WO2014160372A1 - User interface for object tracking - Google Patents

User interface for object tracking Download PDF

Info

Publication number
WO2014160372A1
WO2014160372A1 PCT/US2014/026417 US2014026417W WO2014160372A1 WO 2014160372 A1 WO2014160372 A1 WO 2014160372A1 US 2014026417 W US2014026417 W US 2014026417W WO 2014160372 A1 WO2014160372 A1 WO 2014160372A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile communication
communication device
wireless apparatus
tag
user
Prior art date
Application number
PCT/US2014/026417
Other languages
French (fr)
Inventor
Juan E. Rodriguez
Original Assignee
ACCO Brands Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ACCO Brands Corporation filed Critical ACCO Brands Corporation
Priority to US14/391,203 priority Critical patent/US20150126234A1/en
Priority to GB1503337.6A priority patent/GB2524174A/en
Publication of WO2014160372A1 publication Critical patent/WO2014160372A1/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S11/00Systems for determining distance or velocity not using reflection or reradiation
    • G01S11/02Systems for determining distance or velocity not using reflection or reradiation using radio waves
    • G01S11/06Systems for determining distance or velocity not using reflection or reradiation using radio waves using intensity measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • daily life also presents many distractions that lead to accidental loss.
  • the day-to-day time challenges further compound, the problems as one usually has little time to discover or locate such lost items. Loss of such, items is
  • the devices and systems described in this document relate to a system of loss prevention, discovery, and tracking of personal belongings through the use of wireless hardware and mobile electronic devices such as sniartphones, tablet computers, and portable computers.
  • embodiments of the present invention are directed at systems and methods to monitor the proximity of personal possessions using small radio transceivers (e.g. "tags 5 ' or "fobs") attached, to objects of interest (i.e. "monitored objects”) and wire iessly connecting to a mobile communication device mch as a smartphone, a tablet computer, or a wearable device with computing capabilities running an object proximity and tracking application.
  • small radio transceivers e.g. "tags 5 ' or "fobs”
  • objects of interest i.e. "monitored objects”
  • wire iessly connecting to a mobile communication device mch as a smartphone, a tablet computer, or a wearable device with computing capabilities running an object proximity and tracking application.
  • the application generates an alert when a monitored object moves beyond a predetermined monitoring range ⁇ e.g. a safe zone) and/or radio communication range (the "Separation Alert"), when a previously out ⁇ of ⁇ nmge object re-enters monitoring range (the "Approach Alert”), or when a monitored object moves if the object is supposed to be stationary (the "Movement Alert”).
  • a predetermined monitoring range e.g. a safe zone
  • radio communication range the "Separation Alert”
  • the application may allow a special tag (a "fob") to page the mobile communication device using a wireless apparatus (a "fob”) attached to a monitored object
  • the application may allow a. user to locate the monitored objects through proximity detection and paging when they are in radio
  • the application may adaptivelv alter the behavior of the system to manage battery life as well as adaptively qualify and generate alerts to minimize false alarms.
  • One embodiment of the present invention may be directed to a mobile
  • the invention provides a method for tracking a location of a mobile ccntinwnication device.
  • the mobile coimm kation device includes a processor, a memory, a transceiver, and display. The method includes communicating, by the transceiver; with a wireless apparatus, storing location information of the mobile
  • the invention provides a non-transitory computer program product including a computer usable medium having a computer-readable program code stored thereon.
  • the computer-readable program code includes instructions that, when executed by a mobile communication device having a processor, a memory, a transceiver, and a display, cause the mobile communication device to communicate, by the transceiver, with a wireless apparatus, store location information of the mobile communication device in response to the transceiver one of connecting to and disconnecting from the wireless apparatus, and display the location information cm the display.
  • the invention provides a mobile communication device thai is configured to communicate with a wireless apparatus. The mobile
  • the communication device includes a processor, a transceiver coupled to the processor and operable to communicate with the wireless apparatus, a memor coupled to the processor and operable to store location, information, of the mobile communication device in response to the transcei ver one of connecting to and disconnec ting from the wireless apparatus, and a display coupled to the processor and operable to display the location infonnation,
  • the invention provides a system including a wireless apparatus and a mobile communication device.
  • the wireless apparatus includes a first transceiver.
  • the mobile communication device includes a processor, a second transceiver coupled to the processor and operable to communicate with the first transceiver of the wireless apparatus, a memory coupled to the processor and operable to store location infonnation of the mobi le comm unication de vice in response to the second transceiver one of connecting to and disconnecting from the first transceiver of the wireless apparatus, and a display coupled to the processor and operable to display the location infonnation.
  • FIG. I shows a block diagram illustrating an object proximity and tracking system according to embodiments of the invention
  • FIG. 2 shows another exemplary block diagram illustrating an object proximity and tracking system according to embodiments of the invention.
  • FIG. 3 shows a perspective view of a security system including exemplary embodiments of a wireless apparatus in the form of a fob, a wireless apparatus in the form of a tag, and a mobile communication device according to an embodiment of the in vention.
  • FIGS. 4A and 4B show perspective views of an exemplary wireless apparatus in the form of a tag according to an embodiment of the invention.
  • FIGS. 5A-5C stow perspective views of a exemplary wireless apparatus i the form of a fob according to an embodiment of the in v ention.
  • FIG. 6 shows a wireless apparatus state transition diagram according to an embodiment of the invention.
  • FIG, 7 shows a diagram of the different proximity status zones according to embodiments of the present invention.
  • FIG, 8 shows a flowchart illustrating a method of a wireless apparatus according to embodiments of the invention.
  • FIG. shows a flowchart illustratin g a method of proximity detection performed. by a mobile communicatio device according to embodiments of the invention.
  • FIGS. 10-14B sho exemplar screenshots of using an application to manage, configure, and interact with an object proximity and tracking system according to embodiments of the invention.
  • FIG, 15 shows a block diagram of an exemplary computer system.
  • FIG. 16 shows a flowchart illirstratrag a method of tracking a location of a mobile comm.unioatio.it device.
  • FIG. 17 shows a perspective view of another wireless apparatus
  • F G. ! 8 shows a screenshot of an application that is tracking the location of the mobile communication device.
  • FIG. 1 shows a screenshot of a spreadsheet including location information from the application thai is tracking the location of the mobile communication device.
  • Embodiments of the present invention relate to a securi ty and monitoring solution for objects of interest to a user *
  • a mobile commiitvicatiou device such as a smartphone monitors the proximity of objects of interest for tracking, paging, and location.
  • the system tracks the location of tags that are attached t objects of interest to a user.
  • the system also allows the mobile communication device itself to be monitored, tracked and paged by one or more of the aforementioned objects of interest.
  • Embodiments of the invention relate to an object tag proximity alert system including a mobile communication device (e.g., a mobile phone) running an application and one or more wireless apparatuses (e.g., tags or fobs) comprising transceivers.
  • the tag or fob may be attached to an object and ma communicate with the mobile phone.
  • the mobile phone may alert a user if a tag moves out of a predetermined proximit range from the mobile device, or if a monitored tag that is supposed to be stationary is detected to be moving.
  • the mobile phone continually transmits wireless communications to connected and authenticated tags.
  • a tag periodically monitors the signal strength of messages recei ved from the mobile phone by determining a received signal strength indicator ("RSSi") readin and sends the RSSI readings to the mobile phone.
  • RSSi received signal strength indicator
  • An object proximity tracking application running on the mobile phone determines tee behavior of the tag and the system as whole Using the SSI reading. If a tag's signal strength readings go belo a certain alert threshold, a user may be alerted.
  • functionality relating to setting an adaptive threshold (signal strength threshold can change based on environment), adapti ve transmission rate (rate of transmission changes when battery is l ow or if the connection status changes), and adaptive transmission power (transmission power is lowered when battery low) can be used to improve system performance and battery life.
  • Embodiments of the present invention provide a number of technical advantages.
  • the security system provides a simple, efficient, interactive, customizable, and effective solutio to monitoring, tracking, and receiving notifications regarding objects of interest.
  • the system allows a consumer to rest assured that their objects of interest are within a safe distance of them at all times and that the user will be notified if their objects of interest move out of a predetermined distance.
  • a "wireles apparatus” can include any electronic device that includes a means for communicating with a mobile communication device or another electronic device.
  • a wireless apparatus may include a fob, a. tag, or a zone tag that communicates with a mobile communication device.
  • the wireless apparatus may be an independent device or ma be a sub-component or portion of another device. Additionally, the wireless apparatus ma comprise an means for communicating with the mobile communication device
  • the wireless communication signals including a transmitter, receiver, transceiver, separate antenna, or any other components that are suitable for sending nd receiving wireless communication signals.
  • the apparatus may be portable or small enough that a user can attach the wireless apparatus to a personal object without interfering wit the operation or utility of the personal, object.
  • the wireless apparatus may also comprise components that allow it to alert a user to its location if it is paged or i some embodiments, if the wireles apparatus enters an alarm condition,
  • wireless apparatuses may include a tag, a fob, and a zone tag.
  • a "tag” may be attached to an object of interest and may be tracked using the mobile communication device so that a user ma be alerted when the monitored object leaves a pte-seieeted sensitivity setting, cannot be found by the user, or any other suitable time that a user may wish to know where the monitored object is located.
  • a "fob” may comprise the functionality of the tag but may also include mi tiooaiity such that the user may page the mobile communication device using the tag (e.g., using a "find my phone” button). Additionally, the fob may provide a securit solution for the mobile communication device suc h that the fob may alert the user if the mobile communication device is separated from the user by more than a predetermined distance. As such, the fob may be attached to objects that are in the user's possession most of the lime (e.g., car keys) so that the user may be alerted by the fob if the user is separated from their mobile communication device.
  • the lime e.g., car keys
  • a "zone tag” may be a type of wireless apparatus that may be used in particular zone or area that the user would like to change the behavior of the system .
  • a zone tag may be used in a user 's home so that when the user is in their home, the
  • the safe zone setting may rela the monitoring settings of the system (e.g., the alert threshold, the hold-off time, etc.) so that the user is not annoyed by false alarms.
  • the safe zone assumes that object of interest may be left and separated from the user on purpose without the same security concerns of public places. For example, a user may be separated from their important items b a further distance in their home than they would in a public space because their home is a secure environment.
  • Zone tags may be used in any other suitable manner as well
  • a freighted security state could be implemented through a "danger zone” setting using a zone tag.
  • a "danger zone” zone tag may be implemented, to remind the user to be especially careful and not to leave objects of interest unattended.
  • T he range of the zone tags may be configured using the application as well as the configuration settings that are implemented with each zone tag,
  • a “mobile communication device” can include any electronic device with a means for communicating with other electronic devices or wireless apparatus.
  • the communication device may include a mobile phone, tablet, digital music player, netbook, laptop, or any other electrical device that comprises a means for wireless communication.
  • the mobile communication device may be w irelessly coupled to one or more wireless apparatuses through any suitable wireless communication components and cornm.ufticatio.ft protocols (e.g., Bluetooth.TM Low Energy communications).
  • the mobile communication device and a wireless apparatus may share information through wireless communications that include commands, data to be stored on a memory of either device, or any other information that may control the behavior of the mobile communication device or the wireless apparatus. While th description below focuses on mobile communication devices, aspects of th invention may be irapleraented with any portable device and should not be limited to mobile communication devices alone. Additionally, the mobile communication device ma
  • the mobile communication device may have a close range alert threshold for one wireless apparatus attached to a monitored, object and a long range alert threshold for a second wireless apparatus attached to second monitored objec t,
  • a "wireless signal request” can include any wireless communication signal, data message, data package, or data stream, sent by an electronic device requesting a response from another electronic device.
  • the mobile communication device may send a wireless signal request to the wireless apparatus requesting a. response message.
  • the wireless signal request may comprise commands, state or operational information, responses to a previous communication received from the wireless apparatus, or any other dat that would be useful to share between electronic devices.
  • the information may be shared through any suitable communication scheme including cellular network, communication, short-range communications (e.g., BluetoothTM or other short-range communication), internet or WI-FI eam.rn.uni cations, or any other suitable communication scheme as would be recognized by one of ordinary skill in the art.
  • a * Svireless signal response can include any wireless communication signal, data message, data package, or data stream sent by an electronic device in response to wireless signal request received from another electronic device.
  • the wireless apparatus may send a wireless signal response back to the mobile communication device in response to a wireless signal request.
  • the wireless signal response may comprise commands, state or operational information, responses to a previous
  • the information may be shared through any suitable communication scheme including cellular network communication, short-range communications (e.g., BluetoothTM or other near- field communication), internet or Wi-Fi communications, or any other suitable communication scheme as would be recognized by one of ordinary skill in the art.
  • short-range communications e.g., BluetoothTM or other near- field communication
  • Wi-Fi communications or any other suitable communication scheme as would be recognized by one of ordinary skill in the art.
  • a "signal strength readi ng" may include any measurement of wireless communication message received from a mobile communication device.
  • a signal strength reading may comprise a recei ved signal strength indicator (RSSI) reading.
  • RSSI measures the power present in a received radio signal. Any other suitable measurement, of the received signal may also be implemented (e.g., signal strength readings based on transmission time, etc.).
  • An "expected signal strength reading * ' may include a signal strength reading value that is predicted based on previously received signal strength readings. For example, an application running on a mobile communication device may predict the next signal strength reading or a predetermined number of upcoming signal strength readings based on one or more previously recei ved signal strength readings. For instance, because signal strength readings may be transmitted at regular intervals, changes in signal strength readings may be gradual and relatively predictable, when based on legitimate activities and not temporary or non-recurring environmental effects. Accordingly, the mobile communication device may estimate the next signal strength reading from a wireless apparatus.
  • a mobile communication device receives signal strength readings of 45 dB, 43 dB, 41 dB, and 39 dB
  • the mobile communication device may expect to receive a signal .strength reading of 37 dB as the mobile communication device and the wireless apparatus are separating at a constant rate of 2 dB/reading.
  • the mobile communication device may estimate a speed of
  • an expected signal, strength reading may be estimated or a number of expected signal strength readings may be determined.
  • a mobile communication device may determine whether the wireless apparatus and mobile communication device are moving away from each other, toward each other, staying the same distance, or whether an environmental, issue is affectin the signal strength readings, by comparing an expected signal strength reading to a received signal strength reading. j0043]
  • the expected signal strength reading may be used to determine whether the system is being affected by environmental interference that does not accuratel portray the separation distance between the wireless apparatus and the mobile communication device.
  • the system may know that an environmental change has affected the signal strength readings of the wireless apparatus. As such, the system may wait a predetermined time (e.g., "hold-off ' time or "hold-off period) to determine whether the environmental change is temporary or may adapt an alert threshold based on the new environmental settings to accurately portray the separation distance.
  • a predetermined time e.g., "hold-off ' time or "hold-off period
  • a mobile communication device e.g., a phone running an object proximity tracking application
  • the next expected signal strength reading would be 2 dB lower than the current value.
  • the next reading is 20 dB lower than the current value, a much larger magnitude change in signal strength readings has occurred than expected.
  • the cause of such a drastic change may be that the items are moving away from each at a drastically increased rate or that an environmental aspect has changed such that the wireless communications are reaching the wireless apparatus with less power than previously due to interference from the environment.
  • Such change may occur because either the mobile communication device or the wireless apparatus has entered an area where wireless communication messages do not propagate as well (e.g., being in proximity of materials, bodies, or objects that detune the antenna or radio transceiver, etc.), something has interfered with the wireless communication message (an open door is closed), the
  • the mobile communication device may adapt, to the environmental changes by raising or lowering the alert threshold if the mobile communication device determines that en vironmental factors are causing the disturbance in signal strength. For example, if the difference between the expected signal strength reading and the received signal strength reading is larger than an allowed change value, the mobile communication device ma calculate a threshold change value and may modify the alert threshold by the threshold change value to ensure no false alarms are if iasered due to temporary or artificial
  • the application on the mobile communication device may implement an adaptive alert threshold that may be raised or lowered, depending on the received signal strength readings and an. expected signal strength reading calculation.
  • An "alert threshold” may incl ude a signal strength value corresponding to a predetermitied safe proximity sensitivity setting for the system. For example, the alert:
  • threshold may be an RSSI value that is estimated to be a ceriain sensitivity level based on the transmission power of the system.
  • file alert threshold maybe set to an intermediate RSSI reading (e.g.. -60 dB).
  • the intermediate sensitivity setting may roughly correspond to a separation distance (e.g., 30 feet) in normal conditions based on the transmission power of the transmitter.
  • the RSSI reading may not stay constant at - 60 dB for a separation distance of 30 feet because the RSSI readings may be affected by transmission power and environmental interference.
  • a door may close between a tag and the associated mobile communication device that may affect the RSSI reading of the wireless apparatus without the distance between the wireless apparatus and the mobile communication device actually changing.
  • the RSSI reading may change to ⁇ ?0 dB at 30 feet away due to the interference of the door.
  • the alert threshold may be adaptable to incorporate environmental changes without alarming. Accordingly, the alert threshold may be adjusted according to the environment interference thai the mobile communication de vice and wireless apparatus experience.
  • the object proximity tracking application may implement adaptive thresholds.
  • the alert threshold may be reduced, by a calculated threshold change value. For instance, using the example of the door closing above, the change of - .10 dB in one reading may be larger than a predetermined allowed change value that may be set to, for example, 5 dB per reading.
  • the application may determine that a environmental factor has affected the RSSI readings. Furthermore, the application may calculate an alert threshold change value, for example -8 dB, and may change the alert threshold by the alert threshold change value.
  • the alert threshold change value may be calculated through any suitable method including the use of averaging, regression analysis, analysts of previous environmental behavior, etc.
  • the alert threshold may be lowered by -8 dB from -60 dB to -68 dB. Accordingly, the environmental changes that would ha ve provided a false alarm since the tag was not more than 30 feet fro the mobile communication device are no longer causing the signal strength readings to be below the alert threshold value, and therefore the user is not alerted. However, the threshold ma not be reduced to a level lower tha is necessar to achieve radio connection. Additionally, the alert threshold may be raised if the signal strength, readings are sudden ly stronger than expected. However, the adaptive alert threshold may not be raised so high that a false alarm may be triggered by any separation or lowering of the signal strength readings.
  • the application may wait for a predetermined, period of time (e.g., a "hold-off period or "hold-off time) that allows any temporary disturbance to be abated, before alerting a user. Accordingly, before alerting a user that the alert threshold has been reached, the mobile communication device may determine if a predetermined number of previous signal strength readings for the wireless apparatu are below the alert threshold.
  • a predetermined, period of time e.g., a "hold-off period or "hold-off time
  • the predetermined number of previous signal strength readi ngs may be determined by the period between readings or through any other suitable means. For example, if a reading is taken every second, and the hold-off period is set as five seconds, the mobile communication device may wait to alert the user until the previous five signal strength readings are all belo die alert threshold value. If the predetermined number of previous signal strengths readings are not below the alert Häsho!d. value, the mobile communication device may store the current signal strength reading in a memory and may wait lor the next received signal strength reading before taking further action regarding the alert. j(M)49j Additionally, in some embodiments, the application may implement a "buffer threshold" and delay alerting the user until the received signal strength reading breaches the buffer threshold.
  • the application may implement a buffer threshold of a predetermined sensitivity level (e.g., 5 dB) where the alarm may only trigger if a rece ived signal strength reading ' breaches the buffer threshold over the alert threshold. Accordingly, when the devices are close to being at the separation distance or limit of the sensitivity settings, the alarm may not constantly alarm, due to environmental interference alone.
  • a predetermined sensitivity level e.g., 5 dB
  • the alert threshold may be set to - 60 dB but when the received signal strength readings are close to the -60 dB alert threshold level, the alarm, may not be triggered until the received signal strength readings reach -65 dB, Accordingly, the mobile communication device may enter a warning condition when the received signal strength readings reach -61 dB and may not enter the alarm condition until reaching -65 dB. As such, if the mobile communication device and the wireless apparatus are close to the separation distance corresponding to -60 dB sensitivity setting (e.g.
  • the signal strength readings may be -5 dB, -60 dB, -61 dB, -5 dB, -60 dB, -59 dB, etc. even though the mobile communication device and wireless apparatus are not moving. As such, if an alarm is triggered every time the alert threshold of -60 dB is crossed, a number of false alarms may be triggered. Accordingly, a buffer threshold of 5 dB may be implemented thai ensures the application only enters an alarm condition when the mobile communicatio device and the wireless apparatus are clearly beyond the sensiti ity settings corresponding to the alert threshold.
  • a "power status" may include any indicator of the power level of an electronic device .
  • a power status may be a percentage of a power left n. a power source, the amount o -time left at average or current powe use settings, an electrical gauging of the power level left in a power source, or any other suitable manner of indicating the amount of power left at a wireless apparatus.
  • the wireless apparatus may determine the power status before sending signal strength readings to the mobile communication device and may include the power statu in the wireless communication. Accordingly, the mobile communication device may track the power level of the la and may update configura tion settings for the wireless apparatus depending on the power status of the wireless apparatus.
  • the mobile communication device may receive a power status indicator that informs the mobile communication device that the powe status of the wireless apparatus is low.
  • the .mobile communication device may then update configuration settings for the wireless apparatus including a rate of transmission of signal strength readings, altering a transmission power of the wireless apparatus, entering the wireless apparatus into a low power state that may disable some functionality to ensure the primary functionality continues to operate, etc.
  • the mobile communication de vice may send the updated configuration settings to the wireless apparatus in a wireless communication and the wireless apparatus may implement the configuration settings included in the wireless apparatus in order to conserve power.
  • a "movemeat otification setting" may include a setting for an electronic device that when activated, the wireless apparatus may make periodic readings of a movement sensor and notify the mobile communication device anytime the sensor identifies movement that meets a certain threshold. For example, a user may configure a tag through the application such that the user indicates that the user would like to be notified if the wireless apparatus moves. Accordingly, if a movement sensor (e.g., an acceieronieter) in a wireless apparatus determines that the wireless apparatus is being moved, the wireless apparatus may inciude a movement indicator in the next wireless signal response sent to tire mobile communication device.
  • a movement sensor e.g., an acceieronieter
  • the wireies apparatus may generate a notification message that is separate from the wireiess signal response and is sent as soon as the movement occurs. Accordingly, embodiments of the present invention may determine a movement indicator from a wireless communicatio and may alert a user if the movement indicator indicates the wireless apparatus is moving.
  • a "'movement indicator” may include any suitable data that informs an electronic device that a wireless apparatus has sensed movement.
  • the movement indica tor could be implemented as a flag, a sensor reading from a movement sensor (e.g., an acceieronieter), a message comprising particular information including location data, or any other suitable message that informs a mobile communication device that the wireless apparatus has sensed that it is being moved.
  • the movement indicator may be sensor readings that require additional processing before a determination can be made of how the device is being moved or the processing may occur at the wireless apparatus and the mobile communication device may receive pre-processed data indicating the type of movement or that movement has occurred.
  • profile settings may include any coftfio.urat.ion. settmss for an. electronic de vice that are tied to a user of the electronic device.
  • a user may be able to customize the configuration, settings of a mobile communication device based on their profile settings.
  • a user may set default profile settings that are tied to configuration settings they originally provide an application during registration or initialization of the application. Accordingly, when the user adds wireless apparatuses to the mobile communication device for pairing, authentication, and connection, the profile settings may control the default configuration settings for the wireless apparatus.
  • the configuration settings may include, for example, the sensiti vit setting of the wireless apparatus corresponding to the alert threshold (where the sensitivity setting may roughly correspond to a separation distance in average environmental, conditions), whether the wireless apparatuses should report movement indicators, the rate of transmission for the signal strength readings , transmission power of the wireless apparatus, etc.
  • the profile settings may be temporarily altered or updated when the mobile communication device receives a wireless communication from a zone tag including zone settings.
  • zone settings may include any configuration settings for an electronic de vice that are tied to a particular geographic location or electronic device.
  • a wireless apparatus may transmit a wireless
  • the zone settings may include configuration settings to be appl ied by the mobile communication device while receiving the wireless communication or may include a flag, signal, or other indicator that a predetermined settin stored in the mobile c mmunication device should be activated while receiving the wireless contmunieation including the zone settings.
  • a zone tag may transmit a ''safe zone" message that informs mobile
  • the zone tag may transmit a "danger zone” message that may raise the security of the configuration settings while receiving the message.
  • a zone tag may be located at the desk and transmit a "danger zone” message to the mobile communication device so that the user may be alerted any time any .monitored objects are left behind or leave the heightened proximity settings of the user.
  • the configuration settings may maximize the throughput of the rate of transmission of the wireless apparatuses while the mobile communication device is in the danger zone.
  • the mobile communication device may send the updated configuration settings to each wireless apparatus they are paired with or may customize which wireless apparatuses are affected by zone tagging. Accordingly, the mobile cotmnnntcation device may automatically change the profile settings for the mobile communication device when in areas that are known to be safe or dangerous without requiring the user to change any settings.
  • synchronizing can include the initialization, pairing, and initial communication between two or more electronic devices. Synchronizing may incl ude any one of the initialization, pairing, and initial, communication between the electrical devices or ma include all of the steps. Either way, once devices are synchronized, the devices may communicate requests, commands, and responses between each other,
  • a "data input” can include any input by a user on an electrical device.
  • the data input may be the touching of a particular area of a displ ay screen tha t is configured to send a particular command to the processor of an electrical device (e.g., touch screen input) or may include the compression or engagement of a physical button or input on an electrical de vice (e.g., power button, volume u or down button, etc. ).
  • data inputs may include commands to enter operational modes, engage or disengage features, control the volume, change screen display settings, navigate through an application or operating system, or may be used to provide consumer information including a password, as well as implementing any other features that may be useful in the present invention.
  • ⁇ 0057 ⁇ "'Alerting a user” can include any actions taken by an electronic device to get a user's attention. For example, these actions may include generating audible alarms, physical vibrations, flashing lights, sending emails or short messages (SMS) or status updates (through social media websites like TwitterTM) initiated from either wireless apparatus or the mobile communication device. The actions may be initiated by commands, messages, or signals generated by any of the devices. For example, an application on a mobile communication device may determine that a wireless apparatus has been separated further than an allowed signal strength sensitivity setting (corresponding to an estimated distance) 3 ⁇ 4nd remains outside the sensitivity setting after a pre-determined hold-off period or hold-off time.
