Sealing Device, System, and Methods
20250368409 ยท 2025-12-04
Inventors
Cpc classification
B65D55/028
PERFORMING OPERATIONS; TRANSPORTING
International classification
Abstract
Aspects of the disclosure relate to sealing devices, methods, and systems. A sealing device may be configured to seal a container. The sealing device may send or trigger a message indicating the current geographic location of the sealing device based on the sealing device being removed from the container.
Claims
1. A single-use sealing device comprising: a strap comprising a first free attachment end and a second free attachment end, wherein the first free attachment end is configured to irreversibly engage the second free attachment end; a circuit at least partially embedded in the strap and extending between the first free attachment end and the second free attachment end, wherein engaging the first free attachment end with the second free attachment end closes the circuit; a processor communicatively coupled with the circuit; a wireless transmitter communicatively coupled with the processor; a wireless receiver communicatively coupled with the processor and configured to communicate with a global positioning system (GPS); memory storing executable instructions that, when executed by the processor, cause the single-use sealing device to: obtain indication of a current geographic location of the single-use sealing device from the GPS based on the strap breaking; and transmit an indication of the current geographic location via the wireless transmitter; and a housing attached to the strap between the first free attachment end and the second free attachment end and containing the processor, the wireless transmitter, the wireless receiver, and the memory.
2. The single-use sealing device of claim 1, wherein the instructions, when executed by the processor, further cause the single-use sealing device to: obtain indication of an initial geographic location of the single-use sealing device from the GPS, via the wireless receiver, based on the first free attachment end of the strap engaging the second free attachment end of the strap; and transmit an indication of the initial geographic location via the wireless transmitter.
3. The single-use sealing device of claim 1, wherein the instructions, when executed by the processor, further cause the single-use sealing device to transmit a current date, a current time, and a unique identifier of the single-use sealing device, via the wireless transmitter, based on the strap breaking.
4. The single-use sealing device of claim 1, wherein transmitting the indication of the current geographic location causes a computing device to store an immutable indication of the current geographic location at a distributed ledger.
5. The single-use sealing device of claim 1, wherein transmitting the indication of the current geographic location causes a computing device to update a record stored on a distributed ledger to include an immutable indication of the current geographic location.
6. The single-use sealing device of claim 1, wherein transmitting the indication of the current geographic location causes a computing device to compare the current geographic location to at least one of an expected geographic location, a route, or a destination.
7. The single-use sealing device of claim 1, wherein transmitting the indication of the current geographic location causes a computing device to output an alert comprising at least one of: an indication that the current geographic location does not match an expected geographic location; an indication that the current geographic location deviates from a route; or an indication that the current geographic location does not match a destination.
8. The single-use sealing device of claim 1, further comprising at least one visual indicator communicatively coupled with the processor and configured to provide visual indication of: successful registration with a wireless network via the wireless transmitter; and successful acquisition of a signal received from the GPS via the wireless receiver.
9. The single-use sealing device of claim 1, further comprising at least one light emitting diode (LED) communicatively coupled with the processor and configured to: output a first color based on successful registration with a wireless network via the wireless transmitter and successful acquisition of a signal received from the GPS via the wireless receiver; output a second color based on successful registration with a wireless network via the wireless transmitter and unsuccessful acquisition of a signal received from the GPS via the wireless receiver; and output a third color based on unsuccessful registration with a wireless network via the wireless transmitter and unsuccessful acquisition of a signal received from the GPS via the wireless receiver.
10. The single-use sealing device of claim 1, wherein the instructions, when executed by the processor, further cause the single-use sealing device to: wirelessly receive a request for a geographic location of the sealing device; obtain indication of a geographic location of the single-use sealing device from the GPS, via the wireless receiver, based on receiving the request; and transmit an indication of the geographic location via the wireless transmitter.
11. The single-use sealing device of claim 1, wherein the instructions, when executed by the processor, further cause the single-use sealing device to transmit an indication of contents contained in a container sealed by the single-use sealing device based on the strap breaking.
12. A tracking system comprising: a single-use sealing device comprising: a strap comprising a first free attachment end and a second free attachment end, wherein the first free attachment end is configured to irreversibly engage the second free attachment end; a circuit at least partially embedded in the strap and extending between the first free attachment end and the second free attachment end, wherein engaging the first free attachment end with the second free attachment end closes the circuit; a processor; a wireless transmitter communicatively coupled with the processor; a wireless receiver communicatively coupled with the processor and configured to communicate with a global positioning system (GPS); memory storing first executable instructions that, when executed by the processor, cause the single-use sealing device to: obtain indication of a current geographic location of the single-use sealing device from the GPS based on the strap breaking; and transmit an indication of the current geographic location via the wireless transmitter; and a housing attached to the strap between the first free attachment end and the second free attachment end and containing the processor, the wireless transmitter, the wireless receiver, and the memory; and a computing system comprising: a distributed ledger; one or more processors; and memory storing second executable instructions that, when executed by the one or more processors, cause the computing system to: receive the indication of the current geographic location from the single-use sealing device; and update the distributed ledger to include an immutable indication of the current geographic location.
13. The tracking system of claim 12, wherein: the first executable instructions, when executed by the processor of the single-use sealing device, further cause the single-use sealing device to: obtain indication of an initial geographic location of the single-use sealing device from the GPS, via the wireless receiver, based on the first free attachment end of the strap engaging the second free attachment end of the strap; and transmit an indication of the initial geographic location via the wireless transmitter; and the second executable instructions, when executed by the one or more processors of the computing system, further cause the computer system to: receive the indication of the initial geographic location; and update the distributed ledger to include an immutable indication of the initial geographic location.
