WO2019143734A1 - Improvements to supply chain security - Google Patents

Improvements to supply chain security Download PDF

Info

Publication number
WO2019143734A1
WO2019143734A1 PCT/US2019/013866 US2019013866W WO2019143734A1 WO 2019143734 A1 WO2019143734 A1 WO 2019143734A1 US 2019013866 W US2019013866 W US 2019013866W WO 2019143734 A1 WO2019143734 A1 WO 2019143734A1
Authority
WO
WIPO (PCT)
Prior art keywords
transport case
case
antenna
lid
processor
Prior art date
Application number
PCT/US2019/013866
Other languages
French (fr)
Inventor
Robert Joseph ZANGHI
Original Assignee
Zanghi Robert Joseph
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zanghi Robert Joseph filed Critical Zanghi Robert Joseph
Publication of WO2019143734A1 publication Critical patent/WO2019143734A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C19/00Electric signal transmission systems

Definitions

  • Certain prescription drugs, controlled substances, medical device, and other high- value materials may be vulnerable to theft or tampering, particularly during transportation. While material distribution centers, hospitals, and pharmacies likely have security systems in place for high value materials, it may be difficult to secure the chain of custody for materials between those locations and a destination, such as a smaller medical facility or a receiving patient. Opioids are particularly vulnerable to theft due to their street value and the current high and growing rates of opioid addiction.
  • At least one aspect of the disclosure relates to a system for securing chain of custody of materials.
  • the system includes a transport case and a remote server.
  • the transport case includes a case body having a closable lid and a lock configured to secure the lid in a closed position, and release the lid upon matching a received input to a stored key.
  • the transport case includes a sensor configured to sense a state of the lid, a radio-frequency (RF) confinement layer enclosing an interior of the transport case when the lid is closed, a first antenna for transmitting and receiving first wireless signals to and from the transport case, a second antenna for transmitting and receiving second wireless signals to and from one or more RFID-tagged items contained within the transport case, and a processor.
  • RF radio-frequency
  • the processor is coupled to the lock, the sensor, the first antenna, and the second antenna ⁇
  • the processor is configured to obtain the stored key and provide it to the lock and detect the items contained within the transport case using the second antenna.
  • the processor is configured to transmit, using the first antenna, an inventory of the detected items and an event notification based on the sensor sensing a change in the state of the lid.
  • the remote server is configured to provide, to the transport case, the stored key corresponding to an individual granted access to the transport case.
  • the remote server is configured to receive the inventory and the event notification from the transport case.
  • the remote server is configured to update a database based on the inventory and the event notification received from the transport case.
  • the remote server is configured to provide a record of chain of custody of the items contained within the transport case.
  • FIG. 1 is an overall system view in accordance with embodiments of the present technique
  • FIG. 2 A shows the inside of an opened transport case
  • FIG. 2B shows details of the inner surface of the back panel of said opened transport case
  • FIG. 2C shows details of the outer surface of the front panel of said opened transport case.
  • FIG. 3A is a schematic view of the inside of the bottom of the body of the opened transport case depicted in FIG. 1, highlighting aspects of the RF isolation;
  • FIG. 3B is a section through the side of such a transport case as depicted in FIG.
  • FIG. 4 is a diagram depicting the flow of material objects and data objects throughout the system
  • FIG. 5 is a photograph of an example transport case, as reduced to practice, accompanied by a mobile terminal, in accordance with embodiments of the present technique, and shown schematically in FIG. 1 ;
  • FIG. 6 is a photograph of said transport case shown in FIG. 5, with packing inset removed to show several components as depicted schematically in FIGs. 2A-2C.
  • FIG. 7 is a photograph of said transport case shown in FIG. 5, with the lid pocket sheet (lid inset) partially removed thereby highlighting the mounting of the antenna to the inner surface of the top of the lid;
  • FIG. 8 shows said transport case shown in FIG. 5, closed and ready for travel, in transit, or ready to be opened at the destination, or origin point, and highlighting the front panel status display;
  • FIG. 9A shows the design of an example patch antenna with dimensions (all dimensions are in mm);
  • FIG. 9B shows a photograph of the example patch antenna as constructed out of copper foil applied to“plastic corrugated cardboard” with attached micro coaxial cable;
  • FIG. 9C shows the results of a simulation of the example antenna as designed
  • FIG. 9D shows the results of the fabricated antenna as measured for the initial state (Red Curve) and then as tuned to be more congruent with the operational band (Blue Curve);
  • FIG. 10A shows a plot of a framework of a box used in a simulation of a transport case
  • FIG. 10B shows results of a simulation of RF Fields present within the transport case volume with the bottom antenna energized (contour plot of electric field on the midplane of the box);
  • FIG. 10C shows results of a simulation of RF fields present within the transport case volume with a left sidewall antenna energized (contour plot of electric field on the midplane of the box).
  • FIG. 11 is a block diagram of a computing system suitable for implementing the systems and components described herein. DETAILED DESCRIPTION
  • Embodiments of this disclosure can help combat this challenging societal scourge through assuring the verified, authenticated, and tracked end-to- end chain of custody of shipments of opioids and other narcotics from the point of origination to the point of deployment or utilization.
  • a shipment of high-value materials such as opioids or other controlled substances or materials can be verified and monitored through the use of a self-scanning transport case employing RFID and communications technology combined with a cloud-based globally accessible enterprise-level resource management platform.
  • the chain of custody can be secured through the combination of external, and internal surveillance coupled to self- contained transport case-based biometrics, and other authentication of the people involved in handling the transport case, and its contents all the way from packing to the deployment to, or by the end user.
  • This disclosure relates generally to methods for identifying objects, and people, and systems primarily used for commerce.
  • Embodiments of the disclosure can harness the ubiquity of the cloud to bind together what are commonly disparate technologies of biometric identification of people with radio frequency-based identification of objects.
  • the system disclosed can deliver a seamless, continuous verifiable means of tracking a valuable shipment from the hand which dispatches it to the hand which ultimately receives the shipment.
  • RFID tags are commonly employed for tracking, inventorying of garments in distribution centers, verifying high value shipments, locating, classification, identification of pallet loads in warehouses. For these, and many other applications, standardized, low-cost passive RFID tags are ideal. In the context of this document RFID systems comprise RFID tags, readers, antennas; other connected devices, and linked digital databases.
  • Biometrics such as but not limited to (wearable tech) fingerprints, palm prints, facial, iris, retinal or voice through their unique nature provide a robust means of identifying humans. They are commonly used in concert with pass codes, and/or RF, or optically read badges to control access to physical locations, or electronically stored information.
  • communications technologies such as but not limited to 5G networking, which would be helpful in situations requiring real time video with minimal latency, such as telemedicine, remote surgery, diagnostics, etc.
  • RFID techniques are superior to traditional identification technologies such as universal product code (UPC) bar codes primarily because of the ability of RFID tags to be read in non-line-of-sight situations, many to be read at once, and the capability of the RFID tags to provide item-level identification.
  • UPC universal product code
  • RFID technologies provide a unique ID, as well as the non-static nature of their security features, and their cryptographic resistance against cloning.
  • Embodiments of the disclosure can help combat the opioid crisis, and other similar challenging societal problems, through assuring the verified, authenticated and tracked end-to-end chain of custody of shipments of opioids, other narcotics, and other prescription medications from the point of origination to the point of deployment, or utilization.
  • Embodiments of the disclosure can incorporate RFID, biometric, and cloud technologies to insure the trusted transfer of high value materials, such as medications, and medical equipment. Simultaneously, the system assures the verification of the shipment contained within the transport case, and the personnel handling, sending, transporting, and receiving the shipment end-to-end, seamlessly.
  • the shipment’s contents are verified, and monitored through the use of a self scanning transport case employing conventional RFID, and communications technology combined with a cloud-based globally accessible enterprise-level resource management platform.
  • the chain of custody is assured through the combination of external, and internal surveillance coupled to self-contained case-based biometrics, and other authentication of the people involved in handling the transport case, and its contents all the way from packing to the deployment to, or by the end user.
  • the delivery agent would release the shipment to the intended recipient on the word, and possibly the signature of the recipient.
  • the transport case carries with it all the necessary means, excepting the services provided by the cloud.
  • Connectivity refresh with the cloud can be“event driven” such as (but not limited to): during, or immediately after hand offs; internal or external alarms; changes of internal status; and reestablishment of connectivity after a connection interruption.
  • Event driven such as (but not limited to): during, or immediately after hand offs; internal or external alarms; changes of internal status; and reestablishment of connectivity after a connection interruption.
  • Embodiments of the disclosure can enable the sender, the delivery agent, and the recipient to all separately enroll themselves manually or automatically through biometric terminals, or existing external services such that they are known biometrically to the cloud, and through the cloud to the transport case.
  • the self-realizing transport case knows its current contents through the use of an intrinsic RFID reading system, and RFID tagged contents.
  • the list of the transport case’s current contents as well as the original packing list (i.e., a pack plan) is accessible through the cloud-based globally accessible enterprise-level resource management platform to anyone granted authority to access the transport case’s status. Any change in the contents due to someone removing or adding something to the transport case is immediately known to the transport case, and to all those monitoring it.
  • Embodiments of the disclosure can handle anyone who doesn’t have the appropriate biometric, or alternative personal ID, who opens the transport case. Said person can be visually recorded along with the context of the surrounding environment. This information, possibly along with additional information such as GPS coordinates, etc., can be made known via the cloud-based globally accessible enterprise-level resource management platform to the appropriate parties.
  • FIG. 1 is an overall system view in accordance with embodiments of the present technique.
  • FIG. 1 depicts schematically the system functionality as consistent with the preferred implementation, and in the context of the hypothetical operational scenario. Note that none of the operational aspects in this figure, or its description are limiting to this, or any other implementation of the invention.
  • the challenge is to insure that the right pain pills get to the patient, and only to the intended user.
  • the Solution Transport the pills, and distribute them during the paramedic’s visit, thereby insuring that the narcotic substances reach their intended end-user via an end-to-end monitored, and reliable means of transportation. This can either be done by a certified specialty individual, or non-certified specialty individual.
  • the Hospital Pharmacy 255 prepares the prescription for pick-up by the Paramedical Tech, or other Registered Courier (Collectively Courier).
  • a Registered Courier is someone whose biometrics have been registered with the system, and are maintained in the cloud 150.
  • An authorized coordinator prepares the“Packing Plan” for the contents of the transport case 500, and the shipping route along with the designated registered couriers“Delivery Plan” updating all relevant cloud data.
  • the courier arrives at the Hospital Pharmacy 255, or other distribution point, and is verified through the system.
  • the courier’s image is captured, and verified by the transport case’s 500 external camera (not shown) using either locally or cloud-based facial recognition intelligence. This is similar to the use of facial recognition being used by the airlines for International flight boarding. If the courier has an ID badge it is scanned in conjunction with personal biometrics, and validated by the system. At the same time the contents of the transport case are scanned to insure that the correct prescriptions (not shown) have been picked-up from the pharmacy 255 by the correct person.
  • the cloud 150 maintains information on: the “Pack Plan” of the transport case 500; the“Routing Plan;”“Courier ID Biometrics,” and the correct Registered Courier has the correct case in hand with its correct contents. Access to this information is provided by the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155, also referred to in this document, and others as the Global System 155, without limiting the invention in any manner.
  • the transport case 500 is carried to the next transfer point or destination. If the transport case 500 is able to communicate with the Global System 155 via Wi-Fi® 239 or other means then the collected information is transferred. In the absence of a communication link, the Case Information (e.g., contents, internal and/or external parameters such as temperature or vibration, biometric data, local imagery or video, etc.) is archived with appropriate time stamp, accompanied by relevant metadata. All updated data will be transferred to the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155 at the next available opportunity.
  • the Case Information e.g., contents, internal and/or external parameters such as temperature or vibration, biometric data, local imagery or video, etc.
  • the transport case can communicate changes in internal or external status (to be described in detail subsequently) via links involving certified mobile communications networks such as provided through vehicles, or hand held devices carried by paramedics, or other certified personnel maintaining a private mobile hot spot.
  • certified mobile communications networks such as provided through vehicles, or hand held devices carried by paramedics, or other certified personnel maintaining a private mobile hot spot.
  • the transport case 500 is carried by the delivery person to the delivery vehicle 300 which is the first intermediate point (as depicted in FIG. 4, the data and material flow diagram).
  • the vehicle 300 with the transport case 500 travels to the residence 200, or rehab center not shown, etc.
  • the above trusted transfer of a fully verified case and its contents from one registered handler to another registered handler can be repeated as many times as is necessary to get the case from the initial loading point to the final destination point.
  • the transport case 500 Upon arrival at the point where the pills or injectable, etc., will be dispensed, the transport case 500 is removed from the vehicle 300, and hand carried to the patient, or other recipient of the medication, being delivered, etc. If so desired, constant communications can be maintained through either a link to the vehicle 300, a link to a cellular phone 400, or other means of communication carried by the paramedic or other registered delivery person, or via a direct global (e.g. satellite) link to the Global System 155. Said communications can provide the Cloud-based Globally Accessible Enterprise-level Resource Management Platform with a constantly updated position of the transport case 500, as derived from:
  • the prescription for example item 50 having an ID tag 60
  • the identity of the paramedic, or registered delivery person, and patient or other registered recipient are verified using biometrics and/or ID tags, and the transport case 500 is opened.
  • the data is collected via case-home (either internal or external) sensors, locally processed and/or transmitted to the Global System 155 for verification as per the shipment routing and delivery personnel plan (delivery plan) as maintained by the Global System 155.
  • the transport case 500 is closed and rescanned with the updated contents compared against the case pack plan (not shown) transmitted to the Global System 155 via appropriate means.
  • system level view 100 comprising a novel system identified collectively, but not limiting as system 100.
  • Said system provides for a hierarchical command & communications network, akin to the DOD’s Network-centric Command, and Control - enabling the global monitoring of, and communications with a local team whose nexus is one or more of a multiplicity of active transport cases identified collectively as 500.
  • a purpose of the system is to insure the trusted transfer of high value materials, such as but not limited to medications, and medical equipment, and/or other high value contents such as: gems, gold bars, processed silicon wafers, financial, or government documents, classified apparatus, works of art.
  • high value materials such as but not limited to medications, and medical equipment, and/or other high value contents such as: gems, gold bars, processed silicon wafers, financial, or government documents, classified apparatus, works of art.
  • FIG. 1 there is shown one embodiment of the system 100 formed in accordance with the present invention, and which incorporates:
  • Active transport cases 500 to be described in additional detail subsequently— providing Biometrically-based authenticated-custody of possession, and hand off combined with automated inventory of a multiplicity of high-value, sensitive, and/or mission-critical items; one of which is shown, and identified as 50;
  • Local terminal 400 such as a standard, or modified cellular phone, tablet computer, or the like, capable of communicating with the transport case 500, and other local terminals, supporting local apps, and further enabling access to more remote participants;
  • any number of vehicles of all manners where the Case is resident during a transport phase of the entire shipment process examples include, but are not limited to: van 300, taxi or other vehicle for hire, or public transport vehicle;
  • Any number of facilities, or locations where the transport case 500 is deposited, placed, or set at rest in its base location examples include, but are not limit to: a residence 200; a rehabilitation center, nursing home neither shown; hospital 250, pharmacy 255, pharmaceutical manufacturer, or distributor 270; or other source of drugs, vault or secure depository.
  • individual items 50 may have sensors attached to them which interface with the item’ s RFID tag 60, by such a means that the reading of the individual specially tagged item enables the monitoring of the sensor attached to each specially tagged item.
  • sensors can include, for example, but are not limited to: advanced RFID tags with temperature, and humidity senor capabilities can be attached to highly sensitive specialty drugs; detectors capable of determining whether a transport case 500 has been subjected to cooperative or uncooperative external surveillance such as by: equipment using x-rays, gamma rays, or cosmic ray muons at a customs or similar location.
  • sensors can be attached to the interior of the case body 520, and/or lid 540 to detect mission critical parameters, such as, but not limited to: temperature, vibration, shock acceleration, sound, air pressure, UV light, X-rays, etc.
  • mission critical parameters such as, but not limited to: temperature, vibration, shock acceleration, sound, air pressure, UV light, X-rays, etc.
  • case sensors may communicate directly with the case electronics by wires, fiber optics, free-space optics, or they may employ RFID technology similar to the specially tagged items 50.
  • devices such as GPS equipment can be attached to the exterior of the case, and said devices may communicate directly with the case electronics, or through the network.
  • the transport case 500 itself provides immediate, highly visible display of the“Go/No-Go”, or base status to proximate users through the use of LED or other types of lights 650 affixed to the exterior of the front panel 530 of the transport case 500.
  • An alternative means is by transmitting an immediate failed status to the system monitor application (“Sys-App”) 410 running on the Hand-held, or other local terminal 400 as indicated in FIG. 1.
  • the base status may be indicated by graphic displays, or other displays mounted on specialized panels attached, or integrated into fabric elements of the exterior of the transport case 500 much in the manner of wearable electronics.
  • the transport case 500 itself may indicate a failed base status by vibrating or ringing, similar to a cellular phone announcing the reception of a message.
  • the failed base status can be immediately communicated to a cellular phone or wearable device via cellular call, Wi-Fi®, or BLE (Bluetooth® low energy) with the failed base status indicated by vibration or unique ring-tone.
  • cellular call Wi-Fi®
  • BLE Bluetooth® low energy
  • a master status (ultimate status of the case) can incorporate: the presence/absence of items, any specific additional information on any of the specially tagged items 50, and additional information on the background conditions of the case itself.
  • specialty tagged items can report on the levels of liquids, or pressure of gas cylinders.
  • background information can include, but is not limited to: images, video, temperature, and pressure data, magnetic fields, nuclear radiation, vibration amplitudes, and frequencies, peak acceleration, and shock.
  • the transport case 500 can be used as local hub for data messages and/or data streams received from external sensors or systems such as but not limited to: wearable health monitors (e.g., Color Doctor Blood Pressure Wrist Band, Oura Ring, Zephyr BioHamessTM sensor), traditional portable medical devices commonly accompanying first responders (e.g., pulse oximeters, EKG, EEG), consumer medical monitors commonly used with a smart phone (e.g. AliveCor Kardia Mobile FDA- approved, medical grade EKG recorder) and scientific instruments such as scales, scanners, or meters.