  • SMS short messages
  • status updates through social media websites like TwitterTM
  • the mobile communication device may alert the user and may send an alarm command to the wireless apparatus.
  • the wireless apparatus may enter an alarm condition that may ioclude activatmg flashing tights, making a noise, vibrating, or ny other action to get the user's attention. Additionally, the mobile communication device may enter the alarm condition and alert the user through the same methods. Additionally, in some embodiments where the wireless apparatus is meant to not be detected by others, the wireless apparatus may not enter the alarm condition and instead only the mobile communication device may alert the user.
  • the user may sense the movement, hear the noise, or see the flashing and may be alerted that the mobile communication device has entered an alarm condition based on a wireless apparatus being outside of a predetermined sensiti vity level or setting. Additionally, the system may develop different alerting modes for different types of alarms (e.g., a proximity alarm .may cause a chirping noise while an alarm related to completely losing contact with the wireless apparatus may cause a beeping noise, or different colored lights could be lit for each type of alarm, etc.).
  • a proximity alarm may cause a chirping noise while an alarm related to completely losing contact with the wireless apparatus may cause a beeping noise, or different colored lights could be lit for each type of alarm, etc.
  • FIG. I shows a block diagram in accordance to embodiments of the invention.
  • Embodiments of the invention relate to proximity and object tracking system 1.00 comprising two parts: a mobile communication device 1 10 and a wifeless apparatus in the form of a tag 140 attached to an object of interest (not shown).
  • the monitored object may be any object that a user may desire to track , monitor, or he alerted to if the object is moved when in a stationary mode. Additionally, the user may desire to be alerted if the monitored object is separated from the mobile communicatio device such that signal strength readings from a wireless apparatus attached to the monitored object tall below a predetermined signal sensitivity level.
  • the monitored object may be a camera, a briefcase, a bag, car, car keys, computer, tablet computer, etc, with a tag attached to the monitored object and the mobile communication device may be a mobile phone or other portable cominunication device.
  • Fire mobile communication device 1 10 may comprise a processor device ⁇ 1 1 (e.g., a microcontroller or .microprocessor), a transceiver device 12, and an antenna 1 ! 3 coupled to the transceiver device 1 12,
  • the transceiver device 1 12 may be a chip, card, or any other device comprising both receiver circuitry and transmitter circuitry capable of sending and receivin communication, messages using the antenna 1 13, and may implement any suitable coniraumcation protocol (e > g., Bluetooth.TM Low Energy),.
  • the transceiver device 12 may be coupled to the processor i l l .
  • the processor 1 i I may also be coupled to a computer readable medium 120 comprising code for an. object proximity tracking application 121 according to embodiments of the present invention.
  • the computer readable medium 120 may further comprise storage for predicted status da ta 127 and history data 128.
  • the mobile communication device 1 10 may comprise an acceiexometer 1 17, a power supply 1 19A (e.g., battery), input elements ⁇ 18 (e.g., buttons, switches, microphone, touchscreen, or any other input component), and output components (e.g., a speaker 1 16, a light emitting diode (LED), vibration, element 1 19, etc.).
  • the object proximity tracking application 121 may comprise a signal strength module 122, a status .determination module .123, a prediction module 124, a movement module 1 5, and a configuration module 126,
  • a signal strength module 122 may receive a wireless communication, determine the signal strength reading from the wireless communication, and may filter the signal strength reading to determine a usable signal strength reading (e.g. may filter a RSSI reading or other power indicator for a signal strength).
  • a status determi ation module 123 may determine whether the received signal strength indicator is above or below an alert threshold and whether the appJicaiion 12 should alert a user in. response to the received signal strengt reading.
  • a prediction module 124 may generate an expected signal strength reading or • expected signal strength threshold values based on previously received signal strength readings for a . particular wireless apparatus.
  • the expected signal strength may be determined through any sui table method as one of ordinary skill ma recognize. Additionally, once th expected signal strength is determined, the prediction module 124 may store the expected signal strengt in predicted status database 1.27 or other storage location on the computer readable medium. The prediction module 124 may also determine if the wireless apparatus is moving toward the mobile communication device 1 10, away from the mobile communication dev ice 110, or is stationary compared to the mobile communication device 1 10 and may store this determination i the predicted status storage 127 o the computer readable medium as well.
  • a movement module 125 may determine if a movement indication notification setting is active for a received wireless apparatus and determine whether a received wireless communication includes a movement indicator. Additionally, the movement .module 25 may alert a user if such a movement indicator is present and. the corresponding wireless apparatus is set in a stationary mode such that the user does not expect the wireless apparatus to be moving. 0065J
  • a configuration module 126 may detennme settings and information about the status of the system and may update configuration settings for the wireless apparatus and profile settings of the mobi le communication device 1 10 according to the system status. For example, the configuration module may determine the po was status of a wireless apparatus and update configuration settings according to the power status. The configuration settings may include a transmission rate of signal strength readings for a wireless apparatus, a transmission power for the wireless apparatus, types of acti ve notifications (e.g. a movement notification) for a wireless apparatus, etc.
  • the tag 1 0 may comprise a processor device 141 (e.g., a microcontroller or microprocessor), a transceiver device 142, and an antenna .1 3 coupled to the transceiver device 142.
  • the transceiver device 142 may be a chip, card, or any Other device comprising both receive circuitry and transmitter circuitry capable of sending and receiving
  • a crystal oscillator 148 may provide a clock for the transceiver device 142.
  • the transceiver device 142 may be coupled to the processor 41.
  • the processor 141 may comprise or may be coupled to a computer readable medium (not shown) comprising code for performing methods according to embodiments of the present invention.
  • the wireless apparatus 140 may comprise an accelerometer 147, a power supply 149 (e.g., battery), an input button 147, and output components .144, 145 (e.g., a speaker, a light emitting diode (LED), vibrating element, etc. ).
  • An exemplary embodiment of the tag 140 is shown in FIG. 4,
  • a processor manages the operation of the tag 1 0 including pairing, connecting, and performing mutual authentication with a mobile communication device 1 10, responding to commands received from the mobile device, measuring and reporting the strength of a received radio signal from the mobile comratinication de v ice .1.10, measuring and reporting a power status (e.g.. voltage of a battery), reporting a .movement indicator (i.e.. the acceleration tee tag 140 experiences during movement), and generating audio, visual, and mechanical indications and alerts.
  • the tag 140 may authenticate itself to an object proximity and tracking application running on a mobile communication device 1 10 and may authenticate the proximity object tracking application as well.
  • the tag 140 may report product and capability raformatioa to the application once authenticated. Additionally, the tag 140 may report radio telemetry and the button-press status to the application. The tag 140 may additionally actuate the LED and the buzzer by playing user-configurable audio.
  • the input button 147 may be a user interface that may allow the user to control the itmctionahiy of the wireless apparatus 140.
  • the input button 1 7 may acti vate certain functionality (e.g., pairing,, mute, power, etc) for the wireless apparatus 140,
  • Output components 144, 145 may be any mechanisms for alerting a user (e.g., a buzzer, vibrator, LED light, etc.).
  • the output component 144 is a speaker and output component 145 is a LED. Any suitable output can be implemented and the output components may not be limited to those shown in FIG. .1.
  • the wireless apparatus may require non-volatile storage for parameters, at least serial number and pairing information, and possibly also configurable settings such as beeper volume.
  • the transceiver 142 in the tag 140 may comprise flash memory (not shown) including up to two pages intended for storage of data.
  • the processor 141 ca erase and write to this memory. Although erasing and writing flash takes time, there is no problem with the tag 140 (or fob 1 0) being unresponsive to inputs for a short period. Therefore, in the tag 140, the on-chip flash memory can likely be used for configuration settings.
  • the transceiver 1.42 may further comprise an analog digital converter (ADC) that may be suitable for measuring the battery voltage.
  • ADC analog digital converter
  • FIG. 2 shows an exemplary block diagram of a securit system according to embodiments of the invention where the wireless apparatus is a fob 130
  • a fob 130 may comprise all of the functionality of the wireless apparatus in the form of a tag 140 but may also comprise additional components and functionality for tracking, paging, and notifying a user if the mobile communication device i 10 moves out of a predetermined proximity from the fob 130. More details regarding the fob 130 functionality ma be found in Application No. i.3/571,186, titled “Froxiiuit Tag,” filed August 9, 2012. by Cavacuiti e( at., which is incorporated herein in its entirely, for ail purposes.
  • the wireless apparatus in the form of a fob 130 may comprise an input button 137 that activates a "find my phone" function on the wireless apparatus. Additionally, the fob 130 may comprise firmware or other computer readable medium that comprises code for performing a method that provides additional functionaliiy over the tag 140 including security monitoring of the mobile communication device 1 10. The additional functionality may be described in further detail below.
  • the wireless apparatus otherwise operates as described in reference to FIG. i,
  • FIG. 3 shows a perspective view of an exemplar embodiment of the object proximity and tracking system comprising a mobile communication device 1.10, a wireless apparatus in the form of a fob 130, and a wireless apparatus i the form of a tag 140.
  • Art exemplary screen shot of an obj ect proximity tracking application 120 that may be used to initiate, configure,, and operate the security system is being shown on the mobile
  • the system has a software component (i.e., an. object proximity tracking application) installed on. the mobile communication device 1 10.
  • the application is installed on the mobile communication device 110 and has a graphical user interface that, in conjunction with the device's physical user interfaces, provides controls over the system's behavior and displays information of the tags 140 and fobs B0.
  • the application allows the user to interact and configure the tags .140 and fobs 130 and to configure mobile
  • the communication device 11 behavior in the context of the f ags 1.40 and fobs 130.
  • he application processes data received from the fobs 130 and tags 140 such a filtering the raw signal strength readings and determining if tag 140 or fob 130 is outside of the preselected tracking zone.
  • the application On detecting a tag 140 or fob 130 a being out of a preselected proximity range corresponding to an a!ert threshold, the application generates audio or visual ind.icat.ions or alerts (i.e., a separation alert).
  • alerts may also be issued if motion is detected by the tag 1 or fob 130 (i.e.,., a movement alert),
  • the application may also record signal strength readings; received coramaads, time, date, and location of wireless apparatuses.
  • the application may -also notify the user when a tag 140 or fob 1.30 is out of transmission range and communications are no longer received by the mobile communication device 1 S O.
  • the application may provide the user with the ability t "page” a tag 140 or fob 130 by “beeping” the tag 140 or fob 130 to allow the user to find it, indicating to the user when and where the tag 1 0 or fob 130 was last in range, and generating a visual and/or audio alert to aid the user in locating the device (as well as functionality for ending such an alert or alarm). Additionally, the application may notify the user when the mobi le
  • the communication device 1 10 is out of range by sending an alarm, command to a fob 130 when out of proximity distance.
  • the application may manage the pairing, connection, and disconnection between the mobile communication device 1 10 and the tags 140 or fobs 130.
  • the application serves as a configuration and status view tool for all authenticated and connected tags 1 0 and fobs 130, as well as to provide notifications in response to configured tag 140 or fob 130 related events.
  • a tag 140 or fob 130 may be added to the system via the application user interface. Once added, the user may configure the application to interact with the tag 140 or fob 130 in different ways. The user may configure the application to noti fy the user when the tag 140 or fob 130 has moved out of a preselected proximity range, transmission range, when the tag 140 or fob 130 has came back into range, or when the tag 140 or fob 130 has moved (through the use of an accelerometer on the tag 140 or fob 130). Additionally, the user may remove the tag 140 from the application, in which case the tag 140 may automatically return to an unpaired mode, ready to be paired again to the same, or another mobile communication device 1 1 ,
  • the user may configure a custom oui-of-range alarm to be played when the fob 130 is out of range of the mobile comm unication de vice 1 1.0, The user may also configure whethe the fob 1.30 will vibrate and whether the alarm functionality is enabled or disabled.
  • the application is running on a mobile communication device .1 10 that a user may want to use for purposes other than the monitoring application, the application may be configured to run in the background while the mobile communication device i 10 performs other services for a user.
  • the application may be configured to run in the background while the mobile communication device i 10 performs other services for a user.
  • all of the proximity and alerting functions continue to work.
  • standard system notifications may be used to seamlessly notify the user without interrupting other fonciionahty of the mobile communication device 1 0.
  • Exemplary screenshots of the application are shown in FIGS. 10- 14 and further description regarding the user interaction wit the application is provided below.
  • the wireless apparatus may be provided in the form of a tag 1 0.
  • the tag .140 may be as thin and as small as possible. Small dimensions allow the tag 1 0 to be easily attached to an object of any size without: interfering with, the use of the object. Additionally, smaller tags 140 may be inconspicuous and a malicious third party may not notice the tracking and proximity device attached to the monitored object. Alternatively, a user may wish to advertise the use of the tracking de vice to dissuade potential malicious third parties from trying to take the monitored object and as such, in some embodiments, the tag 140 may be provided i a larger form factor as well.
  • FIGS. 4A and 4B show perspective views of an exemplary tag 140 according to an embodiment of the invention.
  • the tag .140 may comprise front portio and back portion of an outer case 4 1 , an attachment device 444 (e.g., keyehain hole), an input button 14? (e.g., pairing button), a battery compartment cover 446, and a status LED indicator 145.
  • the keyehain hole 444 may be physically coupled to the outer case 441.
  • the keyehain hole 444 allows a keyehain or other attachment device to engage with the keyehain hole 444 and attach the keyehain to the first wireless apparatus.
  • attachment device 444 could be clip, bonding material, or any other type of attachment de vice configured to securably attach the tag .1 0 to an object of interest (not shown)
  • An input button 147 may control th pairing, power up and down of the transceiver, and may allow the user to interact, with the tag 140 while alarming, in order to communicate with a mobile communication device 1 10, the tag 140 ma pair with a mobiie communication device i 10.
  • the input button .147 may comprise multiple functions including powering the transceiver on and off muting the speaker when the tag 140 is alarming, providing pairing initialization functionality, and resetting the tag 140 to factor settings. The different functionality may be activated by pressing the input button 147 for different periods of time, causing a different type of input for each period of time.
  • the input button 147 may have a momentary input mode (Bl ), an intermediate input mode (B2), an extended input mode (83), and a long extended input mode (84) thai may provide different input directions to the tag 140 depending on the period of time that the input button 147 is pressed. For instance, to initiate a pairing mode for the tag 140. the input button 147 may be pressed for an intermediate period of time (e.g., 3-6 seconds), while to power the transceiver of the tag 140 on and off (i.e., wake up or put the tag 140 to sleep), the input button 147 may be pressed for an extended period of time (e.g., 6-9 seconds). Additionally, if the input button 147 is pressed for a very long period of time (e.g., 20-23 seconds), the tag 140 may return to default factory settings.
  • the different possible states for the tag 1 0 and fob 130 may be described in further detail below.
  • the status LED indicators may provide the user with information abou the state of the tag 140, the connection and pairing status of the tag 140 with a mobile commu icati on device 1 10, and the battery power statu of the tag 140. For example, once the power status of the tag 140 drops below a predetermined power status threshold, the status LED indicators may fiash red periodically (e.g., every 30 seconds) to remind the user to replace (or recharge) the battery. Additionally, when the input button 1 7 is pressed, the status LED indicator may inform the user as to the type of input entered. For example, if the input button 147 is only momentarily touched (e.g., for a period of less than 3 seconds), a first or momentary input may be activated and there may be no LED activity.
  • the status LED indicator may flash green momentarily. Additionally, upon an extended input (e.g., input button 147 pressed 6-9 seconds), the status LED indicator ma flash red momentarily.
  • the tag may return to factory default settings and the status LED indicators may flash red and green intermittently, in thi manner the user may know the type of input they have entered using the single input button 147.
  • the tag 140 speaker may be activated to acknowledge the user action including upon activation of the pairing mode, upon successfully pairing the tag 140 to the mobile communication device 1 10., upon unsuccessful pairing of the tag 140, arid finally , upon putting the tag 140 to sleep (e.g., powering down the transceiver),
  • the processor of the tag 140 may comprise firm ware or may be coup led to a computer readable medium that comprises firmware or other code that is capable of perforating a m ethod of pairing, authenticating, and communicating with a mobile
  • the firmware or other software components may be capable of authenticating the tag 1 0 and application, configuring and completing an alarm or other response to a "find my tag" command, determining and reporting signal strength indicator (RSSI) readings, determining and reporting power status of the tag 140, and i some embodiments, configuring and performing a security service including alerting a user if the mobile communication device 1 10 is out of a predetermined range.
  • RSSI signal strength indicator
  • Pairing and authentication of the tag 140 and the mobile communication device 110 may include a mutual authentication sequence that ensure the tags 140 and mobile communication de vices 1 10 only communicate with tags 140 and mobile devices that are authorized to do so.
  • the authentication procedure may include connection to a mobi le communication device ! 10, receiving a pairing communication from the mobile
  • the connected state may indicate that the mobile communication device 1.1 is authenticated by the tag 140, but because the system implements mutual, authentication, the mobile communication device 1 10 may now authenticate the tag 140 to ensure bot devices are authorized to communicate. Accordingly, after authenticating the mobile communication, device .1 10, the tag 1 0 may calculate a tag authentication, code and send the tag
  • the application on the mobile communication device 1 10 may then independently calculate the tag authentication code and verify the received tag authentication against its own calculation. If they match, the tag .1 0 enters an authenticated state and the lag 140 and mobile communication device 1.10 may communicate normally. If the verification is unsuccessful at any point, the mobile communication device 1 10 and. the wireless apparatus may not be authenticated but the wireless apparatus may stay in the connected state and generate a new authentication value to be authenticated by the application.
  • the tag 140 may further be configured to include "find ray tag” or paging functionality where, when in range and authenticated with a mobi le communication device i 10 running the application, the application can. issue a "find my ta " command, send the command in a wireless communication -from the mobile communication device 110, that may cause the tag 140 to start playing a page melody.
  • the page command may be implemented in any suitable fashion.
  • the page command may be a flag or other command, included in a wireless communication that informs the wireless apparatus that the mobile communication device 1 10 is commanding the wireless apparatus to enter a paging mode.
  • the pagin mode includes the wireless apparatus to play the page melody tor a
  • the "find my tag” functionality may allow a user to quickl and easil find the tag 140 (and the attached object) by listening and following the page melody.
  • the user may be able to stop the find my tag functionality b engaging the "find my tag” data input through the application again, which may send a sto page command to the wireless apparatus that may end tire page melod without requiring an input button 1.47 to be pressed on the tag 140.
  • the tag 140 may additionally generate and send signal strength readings to the mobile communication device 1 10 at. a tegular rate (i.e., a rate of transmission) that is determined in the configuration settings of the tag 1.40. Accordingly, the application, running on the mobile communication device 110 may receive readings from the tag 140 at a periodic rate.
  • the calculated RSSI values ar interpreted as the negated ESS! value. For example, a reading of 43 represents an RSSI of -43 dB.
  • the RSSI may be calculated through any suitable method as one of ordinary skill in the art would recognize.
  • the tag 140 may send a periodic signal strength reading in a periodic wireless communication to the mobile communication device I 10 or the mobile communication device 1 10 may request a reading from the wireless apparatus at a particular time.
  • events may cause the wireless apparatus to send a notification communication to the mobile communication device 1 .10 even though the time for the generation of the periodic communication has not yet arrived. Accordingly, the wireless apparatus may save power by only periodically sending notifications of current. location, signal strength readings, and other system sta tus information, but may also be capable of notifying the mobile communication device 1 10 when an event triggers a notification.
  • a notification may be triggered when the signal strength reading is above a signal strength notification threshold.
  • the tag .140 may be programmed to only provide notifications of a signal strength reading when the tag 140 is not a safe distance to th mobile communication device 1.10. Accordingly, the tag 140 may save power (e.g., battery life) because the tag 140 only sends notifications when the tag 140 is outside of a safe zone. Accordingly, the signal strength notification threshold may reduce the need to send frequent notifications in the event that the tag 140 is i "safe zone" and. the host does not need, to know its signal strength readings,
  • a signal, strength notification trigger may be implemented such that notifications are only seat once a large enough change in signal strength readings has occurred. For example, if the signal strength notification trigger equals 3 dB, the tag 140 may notify the mobile communication, device 1 1.0 when the signal strength reading changes by a multiple of 3 dB, such as 0 dB, -3 dB, -6 dB, -9 dB, etc. ie.g>, notifications are only sent when, the signal strength readings change .more than, the signal strength notification trigger), i this manner, notifications may be limited to only those changes that are large enough to warrant a notification (i.e., small changes may not create notifications).
  • the tag 140 may allo the application running on the mobi le communication de vice 1 1.0 to monitor power status. This allows the application to keep the user informed of the battery status o ver a long period of time. Additionally, in order to limit transmissions, the wireless apparatus may only notify the mobile communication device 1 10 of the power status when the power status changes by a power status notification change value. For example, if the power status notification v alue is 45, the power status may notify the mobile communication device 1.10 when, the remaining power level of the battery at the wireless apparatus changes by a multiple of 45 (i.e., when the power status is 55 and 10). Accordingly, the wireless apparatus ma notify the user when the power status of above 55% indicates fall, a power status of between 55 and .10 to indicate half full power, and 1.0% to indicate low power.
  • the tag 140 may send device information to the application that is unique to the tag 140 and identifies the tag 140 to the mobile communicatio device 1 10. Accordingly, multiple tags 1 0 may be implemented with a single mobile communication device 1 10 and application.
  • a fob 130 provides all the functionality of the tag 140 described above but further includes functionality and components related to a security system for the mobile communication device 1 10.
  • the fob 130 cars be kept with a user, such that it may be attached to a user's keycbain or other object that is kept with the user for the majority of the time. Accordingly the fob 1 0 may alert the user if the user is separated from the mobile communication device 1 10.
  • the functionality of the fob 130 is similar to that of the tag 140, but may periodically report the signal strength readings to the mobile communication device 110 and the fob 130.may receive a comman to enter an alarm state if the signal strength readings go below a signal strength alert threshold as set by a user.
  • the lob's 130 purpose can be to alert the user in the event that the mobile communication device 1 1.0 is out of a signal strength sensitivity range of the user, preventing the user from aecidently leaving his or her mobile communication device 110 behind.
  • the fob 130 may send the signal strength readings to the mobile communication device 1 0 which determines that the fob 130 is out of range by comparing the received signal strength readings to a predetermined signal strength sensitivity setting, and sends an alarm command to the fob 130 to alert the user that signal strength readings from the fob 130 have reached a predetermined signal sensitivity setting (which is a rough estimate of separation distance between the fob 130 and the mobile communicatio device 1 1.0).
  • a predetermined signal sensitivity setting which is a rough estimate of separation distance between the fob 130 and the mobile communicatio device 1 1.0.
  • the fob 130 may alert the user through a visual or audio indicator (e.g., flashing lights and playing audio) hi the event the user has been separated from his or her mobile communication device 1 1 , Additionally, the fob 130 may also alert a user if connection is lost with a mobile communication device 1 10 without receiving a command to alert from the mobile communication de vice 1 10,
  • the fob 130 may also comprise a "find my phone" button that may page the mobile communication device 1 10. The mobile communication device 1 10 may then play a sound that the user can use to find the mobile communication device 1 10, much tike the "find my tag " " functionality described above.
  • FIGS. 5A-5C show various views of an exemplary embodiment of a wireless apparatus in the form of a fob 130.
  • the fob 130 may be as thin and as small as possible. Smaller dimensions allow the fob 130 to be easily transported and carried by the user at all times without inconveniencing the user.
  • the fob 130 should be constructed appropriately so that it may be attached to a personal item that the user may always be m possession of and may not likel misplace.
  • the fob .130 may also be constructed so that it may be attached to the clothing of a user (e.g., a belt clip that can be attached to a user's belt, pants, etc.) or attached to an accessory that may be worn by a. consumer (e.g., a lanyard, tie clip, etc).
  • a processor manages the operation of the fob 130. Similar to the. tag 140 described above, the operations include pairing with a mobile communication device 1 10,, connecting to a mobile communication device 1 10, perforating mutual authentication with the mobile communication device 1 10, responding to commands received from the mobile communication device 1 30 s measuring and repotting the strength of the radio signal from the mobile communication device 1 10, measuring and reporting a power status (e.g., voltage) of the fob's power source, reporting the acceleration the fob 130 experiences and issuing commands and requests to the mobile communicatio device 1 10 as well as generating audio, visual, and mechanical indications and alerts.
  • a power status e.g., voltage
  • the fob 130 includes a "Find My Phone" function that may be activated through an input button 137. Additionally, the fob 130 is capable of alarming without being commanded by a mobile communication device 1 10 if the mobile communication device ! 10 is out of range of the fob 130,
  • the wireless apparatus in the form of a fob 130 may comprise ail of the components of the wireless apparatus in the form of a tag 140 shown in FIGS. 4A-4B including a front and back case portion 531 and 536. LED indicators 135. a battery door 537, etc . However, as shown in FIG.
  • the w ireless apparatus in the form of a fob 130 may further comprise a ''f nd my phone" button 137 that is much larger and easier to use than the button on the tag 140, Similar to the input button 147 of the tag 140, the find my phone butto may provide multiple inputs through a single button by the period of time that the input button 137 is compressed and the current state of the fob 130 when the input button 137 is pressed.
  • the button 137 may be used to pair to a new mobile communication device .1 10 if it is pressed down for an intermediate period (e.g.. 3-6 seconds), but may activate the "find my phone" functionality if the input button 137 is momentarily compressed (e.g., 1*3 seconds).
  • the fob 130 may enter into a sleep mode. Finally, a user may clear an alarm by clicking the input button 137 during an alarm to acknowledge the notification.
  • the fob 130 may be entered into an armed or disarmed mode through die application, running on the mobile communication device 110 once paired... connected, and authenticated. Whi le the fob .130 is in an armed status, if the mobile communication device 1 10 moves o u t of range, tags 140 move out. of range of the mobile communication device 1 10, or any other alert status is entered, the mobile communication device 1 10 may send a command tor the fob 130 to alert the user through an alarm status.
  • the fob 130 may automatically enter an alarm status to notify the user of the separation.
  • the alarm condition may comprise two periods, a warning conditio and an alarm condition.