14. The tracking system of claim 12, wherein the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to compare the current geographic location to at least one of an expected geographic location, a route, or a destination.
15. The tracking system of claim 12, wherein the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to output an alert comprising at least one of: an indication that the current geographic location does not match an expected geographic location; an indication that the current geographic location deviates from a route; or an indication that the current geographic location does not match a destination.
16. The tracking system of claim 12, wherein the computing system further comprises an interactive user interface and the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to: receive user input, via the interactive user interface, indicating a selection of the single-use sealing device; and cause a wireless transmission of a request for a geographic locating of the single-use sealing device.
17. The tracking system of claim 12, wherein the computing system further comprises an interactive user interface and the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to: receive user input, via the interactive user interface, indicating a selection of a record stored at the distributed ledger; and display, at the interactive user interface, at least a portion of the record selected.
18. The tracking system of claim 12, wherein the computing system further comprises an interactive user interface and the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to: receive user input, via the interactive user interface, indicating a selection of the single-use sealing device; and display, at the interactive user interface, a geographical map comprising an indication of a geographic location of the single-use sealing device.
19. The tracking system of claim 12, wherein the computing system further comprises a data store storing shipment records, wherein each shipment record is associated with a single-use sealing device of a plurality of single-use sealing devices.
20. The tracking system of claim 12, wherein the computing system further comprises an interactive user interface and the second executable instructions, when executed by the one or more processors of the computing system, further cause the computing system to: receive user input, via the interactive user interface, indicating a selection of the single-use sealing device; and display, at the interactive user interface, indication of one or more records stored at the distributed ledger that are associated with the single-use sealing device selected.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DETAILED DESCRIPTION
[0023] In the following description, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various examples in which the disclosure may be practiced. It is to be understood that other examples may be utilized and implemented whereby structural and functional modifications may be made without departing from the scope and spirit of the present disclosure. Further, headings within this disclosure should not be considered as limiting aspects of the disclosure. Those skilled in the art with the benefit of this disclosure will appreciate that the examples are not limited to the headings.
[0024] Track and trace devices are used in logistics, supply chain management, and the shipping industry to assure that cargo safely reaches its destination. This provides several key benefits, including enhanced security, improved accountability, reduced risk of loss, faster response to issues, quality control, regulatory compliance, data for process optimization, improved customer service, reduced insurance costs, real-time decision-making, theft deterrence, geographical awareness, sustainability and asset protection.
[0025] More specifically, real-time monitoring allows for immediate detection of tampering or unauthorized access to the cargo. This helps to prevent theft, damage, or tampering with valuable goods during transit. With real-time tracking, both the sending and receiving entity can hold each other accountable for the cargo's condition and security. Knowing that cargo is being monitored in real-time also deters potential thieves or dishonest employees, reducing the risk of cargo loss and resulting in cost savings for businesses. Real-time data allows for swift responses to incidents such as tampering, accidents, or delays, mitigating potential damage and minimize disruptions to the supply chain. For cargo that requires specific environmental conditions, real-time monitoring ensures these conditions are maintained, critical for products such as pharmaceuticals, perishable goods, and high-value electronics.
[0026] The data collected during transit can further be analyzed to identify patterns and opportunities for improvement in the supply chain. This can lead to more efficient operations, reduced costs, and improved customer satisfaction, while providing logistics and supply chain managers data to make informed, real-time decisions. This includes rerouting shipments in case of delays or security threats. Real-time tracking provides a clear understanding of where the cargo is at any given time, which can be particularly useful in large-scale global supply chains. Efficient supply chain management helps reduce fuel consumption, emissions, and overall environmental impact by minimizing unnecessary stops and delays.
[0027] Conventional tamper-evident sealing devices currently available may be configured to provide evidence of tampering via physical damage that is visible upon inspection of the sealing device. Such conventional sealing devices, however, may be limited in their functionality. For example, although conventional sealing devices may provide visual evidence of tampering, they may provide no indication of when and where such tampering occurred. As such, the industry would benefit from a low-cost sealing device that is single use, disposable, and provides track-and-trace capabilities. Low-cost, single-use, and disposable sealing devices with track-and-trace capabilities would be particularly useful and advantageous to, among other things, ensure a secure chain of custody between a shipper and receiver, provide real-time alerts of unauthorized access to the cargo, and facilitate the maintenance of shipping records indicating when and where the sealing devices were installed to secure the cargo and when and where the sealing devices were removed providing access to the cargo. The disclosures provided herein address these needs of enhancing indications of tampering.
[0028] The sealing devices described herein also provide improvements to the supply chain, including the food and beverage supply chain. As products move through the supply chain, conventional methods of reacting or recalling can be inefficient or ineffective. For variety packs and multi-packs, in particular, if a singular product for the variety pack or multi-pack is recalled, tracking its location and status can be challenging. A recalled product may be, for example, in preproduction storage, in production, out for delivery, delivered in-store and sometimes all of the above at various locations throughout the country such as warehouses, manufacturing facilities, in-transit, and retail store locations. As one example, many brands do not control their own supply chain. That is, many brands do not own their manufacturing, packaging, warehousing, freight, or distribution resulting in little visibility into what happens to their products between its origin and destination. As such, many brands heavily rely on daily reports related to production output, finished goods inventory, freight pickup fulfillment and arrival status at retail outlets, among other daily logistical challenges. Many brands, therefore, have limited means of validating and verifying milestones throughout these processes, which creates challenges in making critical decisions based on comprehensive and accurate information. For example, it may be cost-prohibitive for brands to invest in high-cost reusable tracking tags given that they typically do not own the transports or employ the transport operators. The disclosures herein of a low-cost, disposable sealing device with tracking and tracing capabilities also address these needs of tracking and tracing products (e.g., food and beverage products) as they move through the supply chain. By improving the ability to track and trace products as they move through the supply chain, brands, copackers, and other entities along the supply chain can more effectively manage product recalls and product holds and can more effectively fulfill regulatory requirements.
