trust level, the checkpoint can be trusted or untrusted. The trace information between the two trusted checkpoints can be revealed to the user, while the trace between the untrusted checkpoints can be limited. From the customer's point of view, 'the tracking of the present invention is based on two tracking profiles 100126741 201224960 念', that is, forward chasing (four) 1 tracking (or, instant _ and _ tracking. When performing the service of the ^ (or The substantially instantaneous) tracking data is provided to the associated t at each checkpoint, only at (4) the specific checkpoint (4) reaches the lower limit period, (4) the forward trace. If provided to the heart-point (before the request) Tn_, material information is no longer used (as below, but still stored in the central unit 1〇7, waiting for a later zero, then only a backtracking concept will be explained). If ^ is 'toward The customer/solid single point (actual location) is provided to the user. This means that the enumeration point (the CP tracking information is immediately deactivated until the next-detection tracking is reached. - Upon reaching the heart and "greater than zero, it is restarted" In the case of reaching the user gossip n before tn has passed The tracking information is not stored in the central unit 107. - Arrival ^, under CP conditions, reveal the missed path to the user (in CPn^^^^,tn+1>〇 and tn>〇. According to this Invented, the concept is called 'lower right, or tn is zero, then the corresponding checkpoint is not credible. Therefore, backtracking cannot be used by the user. In other words, only the checkpoint and the previous checkpoint are subject to When the traceability/user displays the hidden path between the current checkpoint and the previous checkpoint 0, therefore, when the trace module 103 passes through a trusted checkpoint (for example, a known dispatch center) If the value of this inspection material _24 is greater than zero, 100126741

S 12 201224960 則可向客戶公開資產追踪路徑。每次當器件經過其他已知 的檢查點,便可透露過去的追踪資訊,而且,在某一時間 期間,進一步之追踪可為可能的。如上文所解釋,追踪資 訊對使用者之可用性,取決於定時器數值。在某點時,資 產經過其最後一個已知的受信任的檢查點。隨著定時器數 值已流逝,在給定時間tn之後,針對使用者而言,追踪將 撤銷。 接下來,參看圖2來解釋包裹(資產)遞送之具體實例, 其中,T表示時間,元件符號201表示前向追踪,元件符 號203表示中央單元107進行之追踪,且元件符號205表 示回溯追踪。 首先,由非受信任的來源準備好包裹101。換言之,啟 動追踪模組103。此事件對應於圖2中之CP)。歸因於tfO, 僅公開實際位置,亦即,CP!被定義為非受信任的。包裹 101接著到達第一個處置中心(亦被稱作配送中心)。此事件 對應於CP2。CP2係基於地理柵攔而定義,且被視為可信任 的(t2>〇)。自此點起,啟用前向追踪,持續時間為t2。然而, 歸因於非受信任的CPJtfO),返回至CPii回溯追踪不可 為使用者所用(亦即,在使用者終端機109上為不可用)。 一旦t2流逝,便歸因於安全原因而不讓使用者使用追踪, 因為,無法知道追踪模組103是否丟失、被偷、或以任何 方式被濫用。S 12 201224960 can disclose asset tracking paths to customers. Past tracking information can be revealed each time the device passes other known checkpoints, and further tracking can be possible during a certain time period. As explained above, the availability of tracking information to the user depends on the timer value. At some point, the asset passes its last known trusted checkpoint. As the timer value has elapsed, after a given time tn, the tracking will be revoked for the user. Next, a specific example of parcel (asset) delivery will be explained with reference to Fig. 2, where T represents time, component symbol 201 represents forward tracking, component symbol 203 represents tracking by central unit 107, and component symbol 205 represents backtracking. First, the parcel 101 is prepared by an untrusted source. In other words, the tracking module 103 is activated. This event corresponds to the CP in Figure 2. Due to tfO, only the actual location is exposed, ie, CP! is defined as untrusted. Parcel 101 then arrives at the first disposal center (also known as the distribution center). This event corresponds to CP2. CP2 is defined based on geographic barriers and is considered trusted (t2>〇). From this point on, forward tracking is enabled for a duration of t2. However, due to the untrusted CPJtfO), returning to CPii backtracking is not available to the user (i.e., not available on the user terminal 109). Once t2 has elapsed, the user is not allowed to use the tracking for security reasons because it is impossible to know if the tracking module 103 is lost, stolen, or abused in any way.

