Confidential & Proprietary Information
Software
Security
•
Interface-based security policies for configuration
commands
o
Always disabled
o
Always enabled
o
Passphrase auth required
o
Passphrase auth required with timeout
•
Customizable user passphrase
•
Encrypted BLE configuration interface
Interface
•
Modem AT command interface
o
UART
o
BLE Config (secure key)
o
BLE Nordic UART Service (NUS)
•
Unsolicited response codes (URCs)
o
Customizable event filters
o
Selectable output GPIO interrupts
•
BLE Smart One Sensor Service
o
Up to 10 BLE sensor nodes
o
Customizable security key
Tracking
•
Normal Track Mode
o
Previous track point option
o
Dock mode option
•
Theft Alert Mode
o
Geofencing
•
Integrated or external GPS
•
Integrated or external accelerometer
Software Inputs
•
8-Software Defined Count Inputs
o
GPIO mapping
o
Accelerometer event mapping
•
Count
•
Accumulated Time
•
Transition Events
•
Undesired State
o
Optional hysteresis
OTA Messages
•
3 customizable priority settings
•
Customizable dither and re-transmission attempts
•
Legacy Message Compatibility
o
Raw Messages
o
Truncated Messages
o
Standard Messages
Optional previous track point
o
Speed and Heading
Optional previous track point
o
Smart One Sensor Raw and Truncated Sensor
Messages
•
Modular Messages
o
Powered-On
o
GPS
o
Timestamp
o
Inputs 1-8
•
Health Check
•
Interval or Time-Of-Day
Managed OTA Message Transmit Queue
•
Supports up to 10 pending OTA messages
•
Pre-emption settings
o
Disabled
o
Priority
o
Time
o
Priority and Time
Configurable GPIO
•
Special Function
o
Line Power Detection
o
Advertising Enable Detection
o
Tamper Detection
•
GPS Features
o
NMEA pass-through
o
Current and previous position information
•
Power Management
o
Settable power states and track-mode behavior
Full-on
Partial Suspend
Full Suspend