  • the "warning condition" or “warning alarm” for the fob 130 may be activated before a full blown alarm condition is entered dining a. hold-off period or hold-off time so that a user may be alerted to the warning and may remedy the problem before an alarm i s entered. In this manner, the user may be reminded of the separation without a full alarm being activated.
  • the warning alarm may also be entered if the received signal strength from the fob reaches an alert threshold but has not reached a buffer threshold value thai eliminates false alarms. Accordingly, the alarm condition may be entered once the signal strength readings cross the buffer threshold.
  • the fob 130 may comprise two separate melodies, light patterns, or other different notification methods between the warning and alarm conditions.
  • the alarm functionality of the fob 130 reports signal strength readings to the mobile communication device .1. J.0 via periodic wireless communications,
  • the mobile communication device 1 10 may compare the received signal strength readings to a user selectable signal strength alert threshold that is associated with an estimated allowable separation distance.
  • the signal strength alert threshold may be above the signal strength required for the fob 130 to maintain a connection with the mobile communication device 1 10 and when the mobile communication device 1 10 determines that the fob 130 signal strength readings have dropped below the signal strength alert, threshokl i t .may send a command to the fob 130 to start the alarm.
  • the alarm may continue until either the user performs a momentary button press on the fob 130 or the mobile communication device 1 10 sends a second command to the fob 130 to stop the alarm. Alternatively, if the alarm functionality is enabled and the fob 130 disconnects from the mobile communication device 1 10, the alarm is also sounded. This process will, be discussed in further detail below. fO JOO] A single momentary press on the input button 137 may activate a "find my phone" feature.
  • the "find, ray phone” feature may cause the fob 130 to send a command to the mobiie communication device 1 10 to initiate alerts and alannis to help the user determine where the mobile communication device ⁇ 0 is located, in some embodiments, the user may be notified of the distance to the mobi ie communication device 1 1.0 by the fob 130.
  • the user may be notified through any suitable means including a voice informing the user through the output component speaker, distance displayed on a screen on the fob 130, or any other suitable means.
  • the distance may be determined using the latest signal strength reading by the fob 130 or any other suitable means to estimate distance as one of ordinary skill in the art word d recognize.
  • the fob 130 may use status LED indicators 135 as an output display to the user. There may be 3 color states: Red, Green, and Yellow (both Red and Green on together, piped).
  • the stains LE D indicators 135 may inform the user of the current status of the system or the wireless apparatus, or may be used to inform the user of a warning condition or an alarm condition.
  • the status LED indicators 135 ma flash an alternating pattern of red and green for two seconds when powering or starting up and may blink green three times when communication has been established between the fob 130 and mobile
  • the status LED indicators 1 5 may blink green once when the fob 130 enters an armed mode and may blink yellow once when the fob 130 enters a disarmed mode. Additionally, the status LED indicators 135 may blink red three times when the fob 130 is suspended as a result of a command from the mobiie communication device 1 10. Furthermore, when the input button 137 is pressed to activate the "find my phone" functionality, the status LED indicators 135 may flash a green light once. Finally, when the battery is in a designated lo or dying stale, the status LED indicators 135 may blink every ten seconds to alert the user that the battery is low.
  • the mobile communication device 1 10 continually sends wireless communications to wireless apparatus in the form of a tag 1.40 or fob 130.
  • the wireless apparatus may take a reading of the received communications and may return a wireless communication response including a signal strength reading to the mobile communication device 1 10 at regular intervals in continuous cycles or may wait for an event to occur based on the readings or for a command from the mobile communication device 1 10 to send a response.
  • the messages may be encrypted and difficult to intercept or tamper with, if the fob 130 or the mobile communication device 1 10 loses contact with the mobile communication device I 10, the mobile communication device I !O and/or the fob BO may alert a user through a warning condition and alarm condition.
  • FIG. 6 illustrates the different hardware states that the wireless apparatus may enter m relation to the mobile communication device i 0 according to embodiments of the present invention.
  • the different states relate to initial powering up of the tag 140, a first pairing to a mobile communication device 1 10, connecting to the mobile communication device 1 10 5 authenticating the mobile communication device 1 10 and being authenticated by the mobile communication device 1 10, disconnecting -from the mobile communication device 1 10 and entering a sleep mode.
  • the wireless apparatus when the wireless apparatus is not connected to a mobile communication device 1 10, the wireless apparatus is in a s!eepO mode 60 ! in order to conserve power.
  • the wireless apparatus may stay in the sieepO mode 601 until a user activates the wireless apparatus or may wake periodically, try to pair, and go back to sieepO mode 601.
  • the sieepO mode 601 is a special state where the tag 140 is dormant and there is no associated mobile communication device 1 10. This is the default setting when the tag 1 0 or fob 130 is manufactured and delivered to a user before connecting to any mobile communication device I S O, Once a pairing occurs, the wireless apparatus 110 ma remember the mobile communication device 1 10 last paired to and try to connect to that mobile communication device 1 10 whenever awake.
  • the wireless apparatus may enter a pairO mode 602 in response to a pairing input through the input button (e.g., intermediate length compression on the input button 147 of FIG . 4 or 137 of FIG. 5) on the wireless apparatus.
  • the pairO mode 602 i entered upon the first attempt at pairing when no pairing has occurred previously and thus there is no associated mobile communication device 110.
  • the wireless apparatus may advertise its presence to any available mobile communication devices 1 10 within pairing range.
  • the user may connect the mobile communication device 1 10 and. the tag 140 by adding the tag 140 through the application running on the mobile communication device 1 10,
  • a timer is started during pairing such that the wireless apparatus advertises its presence with a pairing message for onl a predetermined period of time, if no mobile communication device 1 10 connects to the tag 140 before the timeout, the tag 140 returns to the Sleep ⁇ state 601.
  • the LED indictor may flash a pa ticular color (e.g., green) to remind the riser that the tag 140 has started to advertise its presence to any available mobile communication devices 1 10 within pairin range.
  • the object proximity and tracking application on the mobile communication device 1 10 may recognize the advertising message and may allow the user to add the tag 140 through pairing with the mobile communication device 1 10.
  • the status LED indicator may stop flashing, may change color, or may complete any other change to indicate to the user that pairing has successfully completed.
  • a melody may play that informs the user of the successful pairing.
  • a red .flashing light, failure melody, or any other suitable indicator may he provided to a user if the pairing is not successful,
  • the tag 140 may enter a connected state 603 because a mobile communication device 110 receives the advertised pairing messages and sends a connection message to the wireless apparatus after being added through the application by the user. If a mobile communication device ! 10 connects to the wireless apparatus while in the PairO 602, Pair 606, or Disconnected states 60S, the wireless apparatus records the ID of the mobile communication device ⁇ 10 and thereafter only connects to the mobile communication device 1 10, The mobile communication device 1 10 has now established a connection to the wireless apparatus, however, the mobile communication device 1 10 and the wireless apparatus are not yet mutually authenticated At this stage, all features are disabled except for authentication. As explained above in reference to the tag 140 and fob 130 sections, the wireless apparatus may now attempt to perform a mutual authentication.
  • the mobile communication device may now attempt to authenticate the wireless apparatus. If the wireless apparatus is successfully authenticated, the wireless apparatus receives a message from the mobile communication device and the wireless apparatus enters an authenticated state 604. The wireless apparatus and the mobile communication device 110 may now communicate and interact as designed, including providing the functionality described herein.
  • the wireless apparatus may also enter a disconnected state 605 any time that the mobile communication device 1 10 disconnects from the wireless apparatus.
  • the user may enter a data in ut into the application that the wireless apparatus should not he monitored.
  • the wireless apparatus may periodically attempt to connect (e,g. ? automatically connect) to the mobile communication de vice 1 1.0.
  • the user may use the application to change the auto-connect setting for the wireless apparatus such that the user may manually connect, the wireless apparatus through the application or physically on the wireless apparatus instead of periodically trying to automatically connect with the mobile communication device 1 10.
  • the automatic connect feature may attempt to connect at random periodic timing differences such that multiple wireless apparatuses do not attempt to connect to the mobile communication device 1 1 at substantially the same time.
  • the wireless apparatus may enter the pairing state 606.
  • the wireless apparatus may again start advertising its presence through pairing messages sent to any mobile
  • the user may add the tag 140 to any mobile communication device 1 10 within pairing distance by adding the tag 140 through the user interface of the application. Additionally, as before, if the tag 140 is not connected to mobile communication device 1 10 prior to a timeout period, the tag 140 enters into a disconnected mode 605 but remembers the last associated mobile cammunication device 1 1.0 and attempts to reconnect as described above.
  • the wireless apparatus enters a sleep mode 607.
  • the wireless apparatus disconnects from the mobile communication device 1 10 and the transceiver of the wireless apparatus powers down until the user manually powers up the wireless apparat us or may sleep for a predetermined period of time such that wireless a pparatus wakes o p and attempts to connect and authenticate again after the period of time passes.
  • the sleep mode 607 may be entered at any time through the user entering the sleep input (B3 K
  • the mobile comrnunieation device ! 10 continually transmits wireless communications, using any suitable communicatio scheme (e.g., BluetoothTM Low Energy messages) to wireless apparatuses (tags .140 or fobs .130) that are connected and authenticated with the mobile communication device 1 10.
  • any suitable communicatio scheme e.g., BluetoothTM Low Energy messages
  • wireless apparatuses tags .140 or fobs .130
  • authenticated wireless apparatus periodicall measures signal, strength readings for messages received from the mobile communication device 1 10 using Received Signal Strength indicator ("RSSi”) readings. The RSSI readings are then sent to the mobile communication device 1 10 for processing.
  • RSSI Received Signal Strength indicator
  • RSSI is a measure of the signal strength of a wireless peer.
  • the RSSI reading is roughly correlated to the distance of separation to a wireiess peer and is used as the primary mechanism to estimate proximity in embodiments of the present invention.
  • the RSSi reading is highly dependent on the environment, the transmitter, and the receiver. As such, processing of the signal is necessary to obtain a usable signal.
  • the recei ved signal strength readings may be processed by receiving the RSSI reading in a wireless communication from the fob 130 or tag 1 0 and filtering the RSSi reading through a low pass filter (e.g., n-tap low pass FIR filter). Any other suitable technique for determining the signal strength values .received from, the tag 140 or fob .1.30 and filtering the readings of noise may be implemented.
  • the mobile communication device 1 10 may receive the RSSI readings and an application running on the mobile communication- device 1 10 may then filter the SSI readings to reduce noise. The most recent filtered RSSI readings are then compared to predetermined values (e.g., thresholds) representing different degrees of proximity or proximity zones,
  • FIG. 7 shows the proximity zones according to exemplary embodiments of the present invention.
  • the zone may be split into safe zone 701 , an alarm zone 702. and lost, communication (out of transmission range) zone 703.
  • the object proximity monitoring application may determine that a tag 140 or fob 130 is in. a safe zone 70 ! when the signal strength readings received from the tag 140 or fob 130 corresponds to a distance that is within a nser-eonfimirable range from the mobile communication device 1 10. Whea the mobile communication device 1 10 determines thai the tag 140 or fob 130 is within the safe proximity distance, no alarm is triggered or alert provided to the user.
  • the application may determine that the tag 140 or fob 130 is in an alarm zone 702, However, before alerting a user, the application running on the mobile communication device 1 10 may wait a predetennined hold-off period to ensure the reading is not due to a temporary environmental change. If the signal strength readings are still determined to be below the signal strength alert threshold after the hoki-o if period has passed, the user may be alerted that the tag 140 or fob 130 is in the alarm zone 702 through the mobile communication device alarming the user.
  • the application may implement a buffer threshold in additio to the alert threshold.
  • the application may implement the buffer threshold to provide a range of signal strength values where the .application either enters a warning condition or delays alar until the signal strength readings are below the buffer threshold as well as the alert, threshold. Additionally, in some embodiments, both a buffe threshold and a hold-off time may be implemented to minimize false alarms.
  • a threshold event may only be considered to have been triggered if the -filtered RSSi reading has had its last crossing of the threshold, boundary at least a predetermined number of samples ago. This provides a ' " hold-off time which delays the alarming of the mobile communication device 1 .10 until a predetermined per iod of time has passed or a
  • the approach alert may use a rising edge threshold.
  • a rising edge threshold means that the filtered RSSl reading may be higher than the alert threshold for a predetennined number of readings before the approach alert may be sounded.
  • a separation alert may implement a lowering edge threshold which notifies the user once the predetermined .number of RSSI readings are below the predetermined alert threshold.
  • the event is considered “triggered” and may be reset before it may be triggered again.
  • the alert may not continue to trigger after the user has
  • an event may be reset after the filtered RSSI readings have had it last crossing of the threshold boundary, in the opposite direction for the hold-off period.
  • the separation alert may be reset once the tag 1.40 enters back, into the safe zone 701 for the hold-off period, and if the tag 140 were to subsequently leave the safe zone 701 for the requisite hold-off period, the separation, alert may again, be issued to notify the user.
  • the boundary threshold e.g., alert threshold
  • an estimated distance may also be provided, to help a user determine the desired sensiti ity for the object.
  • the estimated distance would be provided under average conditions for the system although this distance may change due to environmental disturbances.
  • the status determination, modul ma determine that
  • the mobile communication device 1 10 may not receive the period notifications from the tag 1 0 or fob 130 at the regularl scheduled time period.
  • the tag 1 0 and fob 130 regularly report signal strength readings, power status,, a button press, current status, etc. at regular intervals. Accordingly, if the interval passes and. the mobile communication device 1 1.0 has not received a wireless coramuaication, the mobile communic ion device 1 10 may determine the tag 140 o lob 130 is in a lost communication zone 703.
  • the mobile communication device 1 10 may send more communication requests to the wireless apparatus than is typical in a hope to re-establish communication and may alert the user that the mobile communication device 110 has lost contact with the taa 140 or fob 130.
  • the wireless apparatus may start advertising its location in hopes of connecting with the mobile communication device .1 .10 again.
  • the application running on the mobile communication device 1.10 may also start listening for the wireless apparatus that has gone missing.
  • the rate of advertising signals sent when the wireless apparatus is separated from the mobile device may be time-limited such that after a time out, the rate at which the advertising signals are sent is low. if connection is not re-established, after a set period of time, the fob 130 or tag 140 may decrease the advertising rate, (longer period between advertisement transmissions) in order to conserve battery life.
  • the object proximity and tracking application may initiate "last seen" functionality on the mobile communication device 1 10.
  • the "l st seen” functionality Is shown in FIG.
  • the application may be configured to notify the user when the tag 1.40 or fob 130 enters communication range again through a "notify on approach” configuration setting.
  • An exemplary screenshot of the settings for the "notify on approach” functionality is shown in FIG. 1 A.
  • FIG. 8 shows the wireless communication scheme of the wireless apparatus used in the proximity alert ftmctionality according to one embodiment of the present invention.
  • the method of FIG. 8 may be perforated by either the fob 130 or the tag .1.40 while either apparatus is in an authenticated state with a mobile communication device 1 1.0.
  • the wireless apparatus activates from a predetermined period of inactivity, idle, or rest.
  • the wireless apparatus may not disconnect from the mobile communication device 1 .10, but may not be active other than waiting for the next reading of a wireless communication from the mobile communication device 1 10,
  • the wireless apparatus may enter an idle or inactive state in order to conserve battery power. However, in some embodiments the wireless apparatus may still be able to receive communications from the mobile communication device 1 10 and respond to any commands received in the wireless communications.
  • the wireless apparatus receives a wireless communication request message from the mobile communication device 1 10.
  • the wireless signal request, message may comprise a command or may merely include identification information so that the wireles device may determine the signal strength of the wireless signal request message.
  • the wireless apparatus calculates a signal strength value based on the received wireless communication.
  • the signal strength may be calculated through a received signal strength indicator ( S ' SI) reading and calculation.
  • the RSSl reading may be preprocessed and. inverted such that it is a positive number ⁇ i.e., -60 dB reading is delivered as 60) or the raw RSSl values may be collected.
  • the wireless apparatus processes a command or request within the wireless signal request.
  • the wireless signal request may comprise a command to initiate a page status that alerts a user to the wireless apparatuses location, or may command the wireless apparatus to disconnect from the mobile communication device i 10 and enter a disconnected state. Any other suitable command may be included in the wireless signal request.
  • the wireless apparatus determines a power status of the power supply for the wifeless apparatus.
  • the power status may be a reading of the current battery power of the wireless apparatus, the amount of charge left at average usage, or any other power status indicator.
  • the wireless apparatus updates configuration settings according to information included in the wireless communication.
  • the wireless signal request may comprise a change of configuration settings for the wireless apparatus based on the previously sent wireless response message sent to the mobile communication device 1 0, a data inpet by a user, or the entering of a zone tag area that automatically changes the profile settings for die mobile communication device 1 10. Accordingly, the mobile communication device 1 10 may update the configuration settings of the wireless apparatus at any time by sending the updates embedded within wireless signal requests.
  • the wireless apparatus generat a response message including di signal strength reading and the power status.
  • the wireless apparatus may also include any other suitable information in the wireless response message including commands (e.g., a "find my phone ' " command), location information (e.g., triangulation information, longitude/latitude coordinates from a GPS component, etc.), time, elate, device identification information, special requests, etc. Any suitable information may be included in the wireless signal response as one or ordinary-' skill in the art would recognize. (0131 j In step 808. the wireless apparatus transmits the response message to the mobile comm.unioatio.ft device 1.1,0 and in step 809, the wireless apparatus goes into an idle of inactive state for a predetermined period.
  • the period of the idle or inactivity may he included in a configuration setting as the rate of transmissions of the signal strength readings for the wifeless apparatus.
  • the wireless apparatus may then repeat this cycle by activating when the next cycle begins (step 801).
  • FIG. 9 shows a method of monitoring a wireless apparatus for determining whether a proximity alert needs to be generated using adaptive alert thresholds.
  • the application may incorporate adaptive alert thresholds because signal strength readings may be dependent on environmental and system variables that, may change the signal strength reading at any gi ven time without a corresponding change in separation distance. Accordingly, without incorporating adaptive alert thresholds or a similar adaptive quality, false alarms may result from environmental and system power changes.
  • the mobile communication device 1 10 receives a time stamped communication packet from the wireless apparatus.
  • the time-stamped communication packet may he received in a wireless signal response and may comprise the latest signal strength reading; information related to a device identifier for the wireless apparatus, commands from the wireless apparatus, responses to previously sent commands from the mobile communication device S 10, location, time, and any other suitable information that, ma be used in embodiments of the present invention.
  • the mobile communication devic 1 10 filters the signal strength reading determined from time-stamped communication packet.
  • the mobi le communication de vice 1 10 may recei ve a RSSI reading in response to a previously sent wireless signal request.
  • RSSI is a measure of the signal strength of a wireless peer and is roughly correlated to the distance of separation to a wireless peer.
  • processing of the RSSI data may be necessary to obtain a usable signal.
  • the received signal strength readings may be processed by filtering the RSSI reading through a low pass filter (e.g, n-tap low pass Finite impulse Response (FIR) filter or Butter worth Infinite Impulse Response (UK) filter).
  • FIR Finite impulse Response
  • UK Butter worth Infinite Impulse Response
  • step 903 the mobile communication device 1 10 compares the filtered signal strength reading to a expected signal strength or a last signal strength reading. Once the RSSi reading is filtered and a signal strength reading is determined by the mobile
  • the application running o the mobile communication device 1 10 determines a stored expected signal strength reading that was calculated at the end of the last cycle, and compares the received signal strength reading to the expected signal strength reading.
  • the application calculates the expected signal strength reading using previous signal strength readings from the wireless apparatus. Accordingly, the prediction of the signal, strength status may be used to determine if the wireless apparatus is moving away from the mobile communication device 110, toward the mobile communication device 1 0, or is stationary in relatio to the mobile communication device 110.
  • the expected signal strength may be predicted based on the periodic pas signal strength readings and what may be gradual change in signal strength reading values. Accordingly, the signal strength reading may be compared to the expected signal strength to determine if the signal strength readings change drastically .
  • step 904 the mobile communication device I J O determines whether the difference is lamer than an aiiowed change value. Accordingly, the difference between the expected signal strength reading and the received signal strength is used to determine if a drastic change has occurred. A change in signal strength could indicate separation, physical blockage or detuning of the antenna. Accordingly, a method of disambiguation may be implemented to ensure false alarms do not regularly anno a user. If the change value is determined to be larger than an allowed change value, the system ma assume that the environment has changed in a substantial manner and thus the system may move to step 905 to adapttveJy alter the alert threshold to adapt to the changed environment,
  • step 905 if the difference -magnitude is larger than an allowed change value, the application running on the mobile communication device 1 10 may calculate a threshold, change value.
  • the threshold change value may he calculated through any suitable method including using averaging of the difference, using the difference between the expected signal strength, reading and the actual signal strength reading, offsettin the readings by a standard value, using past threshold change values, etc.
  • the a lert threshold is raised or lowered by the threshold change value based on whether the difference was higher or lower tha the expected value.
  • the calculated threshold change value should be large enough that the alert threshold is not breached b the received signal strength reading unless the expected signal strength reading anticipated such a result.
  • the mobile communica ion device 1 1.0 compares the filtered signal strength reading to an alert threshold value.
  • the threshold change value is not. calculated because the difference between the expected signal strength reading and the actual received signal strength is a reasonable value that does not indicate a drastic change to the environment of the system. Accordingly , the proximity alert system continues wi th the analysis of determining whether the wireless apparatus is outside of the safe zone 701.
  • the filtered signal strength reading may be compared to the ne or updated alert threshold value to determine if an alarm should be issued,
  • step 908 the wireless communication device determines if the filtered signal strength value is below an alert threshold value. If the received signal strength reading is below (or above depending on whether the signal strength readings are negative or positive) the alert threshold value and thus indicates that the wireless apparatus is in an alarm zone 702, the analysis moves to step 909 to determine how long the alert threshold has been breached. However, if the signal strength value is not below or breaching the alert threshold, the proximity analysis process is completed and the application can continue the
  • step 909 if the filtered signal strength value is below the alert threshold value, the mobile communication device J. 10 determines if a predetermined numbe of readings have been below the threshold value.
  • the predetermined number of readings corresponds to "hold-off time that delays an alert until number of samples are below an alert threshold value.
  • the analysis may be completed, the results may be stored and the application may wait until the requisite hold-off period is met before alerting the user.
  • step 910 if the filtered signal strength reading is not below the alert threshold value, the alert threshold value was altered due to a difference between the expected and received signal strength reading being too large, or the predetermined number of filtered signal strength readings have not been below the alert, threshold value, then the mobile communication device 1 J 0 stores the alert threshold value, the filtered signal strength reading, the time, date, and location information (if included in the wireless communication packet) in a history data storage in the mobile communication device 1 10.
  • the mobile communication, device 1 10 determines the next expected signal strength reading based on the stored values and stores the expected signal strength leading in a predicted status storage area on the computer readable medium.
  • the expected signal strength may be predicted accurately due to the periodic readings received by the mobile communication device 1 10.
  • the expected signal strength reading may be used in the next cycle to determine if the received signal is bein affected by outside factors such as environmental or power changes,
  • the mobile communication device 1 10 determines if the wireless communication packet contains any requests or commands from the tag 140 or fob 130 (e.g., a "find my phone" paging command ⁇ . If so, me application performs the requested commands.
  • the mobile communicatio devic 1 10 determines the power status of the wireless apparatus if it is included in the wireless communication.
  • the power status indicator informs the applic ation of the power level of the battery of the wireless apparatus.
  • the mobile communication device 1 10 may update the configuration settings for the wireless apparatus including transmission rate.
  • the mobile communication device 1 10 determines if any configuration settings need to be updated based on th received power status and the expected signal strength.
  • the application may then update the configuration settings and include the configuration settings in the next wireless signal request sent to the wireless apparatus.
  • a number of configuration settings on the wireless apparatus may be updated in order to save power for the wireless apparatus,, increase the accuracy or sensitivity of the system, and further increase the effectiveness of the sy stem. For example, if the application determines that the wireless apparatus has a low power status, the application may decrease the rate of transmission for the wireless apparatus to a lower rate to further conserve battery power.
  • the configuration settings may include a rate of transmission of wireless communications for the wireless apparatus, a transmission power for die wireless apparatus, a notification type setting, and a movement notification setting for the wireless apparatus.
  • an algoriihm in the application determines if the wireless apparatus is proximal and i f it is approaching or departing.
  • the report transmission rate is increased if the fob 130 or tag 140 is far or moving away because there is a higher chance that a separation, alert may be issued soon, and thai the monitored object is in a danger condition, Additionally, the rate of transmission may be decreased if the wireless apparatus is near or moving closer to the mobile communication device 1 10. 0149j Reducing the transmission power extends the power source life of the wireless apparatus.
  • an algorithm in the application determines if the fob 130 or tag 140 is proximal and if it is approaching or departing from the mobile communication device 1 10, Accordingly, the application may update the configuration settings including the transmit power of the wireless apparatus to an increased level if application determine that the fob or tag 140 i far or moving away. Alternatively, if the wireless apparatus is approaching or is close to the mobile communication device 1 10, the application may decrease the transmission power in the configuration settings for the wireless apparatus, Additionally, the power status may be used to determine tile aggressiveness of the transmission power settings. For example, if the power status of the wireless apparatus is at a high level, the system may only limit the transmission by a small amount if the wireless apparatus is moving toward the mobile communication device 1 10. However, if the power status of the wireless apparatus is very low, the application may limit the transmission power setting for the wireiess apparatus as much as possible to maximize the available remaining power.
  • step 915 if the predetermined number of previous signal strength readings are below the alert threshold value, the mobile conimuiiieation device 110 alerts the user until the • user provides an input that acknowledges the alarm or until the alarm timeout period is exhausted.
  • the mobile communication device 1 10 stores the last known distance and location of the wireless apparatus as well as the other data as shown in step 910.
  • process may now return to tep 910, 91 1 , or 912 and continue storing, determining the expected signal strength, processing requests or commands, etc,
  • step 917 the mobile communication device 1 10 generates and transmits a new wireles signal request including any appropriate information including any possible updates to the configuration settings for the wireiess apparatus, commands, etc.