[0029] For example, changes to food safety regulations are expected to impose additional requirements on entities along the food and beverage supply chain. For example, the Food Safety Modernization Act aims to shift the focus from responding to foodborne illness to preventing it. New food traceability rules are expected to require that entities along the food and beverage supply chain maintain records containing key data elements (KDEs) associated with specific critical tracking events (CTEs) in order to provide information to the regulatory entities such as the United States Food and Drug Administration (FDA) within some reasonable time (e.g., within 24 hours). For example, Food traceability rules are expected to impose traceability recordkeeping requirements for entities that manufacture, process, pack, transport, or holds food and beverages including any listed on a food transport list (FTL). CTEs may include, for example, harvesting, cooling, initial packing, first land-based receipt, shipping, receiving, and transformation. KDEs may include, for example, a unique traceability lot code (TLC), the quantity and unit of measure for the food or beverage, a description of the food or beverage, a description of the location of an immediately subsequent receiver of the food or beverage, a description of the location of an immediately preceding shipper of the food or beverage, the shipment date, a reference to or a description of the location of the source of the TLC. Food traceability rules are expected to require KDEs to be linked to the food or beverage product at each CTE. Furthermore, TLCs are expected to be required for certain types of CTEs such as, for example, packing a raw agricultural commodity, receiving food from a fishing vessel during a first land-based receipt, and transforming a food. Food traceability rules are expected to require that traceability records for each CTE include the relevant TLC assigned to the food or beverage product. The disclosures herein of maintaining records based on messages sent from low-cost, disposable sealing devices with tracking and tracing capabilities further address these needs of fulfilling regulatory requirements related to traceability recordkeeping and providing timely reports on the shipping, receiving, and transformation of products moving through the supply chain. As one example, when a food, beverage, or ingredient is indicated as compromised, individual products containing that ingredient may be promptly identified and tracked via the TLC assigned to those products and the corresponding traceability records maintained for the CTEs associated with those products.
[0030] The track-and-trace systems described herein also provide improvements over traditional recordkeeping for products moving through the supply chain. As described herein, a distributed ledger is used to store traceability records, which immutably logs CTEs and associated KDEs in a manner that ensures its privacy, security, accuracy, validity, and reliability. This immutability of the traceability records thus gives confidence to regulatory entities such as the FDA in the validity of the information contained those records. Using a distributed ledger to store CTEs and KDEs in immutable traceability records also provides safeguards against data manipulation or alteration by bad actors.
[0031] The track-and-trace systems described herein further provide improvements to traceability records for products that are combined into a collective whole. As one example, products with individually assigned TLCs may be transformed by packaging or repackaging them into a variety pack or multi-pack. As another example, commodities sourced from different suppliers (e.g., fruits, vegetables, fish, meat, and the like) may be assigned individual TLCs before being combined into a new product during a transformation process along the supply chain. As described in further detail below, the track-and-trace systems described herein are configured to combine TLCs associated with products combined during a transformation process that allows tracking and tracing CTEs and KDEs for both the combined result and its individual subcomponents.
[0032] Turning now to
[0033]
[0034] In some examples, such as the example track-and-trace system 100 shown in
[0035] The message from the sealing device 102 sent via the cellular network 110 may be delivered to a remote application server 114 via one or more networks 116. The networks 116 may include one or more wide area networks (WANs) such as the Internet. As described in further detail below, the application server 114 may receive and process the messages received from sealing devices such as sealing device 102. For example, the application server 114 may create and store records indicating the geolocation of the sealing device 102 and the date and time the sealing device transitioned between an open and closed state. In some examples, the application server 114 may be configured to send a message to the sealing device 102, which may be transmitted to the sealing device via the cellular network 110. As described further below, the message may be addressed to the sealing device and may be configured to cause the sealing device to wake from a sleep state and transmit a status message back to the application server 114 (e.g., via the cellular network 110). In this regard, one example of a message sent from the application server 114 to the sealing device 102 may be referred to, for convenience, as a wake up message.
[0036]
[0037] In some examples, the mobile relay device 202 may be, for example, a mobile cellular telephone (e.g., smartphone) configured to listen for messages from the sealing device 204. For example, a mobile application may be installed at the mobile relay device 202 and execute at the mobile relay device during transport. In some examples, the mobile relay device 202 may be a computing device installed in or integrated at the transport and likewise configured to listen for messages from the sealing device 204. Additionally, in some examples, a relay device (not shown) may be installed at the premises of the shipper 106 and/or the receiver 108 and likewise configured to listen for messages sent by the sealing device 204 at the point of origin and at the destination.
