Multi-Mode Commissioning/Decommissioning of Tags for Managing Assets
First Claim
1. A computer-implemented method comprising:
- receiving a request from a device to associate a tag with an asset coupled to the tag, the request made by a user of the device;
authenticating the user of the device;
responsive to a successful authentication, receiving a tag identifier and an asset identifier from the user through the device; and
associating the tag identifier and the asset identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
Multi-mode commissioning/decommissioning of a wireless monitoring device (Tag) for managing assets and shipments is disclosed. Users can request commissioning, status resets and decommissioning of Tags using multiple modes of communication. The users are authenticated by an information service that receives the requests. Responsive to a successful authentication of a user, the information service receives a tag identifier and an asset identifier from the user. A tracking application associates the Tag identifier and the asset identifier. After the Tag is associated with the asset, the tracking application can successfully track the geographic location and status data of the asset from the Tag. The location data can be used by the tracking application to track assets in real-time. The status data and location data can be used by the tracking application to detect and verify tamper conditions, including tamper alerts triggered by geo-fences, authorized inspection of the asset, and environmental exceptions.
137 Citations
34 Claims
-
1. A computer-implemented method comprising:
-
receiving a request from a device to associate a tag with an asset coupled to the tag, the request made by a user of the device; authenticating the user of the device; responsive to a successful authentication, receiving a tag identifier and an asset identifier from the user through the device; and associating the tag identifier and the asset identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method comprising:
-
receiving a request from a device to disassociate a tag and an asset decoupled from the tag, the request made by a user of the device; authenticating the user of the device; responsive to a successful authentication, receiving a tag identifier and an asset identifier from the user through the device; and disassociating the tag identifier from the asset identifier. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 24, 25)
-
-
23. A computer-implemented method comprising:
-
receiving a report associated with a tag coupled to an asset, the report including a then current geographic location of the tag and a tamper alert; determining if the tag registered the tamper alert at a valid, geo-fenced final destination location; if the tag registered the tamper alert at a valid, geo-fenced final destination location, disassociating the tag and the asset; and if the tag did not register the tamper alert at a valid, geo-fenced final destination location, maintaining an association between a tag identifier and an asset identifier.
-
-
26. A computer-readable medium having instructions stored thereon, which, when executed by a processor causes the processor to perform operations comprising:
-
receiving a request from a device to associate a tag with an asset coupled to the tag, the request made by a user of the device; authenticating the user of the device; responsive to a successful authentication, receiving a tag identifier and an asset identifier from the user through the device; and associating the tag identifier and the asset identifier. - View Dependent Claims (27)
-
-
28. A computer-readable medium having instructions stored thereon, which, when executed by a processor causes the processor to perform operations comprising:
-
receiving a request from a device to disassociate a tag and an asset decoupled from the tag, the request made by a user of the device; authenticating the user of the device; responsive to a successful authentication, receiving a tag identifier and an asset identifier from the user through the device; and disassociating the tag identifier from the asset identifier. - View Dependent Claims (29)
-
-
30. A computer-readable medium having instructions stored thereon, which, when executed by a processor causes the processor to perform operations comprising:
-
receiving a report associated with a tag coupled to an asset, the report including a then current geographic location of the tag and a tamper alert; determining if the tag registered the tamper alert at a valid, geo-fenced final destination location; if the tag registered the tamper alert at a valid, geo-fenced final destination location, disassociating the tag and the asset; and if the tag did not register the tamper alert at a valid, geo-fenced final destination location, maintaining an association between a tag identifier and an asset identifier. - View Dependent Claims (31, 32)
-
-
33. A computer-implemented method comprising:
-
receiving a first request using a first mode of communication to associate or disassociate a tag with an asset coupled to the tag, where the first request is received from a first requestor at a first point in transit of the asset; authenticating the first requestor; responsive to a successful authentication of the first requestor, receiving a tag identifier and an asset identifier from the first requestor; associating or disassociating the tag identifier and the asset identifier; receiving a second request using a second mode of communication to associate or disassociate the tag with the asset coupled to the tag, where the second request is received from a second requestor at a second point in transit of the asset; authenticating the second requestor; responsive to a successful authentication of the second requestor, receiving the tag identifier and the asset identifier from the second requestor; and associating or disassociating the tag identifier and the asset identifier. - View Dependent Claims (34)
-
Specification