  • wearable health monitors e.g., Color Doctor Blood Pressure Wrist Band, Oura Ring, Zephyr BioHamessTM sensor
  • traditional portable medical devices commonly accompanying first responders e.g., pulse oximeters, EKG, EEG
  • consumer medical monitors commonly used with a smart phone (e.g. AliveCor Kardia Mobile FDA- approved, medical grade EKG recorder) and scientific instruments such as scales, scanner
  • Still photographic, and/or video data can be incorporated into the master status data messages as provided by a multiplicity of internal, and external cameras.
  • One such camera 800 is shown here mounted to the body of the transport case rear panel 535.
  • Individual master status data messages, and / or real-time data streams are communicated back up the chain of command through the use of Bluetooth® low energy 425, Wi-Fi® 239, direct wideband cellular links such as LTE, 5G, IEEE 802.15, or similar RF communications equipment.
  • the communications can be by guided, or free-space optics means, or via said optics means combined with RF and/or wired means.
  • the Case 500 communicates the master case status, and other messages and data streams, via Bluetooth® low energy (BLE) 425 from an antenna 460, to a local terminal equipped with BLE apparatus 450, and hosting Sys-App 410.
  • BLE Bluetooth® low energy
  • the transport case 500 may use the antenna 460 to communicate directly with more remote sites, using means such as but not limited to: Wi-Fi® 239; Satellite Radio Links (e.g., Inmarsat). Although shown external to the transport case 500, the antenna 460 may be integrated with the computation module 620, and thus situated within the RF confinement layer. In such embodiments, the RF confinement layer can be designed to permit favorable passage of Bluetooth or Wi-Fi signals, while internally reflecting the RFID-reading signals. In some embodiments, the transport case 500 may employ other means of communicating via the Internet, as well as through cellular telephone, and/or specialized radio, or optical links.
  • Wi-Fi® 239 Satellite Radio Links (e.g., Inmarsat).
  • the antenna 460 may be integrated with the computation module 620, and thus situated within the RF confinement layer.
  • the RF confinement layer can be designed to permit favorable passage of Bluetooth or Wi-Fi signals, while internally reflecting the RFID-reading signals.
  • the transport case 500 may employ other means of communicating via the Internet, as well
  • Such remote monitoring sites may include but are not limited to: one or more fixed facilities such as a patient or recipient home residence 200 shown with associated Wi Fi® equipment 230; one or more remote vehicles such as the van 300 shown with associated Wi-Fi® Equipment 330; and a multiplicity of other portable terminal devices such as a hand- held computer, wearable computer, and/or smart mobile phone 400 shown with appropriate Wi-Fi® equipment 430.
  • An object of the disclosure is to provide users of the system 100 access to continuously updated master status data on the contents of a specific transport case 500, or a multiplicity of such cases, and biometric identification and/or other specific information associated with the transport of the said cases.
  • the invention reduces the load imposed on Primary, Secondary, and Tertiary Users of the system under current, and future application scenarios.
  • Said users of the Invention can include but are not limited to: Primary Users; Secondary Users, and Tertiary Users.
  • Primary Users are those that come in direct contact with the transport case 500 in performing their natural primary function;
  • Secondary users are those users of the transport case 500 who’s main use of the transport case 500 involves the contents of the transport case 500 in support of the Primary Users.
  • Tertiary users are those users of the data provided by the system in support of Primary, and Secondary Users, or other related functions.
  • Class A Primary User Those whose primary function is that of a courier— transporting the transport case 500, and its contents en route to an event, or specific destination by hand, via a mobile platform, or in a vehicle. For example but not limited to the transport of pharmaceuticals, or medical or high value equipment, or documents to a specific destinations, or destinations;
  • Class B Primary User Those whose primary function involves use of the contents of the transport case 500 such as but not limited to first responder personnel on the scene of an event, or medical emergency.
  • Secondary Users are considered to be predominantly remote users involved in supporting and/or monitoring the multiplicity of transport cases 500 in use.
  • Said users include though are not limited to: personnel in the transport central dispatch, depot, distribution, and/or warehouse facility; management, and other personnel of these, or other organization employing the invention.
  • transport case 500 can support other types of applications such as telemedicine, and community paramedicine, as well as others with need of access to continuously updated state on individual items, contents of individual transport cases 500, or the totality of the transport cases 500, and their respective, and/or collective contents.
  • applications such as telemedicine, and community paramedicine, as well as others with need of access to continuously updated state on individual items, contents of individual transport cases 500, or the totality of the transport cases 500, and their respective, and/or collective contents.
  • This category of use can include using the transport case 500 as local Hub for collecting and disseminating data provided by remote external sensors.
  • Example of such include though are not limited to:
  • Portable environmental monitoring sensors which could be deployed at the scene of an event:
  • atmospheric parameters e.g., wind, temperature, relative humidity
  • Unmanned aerial vehicles UAVs
  • Unmanned marine vehicles UWVs
  • Tertiary Users are considered to be additional users of the information generated by the transport case 500. Said users include though not limited to:
  • other tertiary users include those involved in tracking, or monitoring specialized information provided on any one or more items, such as though not limited to:
  • a not-limiting example of said temperature monitoring use is the transport of vaccines, or similar thermolabile materials to a remote location with unreliable refrigeration.
  • the transport case 500 is of a rectangular form and composed of a hollow case body 520, and a hollow case lid 540 such as in a non-limiting example a standard 1500 Series Pelican Case commonly used by emergency medical technicians (EMTs).
  • the case body 520 can be made of a flexible textile material or a rigid metal material.
  • the case body 520 itself can act as an RF confinement layer, as described in further detail below.
  • Said body 520 incorporates a bottom plate 521, a front panel 530, a rear panel 535, and 2 side walls, left side wall 524, and right left side wall 522 respectively.
  • Said lid 540 is attached to the case body 520 by one or more hinges 550, affixed to the rear panel 535, of the aforementioned case body 520.
  • the lid 540 is similarly composed of a top plate 545, a lid front wall, a lid back wall, and two lid side walls (not identified).
  • the lid 540 and body 520 together with a suitable conducting means of reliably, and repetitively sealing the junction between the two aforementioned primary components of the transport case 500, collectively form an isolated volume. Said volume is protected from both normal environmental exposure, and also isolated from the ambient radio frequency environment by a number of aspects of the design of the transport case 500 to be
  • FIG. 1 Further distinctive features of this embodiment of the disclosure are shown in FIG. 1.
  • a magnetic switch assembly changes state.
  • Said switch assembly includes a reed switch 630, or similarly magnetically activated switch affixed to the case body 520, and an associated magnet 631 attached to the lid 540.
  • the signal from the switch travels to the case electronics (not shown) and activates the scan of the case when so desired as enabled by hardware configuration and / or through software by setting of a remotely configurable parameter.
  • the transport case 500 queries all of the tagged items within the case to detect their presence, or absence.
  • the results of said query can be compared to a pre-loaded inventory, stored internal to, and/or external to the case (e.g. in the cloud application such as the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155).
  • the user throughout the supply chain can query the case for specific status information on one or more of the tagged items, and/or the specialized tags, as in the internet of things.
  • the status information is available to class A Primary User, those who are transporting the transport case 500 en route as a courier to the event, or specific destination in the vehicle 300, or by other means of transport.
  • the act of opening, or attempting to open, the case triggers the case body camera 800 to record a series of images, or a video stream for verification or analysis.
  • Such a process could be similar to recent testing by airlines of facial recognition and fingerprints to replace boarding passes at airport terminals.
  • the invention may be embodied by incorporating its key features, such as the RFID technology within a suitably modified standard multimodal shipping container, or typical air freight shipping container (e.g., IATA LD-3, LD-l l, etc.) wherein the existing metal body of the container constitutes the body of the transport case 500.
  • a suitably modified standard multimodal shipping container or typical air freight shipping container (e.g., IATA LD-3, LD-l l, etc.) wherein the existing metal body of the container constitutes the body of the transport case 500.
  • said multimode, or air freight container may be modified either permanently, or temporarily by lining its non-conducting walls with a suitable conducting material, and the entirety of such a modified container becomes the body of the transport case 500.
  • FIG. 2 the invention is depicted from the perspective of the transport case 500, and in the context provided by the embodiment illustrated in Fig. 1.
  • FIG. 2A one of a multiplicity of tagged items 50 is shown, in a not-limiting manner, with attached commercial-off-the-shelf (“COTS”), or custom RFID tags 60. Said tagged items 50 are shown proximate to the inner surface of the top of the lid 545, although they can be located anywhere within the internal volume of the transport case 500.
  • COTS commercial-off-the-shelf
  • EPCTM Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface - collectively the“EPC Gen2 UHF Specification”.
  • interrogation signals are generated within one or more readers 720 by means of components known collectively as the“RF Transmit Chain”.
  • Some readers 720 utilize some of the components for both the transmission, and reception phases, and thereby limit some operational flexibility, but reduce hardware costs. Note that in the context of the invention that the choice of specific reader implementation technology is not limiting.
  • the RF tag interrogation signals from the reader 720 are conducted via coaxial cables 765 to one, or more antennas 760.
  • the tag interrogation signals are radiated via one or more transmission antennas 760.
  • the tags 60 absorb sufficient power from the transmitted RF to enable the very low power logic circuits in the tag 60 to reply.
  • the reply from each tag 60 is coded with a unique identification number (i.e., tag ID), and also may contain other information such as included in the definition of the Internet of Things (IoT) adopted by the IEEE IoT Council.
  • the tag's 60 reply is a coded modification of the scattering properties of the tag 60. In the ideal case one can view the code as switching the tag 60 effectively from an absorbing “black” to a reflecting“white” surface exposed to the incoming RF of the tag interrogation signal.
  • This coded reflection is similar to the Mode S Transponders used for air traffic control.
  • the strength of return signal from the tag 60 is determined by passive reflection, and so the returns exhibit an inverse fourth power dependence on range akin to traditional radar.
  • the same antennas 760 may be used for both transmission, and reception (monostatic mode). Alternatively in the (bistatic mode) some antennas 760 may be dedicated to transmission, and others only to reception. The choice of the configuration depends on the specific application, and the particular hardware, and software involved.
  • the replies from each of the multiplicity of tags 60 is received by a multiplicity of reception antennas 760, and conducted to the multiplicity of readers 720 via the multiplicity of coaxial cables 765.
  • the readers 720 then process the RF received from the tags 60 in the presence of background signals from other tags 60, and/or other readers 720, as well as extraneous ambient signals within the operational band (e.g., the ISM Band in the vicinity of 900 MHz in the US, and EU). Since the interrogation signal is known in both frequency, and phase, it is quite straight forward to extract the information encoded in the return signals. The readers 720 then determine the unique ID’s of the tags 60 which they have detected, as well as any other information, such as but not limited to: sensor data which has been received in the signal from the tagged item 50.
  • the operational band e.g., the ISM Band in the vicinity of 900 MHz in the US, and EU. Since the interrogation signal is known in both frequency, and phase, it is quite straight forward to extract the information encoded in the return signals.
  • the readers 720 determine the unique ID’s of the tags 60 which they have detected, as well as any other information, such as but not limited to: sensor data which has been received
  • FIG. 2A illustrates an embodiment of the invention with a single multi-channel reader 720 that is provided with 4 ports.
  • the tag interrogation RF signals generated in said reader module 720 are conducted via 4 low-loss coaxial cables (735, 745, 755, 765) to 4 antennas (730, 740, 750, 760) respectively.
  • Each of the four antennas 730, 740, 750, 760 employed in the disclosed embodiment can be mounted parallel to, and attached to the inner surface of the outer walls of the transport case 500.
  • Three of the antennas 730, 740, 750, 760 are attached to the case body: left side wall antenna 730 to left side wall 524; right side wall antenna 740 to right side wall 522; bottom antenna 750 to case body bottom 521 respectively.
  • the case lid antenna 760 is attached to the top plate of the case lid 545.
  • multiple RF chains enable multiple antennas to be active enabling bistatic operations.
  • the signals may be carried from the reader 720 via rigid, or flexible waveguide in place of the coaxial cable 765.
  • the RF signals, or their analog, or digital content may be conducted to the antennas via free-space, or guided optical means.
  • the RF is effectively regenerated at the transmit antenna much in the manner of some radar systems.
  • the return signal from the tag 60 may be detected at the antenna 760, and the resultant analog, or digital content transmitted via free-space or guided optics to the reader 720. Note, that in the context of the disclosure, neither the choice of the means of transport of the RF signals to/from the reader 720, nor the RF architecture, and its implementation is limiting.
  • the RF emitted by the antenna is not localized to the vicinity of the antenna; it is free to propagate.
  • Propagation is governed by ambient scattering, and absorbing obstacles in the path of the beam, as defined by the transmit antenna pattern.
  • the beam can be considered a freely propagating plane wave.
  • the outgoing RF can be considered to follow the inverse square law associated with a spherical wave-front. Indeed signals have been received from distant spacecraft transmitting at power levels comparable to those of the reader 720 depicted in FIG. 2A, from beyond the orbit of Pluto.
  • COTS off-the-shelf
  • the final result of the detection of the tags is a digital data stream composed of a series of messages for example, including but not limited to: tag IDs, other tag data, transmission parameters, received power, and timing information. See for example
  • TagReadData objects which provide access to the information about the tag, and the metadata associated with each tag read as specified in the ThingMagic Mercury API Programmer Guide.
  • FIG. 2B shows a schematic view of the case body rear panel 535, and depicts the various functional blocks mounted to the case body rear panel 535, and their
  • control, and computation module 620 control, and computation module 620; reader module 720; power supply module 900.
  • the digital data stream from the reader is conveyed via the reader data and control bus 640 to the control and computation module 620.
  • the computation module 620 can include a computing system, such as the computing system 1100 described further below with reference to Figure 11. This data and control bus also is used to set reader operating parameters, and control commands (such as Read on Command or, Retry the Read, etc.).
  • control and computation module 620 is also connected to a multiplicity of peripheral elements via a multiplicity of digital data buses, and individual data lines, including but not limited to: “Press to Scan” push button 660 mounted on the rear panel 535, and connected via press to scan line 665 ;
  • “Close Case to Scan Magnetic Switch” 630 mounted on the case body left side wall 524, connected via magnetic switch line 635. Its associated Magnet 631 is mounted to the case lid left side wall 541;
  • Case body camera 800 a digital still, and/or video camera mounted on the rear panel 535 looking toward someone opening the case.
  • Said camera 800 is connected via camera control, power and data bus 810;
  • Biometric sensor located in the handle 537 e.g., a biometric fingerprint module 850
  • a biometric module bus 855 e.g., a biometric module bus 855
  • FIG. 2C shows a view of the outer surface of the front panel 530, and depicts schematically how the Go/No go status is indicated via LEDs illuminated as appropriate on an indicator module 650.
  • Said module is mounted on the front panel 530, and connected to the control and computation module 620 by the status indicator bus 655.
  • the master on/off switch 930 which is connected to the power module 900 via the master switch bus 935.
  • energy for the transport case 500 can be stored in rechargeable cells contained within the power module 900 which is mounted to the case body back panel 535.
  • the device is charged, and recharged inductively by placing it in the vicinity of an inductive charging unit.
  • Power to operate the control and computation module 620 is provided by the control and computation module power bus 910.
  • Power to operate the reader 720 is provided via the reader power bus 920.
  • all power and data flows between the three major modules: reader module 720, the control and computation module 620, and the power module 900 can be via USB busses.
  • all of the functional blocks are integrated onto a single master board.
  • the functional blocks can be further integrated onto a single integrated circuit (IC), system on a chip (SOC), or system in package (SIP).
  • IC integrated circuit
  • SOC system on a chip
  • SIP system in package
  • FIGs. 3A and 3B show schematic views of the case body 520 highlighting key RF aspects of the preferred embodiment of the invention depicted in FIG.l and FIGs. 2A-2C.
  • FIG. 3A an example of a multiplicity of tagged items 50 with associated RFID tags 60 are shown contained within the hollow rectangular volume defined by the case body 520 and lid 540 of the transport case 500.
  • the case body 520 and case lid 540 not only provide protection and isolation from external environmental elements (as is typical for Pelican, and other similar types of transport cases), but they can collectively provide electromagnetic, and RF isolation between the ambient environment outside, and the contents, and electronic equipment associated with the invention contained within the transport case 500.
  • the walls of the case body 520 and case lid 540 are formed of a material such as, but not limited to: moldable plastics for example,
  • Polypropylene which provides both mechanical protection, and an environmental barrier.
  • the case body 520 is indicated by a dashed line.
  • the outer structural and environmental layer 543 is indicated generically as the solid line.
  • the inner surface of the case body 520 and case lid 540 are coated with a continuous thin electrically conducting surface identified as the RF confinement layer 770.
  • this coating is vacuum deposited Aluminum.
  • the RF confinement layer can include any metal or metal alloy with sufficient conductivity.
  • the aluminum layers is further overlain with one, or more mechanically protective layer(s) such as thin spray-applied polymer coatings (not shown for clarity in this view).
  • the innermost coating is electrically insulating, and transparent to RF.
  • FIG. 3B shows a cross section through the case bottom 520 viewed from the perspective of the front panel, with the case resting on the right side, and front panel facing outward.
  • the case bottom 520 is composed of multiple layers (leftmost to right in FIG. 3B):
  • Outer mechanical and environmental layer 543 is a hard, or semi-flexible plastic such as molded polypropylene.
  • this layer may be flexible fabric which may contain embedded stiffeners such as in the construction of a mountaineering rucksack where the outer layer is fabricated out of Rip-Stop Nylon fabric with embedded nylon rod, or strip stiffeners.
  • the RF confinement layer 770 can be composed of a vacuum deposited layer of a conductor such as Aluminum. In some embodiments the RF confinement layer 770 can be an Aluminum spray-coating applied to a solid underlayment. In still other embodiments the RF confinement layer 770 can be a sheet of metalized fabric.
  • a mechanical protection layer 547 is designed to protect the RF confinement layer 770 from mechanical damage.
  • this layer is composed of a polymer coating sprayed onto the RF confinement layer 770.
  • the mechanical protection layer 547 should not interfere with the RF fields present within the volume of the transport case 500.
  • the mechanical protection layer 547 may be another layer of fabric, or a thin sheet of plastic.
  • the Mechanical protection layer 547 and the RF confinement layer 770 can be one sheet of metalized fabric such as rip-stop nylon as is commonly used for RF isolation.
  • all three of these layers 543, 770, and 547 may be fabricated from fabric such as Rip-Stop Nylon, with the three layers formed by metalizing one surface of a sheet of fabric, and then bonding a second sheet of fabric to the first with the metallization sandwiched in the middle.
  • the innermost layer shown to the extreme right in FIG. 3B is the packaging inset 549 which contains, and restrains the tagged items 50.