[0038]
[0039] The strap 308, in this example, may be constructed of a variety of materials. For example, the strap 308 may be constructed of plastic, nylon, metal, or a combination of materials. The attachment ends 304a and 304b, in this example, are configured to engage with each other. In some examples, the attachment ends 304a and 304b are configured to irreversibly engage with each other. In this regard, the strap 308 may include an engagement mechanism that is destroyed or otherwise rendered inoperable upon detaching attachment ends from each other thereby preventing their reattachment. Such irreversible engagement may ensure a sealing device such as sealing device 300 cannot be removed without breaking (e.g., cutting) the strap 308 or destroying engagement mechanism that attaches the attachment ends 304a and 304b to each other. In some examples, the engagement mechanism may rely on friction and/or mechanical engagement that permits movement in one direction and prevents movement in the opposite direction. Example engagement mechanisms may include serrations (e.g., teeth, ridges, barbs) formed at (e.g., on) one attachment end with a locking tab at the opposite attachment end that permits the attachment end with the serrations to be fed into or through the opposite attachment end with the locking tab that prevents movement in a direction opposite the feed direction. This example engagement mechanism may be the same as or similar to those used to secure cable ties or zip ties. Example engagement mechanisms also may include a body formed at (e.g., on) one attachment end with a receptacle at the opposite attachment end whereby the body is press-fit into the receptacle and locked into place by one or more locking tabs within the receptacle that prevents the body from being pulled out of receptacle. This example engagement mechanism may be referred to as a ball-and-socket engagement mechanism. In these examples, detaching or attempting to detach the attachment ends may cause a mechanical failure in the sealing device (e.g., breaking the strap, destroying the engagement mechanism). Other examples of engagement mechanisms include wedge lock mechanisms, spring clip or spring tab locking mechanisms, push-pin locking mechanisms, and even adhesives. Those skilled in the art with the benefit of this disclosure will recognize and appreciate other types of engagement mechanisms that may be employed to attach the attachment ends of the strap of a sealing device including engagement mechanisms that render a sealing device to be a single-use sealing device as described herein.
[0040] As described in further detail below with reference to
[0041] The memory 314 may store executable instructions that may be processed and executed by the processor 312 to enable the track-and-trace functionality of the sealing device 300. Data associated with these track-and-trace operations also may be stored in the memory 314 and may be communicated to and/or captured by a remote application server (e.g., a hub such as a cloud-based IoT hub) as described herein. For example, information transmitted by the sealing device 300 may be captured by an Azure IoT hub. The executable instructions may be stored as firmware at the sealing device 300 in read-only memory.
[0042] In some examples, the memory 314 may store operational parameters and/or operational data associated with the sealing device 300, including information to uniquely identify the sealing device. For example, the memory 314 may store a device ID that may be established to uniquely identify each device and may include, for example, a serial number. In some examples, the memory 314 may store other data within an associated data structure such as cargo information (e.g., TLCs, a unique product-specific or shipment-specific reference number), driver information, origin information, destination information, routing information, vehicle information, and geographical information associated with a starting location, an ending location, route location information, and/or the like. As described in further detail below with reference to
[0043] As also described in further detail below with reference to
[0044] As further described below with reference to
[0045] As described above, the power source 320 may facilitate the single-use nature of the sealing device 300. For example, the power source 320 may be or otherwise include an alkaline battery to facilitate disposing or recycling the sealing device 300 once used. The power source 320 also may be configured to have limited capacity sufficient to send only one or a few messages, for example, an initial message upon engaging the attachment ends when sealing a container, a final message upon removal of the sealing device from a sealed container, and one or more intermediate messages sent during transit of the sealed container. In some examples, the processor 312 may be configured to minimize power consumption by utilizing a low-power sleep mode whereby the sealing device 300 enters the low-power sleep mode after sending the initial message upon activation, wakes from the low-power sleep mode to send one or more messages during transit before returning to the low-power sleep mode, and wakes a final time from the low-power sleep mode to send a final message upon removal of the sealing device.
[0046]
[0047] The electronics 310 of the sealing device 300 may include a circuit board having a flexible, semi-flexible, or rigid design, such as a rigid or semi-flexible printed circuit board (PCB) made from a glass reinforced epoxy laminate material (e.g., FR4), a flexible PCB made from a one or more flexible substrate materials, such as a polyimide material, a polyester material, a polyamide material, a fluoropolymer material, etc., and/or a combination of rigid, semi-rigid and/or flexible substrates. The substrate of the flexible PCB may utilize a copper foil for conductive portions and/or chip connection points, dielectric stiffening layers to reinforce certain areas of the PCB, adhesives to bond components to the substrate, overlays, and/or coatings to protect components of the electronics 310. Components, such as the controller circuit 350, the global positioning communication interface 318, the wireless communication interface 316, the detection circuit 354, may be composed on discrete components, a system on-a-chip, or a combination. In some cases, the sealing device 300 may be constructed as a flexible circuit board with a flexible tamper circuit tail having a flexible circuit board assembly (FCBA) or a printed circuit board assembly (PCBA) to house the electronic components and antenna. The electronics 310 of the sealing device 300 may utilize a flexible PCB, a semiflexible PCB, a rigid PCB, or a combination of flexible, semiflexible, or rigid PCB components.
[0048] As noted above, the controller circuit 350 of the sealing device 300 may include a processor 312, memory 314 (e.g., on-board memory, external memory, etc.), and I/O 352. For example, the controller circuit 350 may comprise a dedicated application processor with onboard memory, such as an Advanced Reduced Instruction Set Computer (RISC) Machine (ARM) processor (e.g., a 64 MHz ARM Cortex M33 central processing unit (CPU)) where the ARM processor may be configured to operate using a security enabled firmware code set (e.g., TrustZone technology), a security enabled mobile processor system (e.g., an ARM CryptoCell 310 for application layer security with, for example, 1 MB Flash and 256 KB RAM). In some cases, the processor 312 may support one or more identification modules, such as a Subscriber Identity/Identification Module (SIM) or an eSIM to support one or more wireless communication methods, such as wireless communication via a cellular network, wireless communication via an IoT network and/or the like. The controller circuit 350 may include multiple interfaces to support one or more input and/or output, such as the I/O 352. In some examples, the controller circuit 350 may support one or more analog-to-digital channels ADC, such as a 12-bit ADC. One or more interfaces supported by the controller circuit 350 may include, for example, a real-time clock (RTC) interface, a serial peripheral interface (SPI), a 12C interface, a 12S interface, a Universal Asynchronous Receiver/Transmitter with EasyDMA (UARTE), a pulse density modulation (PDM), a pulse width modulation (PWM) interface, and/or the like. The controller circuit 350 may utilize one or more interfaces as a communication bus 356 to communicate with one or more additional components of the sealing device 300, for example, the global positioning communication interface 318 and the wireless communication interface 316.