  • the wireless apparatus may further comprise a step of cletermining whether the configuration settings indicate thai a movement notification setting is acti ve, and if so, the wireless apparatus may determine if the movement sensor (i.e. acceleroffleter) within the wireless apparatus has indicated any movement since the last wireless signal response, if so, the -wireless apparatus may include a movement indicator in the wireless response message sent to the mobile communication device 1 10.
  • the movement sensor i.e. acceleroffleter
  • the movement indicator could be implemented as a flag, a sensor reading from a movement sensor (e.g., accelerometer), a message comprisin particular information including location data, or any other suitable message that informs a mobile communicatio device 1 10 that the wireless apparatus has sensed that it is being moved.
  • the movemen indicator may be sensor readings that require additional processing before a determination can be made of how the device is being moved or the processing may occur at the wireiess apparatus and the mobile communication device 1 10 may receive pre-processed data indicating the type of movement or that movement has occurred. Accordingly, the wireless apparatus may determine if it is being moved and if so, may. send a movement notification in the wireless signal response to the mobile communication device ⁇ J 0.
  • the wireless apparatus may send the movement indicator outside of wireless signal response message if It determines that the movement is occurring before the next wireless signal response message is due to be sent.
  • the system may have a software component (i.e., application) installed on a mobile communication device 110.
  • application i.e., application
  • the user interface of the object proximity tracking application provides controls over the system's behaviors and allows a user to customize the system to maximize its
  • the distance from the mobile communication device 110 that the safe zone 701 extends, the definitions of alarm conditions ⁇ e.g., alarm o movement of the wireless apparatus), and the system's responses to alarm conditions may be defined and configured by the user using the application running on the mobile communication device 110.
  • the application may synchronize the mobile communication device 1 10 and the wireless apparatus, receive a data input, from a user, and update the wireless apparatus with information corresponding to the data input.
  • the data input ma correspond to configuration settings for a wireless apparatus.
  • the application may update the configuration settings and then include the configuration settings in the next wireless signal request sent to the wireless apparatus.
  • FIGS. 10-14 show exemplary screenshots of an exemplary application fo the mobile communication device ! 10 show in FIG. 3.
  • FIG. 10 shows an exemplary screenshot. of the display 1501 of the mobile communication device 1 10 alter the application 1502 has been downloaded and shows a user 1503 launching the application by tapping on the application icon 1502.
  • FIGS. 1 1 A and 1 I B show exemplary home screenshots of the object proximity and tracking application showing the different tags 140 being tracked, their proximity to the user, a visual icon for easy identification, and their battery status.
  • FIGS, 2A-12C show exemplary screenshots of the application when the system is registering a new tag.
  • FIG. 13 A shows a exemplary details screen for a selected, initialized, and authenticated tag, F G.
  • FIG. 14 A shows a settings screen for the "notify on approach” proximity detection functionality of embodiments of the present invention.
  • FIG. .14B shows an exemplary sereenshot of the 'last seen” functionality of embodiments of the present invention.
  • FIGS. 1 1 A and I IB show exemplary home screenshots of the object proximity and tracking application showing the different tags 140 being tracked, their proximity to the user, a visual icon for easy identification, and their battery status.
  • FIG. 1 I A shows an exemplary embodiment of the application where the main screen may be implemented as separate squares showing the previously registered tags 1 1 03A-1 J 03D. Each square includes a visiial identifier, name, and proximity indication to quickly and easily inform the user of the power and proximity status of the registered tags. Additionally, the user ca easily see that some tags are not activated f e.g., the laptop bag and the car are not current activated as they show no proximity indicator). Additionally, the proximity indicator may have different colors to indicate a power status for the tag.
  • the proximity indicator could be red while if the power status is full, the proximity indicator could be green, blue, or some other color. Additionally, other information could he provided through the color of the proximity indicator. For example, if the proximity indicator is growing (meaning the tag is moving further from the mobile communication device 1 10). the proximit indicator ma be a red color to indicate that the danger level is increasing, while the color could change to blue if the tag is approaching the mobile communication device 1 i 0. Any other suitable information may he displayed through color as well Additionally, the proximity indicator could be inverted such that the indicator displays the signal strength of the received wireless apparatuses, such that the larger the proximity indicator, the closer the tag ma be to the mobile communication device 110.
  • lite home screen allows the user to determine more information about each tag as well as configure each ta individually- From the home screen, the user may additionally be able to re-order and remove tags. Furthermore, if the user taps on a row, the application enters a details screen associated with the selecte tag where configuration settings may be set and further details provided about the tag. Additionally, in some embodiments, the user may be able to select a "find me” button from the home screen that initiates the "find my tag" functionality.
  • FIG. 1 1 B illustrates an exemplary embodiment of the application where the main screen may be implemented as a row-based table where each tag 1 104A-1 104D is represented by a single row. Each row may display a visual identifier and a name for the tag (e.g.., the name of the tag is "camera" and the visual identifier is a picture of a person taking a picture with a camera). Additionally, both home screens allow the user to configure profile settings by touching the settings button 1 101 for the application or may add a tag by hitting the add tag button 1102.
  • FIGS. 12A-12C show exemplary sereensbois of the application when the system is registering a new tag.
  • the user .may be able to add tags to the appl cation by tapping on a. special add tag button 1 102 in the top right portion of the home screen.
  • FIG. 12A shows an exemplary screenshot of an "add a tag” pairing screen that is launched after the user presses the "add a tag” button. Pressing the "add a tag” button opens the “add a tag” pairing screen which informs the user to initiate the pairing button on a tag or fob within pairing rasige of the mobile communication, device 1 1.0.
  • the screen is labeled, "Add A ag," 1102 and informs the user that in order for the user to register a tag with the application, the user should input the pairing button on the tag within pairing range.
  • the mobile communication device 1 10 may liste for pairing advertisement messages from tags within pairing distance and may move to the tag registration screen once the mobile communication device 110 receives the pairing advertisement message.
  • the first tag discovered that may be authenticated is selected to be the tag to add. Once the first tag i discovered, the discovery mode is stopped.
  • the application registers the tag identification data, such that the application may now try to connect anytime the tag becomes disconnected,
  • FIG. 12B shows an exemplary screenshot of the tag naming screen for a tag that is discovered by the mobile communication devic ⁇ 10.
  • This screen allows the user to name the tag and select a picture from their photo library, take a picture and crop, select from the album, or select an included icon. Additionally, the user may enter a tag name, if the user picks the "select an icon", a screen showing several icons may be presented (e.g., three to a row as shown in FIG. 1.2C). The user may be able to scroll, up/down to see all the icons. Tapping on an icon selects that icon.
  • FIG. 13 A shows an exemplary details screen for a selected, initialized, and authenticated tag.
  • the user may tap on an icon in the main screen to view details about a registered tag.
  • This screen has two main sections.
  • the top section 1303 of the table displays an icon and name of the tag, the battery status, and the proximity to the mobile
  • the screen may display a textual description of proximity (e.g., roughly how far tile tag is away from the mobile communication device 1.10). Howe ver, if the tag is .not in .range, the screen ma display the time since the tag was last seen. Additionally, if the tag is currently in the conneeting initializaiion state, the screen may display either "Connecting " or "Initializing " The status display in this section is live and is constantly updated. Furthermore, the user may be able to tap on die icon to rename the tag as well as change the visual identifier (e.g., icon/photo) for the tag.
  • a textual description of proximity e.g., roughly how far tile tag is away from the mobile communication device 1.10
  • the screen may display the time since the tag was last seen.
  • the screen may display either "Connecting " or "Initializing "
  • the status display in this section is live and is constantly updated.
  • the user may be able to tap on die icon to rename the
  • Hie bottom section of the table displays entries which enabie/disabte/configure features for the tag. For example, in FIG. !3A thorough the "Find Me” functionality 1304, "Notify on Approach” functionality 1305, “Notify on Departure” functionality 1306, and “Notify on Movement” fiinctionality 1307 are all highlighted and available to activate and further define the configuration settings for the fiinctionality. Note that each, tag has its own specific configuration separate and unrelated to the configuration of the other tags. Additionally, different tags may also have different capabilities and the rows of this section are displayed or not depending on. whether a tag supports a particular feature.
  • FIG . 13 B shows an exemplary screenshot of a tag that has the "find rne"
  • the tag may have entered this screen b the user pressing the "Find Me” button in FIG. 13 A or through a direct “Find Me” button pressed in the earlier main screen.
  • the "Find Me” screen is used to aid the user in finding a tag. The user may invoke this screen when they wish to issue visual or audio alerts to the tag so that they may find it.
  • the "Find Me” screen can be invoked ironi the main screen or from the "Tag
  • the tag is determined to be in range and connected.
  • the application initiates a command to be sent to the tag that plays a sound n. the tag.
  • the "Find Me” screen may display simple animation or visual indicator on the screen which connotes whether the user is getting closer or farther away from the tag.
  • the "Find Me” screen may display the icon of the tag in the middle of the screen and a pulsating circle around the icon. As the tag becomes closer, the circle grows, the color saturation increases, and/or color changes to red. As the tag becomes farther away, the screen may shrink the circle, decrease the color saturation, and/or change the color to blue. Additionally, at the bottom of the screen, there may be text informing the user whether they are getting closer or farther from the tag.
  • An suitable visual and/or auditory indicators may be implemented to indicate to a user whether they are approaching or moving away front the tas.
  • the application may display a dialog indicating that the tag has disconnected and present an option to take the user to the
  • FIG. 1 A shows a settings screen for the "notify on approach ' ' proximity detection functionality of embodiments of the present invention.
  • the notify on approach functionality provides that if the tag comes into range and is connected with the mobile communication device 1 10 again, it may alert the user,.
  • Each type of notification e.g., separation, approach, movement
  • the configuration settings may include whether the type of notification is enabled or disabled 1403, the type of sound to make for the notification 1404, a selection of the sound clip to play 1405, and a sensiti ity level (e.g., proximity setting) for the alert threshold 1406.
  • the proximity setting 1 06 may be set by moving a visual indicator on a display to the left or right to indicate the closest or furthest sensitivity setting (roughly corresponding to an alert proximity).
  • Other embodiments may incorporate a digit value that ma be input for average corresponding separation distance (e.g., 30 feet), a signal strength RSSI value (e.g.., -60 dB)tex or an other suitable measurement of distance or signal strength.
  • the user can update configuratio settings for the application through the menu. Once the configuration settings are input through, data inputs b the user, the application may update the
  • FIG . 14B shows an. exemplary screenshot of the application during the "Last Seen” functionality.
  • “Last Seen” functionality may be used when the wireless apparatus is disconnected from the mobile communication device 1 10 due to traveling out of the
  • The. "Last Seen” screen is used to aid the user in finding the tag when the tag is out of range.
  • the application shows the user on a map where the tag was last seen.
  • a map may be displayed and centered on the location where the tag is last seen (e.g., last stored location of the tag or last stored location of the mobile comm.unioatio.ft device when the mobile communication device lost communication with the tag).
  • a visual indicator e.g.. a pin or other icon
  • p.ra pouitmg the captured coordinates
  • a transparent circle may be displayed around the pin to indicate the level of accuracy of the reading.
  • a caption may be displayed above the pin.
  • the main text may display a human readable name of the location of the tag. Alternatively or additionally, the latitude longitude information may be shown.
  • the subtitle may display the time that the tag was last seen and may provide some context since the tag was seen (e.g., if the tag was seen less tha a minute ago, the display may say it was seen "Just now,” or "I minute ago.” Furthermore, below the map is a caption indicating the distance from the current position to the last seen position. For example, the caption may read " 10 miles away. 2 hours ago, ,!
  • the object proximit tracking application may offer quick selection among different profiles (safe, danger, airplane, etc.) either pre-installed or user generated.
  • the application may automatically change the active profile based on user determined rules.
  • these rides may include location of the mobile
  • Zone Tags A special class of tags may be used to mark a location or an area.
  • the application may e!ianue the mobil communication device i 10 profile to match the configuration, settings being provided by the zone tag. The application may then update the configuration settings for the connected wireless apparatus and send the updated configuration settings in the next wireless signal request.
  • a "safe zone" rag may be located in the user's home.
  • the mobile communication device 1 10 is in range of such a tag (hence in a 'safe zone') it relaxes the alert generation criteria to allow the user to leave his possessions further away ftom the mobile- communication device 1 10.
  • a zone tag and the mobile comnnmication. device 1 10 mutually authenticate through a mechanism that may allow the zon tag to simultaneously communicate with multiple tags. This mechanism may include the use of secret keys, synchronized clocks, cryptographic hashes and cryptographic message authentication codes,
  • [01731 in another embodiment of the invention may include pairing a tag with more than one mobile- communication device 1 10. This may involve configuring a new mobile communication device 1 10 to sniff ail transmissions in the vicinity to find the tag, putting the tag in a pairing mode, acknowledging the tags' transmissions with a command packet instructing it to add the pairing, then exiting pairing mode. Once paired with two mobile communication devices 1 10, a tag may transmit twice as often, making separate
  • the mobile communication device comprises a processor, an antenna, a transceiver device electrically coupled to the antenna and the processor, and a computer readable medium coupled to the processor and comprising code executable by the processor to implement a method.
  • the method may include receiving a wireless communication from a wireless apparatus attached to an object determining a signal strength reading from the communication, determining if the signal strength reading is below an alert threshold, wherein the alert threshold is adaptable, and if the signal strength reading is below the alert threshold.
  • alertin a user
  • the method further comprises receiving a data input from the user, updating configuration settings for the wireless apparatus, and sending a wireless communication to the wireless apparatus, wherein the wireless communication includes the configuration settings.
  • the obi le co.ramun.ication device comprises a processor, an antenna, a transceiver device electrically coupled to the antenna and the processor, and a computer readable medium coupled to the processor and comprising code executable by the processor to implemen t a. method.
  • the method may include receiving a wireless communication from a wireless apparatus attached to an object, determining a signal strength reading from the communication, determining if the signal strength reading is below a alert threshold, wherein the alert threshold is adaptable, and if the signal strength reading is below the alert threshold, entering a warning condition, wherein the warning condition initiates a .first type of alert; if the signal strength reading is below the alert threshold, determining if the signal strength reading is below a buffer threshold, and wherein if the signal strength reading is below the buffer threshold, entering an alarm condition, wherein the alarm condition initiates a second type of alert.
  • the mobile communication device 1 10 and the wireless apparatuses 130, 140 are used to track a location of a user.
  • the mobile communication de vice 110 tracks and stores location information (e.g., the current geographic position of the device 110) when the device 110 connects to and/or disconnects from one of the apparatuses 130, 1 0.
  • the location information may include dates, times, addresses, notes, and. other pertinent information associated with device 1 10.
  • FIG. 1.6 is a. flowchart ' depicting a method of tracking the location of the mobile communication device 1 10 (e.g., a smariphone that is carried by the user).
  • the device 1 10 searches for a nearby wireless apparatus (e.g., the apparatus .130 or the apparatus 140). if the wireless apparatus is n range, the device 1.1.0 connects to the apparatus at step 1 08, Upon connecting to the apparatus (step 1612), the device 1 10 records and stores the current location information of the de vice 1 10. In some embodiments, the location
  • the location information may be stored within a memory (e.g., read only memory (ROM) ⁇ of the device 110.
  • the location information may be stored in a cloud server with which the device 1 10 communicates.
  • the location information is received by the transceiver 1 .12 ⁇ FIG. .1) of the mobile communication device .1 10 and ma be, for example, GPS location information.
  • the location information may als include date and time information.
  • the GPS location information may be associated with a street address.
  • the device 1.0 While the mobile communication device 1.10 is connected to the wireless apparatus, the device 1.0 monitors the connection between the device 110 and the apparatus at step 1616, Upon disconnecting from the apparatus (step 1620) (e.g., moving out of rang of the apparatus), the device 1 10 again records and stores the current location information of the device 1 10. The device 1 10 then returns to step 1604 to search for the wireles apparatus or a different wireless apparatus.
  • the apparatus e.g., moving out of rang of the apparatus
  • the communication device 1 1 records location information each time the device 1 10 connects to and disconnects front the wireless apparatus, in other embodiments, the device 100 may only record location information when the device 110 connects to the wireless apparatus.
  • the device 1 10 may only record location information when the -device 1 10 disconnects from the wireless apparatus. In further embodiments., the device 1 1 may only record location information when the device 1 10 connects to and/or disconnects front certain, wireless apparatuses, or may record location intbrmation when, the de vice 1.10 connects to a first typ of wireless apparatus and may record location, information when the device 110 disconnects front a second type of wireless apparatus.
  • the wireless apparatus may include a 12V power adapter 1700.
  • the adapter 1700 is configured to lug into, for example, the cigarette lighter socket of an automobile, boat, motorcycle, or other vehicle,
  • the illustrated adapter 1700, or vehicle tag includes a housing 1 704, a power interface element 1708 (e.g., plug) extending axially from the housing 1704.
  • a status indicator 1.712 e.g.,. LED
  • the adapter 1700 also includes two electrical contact member 1 20 that extend radially from the housing .1704 and are electrically coupled to or part of the power interface element 1708.
  • the internal components of the adapter 170 e. g., the transceiver, the processor, etc.
  • the internal components of the adapter 170 are the same as the wireless apparatuses 130. 140 shown in FIGS. 1 and 2.
  • the adapter 1700 can be left in a predetermined location (e.g., a user's car) to track the location of the user and the car each time the user enters and leaves the car. That is, when the user e ers or gets close to the ear. the mobile communication device 1 10 connects to the adapter 1700 and stores location .mfomiaiion. Th s location, information, can, therefore, correspond to the user departing from a certain location (e.g., home, work, school, etc.). When the user arrives at a new destination and exits the car, the mobile communication device 1 10 disconnects from the adapter 1700 and stores the location information. This location information can.
  • a predetermined location e.g., a user's car
  • the mobile communication device 1 10 may be programmed to recognize certain locations by their GPS coordinate (e.g., home, work, school, etc.). As such, upon arrival to or departure from these locations, the device 1. 1 ma automatically identi fy the location as one of the pre-programmed locations of the user. In other embodiments, the device 1 10 may recognize or associate locations with street addresses.
  • GPS coordinate e.g., home, work, school, etc.
  • the power adapter ⁇ 700 may be powered by the car so thai the adapter 1700 only communicates with the mobile communication device 1 10 when the car is on. As such, when the car is turned, off * the adapter 1700 automatically disconnects from the device 1 10, even if the device 1 10 is still within a suitable range of the adapter 1700. Similarly, the de vice 1 1.0 does not connect to the adapter 1700 until after the car is turned on, e ve if the de vice 110 is within a suitable range of the adapter 1700.
  • the other wireless apparatuses 130, 140 can alternatively be left in the car in,, for example, the glove box.
  • the wireless apparatuses 130, 140 can thereby serve the same functiono as the power adapte 1.700.
  • the wireless apparatuses i 30, 140 may be left behind by a user in other locations (e.g f , a desk drawer or docking station at work, at home, etc,), in such
  • each wireless apparatus may be associated with a certain location such that connecting to and disconnecting from the wireless apparatus conesponds to arriving at and departing from, respectively, the certain locations,
  • FIG. 1.8 is a screenshot of exemplary location information being displayed on a display ! 800 (e.g., a touchscreen) of the device i 10.
  • the illustrated screenshot includes three location information entrie 804 A, 1804B, 1.804C.
  • Each entry 1804A-C includes a map 1808A-C having an indicator 18i2A ⁇ C, or pin. thereon.
  • the pin 1812 A-C identifies a more precise location of the device 1 10 when a tracking event (i.e., connection to or disconnectio from a wireless apparatus) occurred.
  • each entry 1S04A-C also includes a date I816A-C when the tracking event occurred, a time .1820A-C when the tracking even occurred, and a status identifier 182 A» € for the type of event.
  • Each entry S04A-C may also include and display address information or GPS coordinates by, for example, touching or clicking on the corresponding pin 1812 A-C A user may scroll through more than the three displayed entries 1804 A-C using a scroll bar 1828 on the display 1800.
  • the user may sort the entries ! .804 A-C by time, location, status (e.g., departures versu arrivals), and the like.
  • Hie location information is also exportable for further processing to another application on the mobile communication device 1 10 or to an application on a separate computing system (e,g., a laptop or desktop computer).
  • a separate computing system e.g., a laptop or desktop computer.
  • FIG. 1 provides an example of a spreadsheet or data log to which the location information has been exported. Once exported, the location information may be manipulated, (e.g., sorted, etc) as desired.
  • a user can select an indi vidual, record or entry 1804A-C (FIG. 18) to provide additional: information regarding that entry.
  • the user may provide a name or mnemonic for an entry.
  • This personalized information ma he used to help i iter, display, or export more meaningful records for the user.
  • the user ma desire to name only records that are related to work, and then choose to display or export those locations for billing or reimbursement purposes.
  • the mobile communication device 1.1.0 has been described as only recording and storing location information when the device 1 10 connects to or disconnects from a wireless apparatus, in other embodiments the device 1 10 may be triggered to record and store location information in response to other events.
  • the device 1 10 may log location information at set time intervals (e.g., every hour) if the devic 1 1.0 remains connected to the wireless apparatus for extended period of time without disconnecting.
  • the device 1 10 may log location information at set distances (e.g., every 10 miles) if the device 10 remains connected to the wi reless apparatus without disconnecting.
  • the device 110 may log location information based on sensed conditions of the wireless apparatus itself (e.g., if power to the wireless apparatus is turned on/off, if power of the wireless apparatus drops belo or increases above preset thresholds, changes in ambient light, changes in ambient temperature, etc,). 10188 ⁇ Specific details regarding some of the above-described aspects are provided. The specific details of the specific aspects ma be combined in any sui table manner without departing from the spirit and scope of embodiments of the disclosure.
  • Embodiments of the present invention pro vide a number of technical advantages.
  • the security system provides a simple, efficient, interacti ve, customizable, and effective solution to monitoring, tracking, and receiving notifications regarding objects of interest.
  • the system increases security for a consumer's personal objects leading to less identity theft and allows a consumer to rest assured that their moni ored objects are within a sale distance of them at all times and that the user may be notified if their objects of interest move out of a predetermined distance.
  • the adaptable alert threshold may be implemented b determining an expected signal strength reading and calculating a difference between the expected signal strength reading and the recei ved signal strengt reading. If the difference is larger than an allowed change value, the application may
  • an adaptable alert threshold allows the application to limit false alarms that are caused by environmental interference or disturbances which do not necessarily indicate an alarm or danser situation. fO J.9.1] Another technical advantage of some embodiments of the present invention is provided by implementin a hold-off period and/or a buffer threshold to limit fal se alarm s.
  • a hold-off period may be implemented to delay the entering of an alarm condition until a predetermined number of signal strength readings from a wireless apparatus are below the alert threshold. Accordingly, if the received signal strength readings are. below the alert threshold for a brief or momentary time period which is smaller than the predetermined hold- off period, the alarm condition may not be entered and the user may not be alerted.
  • a buffer threshold may be implemented such that if the filtered signal strength reading is below an alert threshold, an alarm condition may not be entered until the filtered signal strength reading is below an additional buffer threshold that may be a further predetermined signal strength value below the alert threshold.
  • the wireless apparatus is close to the sensitivity limit corresponding to the alert threshold, the alarm condition is not entered repeatedly if the filtered si gnal strength readings are impacted by environmental disturbances. Accordingly, both of these features provide the technical advantages of reducing false alarms which lead to higher consumer satisfaction, increase security tor the system as the user may not decrease the sensitivity setting just to limit false -alarms, and overall better performance for the system.
  • embodiments of the present invention provide the technical advantages of more efficient power usage through adaptable configuration settings.
  • Embodiments ' of the present invention allow the application to determine a power reading of the wireless apparatus and dependin on the power reading and the received signal strength reading, the system may update the configuration settings including transmission power, rate of transmission of wireless communications including signal strength readings, and notification settings for the wireless apparatus. Allowing the application to change the configuration settings of a wireless apparatus allows the system to implement adaptable transmission power based on the current filtered signal strength readings of tire -wireles apparatus, which saves power so that the wireless apparatus does not send a wireless
  • the adaptable transmission rate can save the power supply of the wireless apparatus when the wireless apparatus is not in a dangerous situation by slowing the rate of transmission of signal strength readings,. Furthermore, increasing the adaptable transmission rate when the wireles apparatus is m a dangerou situation may lead to a more secure system as less time may lapse between received signal strength readings.
  • updating the configuration settings to change the notification settings allows the system to be easily customizable by a user and allows a variety of functionality to be
  • Another advantage of embodiments of the invention is that while the fob and the mobile communication device are in range, they can be used to find each other in the case of accidental loss or misplacement of one apparatus or the other.
  • embodiments of toe present invention provide a number of technical advantages.
  • jO J 94 The system, and method disclosed i the present application provides selective and automatic recording of locations. The user can determine if the records are to be taken based on temporal and geographic specifications either pre-set or post-set by the user.
  • FIG, 15 shows a block diagram of subsystems that may be present in computer apparatuses that are used in system shown in FIGS. 1 and 2.
  • the various participants and elements in the previously described figures may operate using one o more computer apparatuses to facilitate the functions described herein. Any of the elements in the figures ma use any sui table number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown in. FiG, 15.
  • the subsystems shown in FIG. 15 are interconnected via a system bos 1575. Additional subsystems such as a printer 1574, keyboard 1.578, fixed disk 1579 (or other memory comprising computer readable media), monitor 1576, which is coupled to display adapter 1582, and others are shown.
  • Peripherals and input/output (I/O) devices which couple to I/O controller 157.1, can be connected to the computer system by any number of means known in the ait, such as serial port 1577.
  • serial port 1577 can be used to connect the computer apparatus to wide area network such as the Internet, a mouse input de vice, or a scanner.
  • the interconnection, via system, bus allows the central processor 1573 to communicate with each subsystem and to control the execution of instructions from sy stem memory 1582 or the fixed disk 1579, as well as the exchange of information between Subsystems.
  • the system, memory 158.2 and or the fixed disk 1579 may embod a computer readable medium.
  • any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C+ ⁇ or Perl, using, for example, conventional or object- oriented techniques.
  • the software code may be stored as a series of instructions, or commands on a non-transitory computer readable medium, such as a random access memor (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM.