  • it is plastic open cell foam wrapped with nylon fabric, and divided into multiple compartments to hold, and restrain the various types of tagged items.
  • the packaging inset 549 is composed of a COTS plastic foam, or similar material with holes or recesses into the foam, and which may or may not be lined with a fabric to protect the foam as is common in Pelican, and similar transport cases.
  • the choice of material for the packaging inset 549 is only limited to it having minimal effects on the RF fields present within the volume of the transport case 500 when the system is scanning.
  • the case lid 540 is composed of comparable layers, except that in the preferred embodiment, the case lid 540 packing inset, the inner most layer of the case lid 540 consists of a sheet of attached plastic pouches used to contain the individual tagged items 50.
  • the choice of material, and form for the case lid packing inset is only limited to them having minimal effects on the RF fields present within the volume of the transport case 500 when the system is scanning.
  • All RF Fields transmitted 780, and scattered 785 present in the interior are strongly attenuated by the RF confinement layer 770, which, in some implementations, can be a micron thickness aluminum coating.
  • This attenuation can be estimated by simple calculations involving the RF skin effect at the UHF frequencies employed by this and many other embodiments.
  • the unit can operate at power levels in excess of those specified for use in the ISM Band by the FCC, and similar governmental limits imposed in the EU, Japan, China, Russia, etc.
  • This hypothetical higher power operations can permit the detection of tagged items in the presence of a multiplicity of absorbers within the case.
  • a not limiting example is the situation where EMTs may be carrying significant quantities of saline solutions which could lead to significant RF absorption;
  • a further consequence of the confinement layer 770 is that the electric fields associated with RF waves 780, 785 are forced to meet the condition that in the ideal condition with perfectly conducting walls, the E field component parallel to the conducting walls is zero.
  • the transport case 500 functions as a more or less lossy RF cavity depending on the particular materials contained within it. This can result in successful detection with reduced RF transmission levels. Alternatively this can enhance the probability of detection of all tagged items 50 in a given time window, and/or the ability to reduce the scan time for reliable complete detection.
  • a potential consequence of the RF confinement layer 770 is that operation of the RF scan with the transport case 500 open may need to be restricted in order to limit the potential for operation outside of the specifications for the ISM band.
  • the radio-frequency (RF) confinement layer enclosing an interior of the transport case when the lid is closed can be specified and manufactured to provide selective transmission and reflection of the signals from the various classes of antennas within the transport case 500.
  • the transport case 500 includes a first class of antenna for transmitting and receiving first wireless signals to and from the transport case [typically with Wifi ⁇ e.g. 2.4 Ghz or 5GHz ⁇ or Bluetooth ⁇ between 2402 and 2480 MHz, or 2400 and 2483.5 MHz ⁇ ] .
  • the transport case 500 includes a second class of antenna for transmitting and receiving second wireless signals to and from one or more RFID-tagged items contained within the transport case (Typically around 9000 MHz in the US and mid 800 MHz in EU and some other jurisdictions).
  • the two classes of antennas are configured as to place the second class of antenna [RFID antenna] which may be a multiplicity of antennas one or more of which might be energized or connected to the processor at a given time [as per the typical practice with UPC Gen 2 UHF RFID“readers”] within the RF Confinement, and the first class of antenna [used for external communications] mounted external to the RF
  • [0153] Generate and detect internally the RF signal and transmit it through a penetration in the RF confinement via a shielded cable such as a coaxial cable carrying the RF directly to/from the antenna with the imposition of a RF filter in the“coaxial RF chain” to strongly reject the approximately 900 MHz signals associated with the second class antenna [RFID reader antenna].
  • the challenge is that it is difficult to strongly attenuate a single frequency [or a narrow band of frequencies] which is relatively near to the desired frequency [in this case associated with the communications via first class of antenna]. The greater the separation the easier the task.
  • [0154] [3] Generate / detect externally the 900 MHz signal as in [1] with the digital information being transmitted to/from the internal processor via a cable penetrating the RF Confinement as in [2].
  • Said cable may be a coaxial cable or a twisted pair [shielded or not] with a filter interposed as in [2].
  • a variant of [3] is to package the external RF components [RF transponder or modem] within a separate shielded enclosure with the two enclosures so positioned and located so that the shielding is contiguous and uninterrupted with the most minimal penetration through the primary RF confinement and so equipped with a ferrite bead or other type of RF choke. Said RF would then be conducted to/from the antenna and the external RF chain used for communications via a suitable RF connector and associated coaxial cable providing a minimal direct path for the signals associated with the second class of antenna ⁇ [0156] A slight modification of this has been utilized in the embodiment as shown in FIGs. 1 and 2.
  • the digital signals were transmitted to/from an external RF modem connected to the first class of antenna by means of a USB shielded connector with suitable filtering of the digital signals to remove or maximally attenuate the 900 MHz RFID signals.
  • the system was tested to insure that with the case closed that minimal interference was detectable exterior to the case.
  • the material itself can be sufficiently thin or composed to have a sufficiently high resistivity that the skin depth is such that a significant magnetic component of the frequency associated with first class of antennas penetrates while the frequency associated with second class of antennas is reflected. In this case the communications frequency would be much lower than that associated with the RFID reading process.
  • the amount of penetration in a homogenous material depends on the thickness of the material measured in terms of the wavelength. Longer wavelengths penetrate more than shorter wavelengths. Such a system has been in use for many years to communicate with submerged submarines - where the wavelength of interest corresponds to very low frequencies. Therein the difficulty of such a system as the bandwidth of the data being transmitted is similarly low.
  • the conductor should be about 3 to 5 times the skin depth to insure full isolation of the magnetic fields due to the currents in the conductors although most of the magnetic field is confined to about 1 to 2 skin depths.
  • the number and type of RF modes which can be present may be limited, giving rise to some temporary dead spots which will move within the transport case 500 from pulse-to-pulse as the typical reader changes frequencies through the ISM band.
  • FIG. 4 is a diagram depicting the flow of material objects and data objects throughout the system.
  • the embodiments of the disclosure provide for a hierarchical command & communications network enabling the trusted transfer of high value materials, such as medications, and medical equipment.
  • the system assures the concomitant verification of the shipments contents in the case, and the personnel handling, sending, transporting, and receiving the shipment end-to-end seamlessly.
  • FIG. 4 there is shown how information, and material objects are coupled as the system proceeds from State to State indicated by the Ordinal Numerals 1, 2, 3, 4....
  • Physical objects e.g., the multiplicity of transport cases 500 are represented by the Nominal Numbers 11, 12, 13, 14... as they move in physical space, and state space.
  • Information objects associated with corresponding aspects of the physical objects are represented by the nominal numbers 21, 22, 23, 24... as they move in state space.
  • Information objects may be queried, viewed, and altered either locally through an application or“App” 410 in FIG.l, accessed via terminal 400, or remotely through another means of accessing the Global System 155 in FIG. 1. Irrespective of the form of access, the information objects can reside in the cloud as a series of linked database entries:
  • Master status information updates of a transport case 500 are stored in a contents information database 154;
  • Biometric, or other identification information on the personnel handling the transport case 500 at any time including the levels, and types of access granted to the individuals are stored in a transporter information database 158;
  • Physical routing information on the path, and transfer points involved in completion of a particular mission of the transport case 500 at any time, are stored in a location information database 156.
  • an embodiment of the disclosure is illustrated in the form of an automated Crash Cart or Code Cart used in hospitals, and other medical facilities to resuscitate patients suffering cardiac arrest, or similar life-threatening emergencies. All of the supplies used for resuscitation are tagged, and contained within one or more removable drawers, one or more of which can be configured as the transport case 500 in FIG. 1.
  • State“Alert & Ready” 1 the Code Cart is waiting for a call in a local storage area of a ward, floor, or unit.
  • the Cart and its contents 11 are rapidly moved to the bedside of the patient. While the Cart is in motion, it is being tracked, and its current location is updated continuously with appropriate modifications to physical routing information 21 stored in the database 156. This tracking insures that in a complicated physical layout of an older hospital that the Cart arrives as expeditiously as possible - as minimizing transit time is vital.
  • the use of the particular disposable item, or pharmaceutical in the Active Cart 12 may be automatically detected with appropriate modifications made to the contents information stored in the database 154.
  • the now used Cart is scanned, and updates are made to the information objects.
  • the hospital pharmacy, and or the stock room are automatically notified, and the hospital transportation department is notified (as is done traditionally) to bring a replenished, and replenished Cart to be on alert at the particular hospital unit in question, and to retrieve the Cart which was used.
  • State“Used Cart” 3 ready for transport to the pharmacy and/or stock room to be restocked, and replenished.
  • FIG. 5 is a photograph of an example transport case 500 and a mobile terminal 400.
  • the transport case 500 is shown open, and outfitted as would be typical of its use as a dispatch case for an emergency medical team.
  • the elements which are numbered have been previously described in FIGs. 1, 2A-2C, and 3A-3B, including: Case body 520 containing all of the electronics (not shown);
  • Case lid 540 with attached lid packing inset 552, containing several tagged items 50 is attached.
  • FIG. 5 Also shown in FIG. 5, is a laptop computer acting as the mobile terminal 400 shown in FIG. 1, and hosting the mobile application 410.
  • FIG. 6 is a photograph of the case body for the case shown in FIG. 5, with body packing inset 549 containing several tagged items 50, removed, and placed adjacent to the transport case 500.
  • FIG. 6 highlights several of the non-operating, and operating components, including:
  • Lid packing inset 552 containing several tagged items 50, one of which is identified; Antennas left 730; right 740; and bottom 750; with associated rf cables (735, 745,
  • Status indicator bus 655 connecting the Go/No Go status LEDs located within the indicator module 650 to the case electronics mounted on the back panel 535.
  • case electronics are shown within their protective enclosures, mounted to the back panel. Also shown in the figure is the power module 900, which is mounted to the case body back panel 535 (see F1G.1).
  • Power module 900 provides power to operate the reader module 720, and the control & computation module 620 via control & computational power bus 910, and the reader power bus 920 respectively.
  • FIG. 7 is a photograph of the case lid 540 with case lid packing inset 552, containing several tagged items 50; one of which is identified.
  • the case lid packing inset 552 has been partially removed to highlight aspects of the case lid 540 inner structure.
  • FIG. 7 shows: The case lid 540; The top of the case lid 545 ;
  • FIG. 8 is a photograph of the Case depicted in FIG. 5, and previously described, in its closed, and ready-for-travel, or ready to be opened configuration. Referring to FIG. 8, several elements are highlighted identified including:
  • the black Polypropylene outer mechanical environmental layer 543 (see for instance in FlGs. 3A and 3B) of the case lid 540, and case body 530, respectively;
  • the indicator module 650 mounted to the front panel 535, and highlighting the Go/No Go Status LEDs (not individually identified).
  • FIG. 8 also highlights several features associated with a typical base used for transport, Pharmaceutics, medical devices, and other high-value, and/or mission-critical items. Referring to the figure several security, and integrity features are identified including:
  • Return loss is a parameter used to characterize the effectiveness of coupling the RF input power flowing into the antenna to the power emitted into space. Note a return loss of 0 dB implies that all of the power is reflected back into the RF chain (potentially damaging components), while a return loss of infinity implies perfect emission. Realistic“good” antennas typically are in the range of 10 to 20 dB return loss implying that 90% to 99% of the input power is transmitted from the antenna ⁇
  • FlGs. 9A-9D show antenna (RF launching or coupling structures) utilized in the concept demonstration unit for the invention. Specifically:
  • FIG. 9A shows the design of the patch antenna with dimensions (all dimensions are in mm);
  • FIG. 9B shows a photograph of the patch antenna as constructed out of copper foil applied to a corrugated plastic backing, with attached micro coaxial cable and RF connector (not shown);
  • FIG. 9C shows the results of a simulation of the antenna as designed
  • FIG. 9D shows the results of the fabricated antenna as measured for the initial state (Red curve) and then as tuned to be more congruent with the operational band (Blue curve).
  • the fields are all computed mid-band @ 915 MHz.
  • the free space wavelength l is 327.9 mm.
  • the model is based on a 18 15/16" (X) x 141 ⁇ 2"(Y) x 73 ⁇ 4"(Z) or (481.0 x 368.3 x 196.9) mm box with electrically conducting walls. Total volume of 3.487x107 mm 3 which 0.9899 measured in l3.
  • the forward power into the antenna is 0.5W from a 50 ohm source which is consistent with the operating parameters of the M6E Reader used in the experimental work with the Concept Demonstration Unit.
  • FlGs. 10A-10C show plots generated by modeling the case as a perfectly conducting rectangular box with six patch antenna similar to the antenna shown in FIG. 9B, installed on each of the faces of the interior of the box. In the Concept Demonstration Unit, only 4 antennas were installed (no antennas were installed on the long— i.e., top and bottom— faces of the box).
  • FIG. 10A shows the framework of the box used in the simulation work (all dimensions are in mm);
  • FIG. 10B shows the results of a simulation of the RF fields present within the case volume with the bottom antenna energized contour plot of electric field on the midplane of the box, where the midplane is defined as a cross section of the box roughly halfway between, and parallel to, the top and bottom faces of the box;
  • FIG. 10C shows the results of a simulation of the RF fields present within the case volume with the left sidewall antenna energized contour plot of electric field on the midplane of the box.
  • the plots show the behavior of an antenna mounted on the bottom or top surface of the case and also an antenna mounted on the side walls.
  • FIG 11 is a block diagram of a computing system 1100 suitable for
  • the example computing system 1100 is suitable for use in implementing the computerized components described herein, in accordance with an illustrative implementation.
  • the computing system 1100 includes at least one processor 1110 for performing actions in accordance with instructions and one or more memory devices, such as stable storage 1140 or cache 1180, for storing instructions and data.
  • the illustrated example computing system 1100 includes one or more processors 1110 in communication, via a bus 1120, with stable storage 1140, at least one network interface controller 1130 with network interface port 1160 for connection to a network (not shown), and other components 1150, e.g., input/output (“I/O”) components 1170.
  • the processor(s) 1110 will execute instructions received from memory.
  • the processor(s) 1110 illustrated incorporate, or are directly connected to, cache memory 1180. In some instances, instructions are read from stable storage 1140 into cache memory 1180 and executed by the processor(s) 1110 from cache memory 1180.
  • the processor(s) 1110 may be any logic circuitry that processes instructions, e.g., instructions fetched from the stable storage 1140 or cache 1180. In many embodiments, the processor(s) 1110 are microprocessor units or special purpose processors.
  • the facilitation system 130 may be based on any processor, or set of processors, capable of operating as described herein.
  • the processor(s) 1110 may be single core or multi-core processor(s).
  • the processor(s) 1110 may be multiple distinct processors.
  • the stable storage 1140 may be any memory device suitable for storing computer readable data.
  • the stable storage 1140 may be a device with fixed storage or a device for reading removable storage media. Examples include all forms of non-volatile memory, media and memory devices, semiconductor memory devices (e.g., EPROM, EEPROM, SDRAM, and flash memory devices), magnetic disks, magneto optical disks, and optical discs (e.g., CD ROM, DVD-ROM, or Blu-Ray® discs).
  • a computing system 1100 may have any number of stable storage devices 1140.
  • the cache memory 1180 is generally a form of computer memory placed in close proximity to the processor(s) 1110 for fast read times. In some implementations, the cache memory 1180 is part of, or on the same chip as, the processor(s) 1110. In some
  • cache 1180 there are multiple levels of cache 1180, e.g., L2 and L3 cache layers.
  • the network interface controller 1130 manages data exchanges via the network interface 1160 (sometimes referred to as a network interface port).
  • the network interface controller 1130 handles the physical and data link layers of the OSI model for network communication. In some implementations, some of the network interface controller’s tasks are handled by one or more of the processor(s) 1110. In some implementations, the network interface controller 1130 is part of a processor 1110.
  • a computing system 1100 has multiple network interfaces 1160 controlled by a single controller 1130. In some implementations, a computing system 1100 has multiple network interface controllers 1130.
  • each network interface 1160 is a connection point for a physical network link (e.g., a cat-5 Ethernet link).
  • the network interface controller 1130 supports wireless network connections and an interface port 1160 is a wireless (e.g., radio) receiver/transmitter (e.g., for any of the IEEE 802.11 protocols, near field communication“NFC”, Bluetooth, ANT, or any other wireless protocol).
  • the network interface controller 1130 implements one or more network protocols such as Ethernet.
  • a facilitation system 130 can exchange data with other computing devices via physical or wireless links using a network interface 1160.
  • the network interface 1160 may link directly to another device or to another device via an intermediary device, e.g., a network device such as a hub, a bridge, a switch, or a router, connecting the facilitation system 130 to a data network such as the Internet.
  • the computing system 1100 may include, or provide interfaces for, one or more input or output (“I/O”) devices.
  • I/O devices include, without limitation, keyboards, microphones, touch screens, foot pedals, sensors, MIDI devices, and pointing devices such as a mouse or trackball.
  • Output devices include, without limitation, video displays, speakers, refreshable Braille terminal, lights, MIDI devices, and 2-D or 3-D printers.
  • the other components 1150 may include an I/O interface, external serial device ports, and any additional co-processors.
  • a computing system 1100 may include an interface (e.g., a universal serial bus (“USB”) interface) for connecting input devices, output devices, or additional memory devices (e.g., portable flash drive or external media drive).
  • a facilitation system 130 includes an additional device 1150 such as a co-processor, e.g., a math co-processor can assist the processor 1110 with high precision or complex calculations.
  • Implementations of the subject matter and the operations described in this specification can be implemented in digital electronic circuitry, or in computer software embodied on a tangible medium, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Implementations of the subject matter described in this specification can be implemented as one or more computer programs embodied on a tangible medium, i.e., one or more modules of computer program instructions, encoded on one or more computer storage media for execution by, or to control the operation of, a data processing apparatus.
  • a computer storage medium can be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination of one or more of them.
  • the computer storage medium can also be, or be included in, one or more separate components or media (e.g., multiple optical discs, magnetic disks, or other storage devices).
  • the computer storage medium may be tangible and non- transitory.
  • a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment.
  • a computer program may, but need not, correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform actions by operating on input data and generating output.
  • the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., a field programmable gate array (“FPGA”) or an application specific integrated circuit (“ASIC”) ⁇
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • Such a special purpose circuit may be referred to as a computer processor even if it is not a general-purpose processor.
  • Multiple processors, or a multi-core processor may be referred to in the singular, as a processor, e.g., when working in concert.
  • references to“or” may be construed as inclusive so that any terms described using“or” may indicate any of a single, more than one, and all of the described terms.
  • the labels“first,”“second,”“third,” an so forth are not necessarily meant to indicate an ordering and are generally used merely to distinguish between like or similar items or elements.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

