Meshdynamics
Soft Chips. Ultra Low Power Edge Intelligence;
Anchor    Glossary     One Page     Primer      Slides     Soft ChipsTM    Blogs     Book     Mesh     ACG     SlideShare   Linkedin     Bio 



Fig. 1. Soft ChipTM Trusted Sensor Patch -> Data Logs -> Pigeons -> Cloud -> Actionable Edge Intelligence

Rationale for Soft ChipsTM

Chirp protocols are generic and intentionally rudimentary- they can run on any radio and coexist with any existing protocol. When Chirps are detected, Chirp protocol handlers run - in the phones or on USB modems. Simple ant-like edge intelligence is imprinted to provide When-this-then-that and If-when-this-then-that processes. Soft Chips - as the same suggests, can have their behaviors modified. Suites of sensors can be activated by imprinted code to perform specific tasks using specific sensors e.g. make data logs, relay "fire!" alerts, corroborate multi-sensor feeds. Soft Chips may be made in millions because they support multiple use cases and are future proof- because of the radio and protocol agnostic nature of Chirps.

Intended benefits of these embodiments are in them being: 
. Small
. Dumb
. Cheap
. Copious
. Secure
. Custom
. Agnostic
Small Radio Power Usage and Footprint - Long Battery life.
Limited Ant-like processing capabilities - but re-programmable.      
Intended to be produced in millions - since multi-use.
Intended to be used like seeding crops - deep ground truth verification.
Imprinting process - end-to-end - is innately secure. USB modems add security.  
No central standards committee needed. Modem based Chirp protocol custom.
Chirps are radio and protocol agnostic. Can coexist with other protocols.



Example: RFID++: Low Cost Asset Status Trackers.

Consider RFID - a static GUID identification scheme. Tags are applied to boxes in transit. When energized, they transmit a static code to RFID readers.  RFID++ tags - can  be active tags attached to provide travel logs from sensors - temperature, sound & accelerometers - and imprinted by Enterprises for specific SLA compliance verification and monitoring.

These specific travel Logs are released to Carrier Pigeons (the iterant readers) when imprinted handshakes are sent to sensors on the chip to wake up and Chirp. Minimal power consumption is due to both the cryptic 1-2 bytes payloads vs. IPV6 40+ bytes and that transmission are scheduled - managed RF interference. Chirp protocols are thus efficient. MAC based CSMA/CA protocols are inherently inefficient for these reasons.  

This managed Collision Avoidance - in both time and RF Space - is the Cloud Orchestrated Model.  

Establishing provenance of sourced materials - which wood came from which forest - comes from imprinted tags that follow the felled tree from the forest to the lumber yard. Provenance Trust chains begin when the tree is first felled and an RFID++ tags is attached to it. RFID++ thus establish sourcing for regulatory agencies and also provide a record of travel conditions e.g. SLA compliance on perishables. 

Soft ChipsTM and its Multi-Use Cases (military and industrial).


Fig. 2. Serial Modems are small dumb cheap copious.   Ubiquitous Carrier pigeons serve as transports.

Soft Chips have a minimal - but extensible - base vocabulary: Send, Listen, Relay, Log. Transmissions are either scheduled - e.g. Cron  - or trigged by events - a listener on activated sensor on Chirp Chips.
This Extensible Soft Chips family addresses multiple military and industrial - dual use - applications.

1. RFID++ RFID is a static GUID identification scheme. The tags is applied to boxes in transit and when energized, transmit a code to the reader. Similarly, a RFID++ tag is an active tag applied to perishable items, for example. It builds a data log of the item in transit - based on packaged Infra-red, temperature, sound & accelerometer sensors activated selectively to address purpose driven SLA compliance requirements.

2. Chirper GridTM   - Aerial sensor dusting of large areas for forest fires running in relay mode. As soon as any heat sensor is triggered, it is relayed - the entire region lights up. Any carrier pigeon, intermittently servicing the region sends the alert. A version for intrusion detection uses vibration and sound sensors (microphones).