  • RAM random access memor
  • ROM read only memory
  • Any such computet ' readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

Abstract

A method for tracking a location of a mobile communication device having a processor, a memory, a transceiver, and a display includes communicating, by the transceiver, with a wireless apparatus. The method also includes storing location information of the mobile communication device in response to the transceiver one of connecting to and disconnecting from the wireless apparatus. The method further includes displaying the location information on the display.

Description

USER INTERFACE FOR OBJECT TRACKING
CROSS-REFERENCE TO RELATED APPLICATIONS
100011 This application claims priorit to U.S. Provisional Patent Application No.
61/792,568, filed March I S, 2013. claims priority to U.S. Provisional Patent Application. No. 61/780,576, filed March 13, 2013, and is a continuation-in-part of U.S. Patent Application No, 13/612,576, filed September 2, 2012, the entire contents of all of which are hereb incorporated by .reference.
BACKGROUND
[00021 A person typically carries several important items such, as identity papers, mobile electronics including those that contain personal information, and objects of con venience on which modem life depends, However, daily life also presents many distractions that lead to accidental loss. The day-to-day time challenges further compound, the problems as one usually has little time to discover or locate such lost items. Loss of such, items is
inconvenient at the least and leads to identity theft at the worst. Additionally, the
proliferation of mobile electronics has increased the rates of theft and accidental loss. The increasing pei formance and versatility of such products have also increased the immediate and consequential costs of such losses in the form of replacement and potential breach of privacy.
[OO03j Accordingly, there is a need to provide a fast, easy, and effective system for tracking objects prior to their loss as well as helping a user find, such objects once they are lost Furthermore, there is a need to limit false alarms due to environmental disturbances in tracking systems and increase the performance, power supply life, and. power efficienc of such systems. Such objects may extend, to automobiles, pets, or even persons.
[0004] Automatic location tracking has been available in various forms. Most GPS- enabled navigation devices provide location records. There are also location tracking applications available on smart.phon.es, but. these applications typically continually use GPS hardware, which drains the battery quickly, in addition, neither of these systems provide automatic and selective recording of locations. Furthermore, the locations are usually recorded in regular time and/or position intervals without regard to the significance to the user. {0005] Embodiments of the i nvention address these and other problems
SUMMARY
{0006] The devices and systems described in this document relate to a system of loss prevention, discovery, and tracking of personal belongings through the use of wireless hardware and mobile electronic devices such as sniartphones, tablet computers, and portable computers. Specifically, embodiments of the present invention are directed at systems and methods to monitor the proximity of personal possessions using small radio transceivers (e.g. "tags5' or "fobs") attached, to objects of interest (i.e. "monitored objects") and wire iessly connecting to a mobile communication device mch as a smartphone, a tablet computer, or a wearable device with computing capabilities running an object proximity and tracking application.
{0007] The application generates an alert when a monitored object moves beyond a predetermined monitoring range {e.g. a safe zone) and/or radio communication range (the "Separation Alert"), when a previously out~of~nmge object re-enters monitoring range (the "Approach Alert"), or when a monitored object moves if the object is supposed to be stationary (the "Movement Alert"). Additionally, the application may allow a special tag (a "fob") to page the mobile communication device using a wireless apparatus (a "fob") attached to a monitored object Furthermore, the application may allow a. user to locate the monitored objects through proximity detection and paging when they are in radio
communication range, record the last known location of the monitored objects when they are beyond radio communication range, and visually identify the monitored objects using selected or user generated visual identifiers. Finally, the application may adaptivelv alter the behavior of the system to manage battery life as well as adaptively qualify and generate alerts to minimize false alarms.
|O 08| One embodiment of the present invention may be directed to a mobile
communication device, such as a mobile phone, that is capable of executing user installed applications, wirelessly connecting to one or more wireless apparatuses over a short-range radio, acquiring its geographic position, and providing its geographic position in a wireless connection to a wireless apparatus. On connecting or disconnecting with the wireless apparatus, the mobile communication device acquires and records its geographic position. This even may signify, for example, that the user has arrived ai a location and has parked bis/her car, The location records may contain dates, times, geographic positions, addresses associated w th the geographic positions, and/or other pertinent information. j0009| in one embodiment, the invention provides a method for tracking a location of a mobile ccntinwnication device. The mobile coimm kation device includes a processor, a memory, a transceiver, and display. The method includes communicating, by the transceiver; with a wireless apparatus, storing location information of the mobile
communication device in response to the transceiver one of connecting to and disconnecting from the wireless apparatus, and displaying the location information on the display.
£90.16] in another embodiment, the invention provides a non-transitory computer program product including a computer usable medium having a computer-readable program code stored thereon. The computer-readable program code includes instructions that, when executed by a mobile communication device having a processor, a memory, a transceiver, and a display, cause the mobile communication device to communicate, by the transceiver, with a wireless apparatus, store location information of the mobile communication device in response to the transceiver one of connecting to and disconnecting from the wireless apparatus, and display the location information cm the display. jOOli] in yet another embodiment, the invention provides a mobile communication device thai is configured to communicate with a wireless apparatus. The mobile
communication device includes a processor, a transceiver coupled to the processor and operable to communicate with the wireless apparatus, a memor coupled to the processor and operable to store location, information, of the mobile communication device in response to the transcei ver one of connecting to and disconnec ting from the wireless apparatus, and a display coupled to the processor and operable to display the location infonnation,
|0012] In still another embodiment, the invention provides a system including a wireless apparatus and a mobile communication device. The wireless apparatus includes a first transceiver. The mobile communication device includes a processor, a second transceiver coupled to the processor and operable to communicate with the first transceiver of the wireless apparatus, a memory coupled to the processor and operable to store location infonnation of the mobi le comm unication de vice in response to the second transceiver one of connecting to and disconnecting from the first transceiver of the wireless apparatus, and a display coupled to the processor and operable to display the location infonnation. f ΘΟϊ 3| Other aspects of the invention will become apparent by consideration of toe detailed description and accompanying drawings.
BRIEF DESCRIPTIO OF THE DRAWINGS
(0014] FIG. I shows a block diagram illustrating an object proximity and tracking system according to embodiments of the invention,
(00 5] FIG. 2 shows another exemplary block diagram illustrating an object proximity and tracking system according to embodiments of the invention. fOOI 6\ FIG. 3 shows a perspective view of a security system including exemplary embodiments of a wireless apparatus in the form of a fob, a wireless apparatus in the form of a tag, and a mobile communication device according to an embodiment of the in vention.
(0017] FIGS. 4A and 4B show perspective views of an exemplary wireless apparatus in the form of a tag according to an embodiment of the invention.
(0018] FIGS. 5A-5C stow perspective views of a exemplary wireless apparatus i the form of a fob according to an embodiment of the in v ention.
(0019] FIG. 6 shows a wireless apparatus state transition diagram according to an embodiment of the invention.
10020] FIG, 7 shows a diagram of the different proximity status zones according to embodiments of the present invention.
100211 FIG, 8 shows a flowchart illustrating a method of a wireless apparatus according to embodiments of the invention.
{0022) FIG. shows a flowchart illustratin g a method of proximity detection performed. by a mobile communicatio device according to embodiments of the invention.
[0023] FIGS. 10-14B sho exemplar screenshots of using an application to manage, configure, and interact with an object proximity and tracking system according to embodiments of the invention. f0024] FIG, 15 shows a block diagram of an exemplary computer system. |0025j FIG. 16 shows a flowchart illirstratrag a method of tracking a location of a mobile comm.unioatio.it device.
[0026] FIG. 17 shows a perspective view of another wireless apparatus,
|Θ02?] F G. ! 8 shows a screenshot of an application that is tracking the location of the mobile communication device.
[002$] FIG. 1 shows a screenshot of a spreadsheet including location information from the application thai is tracking the location of the mobile communication device.
DETAILED DESCRIPTION
[0029] Before any embodiments of the invention are explained in detail it is to be oftderstood that the invention is not limited in its application to the details of construction and the arrangemen of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways.
[0030] Embodiments of the present invention relate to a securi ty and monitoring solution for objects of interest to a user* In embodiments of the present invention, a mobile commiitvicatiou device such as a smartphone monitors the proximity of objects of interest for tracking, paging, and location. The system tracks the location of tags that are attached t objects of interest to a user. The system also allows the mobile communication device itself to be monitored, tracked and paged by one or more of the aforementioned objects of interest.
[0031] Embodiments of the invention relate to an object tag proximity alert system including a mobile communication device (e.g., a mobile phone) running an application and one or more wireless apparatuses (e.g., tags or fobs) comprising transceivers. The tag or fob may be attached to an object and ma communicate with the mobile phone. The mobile phone may alert a user if a tag moves out of a predetermined proximit range from the mobile device, or if a monitored tag that is supposed to be stationary is detected to be moving. The mobile phone continually transmits wireless communications to connected and authenticated tags. A tag periodically monitors the signal strength of messages recei ved from the mobile phone by determining a received signal strength indicator ("RSSi") readin and sends the RSSI readings to the mobile phone. An object proximity tracking application .running on the mobile phone determines tee behavior of the tag and the system as whole Using the SSI reading. If a tag's signal strength readings go belo a certain alert threshold, a user may be alerted. Additionally, functionality relating to setting an adaptive threshold (signal strength threshold can change based on environment), adapti ve transmission rate (rate of transmission changes when battery is l ow or if the connection status changes), and adaptive transmission power (transmission power is lowered when battery low) can be used to improve system performance and battery life.
[0032] Embodiments of the present invention provide a number of technical advantages. The security system provides a simple, efficient, interactive, customizable, and effective solutio to monitoring, tracking, and receiving notifications regarding objects of interest. The system allows a consumer to rest assured that their objects of interest are within a safe distance of them at all times and that the user will be notified if their objects of interest move out of a predetermined distance.
[0033] Prior to discussing particular embodiments of the technology, a further description of some terms can provide a better understanding of embodiments of the technology.
[0034] A "wireles apparatus" can include any electronic device that includes a means for communicating with a mobile communication device or another electronic device. For example, a wireless apparatus may include a fob, a. tag, or a zone tag that communicates with a mobile communication device. The wireless apparatus may be an independent device or ma be a sub-component or portion of another device. Additionally, the wireless apparatus ma comprise an means for communicating with the mobile communication device
including a transmitter, receiver, transceiver, separate antenna, or any other components that are suitable for sending nd receiving wireless communication signals. The wireless
apparatus may be portable or small enough that a user can attach the wireless apparatus to a personal object without interfering wit the operation or utility of the personal, object. The wireless apparatus may also comprise components that allow it to alert a user to its location if it is paged or i some embodiments, if the wireles apparatus enters an alarm condition,
[0035] There may be multiple types of wireless apparatuses. For example, wireless apparatuses may include a tag, a fob, and a zone tag. A "tag" may be attached to an object of interest and may be tracked using the mobile communication device so that a user ma be alerted when the monitored object leaves a pte-seieeted sensitivity setting, cannot be found by the user, or any other suitable time that a user may wish to know where the monitored object is located.
10036] A "fob" may comprise the functionality of the tag but may also include mi tiooaiity such that the user may page the mobile communication device using the tag (e.g., using a "find my phone" button). Additionally, the fob may provide a securit solution for the mobile communication device suc h that the fob may alert the user if the mobile communication device is separated from the user by more than a predetermined distance. As such, the fob may be attached to objects that are in the user's possession most of the lime (e.g., car keys) so that the user may be alerted by the fob if the user is separated from their mobile communication device.
|0037} A "zone tag" may be a type of wireless apparatus that may be used in particular zone or area that the user would like to change the behavior of the system . For example, a zone tag may be used in a user 's home so that when the user is in their home, the
configuration settings of the security application (the "profile settings '') are altered to create a more relaxed or "safe zone" setting. The safe zone setting may rela the monitoring settings of the system (e.g., the alert threshold, the hold-off time, etc.) so that the user is not annoyed by false alarms. The safe zone assumes that object of interest may be left and separated from the user on purpose without the same security concerns of public places. For example, a user may be separated from their important items b a further distance in their home than they would in a public space because their home is a secure environment. Accordingly, the settings for the monitored objects and the monitoring system may be relaxed automatically while recei ving an indication of such a zone f om a zone tag, Zone tags may be used in any other suitable manner as well For example, a freighted security state could be implemented through a "danger zone" setting using a zone tag. For example, if an office is known for being open and having multiple people with access, a "danger zone" zone tag may be implemented, to remind the user to be especially careful and not to leave objects of interest unattended. T he range of the zone tags may be configured using the application as well as the configuration settings that are implemented with each zone tag,
[0038] A "mobile communication device" can include any electronic device with a means for communicating with other electronic devices or wireless apparatus. The mobile
communication device may include a mobile phone, tablet, digital music player, netbook, laptop, or any other electrical device that comprises a means for wireless communication. The mobile communication device may be w irelessly coupled to one or more wireless apparatuses through any suitable wireless communication components and cornm.ufticatio.ft protocols (e.g., Bluetooth.™ Low Energy communications). The mobile communication device and a wireless apparatus may share information through wireless communications that include commands, data to be stored on a memory of either device, or any other information that may control the behavior of the mobile communication device or the wireless apparatus. While th description below focuses on mobile communication devices, aspects of th invention may be irapleraented with any portable device and should not be limited to mobile communication devices alone. Additionally, the mobile communication device ma
communicate with multiple wireless apparatuses at the same or substantially similar time and the follow ing description should not be limited to a si ngl e pairing of a mobile communication device and wireless apparatus. Additionally, settings on the object proximity tracking application ma be implemented such that different settings af eet different wireless apparatuses. For example, the mobile communication device may have a close range alert threshold for one wireless apparatus attached to a monitored, object and a long range alert threshold for a second wireless apparatus attached to second monitored objec t,
|0039| A "wireless signal request" can include any wireless communication signal, data message, data package, or data stream, sent by an electronic device requesting a response from another electronic device. For example, the mobile communication device may send a wireless signal request to the wireless apparatus requesting a. response message. The wireless signal request may comprise commands, state or operational information, responses to a previous communication received from the wireless apparatus, or any other dat that would be useful to share between electronic devices. The information, may be shared through any suitable communication scheme including cellular network, communication, short-range communications (e.g., Bluetooth™ or other short-range communication), internet or WI-FI eam.rn.uni cations, or any other suitable communication scheme as would be recognized by one of ordinary skill in the art.
{0046} A *Svireless signal response" can include any wireless communication signal, data message, data package, or data stream sent by an electronic device in response to wireless signal request received from another electronic device. For example, the wireless apparatus may send a wireless signal response back to the mobile communication device in response to a wireless signal request. Similar to the wireless signal request, the wireless signal response may comprise commands, state or operational information, responses to a previous
communication received from the second wire Jess apparatus, or any other data that 'would be useful to share between electronic devices. The information may be shared through any suitable communication scheme including cellular network communication, short-range communications (e.g., Bluetooth™ or other near- field communication), internet or Wi-Fi communications, or any other suitable communication scheme as would be recognized by one of ordinary skill in the art.
(004 Ϊ] A "signal strength readi ng" may include any measurement of wireless communication message received from a mobile communication device. For example, a signal strength reading .may comprise a recei ved signal strength indicator (RSSI) reading. RSSI measures the power present in a received radio signal. Any other suitable measurement, of the received signal may also be implemented (e.g., signal strength readings based on transmission time, etc.).
£0042] An "expected signal strength reading*' may include a signal strength reading value that is predicted based on previously received signal strength readings. For example, an application running on a mobile communication device may predict the next signal strength reading or a predetermined number of upcoming signal strength readings based on one or more previously recei ved signal strength readings. For instance, because signal strength readings may be transmitted at regular intervals, changes in signal strength readings may be gradual and relatively predictable, when based on legitimate activities and not temporary or non-recurring environmental effects. Accordingly, the mobile communication device may estimate the next signal strength reading from a wireless apparatus. For instance, i f a mobile communication device receives signal strength readings of 45 dB, 43 dB, 41 dB, and 39 dB, the mobile communication device may expect to receive a signal .strength reading of 37 dB as the mobile communication device and the wireless apparatus are separating at a constant rate of 2 dB/reading. The mobile communication device may estimate a speed of
separation/approach from this data as well using the transmission power of the transmitter. Accordingly, an expected signal, strength reading may be estimated or a number of expected signal strength readings may be determined. Additionally, based on the expected signal strength readings, a mobile communication device may determine whether the wireless apparatus and mobile communication device are moving away from each other, toward each other, staying the same distance, or whether an environmental, issue is affectin the signal strength readings, by comparing an expected signal strength reading to a received signal strength reading. j0043] The expected signal strength reading may be used to determine whether the system is being affected by environmental interference that does not accuratel portray the separation distance between the wireless apparatus and the mobile communication device. For example, if a difference between received signal strength readin and an expected signal strength reading are substantially different, such that the likelihood that the difference is result of legitimate movement of the element is very small, the system may know that an environmental change has affected the signal strength readings of the wireless apparatus. As such, the system may wait a predetermined time (e.g., "hold-off ' time or "hold-off period) to determine whether the environmental change is temporary or may adapt an alert threshold based on the new environmental settings to accurately portray the separation distance.
(0044] For example, if a user holding a mobile communication device (e.g., a phone running an object proximity tracking application) is moving away from a wireless apparatus attached to a camera at a steady rate of 2 dB/readin then the next expected signal strength reading would be 2 dB lower than the current value. However, if the next reading is 20 dB lower than the current value, a much larger magnitude change in signal strength readings has occurred than expected. The cause of such a drastic change may be that the items are moving away from each at a drastically increased rate or that an environmental aspect has changed such that the wireless communications are reaching the wireless apparatus with less power than previously due to interference from the environment. Such change may occur because either the mobile communication device or the wireless apparatus has entered an area where wireless communication messages do not propagate as well (e.g., being in proximity of materials, bodies, or objects that detune the antenna or radio transceiver, etc.), something has interfered with the wireless communication message (an open door is closed), the
transmission power has changed drastically (e.g., the system has entered a low power state), or one of the components in the system is malfunctioning (i.e., the reading is incorrect).
|004$j The mobile communication device may adapt, to the environmental changes by raising or lowering the alert threshold if the mobile communication device determines that en vironmental factors are causing the disturbance in signal strength. For example, if the difference between the expected signal strength reading and the received signal strength reading is larger than an allowed change value, the mobile communication device ma calculate a threshold change value and may modify the alert threshold by the threshold change value to ensure no false alarms are if iasered due to temporary or artificial
environmental disturbance. Accordingly the application on the mobile communication device may implement an adaptive alert threshold that may be raised or lowered, depending on the received signal strength readings and an. expected signal strength reading calculation.
[0Θ46] An "alert threshold" may incl ude a signal strength value corresponding to a predetermitied safe proximity sensitivity setting for the system. For example, the alert:
threshold may be an RSSI value that is estimated to be a ceriain sensitivity level based on the transmission power of the system.. For instance, if the saf proximity sensitivity setting for a tag is determined to be an intermediate sensitivity setting, file alert threshold maybe set to an intermediate RSSI reading (e.g.. -60 dB). The intermediate sensitivity setting may roughly correspond to a separation distance (e.g., 30 feet) in normal conditions based on the transmission power of the transmitter. However, the RSSI reading may not stay constant at - 60 dB for a separation distance of 30 feet because the RSSI readings may be affected by transmission power and environmental interference. For example, a door may close between a tag and the associated mobile communication device that may affect the RSSI reading of the wireless apparatus without the distance between the wireless apparatus and the mobile communication device actually changing. For example, the RSSI reading may change to ~?0 dB at 30 feet away due to the interference of the door. As such, in order for the application to determine whether the tag and the mobile communication device are separated by 30 feet or a distance roughly comparable to the predetermined sensitivity setting, the alert threshold may be adaptable to incorporate environmental changes without alarming. Accordingly, the alert threshold may be adjusted according to the environment interference thai the mobile communication de vice and wireless apparatus experience.
|0047} Accordingly, the object proximity tracking application may implement adaptive thresholds. On detecting a sudden drop in RSSI that is faster than a predetermined allowed change value, the alert threshold ma be reduced, by a calculated threshold change value. For instance, using the example of the door closing above, the change of - .10 dB in one reading may be larger than a predetermined allowed change value that may be set to, for example, 5 dB per reading. If a tag were 25 feet away from the mobile communication device and the tag had bee sending RSSI readings of -55 dB and suddenly the tag provided an RSSI reading of -65 dB, the difference between the expected RSSI reading of -55 dB and the received RSSI reading of -65 dB at the mobile communication, device would be larger than the allowed RSSI change value of 5 dB/reading. Accordingly, the application may determine that a environmental factor has affected the RSSI readings. Furthermore, the application may calculate an alert threshold change value, for example -8 dB, and may change the alert threshold by the alert threshold change value. The alert threshold change value may be calculated through any suitable method including the use of averaging, regression analysis, analysts of previous environmental behavior, etc. Accordingly, the alert threshold may be lowered by -8 dB from -60 dB to -68 dB. Accordingly, the environmental changes that would ha ve provided a false alarm since the tag was not more than 30 feet fro the mobile communication device are no longer causing the signal strength readings to be below the alert threshold value, and therefore the user is not alerted. However, the threshold ma not be reduced to a level lower tha is necessar to achieve radio connection. Additionally, the alert threshold may be raised if the signal strength, readings are sudden ly stronger than expected. However, the adaptive alert threshold may not be raised so high that a false alarm may be triggered by any separation or lowering of the signal strength readings. Additionally, there ma be an number of sensitivity levels implemented by the application to allow a consumer to customize the estimated separation distance allowed between a wireless apparatus and mobile communication device prior to an alarm sounding. §048] Additionally, when the application determines that the signal strength reading is below an alert threshold, the application may wait for a predetermined, period of time (e.g., a "hold-off period or "hold-off time) that allows any temporary disturbance to be abated, before alerting a user. Accordingly, before alerting a user that the alert threshold has been reached, the mobile communication device may determine if a predetermined number of previous signal strength readings for the wireless apparatu are below the alert threshold. The predetermined number of previous signal strength readi ngs may be determined by the period between readings or through any other suitable means. For example, if a reading is taken every second, and the hold-off period is set as five seconds, the mobile communication device may wait to alert the user until the previous five signal strength readings are all belo die alert threshold value. If the predetermined number of previous signal strengths readings are not below the alert ihresho!d. value, the mobile communication device may store the current signal strength reading in a memory and may wait lor the next received signal strength reading before taking further action regarding the alert. j(M)49j Additionally, in some embodiments, the application may implement a "buffer threshold" and delay alerting the user until the received signal strength reading breaches the buffer threshold. Due to environmental interference, RSSS readings may be inherently unpredictable and susceptible to variation that may be unrelated to movement of the wireless apparatus and/or the mobile communication device. As such, the application may implement a buffer threshold of a predetermined sensitivity level (e.g., 5 dB) where the alarm may only trigger if a rece ived signal strength reading 'breaches the buffer threshold over the alert threshold. Accordingly, when the devices are close to being at the separation distance or limit of the sensitivity settings, the alarm may not constantly alarm, due to environmental interference alone. For instance, using the example above, the alert threshold may be set to - 60 dB but when the received signal strength readings are close to the -60 dB alert threshold level, the alarm, may not be triggered until the received signal strength readings reach -65 dB, Accordingly, the mobile communication device may enter a warning condition when the received signal strength readings reach -61 dB and may not enter the alarm condition until reaching -65 dB. As such, if the mobile communication device and the wireless apparatus are close to the separation distance corresponding to -60 dB sensitivity setting (e.g. 30 feet), the signal strength readings may be -5 dB, -60 dB, -61 dB, -5 dB, -60 dB, -59 dB, etc. even though the mobile communication device and wireless apparatus are not moving. As such, if an alarm is triggered every time the alert threshold of -60 dB is crossed, a number of false alarms may be triggered. Accordingly, a buffer threshold of 5 dB may be implemented thai ensures the application only enters an alarm condition when the mobile communicatio device and the wireless apparatus are clearly beyond the sensiti ity settings corresponding to the alert threshold.
{OOSnj n embodiments of the present invention, a "power status" may include any indicator of the power level of an electronic device . For example, a power status may be a percentage of a power left n. a power source, the amount o -time left at average or current powe use settings, an electrical gauging of the power level left in a power source, or any other suitable manner of indicating the amount of power left at a wireless apparatus. The wireless apparatus may determine the power status before sending signal strength readings to the mobile communication device and may include the power statu in the wireless communication. Accordingly, the mobile communication device may track the power level of the la and may update configura tion settings for the wireless apparatus depending on the power status of the wireless apparatus. For example, if the power level is low, the mobile communication device may receive a power status indicator that informs the mobile communication device that the powe status of the wireless apparatus is low. The .mobile communication device may then update configuration settings for the wireless apparatus including a rate of transmission of signal strength readings, altering a transmission power of the wireless apparatus, entering the wireless apparatus into a low power state that may disable some functionality to ensure the primary functionality continues to operate, etc. The mobile communication de vice may send the updated configuration settings to the wireless apparatus in a wireless communication and the wireless apparatus may implement the configuration settings included in the wireless apparatus in order to conserve power.
{0051} In embodiments of the present invention, a "movemeat otification setting" may include a setting for an electronic device that when activated, the wireless apparatus may make periodic readings of a movement sensor and notify the mobile communication device anytime the sensor identifies movement that meets a certain threshold. For example, a user may configure a tag through the application such that the user indicates that the user would like to be notified if the wireless apparatus moves. Accordingly, if a movement sensor (e.g., an acceieronieter) in a wireless apparatus determines that the wireless apparatus is being moved, the wireless apparatus may inciude a movement indicator in the next wireless signal response sent to tire mobile communication device. Additionally, the wireies apparatus may generate a notification message that is separate from the wireiess signal response and is sent as soon as the movement occurs. Accordingly, embodiments of the present invention may determine a movement indicator from a wireless communicatio and may alert a user if the movement indicator indicates the wireless apparatus is moving.