[0049] The sealing device 300 may be automatically enabled upon closing the seal (e.g., engaging the attachments end as described above). For example, the sealing device 300 may process instructions to periodically monitor a status of the sealing device 300 to identify when its status changes from an unused (disengaged) state to a sealed (engaged) state and from a sealed (engaged) state to an opened state (e.g., disengaged or severed state). Additionally, the sealing device 300 may process instructions to monitor or determine, in real time or near real time, a location of the sealing device at any point including, for example, during transit of cargo being transported in a container sealed by the sealing device (e.g., a cargo container or truck trailer). A break in the detection circuit 354 may be identified at any point during transit or at a facility (e.g., the receiver's facility). The sealing device 300 may be automatically enabled upon closing the seal without requiring hardware or other interaction by a user, such as at a distributor or an end customer site. As described herein, the sealing device 300 may utilize existing communication infrastructure to facilitate reliable wireless communication with the hub. For example, the controller circuit 350 may automatically process instructions to detect or otherwise respond to a change in the status of the sealing device in order to provide a quick response to the status change. As another example, the controller circuit 350 may be configured to intermittently (e.g., periodically) send a status message when utilizing a low-power mode (e.g., every x seconds, minutes, hours, days, etc.). In some examples, the controller circuit 350 may be configured to send message to a remote hub that include data captured around the time of the message in real-time, such as a status of the seal (e.g., open or closed), a geographic location of the sealing device, and a date and time. To conserve power, the sealing device 300 may sleep between the messages.
[0050] In some examples, the sealing device 300 may be configured to automatically send a message based on detecting a change of state of the sealing device, for example, from an open (e.g., unused state) to a closed (e.g., engaged or locked) state. Based on this transition, the sealing device 300 may automatically obtain and sends an indication of the geolocation of the sealing device. The sealing device 300 may include the device ID of the sealing device in the message. The sealing device 300 may send the message with or without the current date and time. The sealing device 300 may send the current date and time as a timestamp. In some examples, the sealing device 300 may be configured to cause transmission of the message with the geolocation of the sealing device, for example, using a mobile relay device as described herein. While the sealing device 300 is closed, the controller circuit 350 may process instructions to provide real-time, near real-time, and/or periodic updates of a current geolocation of the sealing device, to provide real-time tracking capability for an object sealed using the sealing device. For example, the controller circuit 350 may intermittently wake (e.g., every x seconds, minutes, hours, days, etc.) to obtain the current geolocation date, and time of the sealing device 300 and send a message (or otherwise cause a message to be sent) that includes the geolocation, date, and time via a communication network (e.g., a cellular network).
[0051] The controller circuit 350 may be configured to detect a transition from the closed state to the open state. The controller circuit 350 may detect the transition from the closed state to the open state, for example, based on opening the sealing device 300 (e.g., detaching the attachment ends) and cutting the sealing device thereby severing the conductive element 308. This state transition causes the controller circuit 350 to obtain the current geolocation of the sealing device 300, along with the current date and time, and automatically send a message (or cause a message to be sent) in real-time or near real time that includes an indication of the current geolocation where the opening event occurred. To ensure that the controller circuit 350 operates via secure communications, one or more secure communication measures may be used. For example, the secure communication measures may use private keys, public keys, and/or tokens to encrypt the data. In some examples, the security measures may include use of symmetric keys, certificates (e.g., x/509 certificates), token-based authentication measures, and/or the like.
[0052] The global positioning communication interface 318, may include one or more different chips or chipsets configured to provide indications of geolocations to the controller circuit 350. For example, global positioning communication interface 318 may comprise a global navigation satellite system (GNSS)-enabled chipset, such as a global positioning system (GPS) chipset, a quasi-zenith satellite system (QZSS) chipset, with or without assisted and/or predictive GNSS capabilities. Other GNSS-enabled chipsets may also be used depending on the geographic location where the sealing device is used, for example, a Globalnaya Navigazionnaya Sputnikovaya Sistema (GLONASS) chipset, a Galileo chipset, a BeiDou Navigation Satellite System (BDS) chipset, a Doppler Orbitography and Radiopositioning Integrated by Satellite (DORIS) chipset, an Indian Regional Navigation Satellite System (IRNSS) chipset, GNSS augmentation chipset, and the like. In some examples, the global positioning communication interface 318 may be configured to utilize service set identifier (SSID) Wi-Fi network location capabilities, such as by leveraging base station triangulation. In some examples, the global positioning communication interface 318 may include or be communicatively coupled to an antenna (e.g., a GPS antenna), not shown, such as a flexible polymer antenna configured for the particular geolocation chip set used, such as a GPS patch antenna, a flexible polymer multi-band GNSS GPS antenna, a flexible (flex) LTE antenna, Wi-Fi antenna, GNSS and the like. In one illustrative example, the global positioning communication interface 318 may be include a GPS chipset and a 2.4 GHz antenna.
