With Connected Devices Leveraging Internet of Things
Total Page:16
File Type:pdf, Size:1020Kb
with connected devices leveraging Internet of Things Frank Callewaert - Global Technology Strategist This Photo by Unknown Author is licensed under CC BY-ND Microsoft IoT Viewpoint 2 …IoT enables an eCustoms and eTrade business revolution, enabled by technology Waves of Innovation Cloud Globally available, unlimited compute resources IoT Harnessing signals from sensors and devices, managed centrally by the cloud Edge Intelligence offloaded from the cloud to IoT devices AI Breakthrough intelligence capabilities, in the cloud and at the edge Internet of Things is everywhere Augmented reality Smart grids Multilayer QR - RFID Agriculture Buildings Airplanes Livestock Auto Construction Surveillance Workspaces Charging Location Buses Sports stations Trains Worker Safety Racing Elevators Security Pets Vending Medical devices Subways Factories Shopping Power Plants Equipment Engines Vaccine Manufacturing Traffic Systems dispensers Postboxes Communications Weather Systems Shipping wearables Smart meters Trucks Smart Seals Freight Drones Public Safety Internet of Things is big 80 billion connected “things” by 2025 - IDC 70% 180 zettabytes digital data by 2025 - IDC value enabled by IoT from B2B scenarios - McKinsey and Company $457 billion global IoT market by 2020 - Gartner A Simple View of an IoT Solution Things Data & Insights Actions A More Realistic View… Data storage Deployment Enterprise integration Cloud-to-device Business process integration commands Cold path analytics Device recovery Solution scale Operations monitoring Cost management Internationalization High availability Updating devices Provisioning Warm path analytics devices Device lifecycle Transport protocols Hot path analytics Drivers Things Data & Insights Actions Device updates Disaster recovery Data ownership < ---- End-to-End Security ---- > On device analytics Data visualization Industry and government compliance HW certification Manufacturing scale Device commercialization Securing data … and why IoT needs simplifying Intelligent Cloud Intelligent Edge A new Azure Sphere OS secured by Microsoft for the devices 10-year lifetime to create a trustworthy platform for new IoT experiences. GPL’d OSS Linux kernel A new Azure Sphere class of MCUs, from silicon partners, with built-in Microsoft security technology provide connectivity and a dependable Azure Sphere hardware root of trust The Azure Sphere Security Service guards every Azure Sphere device; it brokers trust for device-to-device and device-to-cloud communication, detects emerging threats, and renews device security end-to-end solution for securing MCU powered devices 13 IoT in every phase of the eCustoms & eTrade Experience Journey API economy and Dynamic pricing of Best offer Public portal micro-services owned services prediction for freights Customer self-service B2B process and Offerings definitions information tracking Profile Customer and service quotation augmentation relationship Multi-modal freight Service contracts Door-to-door End-user final services forecast and agreements delivery Lifts predictive Skype bots for (moving/relocation) Electronic customer services Multi-customer documents maintenance Nationalization/ Claims and Inquiries parcel consolidation Understanding Metadata Port/out-of-port/free- customs Beacons and sensor in customer needs extraction zone storage containers/parcels for value Sentiment Delivery and validation of added services for end- analysis on calls BI & ML for demand preliminary documentation `Document customers forecasting digitalization and Automatic validation and Truck/vans/lifters traffic Cargo leaves OCR metadata in port/warehouses to port area fraud detection/prevention recognition Cargo release Prospecting detect patterns and Uberization of customer and optimize operations trucks/vans services Container return consumer Delivery of goods Free containers BI & ML for and documentation recycle prevention e-Invoicing market analysis Digital signatures Final cargo social listening Billing and Billing and payment storage Crowd shipping advancement payment ETA for trucks/vans Financial services Modal exchange and complementary services Arrival to Crane predictive Billing and payment Digital sensors destination maintenance e-Payments on containers Provision of container Padlocks & GPS in and cargo consolidation containers for real time Locking y traceability tracking and security Digital tracking of containers of containers Sea transportation Fleet value added services Entrance to port area Modal exchange and ETA prediction for complementary services containers Anomalies detection Cargo tracking Livestock & Pets Pets Livestock Freight Airplanes Buses Fleet monitoring Origin Tracking Predictive maintenance Health & Vaccines Arrival predictions Tracking of Trucks Trains Transport conditions Vaccinations Shipping timber/lumber Location Intelligence for Transportation Smart seals Location Traffic Systems Engines Digital Twins Public Safety Surveillance Security Augmented reality Communications Drones Equipment Warehouse Worker Safety Wearables Identify and monitor threats Internet of Things for eCustoms Site Security and Surveillance Car plate – Container identification Traceability from producer to Buyer People traceability– Site access control Food Safety Movement Pattern detection Multilayer Origin Tracking - Quality attestation MFA and Smart Badging Smart Seals Factories QR – RFID Counterfeit & Fraud detection 100% Scanning Multilayer QR & RFID Warehouse Stocking conditions Smart seals Agriculture Port Cranes Buyer Augmented Reality Digital Twins Internet of Things for eCustoms Challenges and Solution 2/3 Traceability of wood Hammered Cut Stocking Transportion Processing Production and End user in sawmill selling An Read RFID1, Read RFID2, Reads RFID2 Reads RFID2, process Applies tags on the Reads to verify georeferenced set RFID2 with verify the and applies other tags finished products traceability steps RFID1 is info from transacion and on precious wood cuts applied to the individual cut route the piece tree actor - Multi tag - QR code barcode QR code barcode Multi device - Multi How it is done in the field How it is done in the field Uses RFID TAGS to identify the tree and the individual cuts RFID reader sync. via bluetooth with smartphone App that lets reference the biometric characteristics of the plant and georeferencing it and the individual cuts Validate your product’s authenticity DoubleTrust A multi-layer QR Code label with special chemistry Before After Top (red) layer Bottom (yellow) layer Side View Top View © 2017 3M Side View IoT & Blockchain in Action | Pharmaceutical authenticity Manufacturer Prescription processor Carrier 1 The drugs originate from the The drugs packaged according to the The product is securely pharmaceutical manufacturer appropriate dosage and sealed with 3M shipped with QR codes DoubelTrust, multilayer QR code labels verifying transfers at each step Warehouse The product is again verified and stored in the appropriate, secure environment Carrier 2 Carrier 2 scan confirms receipt of Retail store 1000 authentic bottles with 100 bottles are rejected before shelving verified QR codes due to incorrect QR codes The integrity of the product have been violated. Carrier 2 is liable for penalty as the amount of Drug A when it reached the retail store was less than the Smart Contract was tracking SHARED LEDGER Smart Contract created Carrier 1 Warehouse Carrier 2 Retail store 1000 units of Drug A 1000 units of 1000 units of 1000 units of 900 units Drug A Drug A Drug A of Drug A At various points in the journey, the IoT device scans the QR codes and records the unique serial numbers which are updated on the blockchain IoT, Big Data and AI Machine Learning finds patterns in data then uses those patterns to predict the future Microsoft’s approach to AI deployment Technology can perceive the world Perception Comprehension 24 Visual Recognition Intelligent Service makes it easy to build a custom image classifier. For example: • Identify whether a photo includes a picture of your product • Differentiate between genuine versus counterfeit https://visionaidevkit.com/ INTRODUCING CORSYS: THE FUTURE OF SECURITY OPERATIONS THE OVERALL PLATFORM – DIGITALLY ACCELERATING YOUR OPERATIONS CASE OPERATIONS 01 MANAGMENT 02 PROFILER 03 DECISION CENTRE 04 OPTIMISER SPLIT INTO 5 RISK CATEGORIES, CUSTOMISABLE TO SPECIFIC PORT PROCESSES NON-PHYSICAL ANALYSIS & INSPECTION AUTOMATED RISK TOOLS CASE PATHWAY CREATION ASSIGNMENT COMMON 05 OPERATIONAL VIEW MACHINE ASSISTED MANUAL 06 INTELLIGENCE CASE CREATION CONFIRM/ OVERRIDE RISK PATHWAYS 3RD PARTY INGESTION Cases ingested from AI and ML algorithms suggest Customs officers either confirm or override the All data feeds into a single view for supervisors to various sources, along a risk level for each case. The suggested risk levels from the profiler engine, these risk understand and control current operations, and an with additional data system learns from itself using levels correlate to various action pathways depending on optimiser to make the best use of available resources. from other sources verdicts from processed cases what inspection processes your port has available Case verdicts feed back to the ML algorithm smithsdetection.com 29 INTRODUCING CORSYS: THE FUTURE OF SECURITY OPERATIONS WHICH CAN ADAPT TO DELIVER NEW AVIATION / AIR CARGO CONOPS CASE Profiler produces risk assessment score for each parcel based on the information captured 01 MANAGMENT 03 PROFILER 06 Building a trusted AI assisted Machine Learning