At least one aspect of the disclosure relates to a system for securing chain of custody of materials. The system includes a transport case and a remote server. The transport case includes a case body having a closable lid and a lock configured to secure the lid in a closed position, and release the lid upon matching a received input to a stored key. The remote server is configured to provide, to the transport case, the stored key corresponding to an individual granted access to the transport case. The remote server is configured to receive inventory and event notifications from the transport case. The remote server is configured to update a database based on the inventory and the event notifications received from the transport case. The remote server is configured to provide a record of chain of custody of the items contained within the transport case.

Description

IMPROVEMENTS TO SUPPLY CHAIN SECURITY
RELATED APPLICATIONS
[0001] The present application claims priority to, and the benefit of, U.S. Patent
Application No. 62/618,479, filed January 17, 2018, the entire contents of which are hereby incorporated by reference for all purposes.
BACKGROUND OF THE INVENTION
[0002] Certain prescription drugs, controlled substances, medical device, and other high- value materials may be vulnerable to theft or tampering, particularly during transportation. While material distribution centers, hospitals, and pharmacies likely have security systems in place for high value materials, it may be difficult to secure the chain of custody for materials between those locations and a destination, such as a smaller medical facility or a receiving patient. Opioids are particularly vulnerable to theft due to their street value and the current high and growing rates of opioid addiction.
SUMMARY
[0003] At least one aspect of the disclosure relates to a system for securing chain of custody of materials. The system includes a transport case and a remote server. The transport case includes a case body having a closable lid and a lock configured to secure the lid in a closed position, and release the lid upon matching a received input to a stored key. The transport case includes a sensor configured to sense a state of the lid, a radio-frequency (RF) confinement layer enclosing an interior of the transport case when the lid is closed, a first antenna for transmitting and receiving first wireless signals to and from the transport case, a second antenna for transmitting and receiving second wireless signals to and from one or more RFID-tagged items contained within the transport case, and a processor. The processor is coupled to the lock, the sensor, the first antenna, and the second antenna· The processor is configured to obtain the stored key and provide it to the lock and detect the items contained within the transport case using the second antenna. The processor is configured to transmit, using the first antenna, an inventory of the detected items and an event notification based on the sensor sensing a change in the state of the lid. The remote server is configured to provide, to the transport case, the stored key corresponding to an individual granted access to the transport case. The remote server is configured to receive the inventory and the event notification from the transport case. The remote server is configured to update a database based on the inventory and the event notification received from the transport case. The remote server is configured to provide a record of chain of custody of the items contained within the transport case.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] The previously mentioned and other objects, and features of the present disclosure will be more fully disclosed by the following detailed description of the embodiments of the disclosure, which is to be considered together with the accompanying drawings wherein like numbers refer to like parts, and further wherein:
[0005] FIG. 1 is an overall system view in accordance with embodiments of the present technique;
[0006] FIG. 2 A shows the inside of an opened transport case;
[0007] FIG. 2B shows details of the inner surface of the back panel of said opened transport case;
[0008] FIG. 2C shows details of the outer surface of the front panel of said opened transport case.
[0009] FIG. 3A is a schematic view of the inside of the bottom of the body of the opened transport case depicted in FIG. 1, highlighting aspects of the RF isolation;
[0010] FIG. 3B is a section through the side of such a transport case as depicted in FIG.
1 ; highlighting further aspects of the RF and environmental containment provided by the various layers of the walls of the case;
[0011] FIG. 4 is a diagram depicting the flow of material objects and data objects throughout the system;
[0012] FIG. 5 is a photograph of an example transport case, as reduced to practice, accompanied by a mobile terminal, in accordance with embodiments of the present technique, and shown schematically in FIG. 1 ; [0013] FIG. 6 is a photograph of said transport case shown in FIG. 5, with packing inset removed to show several components as depicted schematically in FIGs. 2A-2C.
[0014] FIG. 7 is a photograph of said transport case shown in FIG. 5, with the lid pocket sheet (lid inset) partially removed thereby highlighting the mounting of the antenna to the inner surface of the top of the lid;
[0015] FIG. 8 shows said transport case shown in FIG. 5, closed and ready for travel, in transit, or ready to be opened at the destination, or origin point, and highlighting the front panel status display;
[0016] FIG. 9A shows the design of an example patch antenna with dimensions (all dimensions are in mm);
[0017] FIG. 9B shows a photograph of the example patch antenna as constructed out of copper foil applied to“plastic corrugated cardboard” with attached micro coaxial cable;
[0018] FIG. 9C shows the results of a simulation of the example antenna as designed;
[0019] FIG. 9D shows the results of the fabricated antenna as measured for the initial state (Red Curve) and then as tuned to be more congruent with the operational band (Blue Curve);
[0020] FIG. 10A shows a plot of a framework of a box used in a simulation of a transport case;
[0021] FIG. 10B shows results of a simulation of RF Fields present within the transport case volume with the bottom antenna energized (contour plot of electric field on the midplane of the box);
[0022] FIG. 10C shows results of a simulation of RF fields present within the transport case volume with a left sidewall antenna energized (contour plot of electric field on the midplane of the box); and
[0023] FIG. 11 is a block diagram of a computing system suitable for implementing the systems and components described herein. DETAILED DESCRIPTION
[0024] Today there is a demand to utilize technologies to address the growing problem of prescription drug abuse and the related dramatic increase in the number of opioid-related drug overdoses and associated crime. Embodiments of this disclosure can help combat this challenging societal scourge through assuring the verified, authenticated, and tracked end-to- end chain of custody of shipments of opioids and other narcotics from the point of origination to the point of deployment or utilization.
[0025] A shipment of high-value materials such as opioids or other controlled substances or materials can be verified and monitored through the use of a self-scanning transport case employing RFID and communications technology combined with a cloud-based globally accessible enterprise-level resource management platform. The chain of custody can be secured through the combination of external, and internal surveillance coupled to self- contained transport case-based biometrics, and other authentication of the people involved in handling the transport case, and its contents all the way from packing to the deployment to, or by the end user.
[0026] This disclosure relates generally to methods for identifying objects, and people, and systems primarily used for commerce. Embodiments of the disclosure can harness the ubiquity of the cloud to bind together what are commonly disparate technologies of biometric identification of people with radio frequency-based identification of objects. The system disclosed can deliver a seamless, continuous verifiable means of tracking a valuable shipment from the hand which dispatches it to the hand which ultimately receives the shipment. As an analogy consider a piece of registered mail which carries with it the means, and information to identify the person who is to handle it along the way to the person receiving it at the destination.
[0027] RFID tags are commonly employed for tracking, inventorying of garments in distribution centers, verifying high value shipments, locating, classification, identification of pallet loads in warehouses. For these, and many other applications, standardized, low-cost passive RFID tags are ideal. In the context of this document RFID systems comprise RFID tags, readers, antennas; other connected devices, and linked digital databases.
[0028] Biometrics such as but not limited to (wearable tech) fingerprints, palm prints, facial, iris, retinal or voice through their unique nature provide a robust means of identifying humans. They are commonly used in concert with pass codes, and/or RF, or optically read badges to control access to physical locations, or electronically stored information.
[0029] Advanced algorithms for analytics in medical applications, and responsive supply chain visibility can be developed, and employed in the cloud due to the flexible architecture of the invention. Embodiments of this disclosure can take advantage of advanced
communications technologies, such as but not limited to 5G networking, which would be helpful in situations requiring real time video with minimal latency, such as telemedicine, remote surgery, diagnostics, etc.
[0030] RFID techniques are superior to traditional identification technologies such as universal product code (UPC) bar codes primarily because of the ability of RFID tags to be read in non-line-of-sight situations, many to be read at once, and the capability of the RFID tags to provide item-level identification. Secondarily, RFID technologies provide a unique ID, as well as the non-static nature of their security features, and their cryptographic resistance against cloning.
[0031] The most prominent limitations to the use of RFID tagging of a multiplicity of high value, and/or mission critical items contained within a small volume such as an emergency medical dispatch case are:
The inability of handheld or conventional portal scanners to localize the RF energy to the volume in question;
The restrictions imposed by National Regulatory Agencies (e.g. FCC) placed on effective radiated power emitted by open scanning of RFID tagged items;
The effect of RF absorbing materials such as saline solutions in various shaped containers; and
The effect of metallic, or other highly conducting surfaces on RF fields.
[0032] Similarly, there are limitations on biometrics. Embodiments of the disclosure to be described subsequently overcomes these limitations, and offers further benefits. It employs the cloud to provide a permanent real-time repository of critical information and to provide the necessary services required by the system. [0033] Embodiments of the disclosure can help combat the opioid crisis, and other similar challenging societal problems, through assuring the verified, authenticated and tracked end-to-end chain of custody of shipments of opioids, other narcotics, and other prescription medications from the point of origination to the point of deployment, or utilization.
[0034] Embodiments of the disclosure can incorporate RFID, biometric, and cloud technologies to insure the trusted transfer of high value materials, such as medications, and medical equipment. Simultaneously, the system assures the verification of the shipment contained within the transport case, and the personnel handling, sending, transporting, and receiving the shipment end-to-end, seamlessly.
[0035] The shipment’s contents are verified, and monitored through the use of a self scanning transport case employing conventional RFID, and communications technology combined with a cloud-based globally accessible enterprise-level resource management platform. The chain of custody is assured through the combination of external, and internal surveillance coupled to self-contained case-based biometrics, and other authentication of the people involved in handling the transport case, and its contents all the way from packing to the deployment to, or by the end user.
[0036] Traditionally, in the modern era of postal, and similar delivery services someone would pack, and verify the contents of a shipment, and then entrust the shipment for delivery to an individual courier, or to a known service.
[0037] Unless the shipment was of the highest value where proof of identity was demanded at each step, the delivery agent would release the shipment to the intended recipient on the word, and possibly the signature of the recipient.
[0038] In embodiments of the disclosure, the transport case carries with it all the necessary means, excepting the services provided by the cloud. Connectivity refresh with the cloud can be“event driven” such as (but not limited to): during, or immediately after hand offs; internal or external alarms; changes of internal status; and reestablishment of connectivity after a connection interruption. [0039] Under normal operation the data that defines the Chain of Trust is maintained in the Cloud. However, while, the Cloud makes external monitoring, and tracking possible, the transport case can be self-contained, and not dependent on external apparatus.
[0040] Embodiments of the disclosure can enable the sender, the delivery agent, and the recipient to all separately enroll themselves manually or automatically through biometric terminals, or existing external services such that they are known biometrically to the cloud, and through the cloud to the transport case.
[0041] The self-realizing transport case knows its current contents through the use of an intrinsic RFID reading system, and RFID tagged contents. The list of the transport case’s current contents as well as the original packing list (i.e., a pack plan) is accessible through the cloud-based globally accessible enterprise-level resource management platform to anyone granted authority to access the transport case’s status. Any change in the contents due to someone removing or adding something to the transport case is immediately known to the transport case, and to all those monitoring it.
[0042] Anyone authorized through the cloud-based globally accessible enterprise-level resource management platform, and registered in the system who physically possesses the transport case will be known to the transport case through a local biometric match, and to all who are authorized to monitor the transaction.
[0043] Similar to modern All-Electronic Tolling System for the Open Road (i.e., no toll booths required) such as the updated E-ZPass, which uses multiple sensors including cameras to identify and bill someone who doesn’t have a transponder, embodiments of the disclosure can handle anyone who doesn’t have the appropriate biometric, or alternative personal ID, who opens the transport case. Said person can be visually recorded along with the context of the surrounding environment. This information, possibly along with additional information such as GPS coordinates, etc., can be made known via the cloud-based globally accessible enterprise-level resource management platform to the appropriate parties.
[0044] If you are expecting a delivery, you may be able to not only know where the shipment is located, but if you are so-authorized, you may know who is currently handling it. The recipient through an application on a cell phone, or similar device accessible to the cloud can monitor the contents of the transport case against the original, or updated Packing list. If appropriate, you can monitor external, and internal environmental conditions in addition, and most like todays remote doorbells, such as ring video doorbells, you will be able to interact with the transport case .
[0045] The following hypothetical concept of operation scenario is useful for the purposes of explaining the invention through the accompanying drawings.
[0046] FIG. 1 is an overall system view in accordance with embodiments of the present technique. FIG. 1 depicts schematically the system functionality as consistent with the preferred implementation, and in the context of the hypothetical operational scenario. Note that none of the operational aspects in this figure, or its description are limiting to this, or any other implementation of the invention.
[0047] Consider, an individual who has had successful knee surgery, and then is discharged from the Hospital 250 to either his home, or to a temporary stint in a rehab facility, and then to his home (neither is shown in the figure). In either case, his physician has prescribed both a wellness visit by a paramedical team, and a short course of opioid analgesics to relieve the post-operative pain.
[0048] The challenge is to insure that the right pain pills get to the patient, and only to the intended user.
[0049] The Solution: Transport the pills, and distribute them during the paramedic’s visit, thereby insuring that the narcotic substances reach their intended end-user via an end-to-end monitored, and reliable means of transportation. This can either be done by a certified specialty individual, or non-certified specialty individual.
[0050] Implementation: The Hospital Pharmacy 255 prepares the prescription for pick-up by the Paramedical Tech, or other Registered Courier (Collectively Courier). A Registered Courier is someone whose biometrics have been registered with the system, and are maintained in the cloud 150. An authorized coordinator prepares the“Packing Plan” for the contents of the transport case 500, and the shipping route along with the designated registered couriers“Delivery Plan” updating all relevant cloud data. The courier arrives at the Hospital Pharmacy 255, or other distribution point, and is verified through the system.
[0051] the courier’s image is captured, and verified by the transport case’s 500 external camera (not shown) using either locally or cloud-based facial recognition intelligence. This is similar to the use of facial recognition being used by the airlines for International flight boarding. If the courier has an ID badge it is scanned in conjunction with personal biometrics, and validated by the system. At the same time the contents of the transport case are scanned to insure that the correct prescriptions (not shown) have been picked-up from the pharmacy 255 by the correct person.
[0052] At the conclusion of this process the cloud 150 maintains information on: the “Pack Plan” of the transport case 500; the“Routing Plan;”“Courier ID Biometrics,” and the correct Registered Courier has the correct case in hand with its correct contents. Access to this information is provided by the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155, also referred to in this document, and others as the Global System 155, without limiting the invention in any manner.
[0053] In a hypothetical scenario the transport case 500 is carried to the next transfer point or destination. If the transport case 500 is able to communicate with the Global System 155 via Wi-Fi® 239 or other means then the collected information is transferred. In the absence of a communication link, the Case Information (e.g., contents, internal and/or external parameters such as temperature or vibration, biometric data, local imagery or video, etc.) is archived with appropriate time stamp, accompanied by relevant metadata. All updated data will be transferred to the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155 at the next available opportunity.
[0054] In such instances where direct communications to the Global System 155 is not achievable, the transport case can communicate changes in internal or external status (to be described in detail subsequently) via links involving certified mobile communications networks such as provided through vehicles, or hand held devices carried by paramedics, or other certified personnel maintaining a private mobile hot spot.
[0055] In the hypothetical use scenario for the primary, and many other embodiments of the invention, depicted in FIG. 1., the transport case 500 is carried by the delivery person to the delivery vehicle 300 which is the first intermediate point (as depicted in FIG. 4, the data and material flow diagram). The vehicle 300 with the transport case 500 travels to the residence 200, or rehab center not shown, etc. [0056] The above trusted transfer of a fully verified case and its contents from one registered handler to another registered handler can be repeated as many times as is necessary to get the case from the initial loading point to the final destination point.
[0057] Upon arrival at the point where the pills or injectable, etc., will be dispensed, the transport case 500 is removed from the vehicle 300, and hand carried to the patient, or other recipient of the medication, being delivered, etc. If so desired, constant communications can be maintained through either a link to the vehicle 300, a link to a cellular phone 400, or other means of communication carried by the paramedic or other registered delivery person, or via a direct global (e.g. satellite) link to the Global System 155. Said communications can provide the Cloud-based Globally Accessible Enterprise-level Resource Management Platform with a constantly updated position of the transport case 500, as derived from:
transport case and/or vehicle based GPS; cellular base station mediated tracking of the case and/or personal terminal; other, similar means.
[0058] When the prescription, for example item 50 having an ID tag 60, is ready to be dispensed, the identity of the paramedic, or registered delivery person, and patient or other registered recipient are verified using biometrics and/or ID tags, and the transport case 500 is opened. In either instance, the data is collected via case-home (either internal or external) sensors, locally processed and/or transmitted to the Global System 155 for verification as per the shipment routing and delivery personnel plan (delivery plan) as maintained by the Global System 155.
[0059] After the delivery is completed the transport case 500 is closed and rescanned with the updated contents compared against the case pack plan (not shown) transmitted to the Global System 155 via appropriate means.
[0060] The above process can be repeated a multiplicity of times with constant verifications, and rescans, as required, transmitted to the Global System 155, where they are maintained for archival and immediate purposes. After each delivery, the pack plan is updated with the appropriate deductions and/or additions.