[0053] The wireless communication interface 316 may include a communication chipset and an antenna, such as a transceiver 358 and an antenna 360, to facilitate wireless communication from the sealing device 300. In some examples, the wireless communication interface 316 may be or otherwise include a low-power cellular communication chipset, such as a lower power cellular IoT system-on-a-chip (SoC) or a Bluetooth low energy (BLE) SoC. In some examples, the wireless communication interface 316 may be configured for IoT network communication and may utilize a multimode chipset, for example, a multimode modem such as a combined Long-Term Evolution Machine (LTE-M)/Narrow Band (NB)-IoT modem with an integrated radio frequency (RF) front end. For example, the wireless communication interface 316 may include support over a particular communication band (e.g., 700-2,200 MHz LTE band support) at a specified output power level (e.g., +23 dBm). The wireless communication interface 316 also may comply with one or more certifications including from the Personal Communications Service (PCS) Type Certification Review Board (PTCRB), Federal Communications Commission (FCC), Industry Canada (IC), Conformite Europeenne (CE), and/or certifications as provided by other national or international certification organizations. In some examples, the components of the wireless communication interface 316 may be combined with one or more of global positioning communication interface 318 and/or the controller circuit 350, such as by using a cellular SoC with an onboard microcontroller, integrated memory, I/O, GNSS capabilities, and a power management integrated circuit (PMIC), a BLE-enabled SoC with an onboard microcontroller, memory, and I/O, and/or the like.
[0054] To facilitate determining whether the sealing device 300 is in an open or closed state, the controller circuit 350 may include or otherwise be in signal communication with the detection circuit 354. The detection circuit 354 may include one or more sensing circuits 355 and the conductive element 308. The sensing circuit(s) 355 may be configured to detect when the conductive element 308 forms a conductive connection to a second electrical connection point on the controller circuit 350 (e.g., resulting in a closed state) when the sensing device 300 is engaged to seal a container. The sensing circuits(s) 355 also may be configured to detect when the closed electrical connection formed by the conducive element 308 is opened or broken (e.g., a break or disconnect 463 to the conductive element 308), such as when the sealing device is disengaged or severed to access the sealed container. In some examples, the detection circuit 354 may comprise a continuity sensing circuit, such as a wire-break sensing circuit (e.g., a capacitor loop sensing circuit). In some examples, the sensing circuit(s) 355 may be or otherwise include an integrated circuit, a combination of discrete components, or a combination of integrated circuits and discrete components. In some examples, the sensing circuit(s) 355 may include a wire sensor, a magnet activated switch, a capacitive sensor, and/or the like.
[0055] The conductive element 308 may be formed from one or more conductive materials, such as stranded wire, a flexible or semi-flexible circuit trace, and/or the like. In some examples, the conductive element 308 may be formed of conductive materials that may be protected from accidental or incidental damage or breakage, such as by using protected stranded wire, or other by using conductor protective measures such as by integrating a reinforcing material, such as a metal mesh and/or the like. The conductive element 308 may include a proximal end 361 physically incorporated or otherwise conductively attached to a first connection point on the controller circuit 350 and a distal end 362 physically separate from controller circuit when the sealing device is in an unused (disengaged) state. When used to seal a container by engaging the attachment ends 304a and 304b, the sealing device 300 forms a single-use physical seal that forms a conductive connection between the connection point at the controller circuit 350 for the proximal end 361 of the conductive element 308 and the connection point at the controller circuit for the distal end 362 of the conductive element. In some examples, the electrical connection is formed by a physical and electrical connection between the distal end 362 of the conductive element 308 and an electrical connection point on the controller circuit 350 (e.g., wire continuity), such as via use of male/female electrical connectors. In some examples, the electrical connection may be formed via use of switches and/or relays activated via the proximity or connection of the distal end 362 to or near a component (e.g., a switch) on the controller circuit 350 PCB. For example, a component at or near the distal end 362 of the conductive circuit 308 may cause activation of a magnetic switch, a capacitive switch, a relay, and/or the like. In one illustrative example, the sensing circuit(s) 355 may be formed from discrete components including a capacitor in parallel to electrical connection points on the controller circuit 350 PCB associated with the proximal end 361 and the distal end 362 of the conductive element 308. Connecting the distal end 362 may cause current flow to charge the capacitor, where the controller circuit 350 may sense the transient current flow event via the I/O 352 to trigger obtaining the current geolocation and the current time and date when the sealing device 300 is engaged to seal a container. Similarly, removing the sealing device 300 (e.g., by disengaging the attachment ends or cutting the strap 302) and thus causing the break or disconnect 363 in the conductive element 308 may cause the capacitor to discharge. The controller circuit 350 may detect the transient current flow via the I/O 352 to likewise trigger obtaining the current geolocation and the current time and date when the sealing device 300 is opened or otherwise broken (e.g., the break or disconnect 363). Similar opening and/or closing events may be captured via use of switches and/or relays, where the closure of a magnetic and/or capacitive switch may cause current flow via a first electrical flow path that triggers a closure capture event by the controller circuit 350. Breaking the conductive element 308, for example, by opening or cutting the sealing device 300 causing the break or disconnect 363, may similarly cause current flow via a second electrical flow path that triggers the controller circuit 350 to obtain the current geolocation and the current time and date and send a message with this information or otherwise send a message that causes a mobile relay device to send the information as described herein. The examples discussed above are presented for illustrative purposes for detecting opening and/or closure events of the sealing device 300 and are not meant to be limited to only such examples.