100126741 13 201224960 一旦已到達第二個配送中心(亦即,Γρ、, w田於t3>〇,便 再次啟用前向追踪,而且’歸因於Cp盘 之間的受信 任關係(t3>0且t2>0),回溯追踪為可用的。在 、 h已流逝之 前,到達第三個配送中心,亦即,Cp4。此處,姓 明、✓主意,一 旦到達了 CP4而t;3尚未期滿’則此未必意謂著在已】達 之後使用者可追踪尚未流逝的時間。尚未流逝的定時2 被下一個值t5覆寫。使用者對此追踪資訊之可存取丨生° 決於⑺之定時ϋ數值⑹。但由於㈣,前向取 而回溯追踪不適用。 在t»期滿之前,到達第四個配送中心,亦即, 九 謂著’使用者可即時地追踪CP4# CP5之間的整T 2 ❿為最後—個配送中心,而且,追踪將繼續直至 為止一旦t5已流逝’便不再向使用者展示追踪資^^ 中央早元107仍繼續對包裹101之追踪。 CP6為此實例中之最後一個檢查 ,,,而且’ 一按下追踪 之停止餘,便到達此檢查點。向使 際位置’但,歸因於㈣(CP6並非受信任的),前向追踪及 回溯追踪為不可用。 在上述實例中,定時器數值及檢查點由運作遞送網路(亦 P負貝配送中心)的業者或服務提供商來定義。可基於對 包^到達下—個檢查點(在此實例中為遞送中心)的瞭解, 來定義定時H數值。舉例而言,若預期包相達下一個檢 14 100126741 201224960 查點要花費長時間,則給予相對高的定時器數值。然而, 其應足夠低到保證在濫用之情況下關閉服務。 為了進—步說明郵政貨運情形,吾人可參看圖3之簡化 流程圖來說明包裹1G1可採取國⑽線或_路線之情 形。在下文所解釋之實例中,數值僅為例示性的,但亦可 以眾多的其他方式來加以選擇。 在步驟301中,客戶將追踪模組103放入其包裹101中, 且啟動追踪模組103。接著, 客戶在郵局郵寄出包裹。在 包袤101到達第一個配送中 ^ 第一個已知的受信任檢查點) 之刖,他無法看到追踪資訊, 除了他啟動追踪模組103時 所處的第一個點之外。在步驟 力驟303中,包裹101到達定時 器數值成為12個小時的配送中 心甲%。當包袤101可到達新的 配送中心時,此步驟可重複許多次。—旦已到達配送中心, 便在至多12個小時内向使用本从山,, π使用者終端機109揭示追踪資訊 (前向追踪)。在步驟305中,包裹ΗΠ到達其最終目的地, 且因此’與此檢查點相關聯的定時器數值成為0。追踪服 務被撤銷’而且’追踪模組1〇3被關閉。 在步驟303之後’在步驟3〇7中,亦可繼續追踪過程。 在此步驟307中,包裹ΗΠ已經過定時器數值成為以個小 時的國際樞紐。國内及國際貨運之處置稍有不同。在一國 家中國際配送中心之位置可能為未知的,在此種情況下, 整個國家充當-個受信任檢查點。因此,包裹ι〇ι至少在 100126741 15 201224960 到達受客戶追踪的。 在步驟309中,包裹到 i達又時器數值設定為5個工作 的新國蒙。此意謂著,允 凡》午客戶進行至多5個工作日之前 向追踪。當包裹101可谁λ此t J連入新的國家時,此步驟可重 多次。在步驟309之後,兮 ° 5亥過程亦可在步驟303中繼續。 最後’包裹到達其最終目的地(步驟305)。 圖4展示㈣根據本翻之追踪方法❹1程圖。首 先,在步驟備中,中央單元⑽定義了針對追踪模組1〇3 之心查點亦疋義了最後—個檢查點。此檢查點可對應於 (例如)關閉追踪模組103。在步驟4〇3中,給予每一檢^ 一個定時器數值,且接著在步驟彻中,中央單元107開 始接收關於追踪模組1G3的位置資訊,此位置資訊允許; 央單元丨07跟縱追踪模組1〇3之路徑,且藉此跟縦待追踪 的物件101。在步驟406 Φ,+ a丄 b中在中央單元107上儲存位置 資訊。 、在步驟術中’狀與CPn i拍關聯的料器數值是否期 若回應為否㈣’則在步驟物中基於與此檢查點 (…)有關的定時器數值來向客戶揭示位置資訊,如同上 文所解釋。若定時器數值大於零,則允許即時追踪。另一 方面’若t等於零’則僅向使用者揭示檢查點(d)之位置。 在步驟411巾,判定當前檢查點(CIV0是否為最後-個 檢查點H财將其他轉資簡供至❹者,且可 100126741 201224960 終止追踪。因此,在步驟413中,對追踪模組103撤銷啟 動,亦即,關閉或最終耗盡電池。另一方面,若當前檢查 點(CP^)並非最後一個檢查點,則在步驟407中繼續該過 程。 若在步驟407中,判定與當前檢查點(CP^)有關的定時 器數值為期滿,則在步驟415中判定是否到達下一個檢查 點(CPn)。若回應為否定的,則在步驟405中繼續該過程。 另一方面,若回應為肯定的,則在步驟417中,判定是否 可回溯地向使用者揭示追踪資訊。如上文所解釋,對於在 步驟419中向使用者揭示隱藏的路徑,與CP^及CPn有關 的定時器數值必須均大於零。自步驟419開始,在步驟409 中繼續此過程。另外,若在步驟417中判定不可向使用者 揭示隱藏的路徑,則在步驟409中繼續此過程。 本發明同樣係關於一種控制系統107,諸如,能夠實施 上文所描述方法的中央單元107。以下情形亦為可能的: 藉由另一個追踪系統元件來實施該方法,或者,該等方法 步驟中之一些係由中央單元107所執行,而且,該等方法 步驟中之一些係由另一個元件所執行。 本發明亦係關於一種包含指令的電腦程式產品,而該等 指令係用於在控制系統(諸如,能夠實施該方法的中央單元 107)之電腦構件上載入並執行時實施上文所描述方法的步 驟。 r: 100126741 17 201224960 雖然已在圖式及前述說明巾詳細地例示及描述了本發 明,但此說明及描述將被視為朗性或例示性而非限制 的’本發明不限於所揭示之具體例。熟習此項技術者應理 解’基於對圖式、揭示内容及所附申請專利範圍之研究, 在實打所主張發明時可達成其他具體例及變體。舉例而 言,檢查點及相關的定時器數值不必由中央單元107定 義’而是在網路中可存在處理此等操作之一個或若干個其 他元件。 〃 在申請專利範圍中,「包含」—詞不排除其他以牛或步 驟’而且,不定冠詞、或an」之使用不排除複數之情形。 單的處理器或其他單元可完成申請專利範圍中所述之若 干項目之功能。不同特徵敍述於相互不同的附屬項中的簡 單事實,並不表示無法有利地使用此等特徵之組合。申請 專利範圍中之任何元件符號不應被理解為限制本發明之範 【圖式簡單說明】 圖/1為根據本發明所描述具體例之可應用本發明教示的 追踪系統之簡化網路方塊圖。 圖2為說月根據本發明所描述具體例之追踪方法的時間 線圖。 圖3為說明根據本發明所描述具體例之追踪方法的流程 100126741100126741 13 201224960 Once the second distribution center has been reached (ie, Γρ,, w田在t3>〇, forward tracking is enabled again, and 'attributed to the trusted relationship between Cp disks (t3>0 and T2 > 0), backtracking is available. Before, h has passed, arrive at the third distribution center, that is, Cp4. Here, the last name, ✓ idea, once reached CP4 and t; 3 has not expired 'This does not necessarily mean that the user can track the time that has not passed since the arrival. The timing 2 that has not yet passed is overwritten by the next value t5. The user can access the tracking information according to (7) The timing value is (6). However, due to (4), forward tracking and backtracking are not applicable. Before the expiration of t», the fourth distribution center is reached, that is, the nine means that the user can immediately track the CP4# CP5. The entire T 2 ❿ is the last distribution center, and the tracking will continue until the t5 has passed. Then the user will not be shown the tracking information. ^ Central