[0052] in embodiments of the present invention, a "'movement indicator" may include any suitable data that informs an electronic device that a wireless apparatus has sensed movement. For example, the movement indica tor could be implemented as a flag, a sensor reading from a movement sensor (e.g., an acceieronieter), a message comprising particular information including location data, or any other suitable message that informs a mobile communication device that the wireless apparatus has sensed that it is being moved. The movement indicator may be sensor readings that require additional processing before a determination can be made of how the device is being moved or the processing may occur at the wireless apparatus and the mobile communication device may receive pre-processed data indicating the type of movement or that movement has occurred. {0053] in embodiments of the present invention, "profile settings" may include any coftfio.urat.ion. settmss for an. electronic de vice that are tied to a user of the electronic device. For example, a user may be able to customize the configuration, settings of a mobile communication device based on their profile settings. For example, a user may set default profile settings that are tied to configuration settings they originally provide an application during registration or initialization of the application. Accordingly, when the user adds wireless apparatuses to the mobile communication device for pairing, authentication, and connection, the profile settings may control the default configuration settings for the wireless apparatus. The configuration settings may include, for example, the sensiti vit setting of the wireless apparatus corresponding to the alert threshold (where the sensitivity setting may roughly correspond to a separation distance in average environmental, conditions), whether the wireless apparatuses should report movement indicators, the rate of transmission for the signal strength readings , transmission power of the wireless apparatus, etc. The profile settings may be temporarily altered or updated when the mobile communication device receives a wireless communication from a zone tag including zone settings.
{0054] in embodiments of the present invention, "zone settings" may include any configuration settings for an electronic de vice that are tied to a particular geographic location or electronic device. For example, a. wireless apparatus may transmit a wireless
communication including configuration settings for a mobile communication device. The zone settings may include configuration settings to be appl ied by the mobile communication device while receiving the wireless communication or may include a flag, signal, or other indicator that a predetermined settin stored in the mobile c mmunication device should be activated while receiving the wireless contmunieation including the zone settings. For example, a zone tag may transmit a ''safe zone" message that informs mobile
communicatio d vice that the alert threshold should be lowered while receiving the safe zone message from the zone tag. Alternatively, the zone tag may transmit a "danger zone" message that may raise the security of the configuration settings while receiving the message. For example, in an open access area like an office, a zone tag may be located at the desk and transmit a "danger zone" message to the mobile communication device so that the user may be alerted any time any .monitored objects are left behind or leave the heightened proximity settings of the user. Additionally , the configuration settings may maximize the throughput of the rate of transmission of the wireless apparatuses while the mobile communication device is in the danger zone. The mobile communication device may send the updated configuration settings to each wireless apparatus they are paired with or may customize which wireless apparatuses are affected by zone tagging. Accordingly, the mobile cotmnnntcation device may automatically change the profile settings for the mobile communication device when in areas that are known to be safe or dangerous without requiring the user to change any settings.
10055 j in embodiments of the present invention, "synchronizing" can include the initialization, pairing, and initial communication between two or more electronic devices. Synchronizing may incl ude any one of the initialization, pairing, and initial, communication between the electrical devices or ma include all of the steps. Either way, once devices are synchronized, the devices may communicate requests, commands, and responses between each other,
{0056} A "data input" can include any input by a user on an electrical device. For example, the data input may be the touching of a particular area of a displ ay screen tha t is configured to send a particular command to the processor of an electrical device (e.g., touch screen input) or may include the compression or engagement of a physical button or input on an electrical de vice (e.g., power button, volume u or down button, etc. ). in embodiments of the present invention, data inputs may include commands to enter operational modes, engage or disengage features, control the volume, change screen display settings, navigate through an application or operating system, or may be used to provide consumer information including a password, as well as implementing any other features that may be useful in the present invention.
{0057} "'Alerting a user" can include any actions taken by an electronic device to get a user's attention. For example, these actions may include generating audible alarms, physical vibrations, flashing lights, sending emails or short messages (SMS) or status updates (through social media websites like Twitter™) initiated from either wireless apparatus or the mobile communication device. The actions may be initiated by commands, messages, or signals generated by any of the devices. For example, an application on a mobile communication device may determine that a wireless apparatus has been separated further than an allowed signal strength sensitivity setting (corresponding to an estimated distance) ¾nd remains outside the sensitivity setting after a pre-determined hold-off period or hold-off time.
Accordingly, the mobile communication device may alert the user and may send an alarm command to the wireless apparatus. The wireless apparatus may enter an alarm condition that may ioclude activatmg flashing tights, making a noise, vibrating, or ny other action to get the user's attention. Additionally, the mobile communication device may enter the alarm condition and alert the user through the same methods. Additionally, in some embodiments where the wireless apparatus is meant to not be detected by others, the wireless apparatus may not enter the alarm condition and instead only the mobile communication device may alert the user. If the mobile communication device is in the user's pocket, hand, or within eye sight, the user may sense the movement, hear the noise, or see the flashing and may be alerted that the mobile communication device has entered an alarm condition based on a wireless apparatus being outside of a predetermined sensiti vity level or setting. Additionally, the system may develop different alerting modes for different types of alarms (e.g., a proximity alarm .may cause a chirping noise while an alarm related to completely losing contact with the wireless apparatus may cause a beeping noise, or different colored lights could be lit for each type of alarm, etc.).
I. EXEMPLARY SYSTEMS
(0058} FIG. I shows a block diagram in accordance to embodiments of the invention. Embodiments of the invention relate to proximity and object tracking system 1.00 comprising two parts: a mobile communication device 1 10 and a wifeless apparatus in the form of a tag 140 attached to an object of interest (not shown). The monitored object may be any object that a user may desire to track , monitor, or he alerted to if the object is moved when in a stationary mode. Additionally, the user may desire to be alerted if the monitored object is separated from the mobile communicatio device such that signal strength readings from a wireless apparatus attached to the monitored object tall below a predetermined signal sensitivity level. For example, the monitored object may be a camera, a briefcase, a bag, car, car keys, computer, tablet computer, etc, with a tag attached to the monitored object and the mobile communication device may be a mobile phone or other portable cominunication device.
|O0S9] "Fire mobile communication device 1 10 may comprise a processor device ϊ 1 1 (e.g., a microcontroller or .microprocessor), a transceiver device 12, and an antenna 1 ! 3 coupled to the transceiver device 1 12, The transceiver device 1 12 may be a chip, card, or any other device comprising both receiver circuitry and transmitter circuitry capable of sending and receivin communication, messages using the antenna 1 13, and may implement any suitable coniraumcation protocol (e>g., Bluetooth.™ Low Energy),. The transceiver device 12 may be coupled to the processor i l l . The processor 1 i I may also be coupled to a computer readable medium 120 comprising code for an. object proximity tracking application 121 according to embodiments of the present invention. The computer readable medium 120 may further comprise storage for predicted status da ta 127 and history data 128.
Additionally, the mobile communication device 1 10 may comprise an acceiexometer 1 17, a power supply 1 19A (e.g., battery), input elements ί 18 (e.g., buttons, switches, microphone, touchscreen, or any other input component), and output components (e.g., a speaker 1 16, a light emitting diode (LED), vibration, element 1 19, etc.). ft 060 The object proximity tracking application 121 may comprise a signal strength module 122, a status .determination module .123, a prediction module 124, a movement module 1 5, and a configuration module 126,
(0061] A signal strength module 122 may receive a wireless communication, determine the signal strength reading from the wireless communication, and may filter the signal strength reading to determine a usable signal strength reading (e.g. may filter a RSSI reading or other power indicator for a signal strength).
|ft0f»2j A status determi ation module 123 may determine whether the received signal strength indicator is above or below an alert threshold and whether the appJicaiion 12 should alert a user in. response to the received signal strengt reading.
(0063) A prediction module 124 may generate an expected signal strength reading or expected signal strength threshold values based on previously received signal strength readings for a .particular wireless apparatus. The expected signal strength may be determined through any sui table method as one of ordinary skill ma recognize. Additionally, once th expected signal strength is determined, the prediction module 124 may store the expected signal strengt in predicted status database 1.27 or other storage location on the computer readable medium. The prediction module 124 may also determine if the wireless apparatus is moving toward the mobile communication device 1 10, away from the mobile communication dev ice 110, or is stationary compared to the mobile communication device 1 10 and may store this determination i the predicted status storage 127 o the computer readable medium as well. 1 064] A movement module 125 may determine if a movement indication notification setting is active for a received wireless apparatus and determine whether a received wireless communication includes a movement indicator. Additionally, the movement .module 25 may alert a user if such a movement indicator is present and. the corresponding wireless apparatus is set in a stationary mode such that the user does not expect the wireless apparatus to be moving. 0065J A configuration module 126 may detennme settings and information about the status of the system and may update configuration settings for the wireless apparatus and profile settings of the mobi le communication device 1 10 according to the system status. For example, the configuration module may determine the po wer status of a wireless apparatus and update configuration settings according to the power status. The configuration settings may include a transmission rate of signal strength readings for a wireless apparatus, a transmission power for the wireless apparatus, types of acti ve notifications (e.g. a movement notification) for a wireless apparatus, etc.
18066} The tag 1 0 may comprise a processor device 141 (e.g., a microcontroller or microprocessor), a transceiver device 142, and an antenna .1 3 coupled to the transceiver device 142. The transceiver device 142 may be a chip, card, or any Other device comprising both receive circuitry and transmitter circuitry capable of sending and receiving
communication messages using the antenna 1.43. and may implement any suitable
communication protocol. A crystal oscillator 148 ma provide a clock for the transceiver device 142. The transceiver device 142 may be coupled to the processor 41. The processor 141 .may comprise or may be coupled to a computer readable medium (not shown) comprising code for performing methods according to embodiments of the present invention. Additionally, the wireless apparatus 140 may comprise an accelerometer 147, a power supply 149 (e.g., battery), an input button 147, and output components .144, 145 (e.g., a speaker, a light emitting diode (LED), vibrating element, etc. ). An exemplary embodiment of the tag 140 is shown in FIG. 4,
|0067| A processor (e.g., microcontroller or microprocessor) manages the operation of the tag 1 0 including pairing, connecting, and performing mutual authentication with a mobile communication device 1 10, responding to commands received from the mobile device, measuring and reporting the strength of a received radio signal from the mobile comratinication de v ice .1.10, measuring and reporting a power status (e.g.. voltage of a battery), reporting a .movement indicator (i.e.. the acceleration tee tag 140 experiences during movement), and generating audio, visual, and mechanical indications and alerts. The tag 140 may authenticate itself to an object proximity and tracking application running on a mobile communication device 1 10 and may authenticate the proximity object tracking application as well. The tag 140 may report product and capability raformatioa to the application once authenticated. Additionally, the tag 140 may report radio telemetry and the button-press status to the application. The tag 140 may additionally actuate the LED and the buzzer by playing user-configurable audio.
|0068 input button 147 may be a user interface that may allow the user to control the itmctionahiy of the wireless apparatus 140. For example, the input button 1 7 may acti vate certain functionality (e.g., pairing,, mute, power, etc) for the wireless apparatus 140,
10069 j Output components 144, 145 may be any mechanisms for alerting a user (e.g., a buzzer, vibrator, LED light, etc.). For example, in FIG, 1 the output component 144 is a speaker and output component 145 is a LED. Any suitable output can be implemented and the output components may not be limited to those shown in FIG. .1.
[0070! Additionally, the wireless apparatus may require non-volatile storage for parameters, at least serial number and pairing information, and possibly also configurable settings such as beeper volume. For example, the transceiver 142 in the tag 140 ma comprise flash memory (not shown) including up to two pages intended for storage of data. The processor 141 ca erase and write to this memory. Although erasing and writing flash takes time, there is no problem with the tag 140 (or fob 1 0) being unresponsive to inputs for a short period. Therefore, in the tag 140, the on-chip flash memory can likely be used for configuration settings. The transceiver 1.42 may further comprise an analog digital converter (ADC) that may be suitable for measuring the battery voltage.
|0 7J| FIG. 2 shows an exemplary block diagram of a securit system according to embodiments of the invention where the wireless apparatus is a fob 130, A fob 130 may comprise all of the functionality of the wireless apparatus in the form of a tag 140 but may also comprise additional components and functionality for tracking, paging, and notifying a user if the mobile communication device i 10 moves out of a predetermined proximity from the fob 130. More details regarding the fob 130 functionality ma be found in Application No. i.3/571,186, titled "Froxiiuit Tag," filed August 9, 2012. by Cavacuiti e( at., which is incorporated herein in its entirely, for ail purposes.
J0072] The wireless apparatus in the form of a fob 130 may comprise an input button 137 that activates a "find my phone" function on the wireless apparatus. Additionally, the fob 130 may comprise firmware or other computer readable medium that comprises code for performing a method that provides additional functionaliiy over the tag 140 including security monitoring of the mobile communication device 1 10. The additional functionality may be described in further detail below. The wireless apparatus otherwise operates as described in reference to FIG. i,
[0073] FIG. 3 shows a perspective view of an exemplar embodiment of the object proximity and tracking system comprising a mobile communication device 1.10, a wireless apparatus in the form of a fob 130, and a wireless apparatus i the form of a tag 140. Art exemplary screen shot of an obj ect proximity tracking application 120 that may be used to initiate, configure,, and operate the security system is being shown on the mobile
communication device 1 10. The functionality, components, and operation of the tag 1.40, the fob 130, and the application 120 running on the mobile communication device 1 10 will now be described in further detail below.
Object Proximity Monitoring Application
10074] The system has a software component (i.e., an. object proximity tracking application) installed on. the mobile communication device 1 10. The application, is installed on the mobile communication device 110 and has a graphical user interface that, in conjunction with the device's physical user interfaces, provides controls over the system's behavior and displays information of the tags 140 and fobs B0. The application allows the user to interact and configure the tags .140 and fobs 130 and to configure mobile
communication device 11 behavior in the context of the f ags 1.40 and fobs 130. he application processes data received from the fobs 130 and tags 140 such a filtering the raw signal strength readings and determining if tag 140 or fob 130 is outside of the preselected tracking zone. On detecting a tag 140 or fob 130 a being out of a preselected proximity range corresponding to an a!ert threshold, the application generates audio or visual ind.icat.ions or alerts (i.e., a separation alert). In some embodiments, alerts may also be issued if motion is detected by the tag 1 or fob 130 (i.e.,., a movement alert), The application may also record signal strength readings; received coramaads, time, date, and location of wireless apparatuses. The application may -also notify the user when a tag 140 or fob 1.30 is out of transmission range and communications are no longer received by the mobile communication device 1 S O. The application may provide the user with the ability t "page" a tag 140 or fob 130 by "beeping" the tag 140 or fob 130 to allow the user to find it, indicating to the user when and where the tag 1 0 or fob 130 was last in range, and generating a visual and/or audio alert to aid the user in locating the device (as well as functionality for ending such an alert or alarm). Additionally, the application may notify the user when the mobi le
communication device 1 10 is out of range by sending an alarm, command to a fob 130 when out of proximity distance. Finally; the application may manage the pairing, connection, and disconnection between the mobile communication device 1 10 and the tags 140 or fobs 130.
|0075| Accordingly, the application serves as a configuration and status view tool for all authenticated and connected tags 1 0 and fobs 130, as well as to provide notifications in response to configured tag 140 or fob 130 related events. A tag 140 or fob 130 may be added to the system via the application user interface. Once added, the user may configure the application to interact with the tag 140 or fob 130 in different ways. The user may configure the application to noti fy the user when the tag 140 or fob 130 has moved out of a preselected proximity range, transmission range, when the tag 140 or fob 130 has came back into range, or when the tag 140 or fob 130 has moved (through the use of an accelerometer on the tag 140 or fob 130). Additionally, the user may remove the tag 140 from the application, in which case the tag 140 may automatically return to an unpaired mode, ready to be paired again to the same, or another mobile communication device 1 1 ,
[0076] For the fob 130, the user may configure a custom oui-of-range alarm to be played when the fob 130 is out of range of the mobile comm unication de vice 1 1.0, The user may also configure whethe the fob 1.30 will vibrate and whether the alarm functionality is enabled or disabled.
[0077] Because the application is running on a mobile communication device .1 10 that a user may want to use for purposes other than the monitoring application, the application may be configured to run in the background while the mobile communication device i 10 performs other services for a user. When the application s in the background, all of the proximity and alerting functions continue to work. However, instead of displaying the notifications within the application using custo visual indicators, standard system notifications .may be used to seamlessly notify the user without interrupting other fonciionahty of the mobile communication device 1 0. Exemplary screenshots of the application are shown in FIGS. 10- 14 and further description regarding the user interaction wit the application is provided below.
The Tag
(0078] According to some embodiments of the present invention, the wireless apparatus may be provided in the form of a tag 1 0. In some embodiments of the in vention, the tag .140 may be as thin and as small as possible. Small dimensions allow the tag 1 0 to be easily attached to an object of any size without: interfering with, the use of the object. Additionally, smaller tags 140 may be inconspicuous and a malicious third party may not notice the tracking and proximity device attached to the monitored object. Alternatively, a user may wish to advertise the use of the tracking de vice to dissuade potential malicious third parties from trying to take the monitored object and as such, in some embodiments, the tag 140 may be provided i a larger form factor as well.
(0079} FIGS. 4A and 4B show perspective views of an exemplary tag 140 according to an embodiment of the invention. The tag .140 may comprise front portio and back portion of an outer case 4 1 , an attachment device 444 (e.g., keyehain hole), an input button 14? (e.g., pairing button), a battery compartment cover 446, and a status LED indicator 145. The keyehain hole 444 may be physically coupled to the outer case 441. The keyehain hole 444 allows a keyehain or other attachment device to engage with the keyehain hole 444 and attach the keyehain to the first wireless apparatus. Any other configuration could also be implemented, for example, instead of a keyehain hole, the attachment device 444 could be clip, bonding material, or any other type of attachment de vice configured to securably attach the tag .1 0 to an object of interest (not shown)
(0080) An input button 147 may control th pairing, power up and down of the transceiver, and may allow the user to interact, with the tag 140 while alarming, in order to communicate with a mobile communication device 1 10, the tag 140 ma pair with a mobiie communication device i 10. The input button .147 may comprise multiple functions including powering the transceiver on and off muting the speaker when the tag 140 is alarming, providing pairing initialization functionality, and resetting the tag 140 to factor settings. The different functionality may be activated by pressing the input button 147 for different periods of time, causing a different type of input for each period of time. For example, the input button 147 may have a momentary input mode (Bl ), an intermediate input mode (B2), an extended input mode (83), and a long extended input mode (84) thai may provide different input directions to the tag 140 depending on the period of time that the input button 147 is pressed. For instance, to initiate a pairing mode for the tag 140. the input button 147 may be pressed for an intermediate period of time (e.g., 3-6 seconds), while to power the transceiver of the tag 140 on and off (i.e., wake up or put the tag 140 to sleep), the input button 147 may be pressed for an extended period of time (e.g., 6-9 seconds). Additionally, if the input button 147 is pressed for a very long period of time (e.g., 20-23 seconds), the tag 140 may return to default factory settings. The different possible states for the tag 1 0 and fob 130 may be described in further detail below.
[0081] The status LED indicators may provide the user with information abou the state of the tag 140, the connection and pairing status of the tag 140 with a mobile commu icati on device 1 10, and the battery power statu of the tag 140. For example, once the power status of the tag 140 drops below a predetermined power status threshold, the status LED indicators may fiash red periodically (e.g., every 30 seconds) to remind the user to replace (or recharge) the battery. Additionally, when the input button 1 7 is pressed, the status LED indicator may inform the user as to the type of input entered. For example, if the input button 147 is only momentarily touched (e.g., for a period of less than 3 seconds), a first or momentary input may be activated and there may be no LED activity. Upon an intermediate input (e.g., input button 147 pressed for 3-6 seconds), the status LED indicator may flash green momentarily. Additionally, upon an extended input (e.g., input button 147 pressed 6-9 seconds), the status LED indicator ma flash red momentarily. Finall , upon a long extended input (e.g.,, input button pressed 20-23 seconds), the tag may return to factory default settings and the status LED indicators may flash red and green intermittently, in thi manner the user may know the type of input they have entered using the single input button 147. Additionally, under certain user actions, the tag 140 speaker may be activated to acknowledge the user action including upon activation of the pairing mode, upon successfully pairing the tag 140 to the mobile communication device 1 10., upon unsuccessful pairing of the tag 140, arid finally , upon putting the tag 140 to sleep (e.g., powering down the transceiver),
[0082] The processor of the tag 140 may comprise firm ware or may be coup led to a computer readable medium that comprises firmware or other code that is capable of perforating a m ethod of pairing, authenticating, and communicating with a mobile
comm.unioatio.ft de vice 110 according to embodiments of the invention described herein. Accordingly, the firmware or other software components may be capable of authenticating the tag 1 0 and application, configuring and completing an alarm or other response to a "find my tag" command, determining and reporting signal strength indicator (RSSI) readings, determining and reporting power status of the tag 140, and i some embodiments, configuring and performing a security service including alerting a user if the mobile communication device 1 10 is out of a predetermined range.
{0083] Pairing and authentication of the tag 140 and the mobile communication device 110 may include a mutual authentication sequence that ensure the tags 140 and mobile communication de vices 1 10 only communicate with tags 140 and mobile devices that are authorized to do so. The authentication procedure may include connection to a mobi le communication device ! 10, receiving a pairing communication from the mobile
communication device 1 10 including an authentication code, calculating an authentication code independently of the .mobile communicatioa device 1 0. verifying the authentication code recei ved and calculated to ensure they match, and if they match, entering a connected state,
{9084] The connected state may indicate that the mobile communication device 1.1 is authenticated by the tag 140, but because the system implements mutual, authentication, the mobile communication device 1 10 may now authenticate the tag 140 to ensure bot devices are authorized to communicate. Accordingly, after authenticating the mobile communication, device .1 10, the tag 1 0 may calculate a tag authentication, code and send the tag
authentication code to the mobile communication device 1 1 . The application on the mobile communication device 1 10 may then independently calculate the tag authentication code and verify the received tag authentication against its own calculation. If they match, the tag .1 0 enters an authenticated state and the lag 140 and mobile communication device 1.10 may communicate normally. If the verification is unsuccessful at any point, the mobile communication device 1 10 and. the wireless apparatus may not be authenticated but the wireless apparatus may stay in the connected state and generate a new authentication value to be authenticated by the application.
(0085] The tag 140 may further be configured to include "find ray tag" or paging functionality where, when in range and authenticated with a mobi le communication device i 10 running the application, the application can. issue a "find my ta " command, send the command in a wireless communication -from the mobile communication device 110, that may cause the tag 140 to start playing a page melody. The page command may be implemented in any suitable fashion. For example, the page command, may be a flag or other command, included in a wireless communication that informs the wireless apparatus that the mobile communication device 1 10 is commanding the wireless apparatus to enter a paging mode. The pagin mode includes the wireless apparatus to play the page melody tor a
predetermined period of time or until the user initiates the input button 147 to mute the page melody;. Accordingly, the "find my tag" functionality .may allow a user to quickl and easil find the tag 140 (and the attached object) by listening and following the page melody.
Additionally, the user may be able to stop the find my tag functionality b engaging the "find my tag" data input through the application again, which may send a sto page command to the wireless apparatus that may end tire page melod without requiring an input button 1.47 to be pressed on the tag 140.
{0086} The tag 140 may additionally generate and send signal strength readings to the mobile communication device 1 10 at. a tegular rate (i.e., a rate of transmission) that is determined in the configuration settings of the tag 1.40. Accordingly, the application, running on the mobile communication device 110 may receive readings from the tag 140 at a periodic rate. In some embodiments, the calculated RSSI values ar interpreted as the negated ESS! value. For example, a reading of 43 represents an RSSI of -43 dB. The RSSI may be calculated through any suitable method as one of ordinary skill in the art would recognize.
|00S?j The tag 140 may send a periodic signal strength reading in a periodic wireless communication to the mobile communication device I 10 or the mobile communication device 1 10 may request a reading from the wireless apparatus at a particular time.
Additionally, events may cause the wireless apparatus to send a notification communication to the mobile communication device 1 .10 even though the time for the generation of the periodic communication has not yet arrived. Accordingly, the wireless apparatus may save power by only periodically sending notifications of current. location, signal strength readings, and other system sta tus information, but may also be capable of notifying the mobile communication device 1 10 when an event triggers a notification.
(0088] A notification may be triggered when the signal strength reading is above a signal strength notification threshold. For example, the tag .140 may be programmed to only provide notifications of a signal strength reading when the tag 140 is not a safe distance to th mobile communication device 1.10. Accordingly, the tag 140 may save power (e.g., battery life) because the tag 140 only sends notifications when the tag 140 is outside of a safe zone. Accordingly, the signal strength notification threshold may reduce the need to send frequent notifications in the event that the tag 140 is i "safe zone" and. the host does not need, to know its signal strength readings,
10089] Additionally, in some embodiments, a signal, strength notification trigger may be implemented such that notifications are only seat once a large enough change in signal strength readings has occurred. For example, if the signal strength notification trigger equals 3 dB, the tag 140 may notify the mobile communication, device 1 1.0 when the signal strength reading changes by a multiple of 3 dB, such as 0 dB, -3 dB, -6 dB, -9 dB, etc. ie.g>, notifications are only sent when, the signal strength readings change .more than, the signal strength notification trigger), i this manner, notifications may be limited to only those changes that are large enough to warrant a notification (i.e., small changes may not create notifications).
{0090] Additionally, the tag 140 may allo the application running on the mobi le communication de vice 1 1.0 to monitor power status. This allows the application to keep the user informed of the battery status o ver a long period of time. Additionally, in order to limit transmissions, the wireless apparatus may only notify the mobile communication device 1 10 of the power status when the power status changes by a power status notification change value. For example, if the power status notification v alue is 45, the power status may notify the mobile communication device 1.10 when, the remaining power level of the battery at the wireless apparatus changes by a multiple of 45 (i.e., when the power status is 55 and 10). Accordingly, the wireless apparatus ma notify the user when the power status of above 55% indicates fall, a power status of between 55 and .10 to indicate half full power, and 1.0% to indicate low power.
[0091] Additionally, the tag 140 may send device information to the application that is unique to the tag 140 and identifies the tag 140 to the mobile communicatio device 1 10. Accordingly, multiple tags 1 0 may be implemented with a single mobile communication device 1 10 and application.