[0056] The power source 320 may be or otherwise include a battery (e.g., an alkaline battery) and/or associated circuitry such as a power management circuit (not shown) and a power bus 395 capable of providing power from the power source 320 to one or more of the components of the controller circuit 350. The battery may be sized to provide power over a defined lifetime of the sealing device 300, such as to send messages (e.g., messages communicating geolocation and/or time and date information or message that cause a mobile relay device to send such information). Because the sealing device 300 may be designed for single use, its components, including the battery, may be composed of disposable materials.
[0057] The sealing device 300 may be designed to operate to meet or exceed certain environmental or other operational requirements including, for example, environmental requirements set forth in one or more international standards, such as the Society of Automotive Engineers (SAE) J1455 Electronic Equipment Environmental Standards and/or others that characterize environmental performance and/or reliability of electronic equipment designed for heavy-duty on road and off-road vehicles, such as heavy trucks. Illustrative operational requirements may include an operating temperature requirement (e.g., between about-40 Celsius (C) to about 85 C.), a thermal shock requirement, a humidity requirement a salt spray requirement (e.g., American Society for Testing Materials (ASTM) B117), a steam cleaning/pressure washing requirement, a vibration requirement, a shock requirement, a water and/or dust ingress requirement (e.g., an International Protection (IP) rating such as IP 67).
[0058] In some examples, a sealing device may be configured to provide visual indications of successful connection with a cellular network and/or a global navigation satellite system. For example, upon activation, a sealing device may attempt to register with a cellular network and acquire a global positioning signal and provide a visual indication of successful registration and acquisition. In some examples, a sealing device may include one or more lights such as light emitting diodes (LEDs) used to indicate the registration status and acquisition status. A green light may indicate, for example, successful registration with the cellular network. A yellow light may indicate, for example, successful registration with the cellular network but unsuccessful acquisition of the global positioning signal. A red light may indicate unsuccessful registration with the cellular network and unsuccessful acquisition of the global positioning signal. After successful registration and acquisition, a sealing device may send a message with the current geolocation of the sealing device with the device ID and the current date and time then enter (or reenter) a low-power sleep mode as described herein.
[0059]
[0060] The track-and-trace system 400 may include one application server 402 that performs the track-and-trace operations or multiple application servers that distribute the track-and-trace operations across multiple servers that are interconnected via one or more networks (e.g., WANs, LANs). As noted above, the application server(s) 402 may be implemented as a cloud-based IoT hub. The application server(s) in this example include track-and-trace control logic 430 and one or more data stores that store data associated with the sealing devices, products transported in containers sealed using the sealing devices, and shipments of the products. The application server(s) 402, in this example, thus include sealing device data 432, product data 434, and shipment data 436. Although the sealing device data 432, product data 434, and shipment data 436 are shown as separate data stores in
[0061] The track-and-trace control logic 430 may be implemented as one or more software applications and/or services executed by the application server(s). The track-and-trace control logic 430 in configured to implement the track-and-trace operations of the track-and-trace system 400. The track-and-trace operations include, for example, receiving and processing messages received from or triggered by the sealing device(s) 404 (e.g., initial geolocation messages when engaging the sealing devices, intermittent geolocation messages sent during transit, and final geolocation messages sent when removing sealing devices), storing records of tracking events (e.g., on a distributed ledger), analyzing reported geolocations (e.g., to provide notifications and alerts), and provisioning sealing devices prior to using them to seal containers.
[0062] The track-and-trace control logic 430 may be configured to perform multiple operations to process a message received from the seal device(s) 404 or a mobile relay device 412. For example, the track-and-trace control logic may be configured to decrypt and authenticate the message (e.g., using symmetric keys, tokens, or certificates). The track-and-trace control logic 430 also may be configured to extract the information included in the message such as, for example, the device ID of the sealing device, the current geolocation, and the current date and time. Extracted information also may include any additional information included in the message such as, for example, information about the contents of the container, about the transport, and/or about the shipment as described herein. In some examples, the track-and-trace control logic 430 may be configured to perform a query or lookup of the product information, transport information, and/or shipment information using the device ID included in the message. For example, the track-and-trace control logic 430 may be configured to query the data store containing the sealing device data 432 to obtain the corresponding record for the sealing device as well as any related product records or shipment records included in the data stores storing the product data 434 and the shipment data 436.
[0063] The track-and-trace control logic 430 also may be configured to generate and store records corresponding to messages that memorializes the transition of sealing device(s) 404 between their open and closed states as well as the status updates received during transit. The track-and-trace control logic 430 may be configured to store the records as traceability records 438 on a distributed ledger 408 as shown by way of example in
[0064] The track-and-trace control logic 430 also may be configured to generate notifications and alerts based on messages received from the sealing device(s) 404 (or the mobile relay device 412). For example, the track-and-trace control logic 430 may be configure to generate and send an alert based on a mismatch between the current geolocation indicated in a message received at the application server(s) 402 and an expected geolocation of the product. The track-and-trace control logic 430 may be configured to determine whether a current geolocation matches an expected geolocation, for example, by determining a distance between the two geolocations and comparing the distance to a threshold distance. If the current geolocation is within the threshold distance of the expected geolocation (e.g., within x feet or meters), then the track-and-trace control logic 430 may determine the current geolocation matches the expected geolocation; otherwise the track-and-trace control logic may determine the current geolocation does not match the expected geolocation. The track-and-trace control logic 430 may determine the distance between the two geolocations, for example, by determining a distance between respective pairs of latitude and longitude coordinates or by resolving the two geolocations to an address and determining the distance between the addresses. In this way, the track-and-trace control logic 430 may generate and send an alert if a sealing device is removed at a location other than its intended destination. The track-and-trace control logic 430 also may be configured to generate an alert if the current geolocation deviates from an expected route for the shipment. For example, the shipment data 436 may indicate a route for the shipment between a shipper and a receiver. The track-and-trace control logic 430 may be configured to compare the current geolocation of a message received by the application server(s) 402 while the shipment is in transit and compare that geolocation to locations on the expected route as described herein. The track-and-trace control logic 430 also may be configured to generate and send notifications to indicate that a shipment has left the shipper's premises and/or has been successfully received at a receiver's premises. Notifications and alerts may be sent using any suitable communication means including, for example, electronic mail, text message, popup dialogs, and the like.