Early Yuan 107 will continue to track the package 101. CP6 is The last check in this example, and, and The checkpoint is reached and the checkpoint is reached. To the intervening position 'But, due to (4) (CP6 is not trusted), forward tracking and backtracking are not available. In the above example, the timer value and The checkpoint is defined by the operator or service provider of the operational delivery network (also known as the delivery center). The timing can be defined based on knowledge of the packet arriving at the next checkpoint (in this case, the delivery center). The value of H. For example, if the expected phase of the packet is taken to the next inspection, it will take a long time to give a relatively high timer value. However, it should be low enough to ensure that the service is shut down in case of abuse. In order to further explain the postal cargo situation, we can refer to the simplified flow chart of Figure 3 to illustrate the case where the package 1G1 can take the national (10) line or the _ route. In the examples explained below, the values are only illustrative, but also The selection can be made in a number of other ways. In step 301, the customer places the tracking module 103 in their package 101 and activates the tracking module 103. The customer then mails the package at the post office. In the vast package 101 to reach the first delivery in the first known ^ cut off the feet trusted checkpoint), he can not see the track information, in addition to his first point to start tracking module 103 is located. In step 303, the parcel 101 arrives at the timer value for a 12 hour delivery center. This step can be repeated many times when the package 101 can reach the new distribution center. Once the distribution center has arrived, the tracking information (forward tracking) will be revealed to the user using the slave, the π user terminal 109 for up to 12 hours. In step 305, the parcel arrives at its final destination, and thus the timer value associated with this checkpoint becomes zero. The tracking service was revoked 'and' the tracking module 1〇3 was closed. After step 303, in step 3〇7, the tracking process can also be continued. In this step 307, the parcel has passed the timer value to become an international hub for an hour. The disposal of domestic and international shipments is slightly different. The location of an international distribution centre in a country may be unknown, in which case the entire country acts as a trusted checkpoint. Therefore, the package ι〇ι arrives at least at 100126741 15 201224960 and is tracked by the customer. In step 309, the package is sent to the new time and the value of the timer is set to 5 jobs. This means that the customer will track up to 5 working days before the afternoon. This step can be repeated several times when the package 101 can be connected to a new country. After step 309, the process may continue in step 303. Finally the package arrives at its final destination (step 305). Figure 4 shows (4) according to the tracking method of this turn. First, in the step preparation, the central unit (10) defines the checkpoint for the tracking module 1〇3 and also the last checkpoint. This checkpoint may correspond to, for example, turning off the tracking module 103. In step 4〇3, each timer value is given, and then in the step, the central unit 107 starts to receive the position information about the tracking module 1G3, and the position information is allowed; the central unit 丨07 and the vertical tracking The path of the module 1〇3, and thereby the object 101 to be tracked. The location information is stored on the central unit 107 in steps 406 Φ, + a丄 b. In the step of the procedure, if the value of the hopper associated with the CPn i shot is negative (4), then the position information