The Fob {0092] Another embodiment of the present invention includes a wireless apparatus in the form of a fob 130. A fob 130 provides all the functionality of the tag 140 described above but further includes functionality and components related to a security system for the mobile communication device 1 10. The fob 130 cars be kept with a user, such that it may be attached to a user's keycbain or other object that is kept with the user for the majority of the time. Accordingly the fob 1 0 may alert the user if the user is separated from the mobile communication device 1 10. The functionality of the fob 130 is similar to that of the tag 140, but may periodically report the signal strength readings to the mobile communication device 110 and the fob 130.may receive a comman to enter an alarm state if the signal strength readings go below a signal strength alert threshold as set by a user.
[0093] The lob's 130 purpose can be to alert the user in the event that the mobile communication device 1 1.0 is out of a signal strength sensitivity range of the user, preventing the user from aecidently leaving his or her mobile communication device 110 behind.
Typically, the fob 130 may send the signal strength readings to the mobile communication device 1 0 which determines that the fob 130 is out of range by comparing the received signal strength readings to a predetermined signal strength sensitivity setting, and sends an alarm command to the fob 130 to alert the user that signal strength readings from the fob 130 have reached a predetermined signal sensitivity setting ( which is a rough estimate of separation distance between the fob 130 and the mobile communicatio device 1 1.0). The fob 130 may alert the user through a visual or audio indicator (e.g., flashing lights and playing audio) hi the event the user has been separated from his or her mobile communication device 1 1 , Additionally, the fob 130 may also alert a user if connection is lost with a mobile communication device 1 10 without receiving a command to alert from the mobile communication de vice 1 10, The fob 130 may also comprise a "find my phone" button that may page the mobile communication device 1 10. The mobile communication device 1 10 may then play a sound that the user can use to find the mobile communication device 1 10, much tike the "find my tag"" functionality described above.
{0094} FIGS. 5A-5C show various views of an exemplary embodiment of a wireless apparatus in the form of a fob 130. According to embodiments of the invention, the fob 130 may be as thin and as small as possible. Smaller dimensions allow the fob 130 to be easily transported and carried by the user at all times without inconveniencing the user.
Additionally, the fob 130 should be constructed appropriately so that it may be attached to a personal item that the user may always be m possession of and may not likel misplace. The fob .130 may also be constructed so that it may be attached to the clothing of a user (e.g., a belt clip that can be attached to a user's belt, pants, etc.) or attached to an accessory that may be worn by a. consumer (e.g., a lanyard, tie clip, etc).
[0095] A processor (microcontroller or microprocessor) manages the operation of the fob 130. Similar to the. tag 140 described above, the operations include pairing with a mobile communication device 1 10,, connecting to a mobile communication device 1 10, perforating mutual authentication with the mobile communication device 1 10, responding to commands received from the mobile communication device 1 30s measuring and repotting the strength of the radio signal from the mobile communication device 1 10, measuring and reporting a power status (e.g., voltage) of the fob's power source, reporting the acceleration the fob 130 experiences and issuing commands and requests to the mobile communicatio device 1 10 as well as generating audio, visual, and mechanical indications and alerts. However, in addition to the functionality included in the tag 140, the fob 130 includes a "Find My Phone" function that may be activated through an input button 137. Additionally, the fob 130 is capable of alarming without being commanded by a mobile communication device 1 10 if the mobile communication device ! 10 is out of range of the fob 130,
|0096] The wireless apparatus in the form of a fob 130 may comprise ail of the components of the wireless apparatus in the form of a tag 140 shown in FIGS. 4A-4B including a front and back case portion 531 and 536. LED indicators 135. a battery door 537, etc . However, as shown in FIG. 5 A-5C, the w ireless apparatus in the form of a fob 130 may further comprise a ''f nd my phone" button 137 that is much larger and easier to use than the button on the tag 140, Similar to the input button 147 of the tag 140, the find my phone butto may provide multiple inputs through a single button by the period of time that the input button 137 is compressed and the current state of the fob 130 when the input button 137 is pressed. For example, the button 137 may be used to pair to a new mobile communication device .1 10 if it is pressed down for an intermediate period (e.g.. 3-6 seconds), but may activate the "find my phone" functionality if the input button 137 is momentarily compressed (e.g., 1*3 seconds). Additionally, if the input button 137 is compressed for an extended period (e.g., 6-9 seconds) the fob 130 may enter into a sleep mode. Finally, a user may clear an alarm by clicking the input button 137 during an alarm to acknowledge the notification. [0097] The fob 130 may be entered into an armed or disarmed mode through die application, running on the mobile communication device 110 once paired... connected, and authenticated. Whi le the fob .130 is in an armed status, if the mobile communication device 1 10 moves o u t of range, tags 140 move out. of range of the mobile communication device 1 10, or any other alert status is entered, the mobile communication device 1 10 may send a command tor the fob 130 to alert the user through an alarm status. Additionally, if the mobile communi cati on device 1 10 moves out of transmission range with the tob 130 and the fob i 30 no longer receives wireless communications from the mobile communicati n device 1.10, the fob 130.may automatically enter an alarm status to notify the user of the separation.
{0098} Additionally, the alarm condition may comprise two periods, a warning conditio and an alarm condition. The "warning condition" or "warning alarm" for the fob 130 may be activated before a full blown alarm condition is entered dining a. hold-off period or hold-off time so that a user may be alerted to the warning and may remedy the problem before an alarm i s entered. In this manner, the user may be reminded of the separation without a full alarm being activated. The warning alarm may also be entered if the received signal strength from the fob reaches an alert threshold but has not reached a buffer threshold value thai eliminates false alarms. Accordingly, the alarm condition may be entered once the signal strength readings cross the buffer threshold. The fob 130 may comprise two separate melodies, light patterns, or other different notification methods between the warning and alarm conditions.
[0099] The alarm functionality of the fob 130 reports signal strength readings to the mobile communication device .1. J.0 via periodic wireless communications, The mobile communication device 1 10 may compare the received signal strength readings to a user selectable signal strength alert threshold that is associated with an estimated allowable separation distance. The signal strength alert threshold may be above the signal strength required for the fob 130 to maintain a connection with the mobile communication device 1 10 and when the mobile communication device 1 10 determines that the fob 130 signal strength readings have dropped below the signal strength alert, threshokl i t .may send a command to the fob 130 to start the alarm. The alarm may continue until either the user performs a momentary button press on the fob 130 or the mobile communication device 1 10 sends a second command to the fob 130 to stop the alarm. Alternatively, if the alarm functionality is enabled and the fob 130 disconnects from the mobile communication device 1 10, the alarm is also sounded. This process will, be discussed in further detail below. fO JOO] A single momentary press on the input button 137 may activate a "find my phone" feature. The "find, ray phone" feature may cause the fob 130 to send a command to the mobiie communication device 1 10 to initiate alerts and alannis to help the user determine where the mobile communication device Π0 is located, in some embodiments, the user may be notified of the distance to the mobi ie communication device 1 1.0 by the fob 130. The user may be notified through any suitable means including a voice informing the user through the output component speaker, distance displayed on a screen on the fob 130, or any other suitable means. The distance may be determined using the latest signal strength reading by the fob 130 or any other suitable means to estimate distance as one of ordinary skill in the art word d recognize.
[01.01] The fob 130 may use status LED indicators 135 as an output display to the user. There may be 3 color states: Red, Green, and Yellow (both Red and Green on together, piped). The stains LE D indicators 135 may inform the user of the current status of the system or the wireless apparatus, or may be used to inform the user of a warning condition or an alarm condition. For example, the status LED indicators 135 ma flash an alternating pattern of red and green for two seconds when powering or starting up and may blink green three times when communication has been established between the fob 130 and mobile
communication device 1 10 after powering up (i.e., once the mobile communication device 1 10 and the fob 130 are "paired"). The status LED indicators 1 5 may blink green once when the fob 130 enters an armed mode and may blink yellow once when the fob 130 enters a disarmed mode. Additionally, the status LED indicators 135 may blink red three times when the fob 130 is suspended as a result of a command from the mobiie communication device 1 10. Furthermore, when the input button 137 is pressed to activate the "find my phone" functionality, the status LED indicators 135 may flash a green light once. Finally, when the battery is in a designated lo or dying stale, the status LED indicators 135 may blink every ten seconds to alert the user that the battery is low.
II. EXEMPLARY METHODS
[0102] In embodiments of the invention, the mobile communication device 1 10 continually sends wireless communications to wireless apparatus in the form of a tag 1.40 or fob 130. The wireless apparatus may take a reading of the received communications and may return a wireless communication response including a signal strength reading to the mobile communication device 1 10 at regular intervals in continuous cycles or may wait for an event to occur based on the readings or for a command from the mobile communication device 1 10 to send a response. The messages may be encrypted and difficult to intercept or tamper with, if the fob 130 or the mobile communication device 1 10 loses contact with the mobile communication device I 10, the mobile communication device I !O and/or the fob BO may alert a user through a warning condition and alarm condition.
Wireless Apparatus Pairing, Authentication, and Connecting f I03J In order for the wireless apparatus and the mobile communication device 1 10 to track and moni tor objects of interest, the system may be initialized through the devices being paired, connected, and mutually authenticated. FIG. 6 illustrates the different hardware states that the wireless apparatus may enter m relation to the mobile communication device i 0 according to embodiments of the present invention. The different states relate to initial powering up of the tag 140, a first pairing to a mobile communication device 1 10, connecting to the mobile communication device 1 105 authenticating the mobile communication device 1 10 and being authenticated by the mobile communication device 1 10, disconnecting -from the mobile communication device 1 10 and entering a sleep mode.
(0104} First, when the wireless apparatus is not connected to a mobile communication device 1 10, the wireless apparatus is in a s!eepO mode 60 ! in order to conserve power. The wireless apparatus -may stay in the sieepO mode 601 until a user activates the wireless apparatus or may wake periodically, try to pair, and go back to sieepO mode 601. The sieepO mode 601 is a special state where the tag 140 is dormant and there is no associated mobile communication device 1 10. This is the default setting when the tag 1 0 or fob 130 is manufactured and delivered to a user before connecting to any mobile communication device I S O, Once a pairing occurs, the wireless apparatus 110 ma remember the mobile communication device 1 10 last paired to and try to connect to that mobile communication device 1 10 whenever awake.
(0105} Next the wireless apparatus may enter a pairO mode 602 in response to a pairing input through the input button (e.g., intermediate length compression on the input button 147 of FIG . 4 or 137 of FIG. 5) on the wireless apparatus. The pairO mode 602 i entered upon the first attempt at pairing when no pairing has occurred previously and thus there is no associated mobile communication device 110.
(0106] During pairing, the wireless apparatus may advertise its presence to any available mobile communication devices 1 10 within pairing range. At this point, the user may connect the mobile communication device 1 10 and. the tag 140 by adding the tag 140 through the application running on the mobile communication device 1 10, A timer is started during pairing such that the wireless apparatus advertises its presence with a pairing message for onl a predetermined period of time, if no mobile communication device 1 10 connects to the tag 140 before the timeout, the tag 140 returns to the Sleep© state 601. The LED indictor may flash a pa ticular color (e.g., green) to remind the riser that the tag 140 has started to advertise its presence to any available mobile communication devices 1 10 within pairin range.
[0107] During the ad vertising period, the object proximity and tracking application on the mobile communication device 1 10 may recognize the advertising message and may allow the user to add the tag 140 through pairing with the mobile communication device 1 10. Once successfully paired the status LED indicator may stop flashing, may change color, or may complete any other change to indicate to the user that pairing has successfully completed. .Additionally, a melody may play that informs the user of the successful pairing.
Alternatively, a red .flashing light, failure melody, or any other suitable indicator may he provided to a user if the pairing is not successful,
10108] Once paired, the tag 140 may enter a connected state 603 because a mobile communication device 110 receives the advertised pairing messages and sends a connection message to the wireless apparatus after being added through the application by the user. If a mobile communication device ! 10 connects to the wireless apparatus while in the PairO 602, Pair 606, or Disconnected states 60S, the wireless apparatus records the ID of the mobile communication device Ϊ 10 and thereafter only connects to the mobile communication device 1 10, The mobile communication device 1 10 has now established a connection to the wireless apparatus, however, the mobile communication device 1 10 and the wireless apparatus are not yet mutually authenticated At this stage, all features are disabled except for authentication. As explained above in reference to the tag 140 and fob 130 sections, the wireless apparatus may now attempt to perform a mutual authentication. If the authentication process fails, it can be restarted at the beginning at any time. (0109] The mobile communication device may now attempt to authenticate the wireless apparatus. If the wireless apparatus is successfully authenticated, the wireless apparatus receives a message from the mobile communication device and the wireless apparatus enters an authenticated state 604. The wireless apparatus and the mobile communication device 110 may now communicate and interact as designed, including providing the functionality described herein.
[0.1.10] The wireless apparatus may also enter a disconnected state 605 any time that the mobile communication device 1 10 disconnects from the wireless apparatus. For example, the user may enter a data in ut into the application that the wireless apparatus should not he monitored. When, the wireless apparatus is in. the disconnected state 605, the wireless apparatus may periodically attempt to connect (e,g.? automatically connect) to the mobile communication de vice 1 1.0. The user may use the application to change the auto-connect setting for the wireless apparatus such that the user may manually connect, the wireless apparatus through the application or physically on the wireless apparatus instead of periodically trying to automatically connect with the mobile communication device 1 10. The automatic connect feature may attempt to connect at random periodic timing differences such that multiple wireless apparatuses do not attempt to connect to the mobile communication device 1 1 at substantially the same time.
[011 Ϊ J Additionally, if the user inputs an intermediate input (B2) on the input button at any time, the wireless apparatus may enter the pairing state 606. The wireless apparatus may again start advertising its presence through pairing messages sent to any mobile
communication device 110 within the pairing range. The user may add the tag 140 to any mobile communication device 1 10 within pairing distance by adding the tag 140 through the user interface of the application. Additionally, as before, if the tag 140 is not connected to mobile communication device 1 10 prior to a timeout period, the tag 140 enters into a disconnected mode 605 but remembers the last associated mobile cammunication device 1 1.0 and attempts to reconnect as described above.
£0! ί2| Finally, if the user inputs an extended input (B3) on the input button at any time, the wireless apparatus enters a sleep mode 607. When entering a sleep mode 607, the wireless apparatus disconnects from the mobile communication device 1 10 and the transceiver of the wireless apparatus powers down until the user manually powers up the wireless apparat us or may sleep for a predetermined period of time such that wireless a pparatus wakes o p and attempts to connect and authenticate again after the period of time passes. The sleep mode 607 may be entered at any time through the user entering the sleep input (B3 K
Proximity Alerts fCi 1 131 i embodiments of the present invention, the mobile comrnunieation device ! 10 continually transmits wireless communications, using any suitable communicatio scheme (e.g., Bluetooth™ Low Energy messages) to wireless apparatuses (tags .140 or fobs .130) that are connected and authenticated with the mobile communication device 1 10. An
authenticated wireless apparatus periodicall measures signal, strength readings for messages received from the mobile communication device 1 10 using Received Signal Strength indicator ("RSSi") readings. The RSSI readings are then sent to the mobile communication device 1 10 for processing.
[0114) RSSI is a measure of the signal strength of a wireless peer. The RSSI reading is roughly correlated to the distance of separation to a wireiess peer and is used as the primary mechanism to estimate proximity in embodiments of the present invention. However; the RSSi reading is highly dependent on the environment, the transmitter, and the receiver. As such, processing of the signal is necessary to obtain a usable signal. Accordingly, the recei ved signal strength readings may be processed by receiving the RSSI reading in a wireless communication from the fob 130 or tag 1 0 and filtering the RSSi reading through a low pass filter (e.g., n-tap low pass FIR filter). Any other suitable technique for determining the signal strength values .received from, the tag 140 or fob .1.30 and filtering the readings of noise may be implemented.
(01 IS] The mobile communication device 1 10 may receive the RSSI readings and an application running on the mobile communication- device 1 10 may then filter the SSI readings to reduce noise. The most recent filtered RSSI readings are then compared to predetermined values (e.g., thresholds) representing different degrees of proximity or proximity zones,
|0!10 j FIG. 7 shows the proximity zones according to exemplary embodiments of the present invention. For example, the zone may be split into safe zone 701 , an alarm zone 702. and lost, communication (out of transmission range) zone 703. The object proximity monitoring application, may determine that a tag 140 or fob 130 is in. a safe zone 70 ! when the signal strength readings received from the tag 140 or fob 130 corresponds to a distance that is within a nser-eonfimirable range from the mobile communication device 1 10. Whea the mobile communication device 1 10 determines thai the tag 140 or fob 130 is within the safe proximity distance, no alarm is triggered or alert provided to the user.
{(II 17] However, if the recei ved signal strengt readings indicate that the tag 140 or fob 130 is outside the sale zone 701 doe to a signal strength reading being below a predetermined signal strength aiert threshold, the application may determine that the tag 140 or fob 130 is in an alarm zone 702, However, before alerting a user, the application running on the mobile communication device 1 10 may wait a predetennined hold-off period to ensure the reading is not due to a temporary environmental change. If the signal strength readings are still determined to be below the signal strength alert threshold after the hoki-o if period has passed, the user may be alerted that the tag 140 or fob 130 is in the alarm zone 702 through the mobile communication device alarming the user. Additionally, in some embodiments, the application may implement a buffer threshold in additio to the alert threshold. The application may implement the buffer threshold to provide a range of signal strength values where the .application either enters a warning condition or delays alar until the signal strength readings are below the buffer threshold as well as the alert, threshold. Additionally, in some embodiments, both a buffe threshold and a hold-off time may be implemented to minimize false alarms.
{WIS} In order to avoid false alarms for temporary environmental effects on the RSS1 readings, a threshold event may only be considered to have been triggered if the -filtered RSSi reading has had its last crossing of the threshold, boundary at least a predetermined number of samples ago. This provides a '"hold-off time which delays the alarming of the mobile communication device 1 .10 until a predetermined per iod of time has passed or a
predetermined number of samples have been accepted and are below the alert threshold boundary value. Additionally, there are different types of notification or alerts for the user. For an approach alert, which is associated with aft out of range device that, alerts the user when the wireless apparatus enters back into a proximity range, the approach alert may use a rising edge threshold. A rising edge threshold means that the filtered RSSl reading may be higher than the alert threshold for a predetennined number of readings before the approach alert may be sounded. Alternatively, a separation alert may implement a lowering edge threshold which notifies the user once the predetermined .number of RSSI readings are below the predetermined alert threshold.
|0 J I9] According to embodiments of the present invention, once a threshold has passed, the event is considered "triggered" and may be reset before it may be triggered again. For example, once a tag 140 enters the alarm zone 702 for the requisite hold-off period and t he separ tion alert is triggered, the alert may not continue to trigger after the user has
acknowledged receipt of the separation alert. However, an event may be reset after the filtered RSSI readings have had it last crossing of the threshold boundary, in the opposite direction for the hold-off period. For instance, using the example above, the separation alert may be reset once the tag 1.40 enters back, into the safe zone 701 for the hold-off period, and if the tag 140 were to subsequently leave the safe zone 701 for the requisite hold-off period, the separation, alert may again, be issued to notify the user. The boundary threshold (e.g., alert threshold) is determined by the user in the tag 140 configuration screens and are typically set in reference to a signal strength sensitivity setting instead of a RSSI value (e.g., "medium, sensitivity'' instead of -60 dB). Additionally, in some embodiments, an estimated distance may also be provided, to help a user determine the desired sensiti ity for the object. The estimated distance would be provided under average conditions for the system although this distance may change due to environmental disturbances. fOI ZOj Finally, if the status determination module of the object proximity monitoring application of the mobile communication device 1 10 determines that eommunication with the tag 140 or fob 130 has been lost, the tag 140 or fob 130 may have entered a lost
communication zone 703. The status determination, modul ma determine that
communication is lost because the mobile communication device 1 10 may not receive the period notifications from the tag 1 0 or fob 130 at the regularl scheduled time period. The tag 1 0 and fob 130 regularly report signal strength readings, power status,, a button press, current status, etc. at regular intervals. Accordingly, if the interval passes and. the mobile communication device 1 1.0 has not received a wireless coramuaication, the mobile communic ion device 1 10 may determine the tag 140 o lob 130 is in a lost communication zone 703. The mobile communication device 1 10 may send more communication requests to the wireless apparatus than is typical in a hope to re-establish communication and may alert the user that the mobile communication device 110 has lost contact with the taa 140 or fob 130. 10121] Additionally, the wireless apparatus may start advertising its location in hopes of connecting with the mobile communication device .1 .10 again. The application running on the mobile communication device 1.10 may also start listening for the wireless apparatus that has gone missing. In order to save battery, the rate of advertising signals sent, when the wireless apparatus is separated from the mobile device may be time-limited such that after a time out, the rate at which the advertising signals are sent is low. if connection is not re-established, after a set period of time, the fob 130 or tag 140 may decrease the advertising rate, (longer period between advertisement transmissions) in order to conserve battery life. f0122] Furthermore, the object proximity and tracking application may initiate "last seen" functionality on the mobile communication device 1 10. The "l st seen" functionality Is shown in FIG. I 4B, Additionally, the application may be configured to notify the user when the tag 1.40 or fob 130 enters communication range again through a "notify on approach" configuration setting. An exemplary screenshot of the settings for the "notify on approach" functionality is shown in FIG. 1 A. These features will be discussed in further detail below.
[Hi 23] FIG. 8 shows the wireless communication scheme of the wireless apparatus used in the proximity alert ftmctionality according to one embodiment of the present invention. The method of FIG. 8 may be perforated by either the fob 130 or the tag .1.40 while either apparatus is in an authenticated state with a mobile communication device 1 1.0.
|0124] in step 801 , the wireless apparatus activates from a predetermined period of inactivity, idle, or rest. The wireless apparatus may not disconnect from the mobile communication device 1 .10, but may not be active other than waiting for the next reading of a wireless communication from the mobile communication device 1 10, The wireless apparatus may enter an idle or inactive state in order to conserve battery power. However, in some embodiments the wireless apparatus may still be able to receive communications from the mobile communication device 1 10 and respond to any commands received in the wireless communications.
|0 ϊ 25] In step 802, the wireless apparatus receives a wireless communication request message from the mobile communication device 1 10. The wireless signal request, message may comprise a command or may merely include identification information so that the wireles device may determine the signal strength of the wireless signal request message. {0126] in step 803. the wireless apparatus calculates a signal strength value based on the received wireless communication. The signal strength may be calculated through a received signal strength indicator ( S'SI) reading and calculation. The RSSl reading may be preprocessed and. inverted such that it is a positive number {i.e., -60 dB reading is delivered as 60) or the raw RSSl values may be collected.
{0 7] in step 804, the wireless apparatus processes a command or request within the wireless signal request. The wireless signal request may comprise a command to initiate a page status that alerts a user to the wireless apparatuses location, or may command the wireless apparatus to disconnect from the mobile communication device i 10 and enter a disconnected state. Any other suitable command may be included in the wireless signal request.
{0128] In step 805, the wireless apparatus determines a power status of the power supply for the wifeless apparatus. The power status may be a reading of the current battery power of the wireless apparatus, the amount of charge left at average usage, or any other power status indicator.
[012 j in step 806, the wireless apparatus updates configuration settings according to information included in the wireless communication. The wireless signal request may comprise a change of configuration settings for the wireless apparatus based on the previously sent wireless response message sent to the mobile communication device 1 0, a data inpet by a user, or the entering of a zone tag area that automatically changes the profile settings for die mobile communication device 1 10. Accordingly, the mobile communication device 1 10 may update the configuration settings of the wireless apparatus at any time by sending the updates embedded within wireless signal requests.
{0130] In step 807, the wireless apparatus generat a response message including di signal strength reading and the power status. The wireless apparatus may also include any other suitable information in the wireless response message including commands (e.g., a "find my phone'" command), location information (e.g., triangulation information, longitude/latitude coordinates from a GPS component, etc.), time, elate, device identification information, special requests, etc. Any suitable information may be included in the wireless signal response as one or ordinary-' skill in the art would recognize. (0131 j In step 808. the wireless apparatus transmits the response message to the mobile comm.unioatio.ft device 1.1,0 and in step 809, the wireless apparatus goes into an idle of inactive state for a predetermined period. The period of the idle or inactivity may he included in a configuration setting as the rate of transmissions of the signal strength readings for the wifeless apparatus. The lower the rate of transmissions of wireless communications including the signal strength readings, the longer the battery power may allow the wireless apparatus to operate without charging or replacing of a power source. The wireless apparatus may then repeat this cycle by activating when the next cycle begins (step 801).
Adaptive Alert Thresholds
[0! 32] FIG. 9 shows a method of monitoring a wireless apparatus for determining whether a proximity alert needs to be generated using adaptive alert thresholds. As explained previously, the application may incorporate adaptive alert thresholds because signal strength readings may be dependent on environmental and system variables that, may change the signal strength reading at any gi ven time without a corresponding change in separation distance. Accordingly, without incorporating adaptive alert thresholds or a similar adaptive quality,, false alarms may result from environmental and system power changes.
{0133] in step 901 , the mobile communication device 1 10 receives a time stamped communication packet from the wireless apparatus. The time-stamped communication packet may he received in a wireless signal response and may comprise the latest signal strength reading; information related to a device identifier for the wireless apparatus, commands from the wireless apparatus, responses to previously sent commands from the mobile communication device S 10, location, time, and any other suitable information that, ma be used in embodiments of the present invention.
{0134} In step 902, the mobile communication devic 1 10 filters the signal strength reading determined from time-stamped communication packet. For example, the mobi le communication de vice 1 10 may recei ve a RSSI reading in response to a previously sent wireless signal request. RSSI is a measure of the signal strength of a wireless peer and is roughly correlated to the distance of separation to a wireless peer. However, processing of the RSSI data may be necessary to obtain a usable signal. Accordingly., the received signal strength readings may be processed by filtering the RSSI reading through a low pass filter (e.g,, n-tap low pass Finite impulse Response (FIR) filter or Butter worth Infinite Impulse Response (UK) filter). Any other suitable technique for determining the si nal strength val ues recei ved from the tag 1.40 or fob .130 and -filtering the readings of noise ma be implemented.