[0065] The application server(s) 402, in this example, include a dashboard 440 that the computing device(s) 406 may use to invoke the track-and-trace functions. The computing device(s) 406 may include one or more of a web browser 442 or a mobile application 444 used to access the dashboard 440 (e.g., over the Internet or via a LAN). In some examples, a computing device may include either or both of the web browser 442 or mobile application 444 used to access the dashboard 440 as indicated by the dashed lines in
[0066] The track-and-trace control logic 430 also may be configured to provision the sealing device(s) 404 before using them to seal a container. Provisioning the sealing device(s) 404 may include, for example, assigning a unique device ID to the sealing device. Provisioning the sealing device(s) 404 also may include installing the symmetric keys and/or certificates used for encrypting and authenticating the messages from the sealing devices. Provisioning the sealing device(s) 404 further may include writing product data and/or shipment data to the memory of the sealing devices for inclusion in the messages sent from the sealing devices. The computing device(s) 406 may be configured to connect to the sealing device(s) 404 in order to provision them with information received from the application server(s) 402.
[0067]
[0068]
[0069]
[0070]
[0071]
[0072] The computing device 900 may, in some examples, operate in a standalone environment. In other examples, the computing device 900 may operate in a networked environment. As seen in
[0073] As seen in
[0074] The other devices and/or systems shown in
[0075] One or more aspects discussed herein may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) HTML or XML. The computer-executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. The functionality of the program modules may be combined or distributed as desired in various embodiments. The functionality also may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects discussed herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein. Various aspects discussed herein may be embodied as a method, a computing device, a data processing system, or a computer program product.
[0076] The computing device 900 may be in signal communication with one or more computing devices of a shipper 934 and/or a receiver 936 as described herein. The computing device 900 also may be in signal communication with a sealing device 938 and/or a mobile relay device 940 associated with a transport 942 as also described herein. The sealing device may be in signal communication with a GPS 944 as further described herein. The computing device 900 may be in signal communication with the computing devices of the shipper 934 and/or the receiver 936, the sealing device 938, and/or the mobile relay device 940 via one or more networks 946 including, for example, one or more WANs such as the Internet or a cellular network, one or more LANs, and the like.
[0077] It will be appreciated that, although the disclosures herein were presented in the context of certain example use cases, those disclosures may be employed and implemented in other contexts and in other use cases. For example, the disclosures presented herein may be employed to provide track-and-trace functionality for any type of product (e.g., auto parts, consumer goods, and the like) that move through the supply chain or other logistics channels. For example, the disclosures herein may be employed to provide track-and-trace functionality for shipments of goods, packages, and the like transported by public postal services, private shipping services, and the like. Furthermore, the disclosures provided herein may be employed to provide notifications of access to sealed containers even if those containers whether or not those containers are transported. Additional contexts, use cases, and examples will be appreciated with the benefit of the disclosures herein.
[0078] The articles a and an are used herein to refer to one or to more than one (i.e., to at least one) of the grammatical object of the article. By way of example, an element means one element or more than one element. Furthermore, about as used herein when referring to a measurable value such as an amount, a temporal duration, and the like, is meant to encompass variations of +20%, +10%, +5%, +1%, and +0.1% from the specified value, as such variations are appropriate according to the understanding of one of ordinary skill in the art. Ranges: throughout this disclosure, various aspects of the invention can be presented in a range format. It should be understood that any description in describing a range is provided for convenience and brevity and should not be construed as an inflexible limitation. Where appropriate according to the understanding of one or ordinary skill in the art, the description of a range should be considered to have specifically disclosed all the possible subranges as well as individual numerical values within that range. For example, description of a range such as from 1 to 6 (1-6) should be considered to have specifically disclosed subranges such as from 1 to 3 (1-3), from 1 to 4 (1-4), from 1 to 5 (1-5), from 2 to 4 (2-4), from 2 to 6 (2-6), from 3 to 6 (3-6), etc., as well as individual numbers within that range, for example, 1, 2, 2.7, 3.0, 3.25, 4, 4.675, 5, 5.03, and 6.00 with an appropriate quantity of significant digits according to the understanding of one or ordinary skill in the art. This applies regardless of the breadth of the range.
[0079] Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in any statement of example embodiments is not necessarily limited to the specific features or acts described above. Furthermore, the operations described herein may be conditional. For example, various operations may be performed if certain criteria are met. If the one or more criteria are met, various examples may be used. It may be possible to implement any portion of the examples described herein in any order and based on any condition.
[0080] Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in any statement of examples is not necessarily limited to the specific features or acts described above. Furthermore, while aspects of the present disclosure have been described in terms of preferred examples, and it will be understood that the disclosure is not limited thereto since modifications may be made to those skilled in the art, particularly in light of the foregoing teachings. For example, although various examples are described herein, features and/or steps of those examples may be combined, divided, omitted, rearranged, revised, and/or augmented in any desired manner. Various alterations, modifications, and improvements will be appreciated by those skilled in the art and are intended to be part of this description, even if not expressly stated herein, and are intended to be within the spirit and scope of the disclosures herein. The disclosures herein, therefore, are by way of example only, and are not limiting.