is revealed in the step based on the timer value associated with the checkpoint (...), as above. Explained. If the timer value is greater than zero, immediate tracking is allowed. On the other hand, 'if t is equal to zero', the position of the checkpoint (d) is only revealed to the user. In step 411, it is determined whether the current checkpoint (CIV0 is the last checkpoint H, the other transfer funds are provided to the latter, and the tracking can be terminated by 100126741 201224960. Therefore, in step 413, the tracking module 103 is revoked. Startup, that is, shut down or eventually drain the battery. On the other hand, if the current checkpoint (CP^) is not the last checkpoint, then the process continues in step 407. If in step 407, the decision is made with the current checkpoint. (CP^) The relevant timer value expires, then it is determined in step 415 whether the next checkpoint (CPn) is reached. If the response is negative, the process continues in step 405. On the other hand, if the response is To be sure, then in step 417, it is determined whether the tracking information can be revealed back to the user. As explained above, for the hidden path to the user in step 419, the timer values associated with CP^ and CPn are Both must be greater than zero. Beginning at step 419, the process continues in step 409. Additionally, if it is determined in step 417 that the hidden path cannot be revealed to the user, then the process continues in step 409. The invention is also directed to a control system 107, such as a central unit 107 capable of implementing the methods described above. It is also possible to implement the method by another tracking system component, or in the method steps Some are performed by the central unit 107, and some of the method steps are performed by another component. The invention also relates to a computer program product containing instructions for use in a control system ( The steps of the method described above are carried out, for example, on a computer component of a central unit 107) capable of implementing the method. r: 100126741 17 201224960 Although the drawings and the foregoing description have been illustrated and described in detail herein. The present invention is to be considered as illustrative or not restrictive, and the invention is not limited to the specific examples disclosed. It is understood by those skilled in the art that the present invention is based on the drawings, disclosures, and accompanying applications. The study of patent scope can achieve other specific examples and variants when actually claiming the invention. For example, checkpoints and related timing The value does not have to be defined by the central unit 107' but there may be one or several other elements in the network that handle such operations. 〃 In the scope of the patent application, "include" - the word does not exclude other cattle or steps 'and, The use of the indefinite article or "an" does not exclude the plural. The single processor or other unit can perform the functions of several items described in the scope of the application. The different features are described in the simple facts of the different items, and It is not intended to be advantageous to use any combination of the features. Any element in the scope of the claims should not be construed as limiting the scope of the invention. FIG. 1 is applicable to the specific examples described in accordance with the present invention. A simplified network block diagram of the tracking system taught by the present invention. Fig. 2 is a time-line diagram showing a tracking method of a specific example according to the present invention. 3 is a flow chart illustrating a tracking method according to a specific example described in the present invention 100126741