[0061] Referring to FIG. 1., the present invention is shown in a system level view 100 comprising a novel system identified collectively, but not limiting as system 100. Said system provides for a hierarchical command & communications network, akin to the DOD’s Network-centric Command, and Control - enabling the global monitoring of, and communications with a local team whose nexus is one or more of a multiplicity of active transport cases identified collectively as 500.
[0062] As described previously in the above Concept of Operations hypothetical scenario, a purpose of the system is to insure the trusted transfer of high value materials, such as but not limited to medications, and medical equipment, and/or other high value contents such as: gems, gold bars, processed silicon wafers, financial, or government documents, classified apparatus, works of art. However, none of the above descriptions of the hypothetical contents of the transport case 500 are limiting in the context of the disclosure. The system 100 can assure the concomitant verification of the shipments’ contents in the case, and the personnel handling, sending, transporting, and receiving the shipment end-to- end seamlessly.
[0063] More particularly, and looking now at FIG. 1 in more detail, there is shown one embodiment of the system 100 formed in accordance with the present invention, and which incorporates:
Active transport cases 500 - to be described in additional detail subsequently— providing Biometrically-based authenticated-custody of possession, and hand off combined with automated inventory of a multiplicity of high-value, sensitive, and/or mission-critical items; one of which is shown, and identified as 50;
Local terminal 400 such as a standard, or modified cellular phone, tablet computer, or the like, capable of communicating with the transport case 500, and other local terminals, supporting local apps, and further enabling access to more remote participants;
A cloud 150 based Globally Accessible Enterprise-level Resource Management Platform 155 - Enabling authorized users at a multiplicity of locations, and with a multiplicity of purposes, as well as authorized automated systems to access information derived ultimately from the transport cases 500 located in the Field;
Any number of vehicles of all manners where the Case is resident during a transport phase of the entire shipment process. Examples include, but are not limited to: van 300, taxi or other vehicle for hire, or public transport vehicle;
Any number of facilities, or locations where the transport case 500 is deposited, placed, or set at rest in its base location. Examples include, but are not limit to: a residence 200; a rehabilitation center, nursing home neither shown; hospital 250, pharmacy 255, pharmaceutical manufacturer, or distributor 270; or other source of drugs, vault or secure depository.
[0064] Note that all of the above detail associated with the System 100 as depicted in FIG. 1, and the description of the hypothetical Concept of Operations is not limiting in the context of the prime, or any other embodiment of the disclosure, and is provided solely for the purpose of elucidation of the principals involved in the disclosure. Further, whether the transport case 500 is engaged in a mission, or in its base location at rest, or whether the entire process occurs intramural to one facility, between multiple sites within a campus, globally, or into / within / from outer space is not limiting to the disclosure.
[0065] In other embodiments of the disclosure, individual items 50 may have sensors attached to them which interface with the item’ s RFID tag 60, by such a means that the reading of the individual specially tagged item enables the monitoring of the sensor attached to each specially tagged item. Such sensors can include, for example, but are not limited to: advanced RFID tags with temperature, and humidity senor capabilities can be attached to highly sensitive specialty drugs; detectors capable of determining whether a transport case 500 has been subjected to cooperative or uncooperative external surveillance such as by: equipment using x-rays, gamma rays, or cosmic ray muons at a customs or similar location.
[0066] In other embodiments of the disclosure, sensors can be attached to the interior of the case body 520, and/or lid 540 to detect mission critical parameters, such as, but not limited to: temperature, vibration, shock acceleration, sound, air pressure, UV light, X-rays, etc. These aforementioned case sensors may communicate directly with the case electronics by wires, fiber optics, free-space optics, or they may employ RFID technology similar to the specially tagged items 50.
[0067] In other embodiments devices such as GPS equipment can be attached to the exterior of the case, and said devices may communicate directly with the case electronics, or through the network.
[0068] In some embodiments, such as but not limited to shipping containers confining the RF within them; these case sensors may communicate with the case electronics, wirelessly using any of a multiplicity of short-range wireless protocols, and frequencies without concern about external emission limitations. [0069] In the embodiment as shown schematically in FIG. 1, the transport case 500 itself provides immediate, highly visible display of the“Go/No-Go”, or base status to proximate users through the use of LED or other types of lights 650 affixed to the exterior of the front panel 530 of the transport case 500. An alternative means is by transmitting an immediate failed status to the system monitor application (“Sys-App”) 410 running on the Hand-held, or other local terminal 400 as indicated in FIG. 1.
[0070] In other embodiments, the base status may be indicated by graphic displays, or other displays mounted on specialized panels attached, or integrated into fabric elements of the exterior of the transport case 500 much in the manner of wearable electronics. In other embodiments, the transport case 500 itself may indicate a failed base status by vibrating or ringing, similar to a cellular phone announcing the reception of a message.
[0071] In still another embodiment of the disclosure, the failed base status can be immediately communicated to a cellular phone or wearable device via cellular call, Wi-Fi®, or BLE (Bluetooth® low energy) with the failed base status indicated by vibration or unique ring-tone. Note that all of the above detail associated with the alert of system status, and the description of the hypothetical Concept of Operations is not limiting in the context of the prime, or any other embodiment of the disclosure.
[0072] In many embodiments of the disclosure, such as those shown in FIG. 1 and FIGs. 2A-2C, a master status (ultimate status of the case) can incorporate: the presence/absence of items, any specific additional information on any of the specially tagged items 50, and additional information on the background conditions of the case itself.
[0073] As an example, but not limiting, specialty tagged items can report on the levels of liquids, or pressure of gas cylinders.
[0074] Similarly, background information can include, but is not limited to: images, video, temperature, and pressure data, magnetic fields, nuclear radiation, vibration amplitudes, and frequencies, peak acceleration, and shock.
[0075] In still other embodiments of the disclosure, the transport case 500 can be used as local hub for data messages and/or data streams received from external sensors or systems such as but not limited to: wearable health monitors (e.g., Color Doctor Blood Pressure Wrist Band, Oura Ring, Zephyr BioHamess™ sensor), traditional portable medical devices commonly accompanying first responders (e.g., pulse oximeters, EKG, EEG), consumer medical monitors commonly used with a smart phone (e.g. AliveCor Kardia Mobile FDA- approved, medical grade EKG recorder) and scientific instruments such as scales, scanners, or meters.
[0076] Still photographic, and/or video data can be incorporated into the master status data messages as provided by a multiplicity of internal, and external cameras. One such camera 800 is shown here mounted to the body of the transport case rear panel 535.
[0077] Individual master status data messages, and / or real-time data streams (e.g. from cameras and other sensors capable of streaming real-time) are communicated back up the chain of command through the use of Bluetooth® low energy 425, Wi-Fi® 239, direct wideband cellular links such as LTE, 5G, IEEE 802.15, or similar RF communications equipment. In some embodiments, the communications can be by guided, or free-space optics means, or via said optics means combined with RF and/or wired means.
[0078] In the embodiment of the disclosure shown in FIG. 1, the Case 500 communicates the master case status, and other messages and data streams, via Bluetooth® low energy (BLE) 425 from an antenna 460, to a local terminal equipped with BLE apparatus 450, and hosting Sys-App 410.
[0079] In other embodiments, the transport case 500 may use the antenna 460 to communicate directly with more remote sites, using means such as but not limited to: Wi-Fi® 239; Satellite Radio Links (e.g., Inmarsat). Although shown external to the transport case 500, the antenna 460 may be integrated with the computation module 620, and thus situated within the RF confinement layer. In such embodiments, the RF confinement layer can be designed to permit favorable passage of Bluetooth or Wi-Fi signals, while internally reflecting the RFID-reading signals. In some embodiments, the transport case 500 may employ other means of communicating via the Internet, as well as through cellular telephone, and/or specialized radio, or optical links.
[0080] Such remote monitoring sites may include but are not limited to: one or more fixed facilities such as a patient or recipient home residence 200 shown with associated Wi Fi® equipment 230; one or more remote vehicles such as the van 300 shown with associated Wi-Fi® Equipment 330; and a multiplicity of other portable terminal devices such as a hand- held computer, wearable computer, and/or smart mobile phone 400 shown with appropriate Wi-Fi® equipment 430.
[0081] An object of the disclosure is to provide users of the system 100 access to continuously updated master status data on the contents of a specific transport case 500, or a multiplicity of such cases, and biometric identification and/or other specific information associated with the transport of the said cases.
[0082] The invention reduces the load imposed on Primary, Secondary, and Tertiary Users of the system under current, and future application scenarios. Said users of the Invention can include but are not limited to: Primary Users; Secondary Users, and Tertiary Users.
[0083] In general:
Primary Users are those that come in direct contact with the transport case 500 in performing their natural primary function;
Secondary users are those users of the transport case 500 who’s main use of the transport case 500 involves the contents of the transport case 500 in support of the Primary Users.
Tertiary users are those users of the data provided by the system in support of Primary, and Secondary Users, or other related functions.
[0084] In turn, Primary Users can be separated into 2 categories:
Class A Primary User— Those whose primary function is that of a courier— transporting the transport case 500, and its contents en route to an event, or specific destination by hand, via a mobile platform, or in a vehicle. For example but not limited to the transport of pharmaceuticals, or medical or high value equipment, or documents to a specific destinations, or destinations;
Class B Primary User— Those whose primary function involves use of the contents of the transport case 500 such as but not limited to first responder personnel on the scene of an event, or medical emergency.
[0085] Secondary Users, are considered to be predominantly remote users involved in supporting and/or monitoring the multiplicity of transport cases 500 in use. Said users include though are not limited to: personnel in the transport central dispatch, depot, distribution, and/or warehouse facility; management, and other personnel of these, or other organization employing the invention.
[0086] In addition the transport case 500 can support other types of applications such as telemedicine, and community paramedicine, as well as others with need of access to continuously updated state on individual items, contents of individual transport cases 500, or the totality of the transport cases 500, and their respective, and/or collective contents.
[0087] This category of use can include using the transport case 500 as local Hub for collecting and disseminating data provided by remote external sensors. Example of such include though are not limited to:
Wearable Patient Sensors (e.g., BioStamp from MC10);
Portable environmental monitoring sensors which could be deployed at the scene of an event:
atmospheric parameters (e.g., wind, temperature, relative humidity);
environmental pathogens;
chemical agents;
radioactivity;
explosive residues (i.e., Collectively CBRNH);
Acoustic and other Sensors deployed at a structural collapse, or similar event to search for signs of life;
Unmanned aerial vehicles (UAVs);
Unmanned marine vehicles (UWVs);
Land mobile robots involved in surveillance, Search and Rescue.
[0088] Tertiary Users are considered to be additional users of the information generated by the transport case 500. Said users include though not limited to:
Those involved in the supply chain supporting the primary users of the transport case 500; Regulatory Agencies involved with monitoring specific items contained within one or more of the multiplicity of transport cases 500. In addition other tertiary users include those involved in tracking, or monitoring specialized information provided on any one or more items, such as though not limited to:
The temperature of temperature sensitive materials contained in one transport case 500, and/or a multiplicity of items being transported to a specific destination or event. A not-limiting example of said temperature monitoring use is the transport of vaccines, or similar thermolabile materials to a remote location with unreliable refrigeration.
[0089] Referring again to FIG. 1, in one embodiment of the invention, the transport case 500 is of a rectangular form and composed of a hollow case body 520, and a hollow case lid 540 such as in a non-limiting example a standard 1500 Series Pelican Case commonly used by emergency medical technicians (EMTs). In various embodiments, however, the case body 520 can be made of a flexible textile material or a rigid metal material. In the case of a case body 520 made of a metal material, the case body 520 itself can act as an RF confinement layer, as described in further detail below.
[0090] Said body 520 incorporates a bottom plate 521, a front panel 530, a rear panel 535, and 2 side walls, left side wall 524, and right left side wall 522 respectively. Said lid 540 is attached to the case body 520 by one or more hinges 550, affixed to the rear panel 535, of the aforementioned case body 520. The lid 540 is similarly composed of a top plate 545, a lid front wall, a lid back wall, and two lid side walls (not identified).
[0091] In the same embodiment of the invention shown in FIG. 1, when the lid 540 is closed, the lid 540 and body 520, together with a suitable conducting means of reliably, and repetitively sealing the junction between the two aforementioned primary components of the transport case 500, collectively form an isolated volume. Said volume is protected from both normal environmental exposure, and also isolated from the ambient radio frequency environment by a number of aspects of the design of the transport case 500 to be
subsequently described in detail. Further distinctive features of this embodiment of the disclosure are shown in FIG. 1.
[0092] When the lid is closed or opened, in a non-limiting example, a magnetic switch assembly changes state. Said switch assembly includes a reed switch 630, or similarly magnetically activated switch affixed to the case body 520, and an associated magnet 631 attached to the lid 540. The signal from the switch travels to the case electronics (not shown) and activates the scan of the case when so desired as enabled by hardware configuration and / or through software by setting of a remotely configurable parameter.
[0093] Using RFID technology, the transport case 500 queries all of the tagged items within the case to detect their presence, or absence. The results of said query can be compared to a pre-loaded inventory, stored internal to, and/or external to the case (e.g. in the cloud application such as the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155).
[0094] In many embodiments, the user throughout the supply chain can query the case for specific status information on one or more of the tagged items, and/or the specialized tags, as in the internet of things.
[0095] In addition to the class B Primary User, the status information is available to class A Primary User, those who are transporting the transport case 500 en route as a courier to the event, or specific destination in the vehicle 300, or by other means of transport.
[0096] In some embodiments of the disclosure, the act of opening, or attempting to open, the case triggers the case body camera 800 to record a series of images, or a video stream for verification or analysis. Such a process could be similar to recent testing by airlines of facial recognition and fingerprints to replace boarding passes at airport terminals.
[0097] Alternatively, but not limiting, the invention may be embodied by incorporating its key features, such as the RFID technology within a suitably modified standard multimodal shipping container, or typical air freight shipping container (e.g., IATA LD-3, LD-l l, etc.) wherein the existing metal body of the container constitutes the body of the transport case 500.
[0098] In still an alternative embodiment, said multimode, or air freight container may be modified either permanently, or temporarily by lining its non-conducting walls with a suitable conducting material, and the entirety of such a modified container becomes the body of the transport case 500. [0099] Referring to FIG. 2, the invention is depicted from the perspective of the transport case 500, and in the context provided by the embodiment illustrated in Fig. 1.
[0100] In FIG. 2A, one of a multiplicity of tagged items 50 is shown, in a not-limiting manner, with attached commercial-off-the-shelf (“COTS”), or custom RFID tags 60. Said tagged items 50 are shown proximate to the inner surface of the top of the lid 545, although they can be located anywhere within the internal volume of the transport case 500.
[0101] Traditionally, the process of reading RFID Tags in the open (i.e., Free Space, or in relatively sparsely occupied environment) involves transmitting Standards-based RFID RF interrogation signals. Said signals are derived from an RF carrier which has been modulated to comply with certain protocols such as those defined with the EPCglobal Gen2
Specification: EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID, Specification for RFID Air Interface - collectively the“EPC Gen2 UHF Specification”.
These interrogation signals are generated within one or more readers 720 by means of components known collectively as the“RF Transmit Chain”. Some readers 720 utilize some of the components for both the transmission, and reception phases, and thereby limit some operational flexibility, but reduce hardware costs. Note that in the context of the invention that the choice of specific reader implementation technology is not limiting.
[0102] Commonly the RF tag interrogation signals from the reader 720 are conducted via coaxial cables 765 to one, or more antennas 760.
[0103] In the open, the tag interrogation signals are radiated via one or more transmission antennas 760. The tags 60 absorb sufficient power from the transmitted RF to enable the very low power logic circuits in the tag 60 to reply. The reply from each tag 60 is coded with a unique identification number (i.e., tag ID), and also may contain other information such as included in the definition of the Internet of Things (IoT) adopted by the IEEE IoT Council. The tag's 60 reply is a coded modification of the scattering properties of the tag 60. In the ideal case one can view the code as switching the tag 60 effectively from an absorbing “black” to a reflecting“white” surface exposed to the incoming RF of the tag interrogation signal.
[0104] This coded reflection is similar to the Mode S Transponders used for air traffic control. In the case of RFID the strength of return signal from the tag 60 is determined by passive reflection, and so the returns exhibit an inverse fourth power dependence on range akin to traditional radar.
[0105] Similar to a radar system, the same antennas 760 may be used for both transmission, and reception (monostatic mode). Alternatively in the (bistatic mode) some antennas 760 may be dedicated to transmission, and others only to reception. The choice of the configuration depends on the specific application, and the particular hardware, and software involved.
[0106] The replies from each of the multiplicity of tags 60 is received by a multiplicity of reception antennas 760, and conducted to the multiplicity of readers 720 via the multiplicity of coaxial cables 765.
[0107] The readers 720 then process the RF received from the tags 60 in the presence of background signals from other tags 60, and/or other readers 720, as well as extraneous ambient signals within the operational band (e.g., the ISM Band in the vicinity of 900 MHz in the US, and EU). Since the interrogation signal is known in both frequency, and phase, it is quite straight forward to extract the information encoded in the return signals. The readers 720 then determine the unique ID’s of the tags 60 which they have detected, as well as any other information, such as but not limited to: sensor data which has been received in the signal from the tagged item 50.
[0108] FIG. 2A illustrates an embodiment of the invention with a single multi-channel reader 720 that is provided with 4 ports. The tag interrogation RF signals generated in said reader module 720 are conducted via 4 low-loss coaxial cables (735, 745, 755, 765) to 4 antennas (730, 740, 750, 760) respectively.
[0109] Each of the four antennas 730, 740, 750, 760 employed in the disclosed embodiment can be mounted parallel to, and attached to the inner surface of the outer walls of the transport case 500. Three of the antennas 730, 740, 750, 760 are attached to the case body: left side wall antenna 730 to left side wall 524; right side wall antenna 740 to right side wall 522; bottom antenna 750 to case body bottom 521 respectively. The case lid antenna 760 is attached to the top plate of the case lid 545.