3. Sensor PatchTM For Legacy Edge assets - remote pump motors - may now have a non invasive sensor logging service providing simple predictive maintenance- driving new efficiencies in servicing legacy assets. Gas pipe leakage detection, air and ocean pollution sensors may be copiously deployed - Smart Dust.

4. Military versions - covert mobile asset tracking and intrusion detection in DMZ or hostile regions.

5. Modem Chipset only - not packaged with sensors, providing a serial bus interface to Enterprise sensor patch - without the wireless communication unit. Based on simplified FREERTOS and Sub-1 GHz radios (for range and leverage less congested RF).  Soft Chips may customize this Exemplary Soft Chip Work Flow to harvest edge data securely.

 
Soft ChipsTM and CHIPS initiatives.

Soft Chips embodiments are intended for dual use (military and industrial) since the security is in the imprinting services provided by trusted hosted services. The two ends of wireless modem have to "match" or know of each others' schedules and RF channel usage and handshake protocols. End-to-End and zero trust.

In our polarized world, governments and military deploy edge devices imprinted by them to provide womb-to-tomb ground truth verification. Sensitive data is not sent over foreign networks and equipment. Covert networks over trusted devices are used. Business is war watered down. Today, all Global enterprises and Regulatory agencies run on federated “Clouds” and expect authentic data from their assets on the ground.

CHIPS initiatives - "integral to America’s economic and national security" benefit from collaborative sharing of trusted, previously walled private gardens. Globally Relevant challenges are now addressable.

           Global scale challenges mandate Globally Relevant Edge à Cloud solutions.

Soft ChipsTM and Upgradeable COTS products. 

images/Soft_Chip_Sensor_Patch_With_Modem_Labelled.jpg
Fig. 3. Exemplary Sensor Package Development tool kit, COTS Sensor Controller and Sensors. Click for more.

In 2016 a developer implemented a version of Chirps on Raspberry PI with a two byte Chirp. Web
We now take this to the next level – innately secure, cloud orchestrated Cloud->Edge messaging.

Texas Instruments and others US Chip makers provide extensive Sensor Controller development environments. The Sensor Controller Studio, for example, supports a plethora of radios - all of which can be Chirp aware.
These MAC based radios need a simple protocol handler, running at the Lower Level MAC, to detect Chirps.

These radios are already on - Ubiquitous - carrier pigeons and run the full OSI stack. In those cases, where a specialized radio is needed, a USB attachment - Enterprise Imprinted - is a simple fix.

Long range Sub-1 GHz radios are used by Amazon Sidewalk. With Chirp extensions this network extends to farms and forests - Sustainable Global Impact. Military deploy Software Defined Radios - easily Chirp aware. 
  
Soft ChipsTM and Our Supervised Autonomy Bias

In 1992 a Supervised Autonomy Architecture (video) was deployed in multiple dual use cases. In 2003 Soft ChipsTM Concepts were developed for Military stealth intrusion detection. It became apparent that the last mile connectivity for remote assets had its challenges and needed resolution first. Mobility, Scalability, Terse messaging and Logically Contiguous Clouds were addressed first. Chirps were first discussed here 


 
Fig. 4. Logically Contiguous Remotely Managed, robotic devices. Animation.




Fig. 5. Task delivery constraints aligned with subscriber demand and task delivery schedules. Animation


Soft Chips Summary and Conjectures.

The rapidly accelerating confluence of  Distributed AI  with Software Defined Networking (SDN) prompted this Cloud->Edge thinking.

Cheap, Copious, Global Scale Connectivity then drives new - currently impractical - efficiencies.

Soft Chips is a "natural" alternative to key challenges in remote edge asset management. Bio Slides.

1. Today: Edge with BLE, Zigbee, Lora  => Fractured Markets and Silos   ==  Not Massive versus
2. Chirp: Edge with Imprinted Pigeons  => Contiguous Clouds and Pub/Sub ==  Massive and Trusted.