S 18 201224960 圖4為說明根據本發明所描述旦體 流程圖。 【主要元件符號說明】 例之追踪 方法的另 101 103 105 107 109 201 物件;包裹;S 18 201224960 Figure 4 is a flow chart illustrating the denier described in accordance with the present invention. [Explanation of main component symbols] Example of tracking method 101 103 105 107 109 201 Object; parcel;

追細模組;追释單元 蜂巢式通信*** 控制系統;中央單元 第三方系統;(客戶、 前向追踪 使用者)終端機 203 205 中央單元107進行之追踪 回溯追踪 時間;定時器數值 CP、CPrCP6、CPn、CPn+1 檢查點 301、303、305、307、309追踪方法流程步驟 401、403、405、406、407、409、411、413、415、417、419 追踪方法流程步驟 T 時間 C' 100126741 19Chasing module; chasing unit honeycomb communication system control system; central unit third party system; (customer, forward tracking user) terminal 203 205 central unit 107 tracking backtracking time; timer value CP, CPrCP6 , CPn, CPn+1 checkpoints 301, 303, 305, 307, 309 tracking method flow steps 401, 403, 405, 406, 407, 409, 411, 413, 415, 417, 419 tracking method flow step T time C' 100126741 19

Claims (1)

201224960 七 、申請專利範圍: 1二種—物件追踪㈣㈣踪物件(間之方法,該物 4包含:連接至待追踪物件(1G1)的追踪模組 二Γ系統(1。7)、及第三方系統(1°9),此方法包含由 控制糸統(10乃執行之以下步驟: 定義針對物件_)之檢查點(CP2;CP3)(401); 定義用於至少某些檢查點(Cp2定時 (403) ; 、 3’ 接收關於追踪模組(1〇3)之位置資訊,而藉由控制系統 (1〇7)以追踪物件(1〇1)所行進之路後⑽);及 僅在與第-檢查點(〇&gt;2)有_定時器數值期滿之前,向 第方系統(1 〇9)揭不在物件(i 〇 1)到達第二檢查點仰3)之 前於第-檢查點離第二檢查點(CP3)之間的路徑 (409)。 2·如申請專利範圍第1項之方法,其中進-步包含:-旦师㈢達第二檢查點(CP3),在與第—檢查點(CM有關 、—夺器』滿之後,僅在與第二檢查點(C?3)有關的定時器 J二且與第一檢查點((^有關的定時器大於零時,才 允_第三方系統⑽)回溯地追踪物件(101)(419)。 3·如申請專利範圍第i項之方法,其中,在與第一檢查 點奶)有關的定時器數值期滿之前,允許該第三方系統 (109)實質上即時地追踪物件(1〇1)。 100126741 20 201224960 4. 如申請專利範圍第 員之方法,其中,自開啟追踪模 、,且(川3)之時刻起,直至 踪槿袓關閉追%模組(103)為止,或直至追 %楨組(103)耗盡電池為 马止,戎追踪模組(103)之位置資訊皆 可為該控制系統(1〇7)所用。 5. 如申請專利範圍 點㈣有關的定時器數值::方法’其中’若與第-檢: 二檢查购之間,僅二”1在第-檢查點(㈤與: 點㈣之位置,作不椹^方系統(109)揭示第一檢查 似)之間的路徑。 第1查點(CP2)與第二檢查點 6. 如申請專利範圍第 檢查點(CP6)有關的定心方法’其中’若與最後一個 ., h數值㈣,則該最後-個檢查點 (1尸6)之位置為向該第二 ^ —万糸統(109)揭示的最後的位置資 sfl。 7. 如申請專利範圍第1 員之方法,其中,若與最後一個 檢查點(叫有關的定時器數值為零,則不向該第:方夺统 σ〇·不,在與前-個檢查點(a)有_定時_期滿 之後,在知後—個檢查點(⑶)與前-個檢查點(CP5)之間 由物件(101)所行進的路徑。 8·如申請專利範圍第丨至7财任—項之方法,其中, 右物件(101)滿足與特定檢查點(cp)有關的至少—個給定條 件,則該物件(101)被視為已到達此特定檢查點(cp)。 9.如申請專利範圍第8項之方法,其中,該給錢件為 100126741 21 201224960 以下各者中之至少一者:物件〇〇1)進入經定義的地理區 域、物件(101)離開經定義的地理區域、物件(1〇1)在給定時 間内在經定義的地理區域内部為不動、物件(謝)在給定時 間内移動、物件_)經受振動、物件⑽)經受加速、物件 (ιοί)之溫度到達給定值、物件(1〇1)之使用者執行給定的動 作偵測到來自另-系統的事件、偵測到物件(仙)之周邊 上的事件、及偵測到基於商業邏輯的事件。 10. 如申請專利範圍第W之方法,其中,該位置資訊係 基於以下各者巾之至少-者:蜂巢式通料統(1G5)、衛星 定位系統、射頻識別、及無線區域網路。 11. 如申請專利範圍第W之方法’其中,至少一個參數 值與該等至少S些檢查點(〇&gt;2; 〇&gt;3)為相關聯,而且,用 於該等至少某些檢查點(CP2 ; Cp3)的定時器數值(t2 ; t相 基於該至少一個參數值而定義的。 “ 12. 如申請專利範圍第U項之方法,其中,該至少〜匈 參數值為檢查點(CP)之信任級別。 13·-種包含指令的電腦程式產品,該等指令係用於在趣 制系統(107)之電腦手段上載入及執行時,實施前述申靖專 利範圍中任一項之方法之步驟。 14. 一種用於追踪物件(101)之物件追踪系統的控制*** (107),此控制系統(107)包含以下功能手段: 定義針對物件之檢查點; 100126741 22 201224960 定義用於至少某些檢查點(CP2 ; CP3)之定時器數值; 接收關於連接至物件(101)的追踪模組(103)的位置資 訊,而藉由控制系統(107)以追踪物件(101)所行進之路徑; 及 僅在與第一檢查點(CP2)有關的定時器數值期滿之前,向 第三方系統(109)揭示在第一檢查點(CP2)與第二檢查點 (CP3)之間、且在物件(101)到達第二檢查點(CP3)之前物件 (101)所行進之路徑。 