Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata
First Claim
Patent Images
1. Apparatus for securely binding an asset to a human using computing intermediaries including a handheld computing device comprising a processor and a handheld communications device, the apparatus comprising:
- an asset computing device structured to be tamper-resistantly affixed to the asset, the asset computing device including an asset communications device and a processor disposed and structured to receive signals from at least one sensor; and
non-transitory memory storing instructions that, when executed by the handheld computing device processor, provides a trust engine that securely binds a human with the handheld computing device using multi-factor authentication including biometrics;
the asset computing device securely binding with the handheld computing device using at least one of a wired link and a wireless link between the asset communications device and the handheld communications device;
the secure binding between the human and the handheld computing device and the secure binding between the asset computing device and the handheld computing device securely establishing and maintaining a trusted chain of custody association between the human and the asset.
4 Assignments
0 Petitions
Accused Products
Abstract
A convenient, easy to use ubiquitous governance system to help manage and maintain the plurality of semi-autonomous devices that will be loosely coupled to and communicate via the Internet or other network, more commonly referred to as the network of things.
-
Citations
24 Claims
-
1. Apparatus for securely binding an asset to a human using computing intermediaries including a handheld computing device comprising a processor and a handheld communications device, the apparatus comprising:
-
an asset computing device structured to be tamper-resistantly affixed to the asset, the asset computing device including an asset communications device and a processor disposed and structured to receive signals from at least one sensor; and non-transitory memory storing instructions that, when executed by the handheld computing device processor, provides a trust engine that securely binds a human with the handheld computing device using multi-factor authentication including biometrics; the asset computing device securely binding with the handheld computing device using at least one of a wired link and a wireless link between the asset communications device and the handheld communications device; the secure binding between the human and the handheld computing device and the secure binding between the asset computing device and the handheld computing device securely establishing and maintaining a trusted chain of custody association between the human and the asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for cooperating with a user having a user device, the system comprising:
-
a sensor that monitors the environmental events acting on an asset to enable determination of whether the asset has been harmed by the environmental events; at least one intelligent communicating device associated with the asset and configured to provide a trusted intelligent agent that gathers environmental information from the sensor; and at least one processor configured to securely bind (a) the user to the user device using multi-factor authentication including biometrics, (b) the user device to the intelligent communicating device, and (c) the user and the intelligent communicating device to the asset and any cargo contained therein, the at least one processor associating the user with information monitored by the sensor, thereby securely documenting events concerning the asset for which the user is responsible, the at least one processor providing a trust engine that securely binds with the user device using at least one of a wired link and a wireless link, the secure binding between the user and the user device and the secure binding between the intelligent communicating device associated with the asset and the user device securely establishing and maintaining a trusted chain of custody association between the user and the asset. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification