HIDDEN IDENTIFICATION TAGS FOR OBJECTS INCLUDING AUTOMOBILES

20190178978 ยท 2019-06-13

    Inventors

    Cpc classification

    International classification

    Abstract

    The invention comprises a system of using small, hidden, machine-to-machine (M2M) chips to track automobiles through the radio emissions of the chips, and to use M2M chips as a defense against theft generally, by tracking potentially stolen items through the radio emissions of M2M chips. Users can monitor potential theft of the different parts of an automobile because the chips embedded into the automobile components will be constantly communicating with each other. Spacecraft and other near-earth objects, and drones, can also be tracked by M2M chips, that can be designed in a manner that makes them extremely difficult to find. The M2M chips can be designed in numerous different shapes, and use very little power. Some of the M2M chips are silicon wafer chips with small logic gates.

    Claims

    1. Have specific claim about hidden M2M chip. Discuss hidden locations of M2M chips in greater detail. The system uses CHIPSETS bonded to special polymer film strips embedded to the inside rear portion of LICENSE plates and any part of vehicle bodies or frames close to license plate mountings.

    1. A method for tracking space objects in space utilizing a locator spacecraft, and a long-range transmitter; said locator spacecraft further comprising a means of attachment; a and said locator spacecraft being capable of carrying at least one long-range transmitter; each said long range transmitter includes two chips and a means of providing power for said chips; said method further comprising that each said long-range transmitter also includes a hard shell; said method further comprising that each said hard shell being capable of blocking radiation from reaching said chips; said method further comprising that each said chip is capable of transmitting the location of said chip to a receiving station; said method further utilizing at least one receiving station; said method further comprising the following steps; the locator spacecraft flies to a space object; the locator spacecraft uses the means of attachment to attach said long-range transmitter to said space object; the long-range transmitter begins broadcasting a radio signal; the radio signal is received by a receiving station; wherein said receiving station can detect the location of the space object by detecting the location of the long-range transmitter that is attached to the space object, through said receiving station receiving the radio signals broadcast by said long-range transmitter.

    2. The method of claim 1 further comprising that said means of attachment is a robotic arm.

    3. The method of claim 1 further comprising that each said long range transmitter includes a solar cell, which is operatively connected to said means of providing power, and has the ability to recharge said means of providing power.

    4. The method of claim 1 further comprising that said locator spacecraft has the ability to contain multiple long-range transmitters, so that said locator spacecraft can attach one long-range transmitter to one space object, then said locator spacecraft can fly to a second space object and attach another long-range transmitter to said second space object, and then said locator spacecraft can fly to further space objects and attach long-range transmitters to those further space objects.

    5. The method of claim 1, further comprising that said space object is a piece of man-made space debris.

    6. The method of claim 1, further comprising that said space object is a PHO.

    7. The method of claim 1, further comprising that said receiving station is a remote receiving station.

    8. A method of tracking a drone, utilizing a mated pair of chips, programmed with an embedded application, wherein the embedded application causes the chips to continually broadcast telemetry from the drone's unique IP address, so that receivers of radio waves can receive said broadcasted signal, and thereby determine the location of said drone.

    9. The method of claim 8, further comprising a remote program, and further comprising that said telemetry can be received by aggregators; said aggregators then transmitting the information they have received to a remote server, where a remote program will analyze the results of telemetry to triangulate the position of said drone; and where said remote program will show the position of said drone.

    10. The method of claim 9, said method further comprising that said remote program will transmit the location of said drone back to said aggregators, and said aggregators will transmit the location of said drone to said drone, and said drone will broadcast the location of said drone, so that receivers that receive the broadcast of said drone's location will know the location of said drone.

    11. The method of claim 8, said method further comprising that said drone directly communicates with said aggregators, and said aggregators communicate with said drone and inform said drone about their reading of the distance between themselves and said drone; so that said drone may triangulate the data that it is receiving from said aggregators and said drone may therefore determine its own position, and said drone may then broadcast its position, so that entities receiving said broadcast may learn the position of said drone.