[0110] In the disclosed embodiment, and as it has been reduced to practice in the concept demonstration unit using an M6E commercial off-the-shelf reader, all four of the ports share the same RF chain, and therefore only a single antenna can be active at one time in a monostatic mode.
[0111] In other embodiments, multiple RF chains enable multiple antennas to be active enabling bistatic operations.
[0112] Note that, in the context of the disclosure, the choice of RF operating mode of the reader whether monostatic, or bistatic is not limiting. Similarly, the number of antennas 760, and their associated readers 720, is also not limiting.
[0113] In other embodiments of the disclosure, the signals may be carried from the reader 720 via rigid, or flexible waveguide in place of the coaxial cable 765.
[0114] In still other embodiments, the RF signals, or their analog, or digital content may be conducted to the antennas via free-space, or guided optical means. In said embodiments, the RF is effectively regenerated at the transmit antenna much in the manner of some radar systems. In these, and other embodiments, the return signal from the tag 60 may be detected at the antenna 760, and the resultant analog, or digital content transmitted via free-space or guided optics to the reader 720. Note, that in the context of the disclosure, neither the choice of the means of transport of the RF signals to/from the reader 720, nor the RF architecture, and its implementation is limiting.
[0115] In an open, or free space reader configuration, the RF emitted by the antenna is not localized to the vicinity of the antenna; it is free to propagate.
[0116] Propagation is governed by ambient scattering, and absorbing obstacles in the path of the beam, as defined by the transmit antenna pattern. In general, at distances beyond a few times the“free- space- wavelength” (l) from the antenna, the beam can be considered a freely propagating plane wave. Beyond a few hundred wavelengths (>300 l) the outgoing RF can be considered to follow the inverse square law associated with a spherical wave-front. Indeed signals have been received from distant spacecraft transmitting at power levels comparable to those of the reader 720 depicted in FIG. 2A, from beyond the orbit of Pluto.
[0117] As a result of this propagation to infinity behavior, governments have chosen to restrict transmitted power levels, and transmitter antenna gain, to prevent interference. For example, the reader at location A, should not interfere with a similar but unrelated reader, or any other radio receiver operating at the same frequency at location B. As a result of said restrictions on the power, and/or the energy in the transmitted pulse, a given tag 60 may not receive sufficient energy from the ambient RF field to activate its circuitry, and consequently the tag 60 may not be successfully read.
[0118] Commercial, off-the-shelf (COTS) readers, such as the M6E used in the concept demonstration unit, and others complying with the Gen2 Spec will attempt to read a tag a number of times to insure a good probability of detection.
[0119] As provided in the Gen2 Spec, various operational modes of the reader are provided to deal with; conflicts between multiple readers, and a large number of tags.
[0120] The final result of the detection of the tags is a digital data stream composed of a series of messages for example, including but not limited to: tag IDs, other tag data, transmission parameters, received power, and timing information. See for example
TagReadData objects, which provide access to the information about the tag, and the metadata associated with each tag read as specified in the ThingMagic Mercury API Programmer Guide.
[0121] FIG. 2B shows a schematic view of the case body rear panel 535, and depicts the various functional blocks mounted to the case body rear panel 535, and their
interconnections: control, and computation module 620; reader module 720; power supply module 900.
[0122] Referring to FIG. 2B, the digital data stream from the reader is conveyed via the reader data and control bus 640 to the control and computation module 620. The computation module 620 can include a computing system, such as the computing system 1100 described further below with reference to Figure 11. This data and control bus also is used to set reader operating parameters, and control commands (such as Read on Command or, Retry the Read, etc.).
[0123] In many of the embodiments of the invention including the embodiments depicted in FIG. 2, the control and computation module 620 is also connected to a multiplicity of peripheral elements via a multiplicity of digital data buses, and individual data lines, including but not limited to: “Press to Scan” push button 660 mounted on the rear panel 535, and connected via press to scan line 665 ;
“Close Case to Scan Magnetic Switch” 630, mounted on the case body left side wall 524, connected via magnetic switch line 635. Its associated Magnet 631 is mounted to the case lid left side wall 541;
Case body camera 800, a digital still, and/or video camera mounted on the rear panel 535 looking toward someone opening the case. Said camera 800 is connected via camera control, power and data bus 810;
Biometric sensor located in the handle 537 (e.g., a biometric fingerprint module 850) connected via a biometric module bus 855.
[0124] FIG. 2C shows a view of the outer surface of the front panel 530, and depicts schematically how the Go/No go status is indicated via LEDs illuminated as appropriate on an indicator module 650. Said module is mounted on the front panel 530, and connected to the control and computation module 620 by the status indicator bus 655.
[0125] Also located on the front panel 530 is the master on/off switch 930 which is connected to the power module 900 via the master switch bus 935. In some embodiments, energy for the transport case 500 can be stored in rechargeable cells contained within the power module 900 which is mounted to the case body back panel 535.
[0126] In some embodiments the device is charged, and recharged inductively by placing it in the vicinity of an inductive charging unit.
[0127] Power to operate the control and computation module 620 is provided by the control and computation module power bus 910. Power to operate the reader 720 is provided via the reader power bus 920.
[0128] In some embodiments, all power and data flows between the three major modules: reader module 720, the control and computation module 620, and the power module 900 can be via USB busses.
[0129] In some embodiments, all of the functional blocks are integrated onto a single master board. In some other embodiments, the functional blocks can be further integrated onto a single integrated circuit (IC), system on a chip (SOC), or system in package (SIP). [0130] Note that the choice of a particular partitioning of functions into specific COTS, and/or custom hardware modules as depicted in FIG. 1, FlGs. 2A-2C, FIGs. 3A and 3B, and the method of interconnection between the functional modules, is illustrative only and not intended to limit the disclosure.
[0131] FIGs. 3A and 3B show schematic views of the case body 520 highlighting key RF aspects of the preferred embodiment of the invention depicted in FIG.l and FIGs. 2A-2C.
[0132] Referring to FIG. 3A, an example of a multiplicity of tagged items 50 with associated RFID tags 60 are shown contained within the hollow rectangular volume defined by the case body 520 and lid 540 of the transport case 500.
[0133] The case body 520 and case lid 540 not only provide protection and isolation from external environmental elements (as is typical for Pelican, and other similar types of transport cases), but they can collectively provide electromagnetic, and RF isolation between the ambient environment outside, and the contents, and electronic equipment associated with the invention contained within the transport case 500.
[0134] In the preferred embodiment, the walls of the case body 520 and case lid 540 are formed of a material such as, but not limited to: moldable plastics for example,
Polypropylene, which provides both mechanical protection, and an environmental barrier.
[0135] Referring to FIG. 3A, the case body 520 is indicated by a dashed line. The outer structural and environmental layer 543is indicated generically as the solid line. To isolate the contents of the transport case 500 electromagnetically from the ambient RF environment, the inner surface of the case body 520 and case lid 540 are coated with a continuous thin electrically conducting surface identified as the RF confinement layer 770. In one embodiment, this coating is vacuum deposited Aluminum. In other embodiments, the RF confinement layer can include any metal or metal alloy with sufficient conductivity.
[0136] Also in this embodiment, and many others, the aluminum layers is further overlain with one, or more mechanically protective layer(s) such as thin spray-applied polymer coatings (not shown for clarity in this view). The innermost coating is electrically insulating, and transparent to RF. [0137] FIG. 3B shows a cross section through the case bottom 520 viewed from the perspective of the front panel, with the case resting on the right side, and front panel facing outward.
[0138] Referring now to FIG. 3B, in many embodiments of the invention, the case bottom 520 is composed of multiple layers (leftmost to right in FIG. 3B):
[0139] Outer mechanical and environmental layer 543; in many embodiments this is a hard, or semi-flexible plastic such as molded polypropylene. In other embodiments this layer may be flexible fabric which may contain embedded stiffeners such as in the construction of a mountaineering rucksack where the outer layer is fabricated out of Rip-Stop Nylon fabric with embedded nylon rod, or strip stiffeners.
[0140] The RF confinement layer 770 can be composed of a vacuum deposited layer of a conductor such as Aluminum. In some embodiments the RF confinement layer 770 can be an Aluminum spray-coating applied to a solid underlayment. In still other embodiments the RF confinement layer 770 can be a sheet of metalized fabric.
[0141] A mechanical protection layer 547 is designed to protect the RF confinement layer 770 from mechanical damage. In some embodiments, this layer is composed of a polymer coating sprayed onto the RF confinement layer 770. The mechanical protection layer 547should not interfere with the RF fields present within the volume of the transport case 500. In some embodiments, the mechanical protection layer 547 may be another layer of fabric, or a thin sheet of plastic.
[0142] In some embodiments the Mechanical protection layer 547 and the RF confinement layer 770 can be one sheet of metalized fabric such as rip-stop nylon as is commonly used for RF isolation.
[0143] In still other embodiments, all three of these layers 543, 770, and 547 may be fabricated from fabric such as Rip-Stop Nylon, with the three layers formed by metalizing one surface of a sheet of fabric, and then bonding a second sheet of fabric to the first with the metallization sandwiched in the middle.
[0144] The innermost layer shown to the extreme right in FIG. 3B, is the packaging inset 549 which contains, and restrains the tagged items 50. In some embodiments, it is plastic open cell foam wrapped with nylon fabric, and divided into multiple compartments to hold, and restrain the various types of tagged items. In other embodiments, the packaging inset 549 is composed of a COTS plastic foam, or similar material with holes or recesses into the foam, and which may or may not be lined with a fabric to protect the foam as is common in Pelican, and similar transport cases.
[0145] Just as for the inner mechanical protective layer 547, the choice of material for the packaging inset 549 is only limited to it having minimal effects on the RF fields present within the volume of the transport case 500 when the system is scanning.
[0146] In a similar manner, the case lid 540 is composed of comparable layers, except that in the preferred embodiment, the case lid 540 packing inset, the inner most layer of the case lid 540 consists of a sheet of attached plastic pouches used to contain the individual tagged items 50. Just as in the manner of the case body inset 549, the choice of material, and form for the case lid packing inset is only limited to them having minimal effects on the RF fields present within the volume of the transport case 500 when the system is scanning.
[0147] Several aspects of the system are related to the RF isolation between the interior of the transport case 500 and the ambient environment including but not limited to:
All RF Fields transmitted 780, and scattered 785 present in the interior are strongly attenuated by the RF confinement layer 770, which, in some implementations, can be a micron thickness aluminum coating. This attenuation can be estimated by simple calculations involving the RF skin effect at the UHF frequencies employed by this and many other embodiments. Thus the unit can operate at power levels in excess of those specified for use in the ISM Band by the FCC, and similar governmental limits imposed in the EU, Japan, China, Russia, etc. This hypothetical higher power operations can permit the detection of tagged items in the presence of a multiplicity of absorbers within the case. A not limiting example is the situation where EMTs may be carrying significant quantities of saline solutions which could lead to significant RF absorption;
A further consequence of the confinement layer 770 is that the electric fields associated with RF waves 780, 785 are forced to meet the condition that in the ideal condition with perfectly conducting walls, the E field component parallel to the conducting walls is zero. As a result, the transport case 500 functions as a more or less lossy RF cavity depending on the particular materials contained within it. This can result in successful detection with reduced RF transmission levels. Alternatively this can enhance the probability of detection of all tagged items 50 in a given time window, and/or the ability to reduce the scan time for reliable complete detection.
[0148] A potential consequence of the RF confinement layer 770 is that operation of the RF scan with the transport case 500 open may need to be restricted in order to limit the potential for operation outside of the specifications for the ISM band.
[0149] Regarding the two antennas— that is, the antennas 730, 740, 750, 760 for reading tags 60, and the antenna for communicating 460 for communication outside of the case— the radio-frequency (RF) confinement layer enclosing an interior of the transport case when the lid is closed can be specified and manufactured to provide selective transmission and reflection of the signals from the various classes of antennas within the transport case 500. The transport case 500 includes a first class of antenna for transmitting and receiving first wireless signals to and from the transport case [typically with Wifi { e.g. 2.4 Ghz or 5GHz } or Bluetooth { between 2402 and 2480 MHz, or 2400 and 2483.5 MHz}] . Additionally, the transport case 500 includes a second class of antenna for transmitting and receiving second wireless signals to and from one or more RFID-tagged items contained within the transport case (Typically around 9000 MHz in the US and mid 800 MHz in EU and some other jurisdictions).
[0150] In some embodiments, the two classes of antennas are configured as to place the second class of antenna [RFID antenna] which may be a multiplicity of antennas one or more of which might be energized or connected to the processor at a given time [as per the typical practice with UPC Gen 2 UHF RFID“readers”] within the RF Confinement, and the first class of antenna [used for external communications] mounted external to the RF
Confinement.
[0151] However, if there are conductors passing from within the Confinement to the exterior there will be some leakage of the approximately 900 MHz RFID excitation signal which could trigger the“read” of tags external to the Case or which could be detectable external to the case in violation of the applicable FCC regulations [or equivalent in other jurisdictions]. There are four principal means of minimizing such interference. [0152] [1] Generate and detect externally the 900 MHz signals associated with the second class of antennas [RFID reader antenna] using a non-conducting connection such as a fiber optic passing through a minimal diameter penetration through the wall of the case including the RF confinement layer. Said fiber optic would carry the digital information to be communicated by the external radio transmitter/receiver system to/from the external antenna. Alternatively, said fiber optic could carry on an optical carrier the RF signal to be transmitted and received by a optical modem connected to the externally mounted antenna.
[0153] [2] Generate and detect internally the RF signal and transmit it through a penetration in the RF confinement via a shielded cable such as a coaxial cable carrying the RF directly to/from the antenna with the imposition of a RF filter in the“coaxial RF chain” to strongly reject the approximately 900 MHz signals associated with the second class antenna [RFID reader antenna]. The challenge is that it is difficult to strongly attenuate a single frequency [or a narrow band of frequencies] which is relatively near to the desired frequency [in this case associated with the communications via first class of antenna]. The greater the separation the easier the task. Attention must be paid to the actual penetration as it tends to act as a slot or similar type of antenna with emissions depending on the ratio of dimension of the penetration to the wavelength of the desired RF signal to be rejected. [900 MHz has a free space wavelength of 3x108 / 9xl08meters == 300 mm; any hole greater than 30 mm diameter would be a serious radiator; any hole less than 1 mm should not be a problem].
[0154] [3] Generate / detect externally the 900 MHz signal as in [1] with the digital information being transmitted to/from the internal processor via a cable penetrating the RF Confinement as in [2]. Said cable may be a coaxial cable or a twisted pair [shielded or not] with a filter interposed as in [2].
[0155] A variant of [3] is to package the external RF components [RF transponder or modem] within a separate shielded enclosure with the two enclosures so positioned and located so that the shielding is contiguous and uninterrupted with the most minimal penetration through the primary RF confinement and so equipped with a ferrite bead or other type of RF choke. Said RF would then be conducted to/from the antenna and the external RF chain used for communications via a suitable RF connector and associated coaxial cable providing a minimal direct path for the signals associated with the second class of antenna· [0156] A slight modification of this has been utilized in the embodiment as shown in FIGs. 1 and 2. The digital signals were transmitted to/from an external RF modem connected to the first class of antenna by means of a USB shielded connector with suitable filtering of the digital signals to remove or maximally attenuate the 900 MHz RFID signals. The system was tested to insure that with the case closed that minimal interference was detectable exterior to the case.
[0157] [4] Fabricate the case or the RF confinement layer in such a manner as to make the material or its fabrication itself frequency selective. Such an implementation would permit all of the RF to be generated / detected inside of the RF confinement layer. Signals of interest associated with the first class of antenna would be only weakly affected by the presence of the RF confinement layer. Simultaneously the RF confinement layer would reflect and attenuate the signals associated with second class of antenna [the RFID reader antennas]. Two means are relatively feasible in both:
[0158] The frequencies associated with the two classes of antennae are so disparate that holes able to transmit a frequency in the THz or similar band with minimal attenuation [e.g. 900 GHz associated with a“free space wavelength” of 3 x 108/ 9 X1011 = 300 micron] while strongly attenuating the approximately 30 cm wavelength associated with the 900 MHz RFID frequency.
[0159] The material itself can be sufficiently thin or composed to have a sufficiently high resistivity that the skin depth is such that a significant magnetic component of the frequency associated with first class of antennas penetrates while the frequency associated with second class of antennas is reflected. In this case the communications frequency would be much lower than that associated with the RFID reading process. The amount of penetration in a homogenous material depends on the thickness of the material measured in terms of the wavelength. Longer wavelengths penetrate more than shorter wavelengths. Such a system has been in use for many years to communicate with submerged submarines - where the wavelength of interest corresponds to very low frequencies. Therein the difficulty of such a system as the bandwidth of the data being transmitted is similarly low.
[0160] Note: Rule of thumb is that the conductor should be about 3 to 5 times the skin depth to insure full isolation of the magnetic fields due to the currents in the conductors although most of the magnetic field is confined to about 1 to 2 skin depths. [0161] Note that depending on dimensions of the transport case 500, the number and type of RF modes which can be present may be limited, giving rise to some temporary dead spots which will move within the transport case 500 from pulse-to-pulse as the typical reader changes frequencies through the ISM band.
[0162] Subsequent figures will describe some of the RF modeling used to predict behavior, and contrast it with observed behaviors associated with one embodiment of the invention, which has been reduced to practice in the Concept Demonstration Unit.
[0163] FIG. 4 is a diagram depicting the flow of material objects and data objects throughout the system. As stated previously, the embodiments of the disclosure provide for a hierarchical command & communications network enabling the trusted transfer of high value materials, such as medications, and medical equipment. The system assures the concomitant verification of the shipments contents in the case, and the personnel handling, sending, transporting, and receiving the shipment end-to-end seamlessly.
[0164] More particularly, and looking now at FIG. 4 in more detail, there is shown how information, and material objects are coupled as the system proceeds from State to State indicated by the Ordinal Numerals 1, 2, 3, 4.... Physical objects, e.g., the multiplicity of transport cases 500 are represented by the Nominal Numbers 11, 12, 13, 14... as they move in physical space, and state space. Information objects associated with corresponding aspects of the physical objects are represented by the nominal numbers 21, 22, 23, 24... as they move in state space.