15.—種包含申請專利範圍第14項之控制系統(107)的物 件追踪系統。 100126741 23201224960 VII. Patent application scope: 1 - Object tracking (4) (4) Trace object (the method of 4): The tracking module connected to the object to be tracked (1G1), the tracking system (1. 7), and the third party System (1°9), this method consists of a checkpoint (CP2; CP3) (401) controlled by the control system (10 is the following steps: defined for object_); defined for at least some checkpoints (Cp2 timing) (403); , 3' receives the position information about the tracking module (1〇3), and the tracking system (1〇1) follows the path (10) by the control system (1〇7); Before the expiration of the _ timer value with the first checkpoint (〇>2), before the first system (1 〇9) reveals that the object (i 〇1) reaches the second checkpoint (3) before the first check Point the path (409) between the second checkpoint (CP3). 2. If the method of claim 1 is applied, the further step includes: - (1) the second checkpoint (CP3), after the first checkpoint (CM-related, - the device is full), only The timer J2 associated with the second checkpoint (C?3) and the first checkpoint (when the timer associated with ^ is greater than zero, the third-party system (10) is allowed to trace back the object (101) (419) 3. The method of claim i, wherein the third party system (109) is allowed to track the object substantially instantaneously before expiration of the timer value associated with the first checkpoint milk (1) 1). 100126741 20 201224960 4. The method of applying for the patent Scope, in which the tracking mode is turned on, and (from 3), until the tracking closes the % module (103), or until The chasing %桢 group (103) runs out of batteries, and the position information of the tracking module (103) can be used by the control system (1〇7). 5. The value of the timer related to the patent application point (4) :: Method 'where' if and the first - check: between the two inspections, only two "1" at the first - checkpoint ((5) and: point (four) position The path between the first check and the other check system (109) reveals the first checkpoint (CP2) and the second checkpoint 6. The centering method related to the checkpoint (CP6) of the patent application scope 'Where' with the last one, h value (four), then the position of the last checkpoint (1 corpse 6) is the last position sfl revealed to the second 糸 糸 (109). For example, in the method of applying for the first part of the patent scope, if, if it is the same as the last checkpoint (the timer value associated with the call is zero, then the first: the square is not σ〇·No, at the previous checkpoint ( a) After the _timing_expiration, the path traveled by the object (101) between the checkpoint ((3)) and the previous checkpoint (CP5) is known. The method of claim 7 wherein the right object (101) satisfies at least one given condition associated with a particular checkpoint (cp), the object (101) is deemed to have reached the particular checkpoint (cp) 9. The method of claim 8, wherein the money is 100126741 21 201224960 at least one of: one of the objects: 1) Into the defined geographical area, the object (101) leaves the defined geographical area, the object (1〇1) is not moved within the defined geographical area at a given time, the object (thanks) moves within a given time, the object _) subject to vibration, object (10)) subjected to acceleration, temperature of object (ιοί) reaching a given value, user of object (1〇1) performing a given action to detect an event from another system, detecting an object Events on the periphery of (Sin) and detection of events based on business logic. 10. The method of claim No. W, wherein the location information is based on at least one of the following: a cellular communication system (1G5), a satellite positioning system, a radio frequency identification, and a wireless local area network. 11. The method of claim </ RTI> wherein at least one parameter value is associated with the at least one of the check points (〇 &gt;2; 〇 &gt; 3) and, for, at least some of the checks The timer value of the point (CP2; Cp3) (t2; the t phase is defined based on the at least one parameter value. " 12. The method of claim U, wherein the at least the Hungarian parameter value is a checkpoint ( The trust level of CP). 13. A computer program product containing instructions for the execution of any of the aforementioned Shenjing patents when loaded and executed on the computer system of the system of interest (107). The method of the method 14. A control system (107) for tracking an object tracking system of an object (101), the control system (107) comprising the following functional means: defining a checkpoint for the object; 100126741 22 201224960 defined for At least some of the checkpoints (CP2; CP3) timer values; receive location information about the tracking module (103) connected to the object (101), and track the object (101) by the control system (107) Path; and only in Before the expiration of the timer value associated with the first checkpoint (CP2), the third party system (109) is revealed between the first checkpoint (CP2) and the second checkpoint (CP3), and the object (101) arrives. The path traveled by the object (101) before the second checkpoint (CP3) 15. An object tracking system containing the control system (107) of claim 14 of the patent scope 100126741 23
TW100126741A 2010-10-05 2011-07-28 Object tracking TW201224960A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CH2010/000242 WO2012045181A1 (en) 2010-10-05 2010-10-05 Object tracking