    12. A method of tracking automobiles and other vehicles, said method utilizing a central program and a mated pair of M2M chips, where said M2M chips have been programmed with similar IP addresses, and said method further comprising that said M2M chips have both been programmed with an embedded application (5); where said embedded application (5) causes said M2M chips to continually emit a radio signal, said method comprising the following; attaching both M2M chips to parts of the vehicle; causing said M2M chips to continually emit a radio signal; allowing said radio signal to be received by aggregators and transferred over the internet to a central server; wherein said central program triangulates all radio signals that have been received from said M2M chips to determine the location of said M2M chips and the attached vehicle.

    13. The method of claim 12, where one M2M chip is attached to the license plate of a vehicle and the other M2M chip is not.

    14. The method of claim 13, further comprising that the M2M chip attached to the license plate of a vehicle is attached to said license plate via thermoplastic welding.

    15. A method of tracking individuals by tracking the clothes worn by said individuals, said method utilizing a central program and a mated pair of M2M chips, where said M2M chips have been programmed with similar IP addresses, and said method further comprising that said M2M chips have both been programmed with an embedded application (5); where said embedded application (5) causes said M2M chips to continually emit a radio signal, said method comprising the following; attaching both M2M chips to parts of the vehicle; causing said M2M chips to continually emit a radio signal; allowing said radio signal to be received by aggregators and transferred over the internet to a central server; wherein said central program triangulates all radio signals that have been received from said M2M chips to determine the location of the missing person based on the location of said M2M chips.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0151] FIG. 1 shows an automobile with a chipset in its license plate.

    [0152] FIG. 2 shows an automobile with several M2M chips, hidden in the frame of the automobile.

    [0153] FIG. 3 shows a flow chart of the flow of information from the chipset to a central computer.

    [0154] FIG. 4 shows an example of a chipset being attached to a piece of space debris in orbit around Earth.

    [0155] FIG. 5 shows a version of a chipset that is attached to a drone.

    [0156] FIG. 6 shows a jacket, containing a chipset.

    [0157] FIG. 7 shows a close-up picture of a chipset.

    [0158] FIG. 8 shows another use of the invention.

    [0159] FIG. 9 shows a different use of the invention.

    [0160] FIG. 10 shows a use of the invention to prevent theft of a plant.

    DETAILED DESCRIPTION OF THE DRAWINGS

    [0161] FIG. 1 shows an automobile with one M2M chip of a chipset in its license plate, and another M2M chip hidden in the frame of the automobile. The M2M chips (3) are in communication with each other. They make up a mated pair (11) of M2M chips. The two chips are also broadcasting, which puts them in communication with nearby aggregators (8). The M2M chips (3) are each attached to a polymer strip. Each M2M chip is attached to a polymer strip (4), and one chip is also attached to the license plate, by an epoxy base (10). The other M2M chip is embedded within the frame of the automobile. The M2M chips are small enough that they are hard to see. The M2M chips can also have different shapes.

    [0162] FIG. 2 shows an automobile with a mated pair (11) of M2M chips, with both chips hidden in the frame of the automobile. The M2M Chips send information to each other. One M2M chip is embedded in the frame of the automobile, near the passenger windows. A second M2M chip is embedded near the engine of the automobile. The two M2M chips broadcast to each other, and to nearby aggregators (8). Each M2M chip can tell the location of the other M2M chip via the broadcast that it receives from the other M2M chip. If the M2M chips are moved further apart, both chips will notice this, because the signal each chip receives from the other chip will change. Triangulation and other methods can also be used by each M2M chip to detect whether the other M2M chip has moved further away. If someone attempts to dismantle the automobile, the M2M chips will be moved further apart. Each aggregator (8) within range receives a signal from the M2M chips. The location of the chips is secret, so they cannot be stolen or removed easily. If the M2M chips move substantially far apart, the M2M chips will each send a signal saying this, to the nearby aggregators (8). The aggregators will also be able to detect the location of the M2M chips through the signals being sent by the M2M chips (3). The aggregators (8) will then each send a signal to a gateway (9), which will access a cellular network via a gateway API, and then send a warning to any remote servers (7) nearby. The remote servers (7) can then each inform a central server that the automobile is being dismantled, and the location of the M2M chips, which will show the location of the parts of the automobile attached to the M2M chips. Law enforcement can then use this information to help locate the automobile.