[0165] The key distinction between the physical objects, and the information objects is that the latter move back, and forth between a permanent repository in the cloud 150, and the multiplicity of physical objects such as the aforementioned transport cases 500 collectively identified in FIG. 1 as transport cases 500. Information objects may be modified by users through the Cloud-based Globally Accessible Enterprise-level Resource Management Platform 155 in FIG. 1. Alternatively, modification can result from physical object-related activity. As an example the change of the master status of one or more of the multiplicity of transport cases 500 in FIG. 1 due to the change in quantity of the materials inside the case of one or more of the tagged items 50.
[0166] Information objects may be queried, viewed, and altered either locally through an application or“App” 410 in FIG.l, accessed via terminal 400, or remotely through another means of accessing the Global System 155 in FIG. 1. Irrespective of the form of access, the information objects can reside in the cloud as a series of linked database entries:
Master status information updates of a transport case 500 are stored in a contents information database 154;
Biometric, or other identification information on the personnel handling the transport case 500 at any time including the levels, and types of access granted to the individuals are stored in a transporter information database 158;
Physical routing information on the path, and transfer points involved in completion of a particular mission of the transport case 500 at any time, are stored in a location information database 156.
[0167] The following, non- limiting scenario can be used to elucidate the flows of physical and information objects depicted in Figure 4.
[0168] In this hypothetical scenario, an embodiment of the disclosure is illustrated in the form of an automated Crash Cart or Code Cart used in hospitals, and other medical facilities to resuscitate patients suffering cardiac arrest, or similar life-threatening emergencies. All of the supplies used for resuscitation are tagged, and contained within one or more removable drawers, one or more of which can be configured as the transport case 500 in FIG. 1.
[0169] The System evolves as follows:
State“Alert & Ready” 1— the Code Cart is waiting for a call in a local storage area of a ward, floor, or unit. When someone in the unit is in trouble, the Cart and its contents 11 are rapidly moved to the bedside of the patient. While the Cart is in motion, it is being tracked, and its current location is updated continuously with appropriate modifications to physical routing information 21 stored in the database 156. This tracking insures that in a complicated physical layout of an older hospital that the Cart arrives as expeditiously as possible - as minimizing transit time is vital.
State“Arrival and Use” 2 - the Cart has arrived at the patient's bedside, and it is put to use saving the patient. The various drawers, and compartments are opened, and pharmaceuticals, and items are withdrawn for use as required.
In the hypothetical operational scenario the use of the particular disposable item, or pharmaceutical in the Active Cart 12 may be automatically detected with appropriate modifications made to the contents information stored in the database 154.
Alternatively, at the completion of its use— the now used Cart is scanned, and updates are made to the information objects.
Depending on the specific items used in the resuscitation the hospital pharmacy, and or the stock room are automatically notified, and the hospital transportation department is notified (as is done traditionally) to bring a replenished, and replenished Cart to be on alert at the particular hospital unit in question, and to retrieve the Cart which was used.
State“Used Cart” 3— ready for transport to the pharmacy and/or stock room to be restocked, and replenished.
State“Ready for Replenishment” 4— the Cart has arrived to be replenished.
Depending on hospital procedures, and practices the suppliers of the items being replaced, or refilled can be notified as can be regulatory agencies if quantities of controlled pharmaceuticals are involved. When replenishing of the cart is completed the cart is scanned, and the appropriate databased items are updated.
Note several intermediate states involving transportation among pharmacy, and stock room are omitted for clarity. During all of the transport phases the location of the Cart, and other physical routing elements in the cloud can be updated.
State“Standby” 5— the now replenished Cart is on stand-by in the central storage waiting to be dispatched to a unit to replace another Cart which is currently in alert state.
[0170] Note: that all of the above detail associated with the System as depicted in FIG. 1, and the description of the hypothetical use scenario, is not intended to be limiting, but is provided solely for the purpose of elucidation of the principals involved in the invention. Further, whether the Case is engaged in a mission, or in its base location at rest, or whether the entire process occurs intramurally to one facility, between multiple sites within a campus, globally, or universally is not limiting to the invention.
[0171] FIG. 5 is a photograph of an example transport case 500 and a mobile terminal 400. Referring to FIG. 5, the transport case 500 is shown open, and outfitted as would be typical of its use as a dispatch case for an emergency medical team. The elements which are numbered have been previously described in FIGs. 1, 2A-2C, and 3A-3B, including: Case body 520 containing all of the electronics (not shown);
Body packing inset 549 containing several tagged items 50;
Hinges 550;
Case lid 540 with attached lid packing inset 552, containing several tagged items 50.
[0172] Also shown in FIG. 5, is a laptop computer acting as the mobile terminal 400 shown in FIG. 1, and hosting the mobile application 410.
[0173] FIG. 6 is a photograph of the case body for the case shown in FIG. 5, with body packing inset 549 containing several tagged items 50, removed, and placed adjacent to the transport case 500.
[0174] FIG. 6 highlights several of the non-operating, and operating components, including:
Lid packing inset 552 containing several tagged items 50, one of which is identified; Antennas left 730; right 740; and bottom 750; with associated rf cables (735, 745,
755) shown within protective sleeving;
Status indicator bus 655 connecting the Go/No Go status LEDs located within the indicator module 650 to the case electronics mounted on the back panel 535.
Note the case electronics are shown within their protective enclosures, mounted to the back panel. Also shown in the figure is the power module 900, which is mounted to the case body back panel 535 (see F1G.1).
Power module 900 provides power to operate the reader module 720, and the control & computation module 620 via control & computational power bus 910, and the reader power bus 920 respectively.
Also shown is the O-ring groove in the lid walls 560 with the O-ring removed for clarity of visualization, and the accompanying O-ring tongue 562 formed on the top of the walls of the body of the case.
FIG. 7 is a photograph of the case lid 540 with case lid packing inset 552, containing several tagged items 50; one of which is identified. Referring to FIG. 7, the case lid packing inset 552 has been partially removed to highlight aspects of the case lid 540 inner structure. FIG. 7 shows: The case lid 540; The top of the case lid 545 ;
With the blue color of the mechanical protection layer 547 on its inner surface;
Lid mounted top antenna 760 with RF coaxial cable 765 shown in its protective sleeve.
[0175] FIG. 8 is a photograph of the Case depicted in FIG. 5, and previously described, in its closed, and ready-for-travel, or ready to be opened configuration. Referring to FIG. 8, several elements are highlighted identified including:
The black Polypropylene outer mechanical environmental layer 543 (see for instance in FlGs. 3A and 3B) of the case lid 540, and case body 530, respectively;
The indicator module 650 mounted to the front panel 535, and highlighting the Go/No Go Status LEDs (not individually identified).
[0176] FIG. 8 also highlights several features associated with a typical base used for transport, Pharmaceutics, medical devices, and other high-value, and/or mission-critical items. Referring to the figure several security, and integrity features are identified including:
Two double throw latches 562;
Two padlockable hasps 564;
Automatic pressure equalization valve 556.
[0177] None of the above are in any way limiting to any embodiment of the disclosure.
[0178] We have used commonly available electromagnetic field modeling software (i.e., EMF tools) to calculate the performance of the antennas used to couple the RF from the reader 720 RF chain into the volume of the transport case 500 and to couple the returned power from the tags back to the reader 720. We first modeled the ideal antennas in free-space and then again inside a virtual case.
[0179] We also fabricated Antennas based on the ideal antennas, and compared the return loss of the model, and the fabricated antenna respectively. Return loss is a parameter used to characterize the effectiveness of coupling the RF input power flowing into the antenna to the power emitted into space. Note a return loss of 0 dB implies that all of the power is reflected back into the RF chain (potentially damaging components), while a return loss of infinity implies perfect emission. Realistic“good” antennas typically are in the range of 10 to 20 dB return loss implying that 90% to 99% of the input power is transmitted from the antenna·
[0180] Note: that ideally these Antennas should be measured within the transport case 500 with appropriate content items 50 and tags 60. However, this is a challenging measurement, and so for the ultimate proof of concept we depended on successfully reading all of the tags 60 on the items 50 which we placed in the case.
[0181] FlGs. 9A-9D show antenna (RF launching or coupling structures) utilized in the concept demonstration unit for the invention. Specifically:
FIG. 9A shows the design of the patch antenna with dimensions (all dimensions are in mm);
FIG. 9B shows a photograph of the patch antenna as constructed out of copper foil applied to a corrugated plastic backing, with attached micro coaxial cable and RF connector (not shown);
FIG. 9C shows the results of a simulation of the antenna as designed;
FIG. 9D shows the results of the fabricated antenna as measured for the initial state (Red curve) and then as tuned to be more congruent with the operational band (Blue curve).
[0182] Commonly available EMF modeling tools were used to calculate expected electric fields in the enclosed case with the assumptions of ideal conducting walls, and terminated antennas which are not excited.
[0183] The following parameters were used in the model:
The fields are all computed mid-band @ 915 MHz.
The free space wavelength l is 327.9 mm.
The model is based on a 18 15/16" (X) x 14½"(Y) x 7¾"(Z) or (481.0 x 368.3 x 196.9) mm box with electrically conducting walls. Total volume of 3.487x107 mm3 which 0.9899 measured in l3.
The l3 refers to measuring each of the dimensions of the box in terms of the free space wavelength l = 327.9 mm. Then you get the product of (481.0/ 327.9) (368.3/327.9) (196.9/327.9) = 0.9899 measured in cubic l— a figure of merit for the model.
[0184] Since one dimension is less than one l, and even the largest dimension is only about 1.5 l, clearly traditional approximations used with antenna theory will not be valid antenna theory and microwave cavity approximations.
[0185] The forward power into the antenna is 0.5W from a 50 ohm source which is consistent with the operating parameters of the M6E Reader used in the experimental work with the Concept Demonstration Unit.
[0186] FlGs. 10A-10C show plots generated by modeling the case as a perfectly conducting rectangular box with six patch antenna similar to the antenna shown in FIG. 9B, installed on each of the faces of the interior of the box. In the Concept Demonstration Unit, only 4 antennas were installed (no antennas were installed on the long— i.e., top and bottom— faces of the box).
[0187] Note only one antenna is energized for each of the plots. Specifically:
FIG. 10A shows the framework of the box used in the simulation work (all dimensions are in mm);
FIG. 10B shows the results of a simulation of the RF fields present within the case volume with the bottom antenna energized contour plot of electric field on the midplane of the box, where the midplane is defined as a cross section of the box roughly halfway between, and parallel to, the top and bottom faces of the box;
FIG. 10C shows the results of a simulation of the RF fields present within the case volume with the left sidewall antenna energized contour plot of electric field on the midplane of the box.
[0188] We also modeled the fields in the box with several antennas present:
The unexcited antenna was terminated;
The plots show the behavior of an antenna mounted on the bottom or top surface of the case and also an antenna mounted on the side walls.
[0189] Referring specifically to the horizontal 2D contour plots on the plane in the middle of the box (XY-plane) shown in FIG. 10B (for the bottom antenna energized), and FIG. 10C (for the left side antenna energized). Both produce fairly uniform E field distributions, although there are weak fields in the comers and somewhat less of a decrease in the center of the box.
[0190] This was consistent with measured performance during the experimental work with the Concept Demonstration Unit. We were able to demonstrate reliably reading of all of the tags associated with the items which were placed both in the inset in the body of the transport case, and also in the inset attached to the case lid.
[0191] Note that the experimental apparatus, nor the modeling of the EM fields nor the modeling of the antenna performance are provided as illustrative only, and are not intended to limit embodiments of this disclosure. None of the simulations, nor the measurements made with the Concept Demonstration Unit are intended to be limiting upon the disclosure in any way.
[0192] Note that all of the above detail associated with the system as depicted in FIG. 1, and the description of the hypothetical use scenario, Concept Demonstration Unit experiments, and associated computer modeling, and simulation is not limiting in the context of the prime, nor any other embodiment of the invention, and is provided solely for the purpose of elucidation of the principals involved in this disclosure.
[0193] Figure 11 is a block diagram of a computing system 1100 suitable for
implementing the computing systems described in Figure 1. The example computing system 1100 is suitable for use in implementing the computerized components described herein, in accordance with an illustrative implementation. In broad overview, the computing system 1100 includes at least one processor 1110 for performing actions in accordance with instructions and one or more memory devices, such as stable storage 1140 or cache 1180, for storing instructions and data. The illustrated example computing system 1100 includes one or more processors 1110 in communication, via a bus 1120, with stable storage 1140, at least one network interface controller 1130 with network interface port 1160 for connection to a network (not shown), and other components 1150, e.g., input/output (“I/O”) components 1170. Generally, the processor(s) 1110 will execute instructions received from memory. The processor(s) 1110 illustrated incorporate, or are directly connected to, cache memory 1180. In some instances, instructions are read from stable storage 1140 into cache memory 1180 and executed by the processor(s) 1110 from cache memory 1180. [0194] In more detail, the processor(s) 1110 may be any logic circuitry that processes instructions, e.g., instructions fetched from the stable storage 1140 or cache 1180. In many embodiments, the processor(s) 1110 are microprocessor units or special purpose processors. The facilitation system 130 may be based on any processor, or set of processors, capable of operating as described herein. The processor(s) 1110 may be single core or multi-core processor(s). The processor(s) 1110 may be multiple distinct processors.
[0195] The stable storage 1140 may be any memory device suitable for storing computer readable data. The stable storage 1140 may be a device with fixed storage or a device for reading removable storage media. Examples include all forms of non-volatile memory, media and memory devices, semiconductor memory devices (e.g., EPROM, EEPROM, SDRAM, and flash memory devices), magnetic disks, magneto optical disks, and optical discs (e.g., CD ROM, DVD-ROM, or Blu-Ray® discs). A computing system 1100 may have any number of stable storage devices 1140.
[0196] The cache memory 1180 is generally a form of computer memory placed in close proximity to the processor(s) 1110 for fast read times. In some implementations, the cache memory 1180 is part of, or on the same chip as, the processor(s) 1110. In some
implementations, there are multiple levels of cache 1180, e.g., L2 and L3 cache layers.
[0197] The network interface controller 1130 manages data exchanges via the network interface 1160 (sometimes referred to as a network interface port). The network interface controller 1130 handles the physical and data link layers of the OSI model for network communication. In some implementations, some of the network interface controller’s tasks are handled by one or more of the processor(s) 1110. In some implementations, the network interface controller 1130 is part of a processor 1110. In some implementations, a computing system 1100 has multiple network interfaces 1160 controlled by a single controller 1130. In some implementations, a computing system 1100 has multiple network interface controllers 1130. In some implementations, each network interface 1160 is a connection point for a physical network link (e.g., a cat-5 Ethernet link). In some implementations, the network interface controller 1130 supports wireless network connections and an interface port 1160 is a wireless (e.g., radio) receiver/transmitter (e.g., for any of the IEEE 802.11 protocols, near field communication“NFC”, Bluetooth, ANT, or any other wireless protocol). In some implementations, the network interface controller 1130 implements one or more network protocols such as Ethernet. Generally, a facilitation system 130 can exchange data with other computing devices via physical or wireless links using a network interface 1160. The network interface 1160 may link directly to another device or to another device via an intermediary device, e.g., a network device such as a hub, a bridge, a switch, or a router, connecting the facilitation system 130 to a data network such as the Internet.
[0198] The computing system 1100 may include, or provide interfaces for, one or more input or output (“I/O”) devices. Input devices include, without limitation, keyboards, microphones, touch screens, foot pedals, sensors, MIDI devices, and pointing devices such as a mouse or trackball. Output devices include, without limitation, video displays, speakers, refreshable Braille terminal, lights, MIDI devices, and 2-D or 3-D printers.
[0199] The other components 1150 may include an I/O interface, external serial device ports, and any additional co-processors. For example, a computing system 1100 may include an interface (e.g., a universal serial bus (“USB”) interface) for connecting input devices, output devices, or additional memory devices (e.g., portable flash drive or external media drive). In some implementations, a facilitation system 130 includes an additional device 1150 such as a co-processor, e.g., a math co-processor can assist the processor 1110 with high precision or complex calculations. Implementations of the subject matter and the operations described in this specification can be implemented in digital electronic circuitry, or in computer software embodied on a tangible medium, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Implementations of the subject matter described in this specification can be implemented as one or more computer programs embodied on a tangible medium, i.e., one or more modules of computer program instructions, encoded on one or more computer storage media for execution by, or to control the operation of, a data processing apparatus. A computer storage medium can be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination of one or more of them. The computer storage medium can also be, or be included in, one or more separate components or media (e.g., multiple optical discs, magnetic disks, or other storage devices). The computer storage medium may be tangible and non- transitory.
[0200] The operations described in this specification can be implemented as operations performed by a data processing apparatus on data stored on one or more computer-readable storage devices or received from other sources. [0201] A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
[0202] The processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform actions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., a field programmable gate array (“FPGA”) or an application specific integrated circuit (“ASIC”)· Such a special purpose circuit may be referred to as a computer processor even if it is not a general-purpose processor. Multiple processors, or a multi-core processor, may be referred to in the singular, as a processor, e.g., when working in concert.
[0203] While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular implementations of particular inventions. Certain features that are described in this specification in the context of separate implementations can also be implemented in combination in a single
implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination. [0204] Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the
implementations described above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
[0205] References to“or” may be construed as inclusive so that any terms described using“or” may indicate any of a single, more than one, and all of the described terms. The labels“first,”“second,”“third,” an so forth are not necessarily meant to indicate an ordering and are generally used merely to distinguish between like or similar items or elements.
[0206] Thus, particular implementations of the subject matter have been described. Other implementations are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In certain implementations, multitasking or parallel processing may be utilized.