Publications (1)

Publication Number Publication Date
TW201224960A true TW201224960A (en) 2012-06-16

Family

ID=44201863

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100126741A TW201224960A (en) 2010-10-05 2011-07-28 Object tracking

Country Status (2)

Country Link
TW (1) TW201224960A (en)
WO (1) WO2012045181A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372335A1 (en) * 2013-06-18 2014-12-18 International Business Machines Corporation Cooperative Path Tracking

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200421142A (en) * 2003-04-11 2004-10-16 Hon Hai Prec Ind Co Ltd Cargo auto tracking system and method
FR2859792B1 (en) * 2003-09-17 2006-06-02 Nextenso METHOD FOR DETECTING THE PRESENCE OR ABSENCE OF A MOBILE TERMINAL ON A PATH
GB2410850A (en) * 2004-02-03 2005-08-10 Michael Fish Means for tracking a person undertaking a journey
US20090102659A1 (en) * 2007-09-24 2009-04-23 Savi Technology, Inc. Method and Apparatus for Tracking and Monitoring Containers

Also Published As

Publication number Publication date
WO2012045181A1 (en) 2012-04-12

Similar Documents

Publication Publication Date Title
US11720848B2 (en) Location-based pick up and delivery services
US10750894B2 (en) Integrated package and mail delivery security system
US20220188764A1 (en) Determining a delivery location and time based on the schedule or location of a consignee
CN107533691B (en) Secure location based events and notifications
US6362736B1 (en) Method and apparatus for automatic recovery of a stolen object
US11490754B2 (en) Integrated package and mail security system implementing enriched customer and delivery service capabilities
US20070229350A1 (en) Apparatus and Method for Providing Location Information on Individuals and Objects using Tracking Devices
US20140082099A1 (en) Misplaced mobile device notifications based on rightful user&#39;s social networking information
JP5250455B2 (en) Terminal device monitoring system
JP2010211412A (en) Terminal equipment monitoring system
US20180039941A1 (en) System and method for tracking a container
JP2007164486A (en) Information report unit
JP2005175896A (en) Portable communication terminal
TW201224960A (en) Object tracking
US10896402B2 (en) Short-range wireless determination of a vehicle&#39;s asset inventory