    [0163] FIG. 3 shows a flow chart of the flow of information from the chipset to a central computer. The M2M chips (3) each control an actuator (1). The M2M chips (3) each have an embedded application (5). The M2M chips each transmit to each other, and also each transmit to a nearby data collector (6). The M2M chips (3) also transmit to nearby aggregators (8). Each aggregator then transmit to a gateway (9). The gateway (9) then transmit to a remote server (7), which is the central computer. The remote server then transmits information back to the aggregators, which then transmit information to the M2M chips (3). Each M2M chip (3) then commands the actuator it controls, based on the information that M2M chip has received from the aggregators.

    [0164] FIG. 4 shows an example of a chipset being attached to pieces of space debris in orbit around Earth. The locator spacecraft is using a robotic arm to attach a mated pair (11) of M2M chips (3) to the pieces of space debris. The M2M chips are being fastened to the piece of space debris by an epoxy base (10).

    [0165] FIG. 5 shows a version of a chipset that is attached to a drone. Each M2M chip (3) controls an actuator (1), which can cause the drone to alter its flight path. The M2M chips (3) are each attached to a polymer strip. Each M2M chip is attached to a polymer strip (4), and to one of the walls of the drone, by an epoxy base.

    [0166] FIG. 6 shows a jacket, containing a chipset. The M2M chips (3) in the chipset are scattered throughout the jacket, and each M2M chip broadcasts to nearby aggregators (8).

    [0167] FIG. 7 shows a close-up picture of a chipset. The M2M chips in the chipset are attached to polymer strips (4), by an epoxy base (10). An RFID chip (2) is shown for comparison.

    [0168] FIG. 8 shows another use of the invention. A chipset is embedded in a bottle of expensive medicine, and the bottle is inside a pharmaceutical cabinet. An aggregator nearby monitors the broadcasts from all the chipsets, and transmits this information to a gateway, which transmits the information to a remote server. If the bottle is removed from the cabinet, the chipset will broadcast from a different point, and the aggregator will detect that the chipset has moved, and then pass this information on to the gateway, which will pass it on to the remote server. The remote server will then cause an alarm to sound elsewhere.

    [0169] FIG. 9 shows a different use of the invention. Several containers are in a warehouse, and each contain a hidden chipset with a unique IP address. An aggregator in the warehouse monitors the broadcasts from all the chipsets, and transmits this information to a gateway, which transmits the information to a remote server. If one of the containers is removed, the chipset will broadcast from a different point, and the aggregator will detect that the chipset has moved, and then pass this information on to the gateway, which will pass it on to the remote server. The remote server will then cause an alarm to sound elsewhere in the warehouse. The M2M chips (3) here look different from the M2M chips in some other figures. This is to illustrate that M2M chips can have many different appearances.

    [0170] FIG. 10 shows a use of the invention to prevent theft of a plant. The plant is in a glass case in a nursery. Several M2M chips (3) which are part of a chipset are placed on different leaves and stems of the plant, and these M2M chips (3) are broadcasting to each other. The chips are small and hard to see, therefore they are hard for thieves to find and remove. Some of the M2M chips are held within the folds of leaves. Each M2M chip broadcasts to the other M2M chips. Each M2M chip can therefore tell the position of the other M2M chips within the chipset via triangulation. The broadcasts of all M2M chips also can be detected by an aggregator (8), which is nearby and processes signals from the M2M chips placed on all the plants in the nursery.

    [0171] If a thief steals one of the leaves or stems of the plant, which is attached to a chip, then the chip will be moved further away from the other plant, and then the other chips in the chipset will detect that this particular M2M chip has gone out of broadcasting range, or is broadcasting from much further away. The other M2M chips will then transmit an alarm to the aggregator, which will sound an alarm.

    [0172] The aggregator, in this embodiment of the invention, can also detect when two M2M chips that are supposed to be close together (Such as two chips that are part of the same chipset and attached to the same plant), stop broadcasting from positions close together.

    [0173] The aggregator can be programmed to independently sound an alarm if the chips that are supposed to be on different parts of the same plant are moved too far apart from each other.