Claims

CLAIMS What is claimed is:
1. A system for improving supply chain security, the system comprising:
a transport case including:
a case body having a closable lid and a lock configured to:
secure the lid in a closed position, and
release the lid upon matching a received input to a stored key;
a sensor configured to sense a state of the lid;
a radio-frequency (RF) confinement layer enclosing an interior of the transport case when the lid is closed;
a first antenna for transmitting and receiving first wireless signals to and from the transport case;
a second antenna for transmitting and receiving second wireless signals to and from one or more RFID-tagged items contained within the transport case; and
a processor coupled to the lock, the sensor, the first antenna, and the second antenna and configured to:
obtain the stored key and provide it to the lock;
detect the items contained within the transport case using the second antenna;
transmit, using the first antenna, an inventory of the detected items; and
transmit, using the first antenna, an event notification based on the sensor sensing a change in the state of the lid; and
a remote server configured to:
provide, to the transport case, the stored key corresponding to an individual granted access to the transport case;
receive the inventory and the event notification from the transport case;
update a database based on the inventory and the event notification received from the transport case; and
provide a record of chain of custody of the items contained within the
transport case.
2. The system of claim 1, wherein the RF confinement layer includes an approximately 1 micron thick layer of vacuum deposited aluminum.
3. The system of claim 1, wherein the RF confinement layer includes a rigid metallic surface.
4. The system of claim 1, wherein the case body is metallic and constitutes the RF
confinement layer.
5. The system of claim 1, wherein the processor is configured to only attempt to detect the items contained transport case when the lid is in the closed position.
6. The system of claim 1, wherein the processor is configured to detect the items contained transport case based on the sensor sensing that the lid is has been closed.
7. The system of claim 1, wherein the processor is configured to transmit, via the first
antenna, a stored second event notification and a stored second inventory based on the processor discovering a network connection following a period of no network connectivity.
8. The system of claim 1, comprising:
a terminal configured to receive the record of the chain of custody from the remote server.
9. The system of claim 8, wherein the remote server is configured to push a chain of custody update to the terminal upon receiving the event notification from the transport case.
10. The system of claim 8, wherein the processor is configured to transmit a notification in the event of unauthorized access of the transport case, and the remote server is configured to push an alert to the terminal upon receiving the notification from the transport case.
11. The system of claim 1, wherein the case body is made from a rigid polymer material.
12. The system of claim 1, wherein the case body is made from a flexible textile material.
13. The system of claim 12, wherein the case body comprises the RF confinement layer sandwiched between a first layer of the flexible textile material and a second layer of the flexible textile material.
14. The system of claim 1, wherein an item of the one or more items includes an
environmental sensor capable of detecting one or more of temperature, vibration, air pressure, sound, or radiation, and the processor is configured to retrieve a reading from the sensor when detecting the item.
15. The system of claim 1, wherein an item of the one or more items is a medical device or scientific instrument, and the processor is configured to receive data from the medical device and transmit the data, via the first antenna, to the remote server.
16. The system of claim 15, wherein the transport case includes a third antenna for
communicating with the medical device or scientific instrument.
17. The system of claim 1, wherein the first antenna and the second antenna are both
positioned within the interior of the transport case, and the RF confinement layer is configured to allow most of the first wireless signal to pass through the RF containment layer, while preventing most of the second wireless signal from passing through the RF containment layer.
18. The system of claim 1, wherein the lock includes a biometric lock.
19. The system of claim 1, wherein the transport case includes a still or moving image camera coupled to the processor and configured to take a still or moving image of a region outside of the transport case.
20. The system of claim 17, wherein the processor is configured to cause the camera to take the still or moving image in response to an attempt to release the lock.
21. The system of claim 17, wherein the processor is configured to cause the camera to take the still or moving image in response to an opening of the lid.
PCT/US2019/013866 2018-01-17 2019-01-16 Improvements to supply chain security WO2019143734A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862618479P 2018-01-17 2018-01-17
US62/618,479 2018-01-17

Publications (1)

Publication Number Publication Date
WO2019143734A1 true WO2019143734A1 (en) 2019-07-25

Family

ID=67302482

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/013866 WO2019143734A1 (en) 2018-01-17 2019-01-16 Improvements to supply chain security

Country Status (1)

Country Link
WO (1) WO2019143734A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060085094A1 (en) * 2003-05-08 2006-04-20 Omnicell, Inc. Secured dispensing cabinet and methods
US20100198620A1 (en) * 2009-01-30 2010-08-05 Omnicell, Inc. Tissue tracking
WO2011069803A1 (en) * 2009-12-09 2011-06-16 Spinnaker International Limited A security apparatus
US8068023B2 (en) * 2001-12-28 2011-11-29 Dulin Jacques M System for maintaining security of evidence throughout chain of custody
WO2016098074A1 (en) * 2014-12-19 2016-06-23 Stanley Middle East FZE A container with a detection system
US20170228951A1 (en) * 2016-02-09 2017-08-10 Omnicell, Inc. Relay box

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8068023B2 (en) * 2001-12-28 2011-11-29 Dulin Jacques M System for maintaining security of evidence throughout chain of custody
US20060085094A1 (en) * 2003-05-08 2006-04-20 Omnicell, Inc. Secured dispensing cabinet and methods
US20100198620A1 (en) * 2009-01-30 2010-08-05 Omnicell, Inc. Tissue tracking
WO2011069803A1 (en) * 2009-12-09 2011-06-16 Spinnaker International Limited A security apparatus
WO2016098074A1 (en) * 2014-12-19 2016-06-23 Stanley Middle East FZE A container with a detection system
US20170228951A1 (en) * 2016-02-09 2017-08-10 Omnicell, Inc. Relay box

Similar Documents

Publication Publication Date Title
CN112492524B (en) Enabling node delivery notification using elements of a wireless node network
KR101269285B1 (en) Proximity locator system
CN105745675B (en) Method and system for managing shipment of items using a wireless node network
US7671718B2 (en) Method and apparatus for detection and tracking of objects within a defined area
US20100176918A1 (en) Identification and tracking of information stored on radio frequency identification devices
Moreno et al. IVAN: Intelligent van for the distribution of pharmaceutical drugs
Saleem et al. Review of various aspects of radio frequency identification (RFID) technology
Garcia Zuazola et al. Telematics system for the intelligent transport and distribution of medicines
WO2019143734A1 (en) Improvements to supply chain security
Antic et al. RFID: Past, present, future
Maia et al. Using RFID in the engineering of interactive software systems: a systematic mapping
Kolias et al. Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
TWI822543B (en) Digital management system of airport intelligent automation
Lau et al. Edward Kai-Ning Yung
Priyanka RFID based vehicle access control and tracking with IoT
Jones Radiofrequency identification: exploiting an old technology for measuring nurse time and motion
Muli Smart school bus system to enhance child transport safety using radio frequency identification (RFID) technology.
Hawrylak et al. RFID in e-health: Technology, implementation, and security issues
Macalanda et al. Radio frequency identification (rfid) for naval medical treatment facilities (mtf)
Leema et al. Data management issues in RFID applications
Bukkapatnam et al. Sensor (RFID) Networks and complex manufacturing systems monitoring (COMMSENS): Laboratory for RFID research
Dondelinger Radio frequency identification
Oustad et al. Securing Assets with RFID
AZENAN TRACKING OF PATIENTS IN THE HOSPITAL USING RFID
Ezanee Radio Frequency Identification (RFID) Based Plate Recognition for Registered Vehicle in UMP

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19740734

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 13/10/2020 )

122 Ep: pct application non-entry in european phase

Ref document number: 19740734

Country of ref document: EP

Kind code of ref document: A1