[0135] in step 903, the mobile communication device 1 10 compares the filtered signal strength reading to a expected signal strength or a last signal strength reading. Once the RSSi reading is filtered and a signal strength reading is determined by the mobile
communication device 1 i 0,t the application running o the mobile communication device 1 10 determines a stored expected signal strength reading that was calculated at the end of the last cycle, and compares the received signal strength reading to the expected signal strength reading. The application calculates the expected signal strength reading using previous signal strength readings from the wireless apparatus. Accordingly, the prediction of the signal, strength status may be used to determine if the wireless apparatus is moving away from the mobile communication device 110, toward the mobile communication device 1 0, or is stationary in relatio to the mobile communication device 110. As explained previously in the definitions section, the expected signal strength may be predicted based on the periodic pas signal strength readings and what may be gradual change in signal strength reading values. Accordingly, the signal strength reading may be compared to the expected signal strength to determine if the signal strength readings change drastically .
[0136] In step 904, the mobile communication device I J O determines whether the difference is lamer than an aiiowed change value. Accordingly, the difference between the expected signal strength reading and the received signal strength is used to determine if a drastic change has occurred. A change in signal strength could indicate separation, physical blockage or detuning of the antenna. Accordingly, a method of disambiguation may be implemented to ensure false alarms do not regularly anno a user. If the change value is determined to be larger than an allowed change value, the system ma assume that the environment has changed in a substantial manner and thus the system may move to step 905 to adapttveJy alter the alert threshold to adapt to the changed environment,
[0.137] In step 905, if the difference -magnitude is larger than an allowed change value, the application running on the mobile communication device 1 10 may calculate a threshold, change value. The threshold change value may he calculated through any suitable method including using averaging of the difference, using the difference between the expected signal strength, reading and the actual signal strength reading, offsettin the readings by a standard value, using past threshold change values, etc. j0138] In step 906, the a lert threshold is raised or lowered by the threshold change value based on whether the difference was higher or lower tha the expected value. Typically, the calculated threshold change value should be large enough that the alert threshold is not breached b the received signal strength reading unless the expected signal strength reading anticipated such a result.
|i>l39] in step 907, if the difference is not larger than the allowed change value, the mobile communica ion device 1 1.0 compares the filtered signal strength reading to an alert threshold value. The threshold change value is not. calculated because the difference between the expected signal strength reading and the actual received signal strength is a reasonable value that does not indicate a drastic change to the environment of the system. Accordingly , the proximity alert system continues wi th the analysis of determining whether the wireless apparatus is outside of the safe zone 701. Although the exemplary embodiment shown in FIG. 9 does not continue with the comparison of the filtered signal strength reading and the alert threshold value described in step 907 if the difference magnitude is larger than an allowed change value, in some embodiments, after offsettin or changing the alert threshold, the filtered signal strength reading may be compared to the ne or updated alert threshold value to determine if an alarm should be issued,
[01401 In step 908, the wireless communication device determines if the filtered signal strength value is below an alert threshold value. If the received signal strength reading is below (or above depending on whether the signal strength readings are negative or positive) the alert threshold value and thus indicates that the wireless apparatus is in an alarm zone 702, the analysis moves to step 909 to determine how long the alert threshold has been breached. However, if the signal strength value is not below or breaching the alert threshold, the proximity analysis process is completed and the application can continue the
configuration and managemen of the system without alerting the user.
(0141] In step 909, if the filtered signal strength value is below the alert threshold value, the mobile communication device J. 10 determines if a predetermined numbe of readings have been below the threshold value. The predetermined number of readings corresponds to "hold-off time that delays an alert until number of samples are below an alert threshold value. As explained above in reference to FIG. 7„ the user is only alerted if the wireless apparatus stays over the alert threshold for a 'liold-off " period. Accordingly, if the alert threshold has not been breached for the corresponding hold-off period, the analysis may be completed, the results may be stored and the application may wait until the requisite hold-off period is met before alerting the user.
{0142 j In step 910, if the filtered signal strength reading is not below the alert threshold value, the alert threshold value was altered due to a difference between the expected and received signal strength reading being too large, or the predetermined number of filtered signal strength readings have not been below the alert, threshold value, then the mobile communication device 1 J 0 stores the alert threshold value, the filtered signal strength reading, the time, date, and location information (if included in the wireless communication packet) in a history data storage in the mobile communication device 1 10.
(0143] in step 91 1 , the mobile communication, device 1 10 determines the next expected signal strength reading based on the stored values and stores the expected signal strength leading in a predicted status storage area on the computer readable medium. As explained in. the definitions section, the expected signal strength may be predicted accurately due to the periodic readings received by the mobile communication device 1 10. The expected signal strength reading may be used in the next cycle to determine if the received signal is bein affected by outside factors such as environmental or power changes,
[01441 to step 12, the mobile communication device 1 10 determines if the wireless communication packet contains any requests or commands from the tag 140 or fob 130 (e.g., a "find my phone" paging command}. If so, me application performs the requested commands.
{0.1.45] In step 913, the mobile communicatio devic 1 10 determines the power status of the wireless apparatus if it is included in the wireless communication. The power status indicator informs the applic ation of the power level of the battery of the wireless apparatus. Depending on the power status level, the mobile communication device 1 10 may update the configuration settings for the wireless apparatus including transmission rate.
(0146] In step 914, the mobile communication device 1 10 determines if any configuration settings need to be updated based on th received power status and the expected signal strength.. The application may then update the configuration settings and include the configuration settings in the next wireless signal request sent to the wireless apparatus. A number of configuration settings on the wireless apparatus may be updated in order to save power for the wireless apparatus,, increase the accuracy or sensitivity of the system, and further increase the effectiveness of the sy stem. For example, if the application determines that the wireless apparatus has a low power status, the application may decrease the rate of transmission for the wireless apparatus to a lower rate to further conserve battery power. The configuration settings may include a rate of transmission of wireless communications for the wireless apparatus, a transmission power for die wireless apparatus, a notification type setting, and a movement notification setting for the wireless apparatus.
[ 0147] Reducing the rate of transmission of wireless communications for the wireless apparat us extends the battery life of the wireless apparatus as the sleep period is longer and fewer power consuming activities occur in a particular period of time. Accordingly, if the power status of the wireless application is low, the application may update the rate of transmission in the configuration settings for the wireless apparatus to increase the period of wait between reading and t ansmitting the signal strength values in response to the wireless signal request. Accordingly., the wireless apparatus may perform, fewer signal strength measurements and send fewer wireless signal responses which ma extend batter life.
|0l 48 j Additionally, an algoriihm in the application determines if the wireless apparatus is proximal and i f it is approaching or departing. The report transmission rate is increased if the fob 130 or tag 140 is far or moving away because there is a higher chance that a separation, alert may be issued soon, and thai the monitored object is in a danger condition, Additionally, the rate of transmission may be decreased if the wireless apparatus is near or moving closer to the mobile communication device 1 10. 0149j Reducing the transmission power extends the power source life of the wireless apparatus. Accordingly, an algorithm in the application determines if the fob 130 or tag 140 is proximal and if it is approaching or departing from the mobile communication device 1 10, Accordingly, the application may update the configuration settings including the transmit power of the wireless apparatus to an increased level if application determine that the fob or tag 140 i far or moving away. Alternatively, if the wireless apparatus is approaching or is close to the mobile communication device 1 10, the application may decrease the transmission power in the configuration settings for the wireless apparatus, Additionally, the power status may be used to determine tile aggressiveness of the transmission power settings. For example, if the power status of the wireless apparatus is at a high level, the system may only limit the transmission by a small amount if the wireless apparatus is moving toward the mobile communication device 1 10. However, if the power status of the wireless apparatus is very low, the application may limit the transmission power setting for the wireiess apparatus as much as possible to maximize the available remaining power.
[0.150] in step 915 , if the predetermined number of previous signal strength readings are below the alert threshold value, the mobile conimuiiieation device 110 alerts the user until the user provides an input that acknowledges the alarm or until the alarm timeout period is exhausted.
|0151 } lit step 16, the mobile communication device 1 10 stores the last known distance and location of the wireless apparatus as well as the other data as shown in step 910.
Additionally, the process may now return to tep 910, 91 1 , or 912 and continue storing, determining the expected signal strength, processing requests or commands, etc,
[0152] Finally, in step 917. the mobile communication device 1 10 generates and transmits a new wireles signal request including any appropriate information including any possible updates to the configuration settings for the wireiess apparatus, commands, etc.
|0i53| Although not shown in FIG, 8 or FID, 9, the wireless apparatus may further comprise a step of cletermining whether the configuration settings indicate thai a movement notification setting is acti ve, and if so, the wireless apparatus may determine if the movement sensor (i.e. acceleroffleter) within the wireless apparatus has indicated any movement since the last wireless signal response, if so, the -wireless apparatus may include a movement indicator in the wireless response message sent to the mobile communication device 1 10. As explained previously, the movement indicator could be implemented as a flag, a sensor reading from a movement sensor (e.g., accelerometer), a message comprisin particular information including location data, or any other suitable message that informs a mobile communicatio device 1 10 that the wireless apparatus has sensed that it is being moved. The movemen indicator may be sensor readings that require additional processing before a determination can be made of how the device is being moved or the processing may occur at the wireiess apparatus and the mobile communication device 1 10 may receive pre-processed data indicating the type of movement or that movement has occurred. Accordingly, the wireless apparatus may determine if it is being moved and if so, may. send a movement notification in the wireless signal response to the mobile communication device ί J 0.
Additional ly, the wireless apparatus: may send the movement indicator outside of wireless signal response message if It determines that the movement is occurring before the next wireless signal response message is due to be sent.
Exemplary Sereensheis of Embodiments of the Application
(0154] As described previously, in some embodiments of the invention, the system may have a software component (i.e., application) installed on a mobile communication device 110. The user interface of the object proximity tracking application provides controls over the system's behaviors and allows a user to customize the system to maximize its
effectiveness. For instance, the distance from the mobile communication device 110 that the safe zone 701 extends, the definitions of alarm conditions { e.g., alarm o movement of the wireless apparatus), and the system's responses to alarm conditions may be defined and configured by the user using the application running on the mobile communication device 110.
[0155] The application may synchronize the mobile communication device 1 10 and the wireless apparatus, receive a data input, from a user, and update the wireless apparatus with information corresponding to the data input. The data input ma correspond to configuration settings for a wireless apparatus. The application may update the configuration settings and then include the configuration settings in the next wireless signal request sent to the wireless apparatus.
[0156] FIGS. 10-14 show exemplary screenshots of an exemplary application fo the mobile communication device ! 10 show in FIG. 3. FIG. 10 shows an exemplary screenshot. of the display 1501 of the mobile communication device 1 10 alter the application 1502 has been downloaded and shows a user 1503 launching the application by tapping on the application icon 1502. FIGS. 1 1 A and 1 I B show exemplary home screenshots of the object proximity and tracking application showing the different tags 140 being tracked, their proximity to the user, a visual icon for easy identification, and their battery status. FIGS, 2A-12C show exemplary screenshots of the application when the system is registering a new tag. FIG. 13 A shows a exemplary details screen for a selected, initialized, and authenticated tag, F G. 1.3B shows a tag with the "find me" functionality activated. FIG. 14 A shows a settings screen for the "notify on approach" proximity detection functionality of embodiments of the present invention. Finally. FIG. .14B shows an exemplary sereenshot of the 'last seen" functionality of embodiments of the present invention,
[0157] FIGS. 1 1 A and I IB show exemplary home screenshots of the object proximity and tracking application showing the different tags 140 being tracked, their proximity to the user, a visual icon for easy identification, and their battery status. FIG. 1 I A shows an exemplary embodiment of the application where the main screen may be implemented as separate squares showing the previously registered tags 1 1 03A-1 J 03D. Each square includes a visiial identifier, name, and proximity indication to quickly and easily inform the user of the power and proximity status of the registered tags. Additionally, the user ca easily see that some tags are not activated f e.g., the laptop bag and the car are not current activated as they show no proximity indicator). Additionally, the proximity indicator may have different colors to indicate a power status for the tag. For example, if the power status is in a low state, the proximity indicator could be red while if the power status is full, the proximity indicator could be green, blue, or some other color. Additionally, other information could he provided through the color of the proximity indicator. For example, if the proximity indicator is growing (meaning the tag is moving further from the mobile communication device 1 10). the proximit indicator ma be a red color to indicate that the danger level is increasing, while the color could change to blue if the tag is approaching the mobile communication device 1 i 0. Any other suitable information may he displayed through color as well Additionally, the proximity indicator could be inverted such that the indicator displays the signal strength of the received wireless apparatuses, such that the larger the proximity indicator, the closer the tag ma be to the mobile communication device 110. ft* 158] lite home screen allows the user to determine more information about each tag as well as configure each ta individually- From the home screen, the user may additionally be able to re-order and remove tags. Furthermore, if the user taps on a row, the application enters a details screen associated with the selecte tag where configuration settings may be set and further details provided about the tag. Additionally, in some embodiments, the user may be able to select a "find me" button from the home screen that initiates the "find my tag" functionality.
( 0 Ι 59| FIG. 1 1 B illustrates an exemplary embodiment of the application where the main screen may be implemented as a row-based table where each tag 1 104A-1 104D is represented by a single row. Each row may display a visual identifier and a name for the tag (e.g.., the name of the tag is "camera" and the visual identifier is a picture of a person taking a picture with a camera). Additionally, both home screens allow the user to configure profile settings by touching the settings button 1 101 for the application or may add a tag by hitting the add tag button 1102.
{0160} FIGS. 12A-12C show exemplary sereensbois of the application when the system is registering a new tag. The user .may be able to add tags to the appl cation by tapping on a. special add tag button 1 102 in the top right portion of the home screen. FIG. 12A shows an exemplary screenshot of an "add a tag" pairing screen that is launched after the user presses the "add a tag" button. Pressing the "add a tag" button opens the "add a tag" pairing screen which informs the user to initiate the pairing button on a tag or fob within pairing rasige of the mobile communication, device 1 1.0. The screen is labeled, "Add A ag," 1102 and informs the user that in order for the user to register a tag with the application, the user should input the pairing button on the tag within pairing range. The mobile communication device 1 10 may liste for pairing advertisement messages from tags within pairing distance and may move to the tag registration screen once the mobile communication device 110 receives the pairing advertisement message. The first tag discovered that may be authenticated is selected to be the tag to add. Once the first tag i discovered, the discovery mode is stopped.
Furthermore, the application registers the tag identification data, such that the application may now try to connect anytime the tag becomes disconnected,
{0161] FIG. 12B shows an exemplary screenshot of the tag naming screen for a tag that is discovered by the mobile communication devic Ϊ 10. This screen allows the user to name the tag and select a picture from their photo library, take a picture and crop, select from the album, or select an included icon. Additionally, the user may enter a tag name, if the user picks the "select an icon", a screen showing several icons may be presented (e.g., three to a row as shown in FIG. 1.2C). The user may be able to scroll, up/down to see all the icons. Tapping on an icon selects that icon.
{0162 j FIG. 13 A shows an exemplary details screen for a selected, initialized, and authenticated tag. The user may tap on an icon in the main screen to view details about a registered tag. This screen has two main sections. The top section 1303 of the table displays an icon and name of the tag, the battery status, and the proximity to the mobile
communication device 110 (e.g., "currently far away"). If the tag is in range, the screen may display a textual description of proximity (e.g., roughly how far tile tag is away from the mobile communication device 1.10). Howe ver, if the tag is .not in .range, the screen ma display the time since the tag was last seen. Additionally, if the tag is currently in the conneeting initializaiion state, the screen may display either "Connecting ..." or "Initializing ..." The status display in this section is live and is constantly updated. Furthermore, the user may be able to tap on die icon to rename the tag as well as change the visual identifier (e.g., icon/photo) for the tag.
[0163] Hie bottom section of the table displays entries which enabie/disabte/configure features for the tag. For example, in FIG. !3A„ the "Find Me" functionality 1304, "Notify on Approach" functionality 1305, "Notify on Departure" functionality 1306, and "Notify on Movement" fiinctionality 1307 are all highlighted and available to activate and further define the configuration settings for the fiinctionality. Note that each, tag has its own specific configuration separate and unrelated to the configuration of the other tags. Additionally, different tags may also have different capabilities and the rows of this section are displayed or not depending on. whether a tag supports a particular feature.
(0164] FIG . 13 B shows an exemplary screenshot of a tag that has the "find rne"
functionality acti vated. The tag may have entered this screen b the user pressing the "Find Me" button in FIG. 13 A or through a direct "Find Me" button pressed in the earlier main screen.
[01651 The "Find Me" screen is used to aid the user in finding a tag. The user may invoke this screen when they wish to issue visual or audio alerts to the tag so that they may find it. The "Find Me" screen can be invoked ironi the main screen or from the "Tag
Details" screen. In either case, the tag is determined to be in range and connected. When this screen is invoked, the application initiates a command to be sent to the tag that plays a sound n. the tag. Additionally, the "Find Me" screen may display simple animation or visual indicator on the screen which connotes whether the user is getting closer or farther away from the tag. For example, the "Find Me" screen may display the icon of the tag in the middle of the screen and a pulsating circle around the icon. As the tag becomes closer, the circle grows, the color saturation increases, and/or color changes to red. As the tag becomes farther away, the screen may shrink the circle, decrease the color saturation, and/or change the color to blue. Additionally, at the bottom of the screen, there may be text informing the user whether they are getting closer or farther from the tag. An suitable visual and/or auditory indicators may be implemented to indicate to a user whether they are approaching or moving away front the tas.
}6166] Additionally, if the tag becomes disconnected, from the mobile communication device 1 10 during while the "find me" functionality is active, the application may display a dialog indicating that the tag has disconnected and present an option to take the user to the
"Last Seen" screen to see where the tag was last seen,
{0167] FIG. 1 A shows a settings screen for the "notify on approach'' proximity detection functionality of embodiments of the present invention. The notify on approach functionality provides that if the tag comes into range and is connected with the mobile communication device 1 10 again, it may alert the user,. Each type of notification (e.g., separation, approach, movement) may have a similar settings screen as shown here but may have different individual settings. For the notify on approach detection functionality, the configuration settings may include whether the type of notification is enabled or disabled 1403, the type of sound to make for the notification 1404, a selection of the sound clip to play 1405, and a sensiti ity level (e.g., proximity setting) for the alert threshold 1406. In this example,, the proximity setting 1 06 may be set by moving a visual indicator on a display to the left or right to indicate the closest or furthest sensitivity setting (roughly corresponding to an alert proximity). Other embodiments may incorporate a digit value that ma be input for average corresponding separation distance (e.g., 30 feet), a signal strength RSSI value (e.g.., -60 dB)„ or an other suitable measurement of distance or signal strength. Accordingly, the user can update configuratio settings for the application through the menu. Once the configuration settings are input through, data inputs b the user, the application may update the
configuration settings in the next wireless signal request and send the wireless signal request to the tag to update the tag's configuration settings.
(0168} FIG . 14B shows an. exemplary screenshot of the application during the "Last Seen" functionality. "Last Seen" functionality may be used when the wireless apparatus is disconnected from the mobile communication device 1 10 due to traveling out of the
transmission range of the mobile communication device 1 10. The. "Last Seen" screen is used to aid the user in finding the tag when the tag is out of range.
[0169] In the exemplary screenshot of FIG MB, the application shows the user on a map where the tag was last seen. A map may be displayed and centered on the location where the tag is last seen (e.g., last stored location of the tag or last stored location of the mobile comm.unioatio.ft device when the mobile communication device lost communication with the tag). A visual indicator (e.g.. a pin or other icon) may be displayed on the map, p.ra»pouitmg the captured coordinates and a transparent circle may be displayed around the pin to indicate the level of accuracy of the reading. A caption may be displayed above the pin. The main text may display a human readable name of the location of the tag. Alternatively or additionally, the latitude longitude information may be shown. The subtitle may display the time that the tag was last seen and may provide some context since the tag was seen (e.g., if the tag was seen less tha a minute ago, the display may say it was seen "Just now," or "I minute ago." Furthermore, below the map is a caption indicating the distance from the current position to the last seen position. For example, the caption may read " 10 miles away. 2 hours ago,,!
IV. OTHER EXEMPLARY EMBODIMENTS
User and Svstetn Profiles
[017Θ] Parameters such as starting RSS! threshold, hold-off time and transmit power affect the system's response to separation and approach events. These translate to different physical distances at which an alert would be generated. It is recognized that different locales and different situations may use different combinations of these parameters which may implement different profiles for different situations and locales for the user or multiple users, Accordingly, in some embodiments, the object proximit tracking application may offer quick selection among different profiles (safe, danger, airplane, etc.) either pre-installed or user generated.
(0171] Furthermore, as a user move from locale t locale and as the surroundings and situations change, the user may find it beneficial to implement different profiles at different times. However, havin to manually change profiles frequently is an inconvenience.
Accordingly, the application may automatically change the active profile based on user determined rules. For example, these rides may include location of the mobile
communication device 1 10 (GPS readings), time of day , and the presence of special tags called "zone tags." Any other suitable rules ma be implemented in the system as well.
Zone Tags [0172] A special class of tags may be used to mark a location or an area. When an associated mobile communication device 110 discovers such a tag, the application may e!ianue the mobil communication device i 10 profile to match the configuration, settings being provided by the zone tag. The application may then update the configuration settings for the connected wireless apparatus and send the updated configuration settings in the next wireless signal request. For example, a "safe zone" rag may be located in the user's home. When the mobile communication device 1 10 is in range of such a tag (hence in a 'safe zone') it relaxes the alert generation criteria to allow the user to leave his possessions further away ftom the mobile- communication device 1 10. A zone tag and the mobile comnnmication. device 1 10 mutually authenticate through a mechanism that may allow the zon tag to simultaneously communicate with multiple tags. This mechanism may include the use of secret keys, synchronized clocks, cryptographic hashes and cryptographic message authentication codes,
[01731 In another embodiment of the invention may include pairing a tag with more than one mobile- communication device 1 10. This may involve configuring a new mobile communication device 1 10 to sniff ail transmissions in the vicinity to find the tag, putting the tag in a pairing mode, acknowledging the tags' transmissions with a command packet instructing it to add the pairing, then exiting pairing mode. Once paired with two mobile communication devices 1 10, a tag may transmit twice as often, making separate
transmissions to each mobile communication device 1 10 in order that the acknowledgements from the mobile communication devices 1 10 do not collide.
|0174j In another embodiment of the present in vention, the mobile communication device comprises a processor, an antenna, a transceiver device electrically coupled to the antenna and the processor, and a computer readable medium coupled to the processor and comprising code executable by the processor to implement a method. The method may include receiving a wireless communication from a wireless apparatus attached to an object determining a signal strength reading from the communication, determining if the signal strength reading is below an alert threshold, wherein the alert threshold is adaptable, and if the signal strength reading is below the alert threshold. alertin» a user, wherein the method further comprises receiving a data input from the user, updating configuration settings for the wireless apparatus, and sending a wireless communication to the wireless apparatus, wherein the wireless communication includes the configuration settings. 10175 j In another embodiment of the present invention, the obi le co.ramun.ication device comprises a processor, an antenna, a transceiver device electrically coupled to the antenna and the processor, and a computer readable medium coupled to the processor and comprising code executable by the processor to implemen t a. method. The method may include receiving a wireless communication from a wireless apparatus attached to an object, determining a signal strength reading from the communication, determining if the signal strength reading is below a alert threshold, wherein the alert threshold is adaptable, and if the signal strength reading is below the alert threshold, entering a warning condition, wherein the warning condition initiates a .first type of alert; if the signal strength reading is below the alert threshold, determining if the signal strength reading is below a buffer threshold, and wherein if the signal strength reading is below the buffer threshold, entering an alarm condition, wherein the alarm condition initiates a second type of alert.
Location Tracking
|0176'j in some embodiments, the mobile communication device 1 10 and the wireless apparatuses 130, 140 (FI GS, 1 and 2) are used to track a location of a user. In particular, the mobile communication de vice 110 tracks and stores location information (e.g., the current geographic position of the device 110) when the device 110 connects to and/or disconnects from one of the apparatuses 130, 1 0. In addition to the geographic position of the device 1 Ϊ 0, the location information may include dates, times, addresses, notes, and. other pertinent information associated with device 1 10.
|017?j FIG. 1.6 is a. flowchart' depicting a method of tracking the location of the mobile communication device 1 10 (e.g., a smariphone that is carried by the user). At step 1604, the device 1 10 searches for a nearby wireless apparatus (e.g., the apparatus .130 or the apparatus 140). if the wireless apparatus is n range, the device 1.1.0 connects to the apparatus at step 1 08, Upon connecting to the apparatus (step 1612), the device 1 10 records and stores the current location information of the de vice 1 10. In some embodiments, the location
information may be stored within a memory (e.g., read only memory (ROM)} of the device 110. In other embodiments, the location information may be stored in a cloud server with which the device 1 10 communicates. The location information is received by the transceiver 1 .12 {FIG. .1) of the mobile communication device .1 10 and ma be, for example, GPS location information. As such, the locatio information may als include date and time information. Furthermore, in some embodiments, the GPS location information may be associated with a street address. jO J 78] While the mobile communication device 1.10 is connected to the wireless apparatus, the device 1.0 monitors the connection between the device 110 and the apparatus at step 1616, Upon disconnecting from the apparatus (step 1620) (e.g., moving out of rang of the apparatus), the device 1 10 again records and stores the current location information of the device 1 10. The device 1 10 then returns to step 1604 to search for the wireles apparatus or a different wireless apparatus.
$179] in some embodiments, such as the illustrated embodiment, the mobile
communication device 1 1 records location information each time the device 1 10 connects to and disconnects front the wireless apparatus, in other embodiments, the device 100 may only record location information when the device 110 connects to the wireless apparatus.
Alternati vely, the device 1 10 may only record location information when the -device 1 10 disconnects from the wireless apparatus. In further embodiments., the device 1 1 may only record location information when the device 1 10 connects to and/or disconnects front certain, wireless apparatuses, or may record location intbrmation when, the de vice 1.10 connects to a first typ of wireless apparatus and may record location, information when the device 110 disconnects front a second type of wireless apparatus.
[0180 j As shown in FIG. 37. in some embodiments the wireless apparatus may include a 12V power adapter 1700. The adapter 1700 is configured to lug into, for example, the cigarette lighter socket of an automobile, boat, motorcycle, or other vehicle, The illustrated adapter 1700, or vehicle tag, includes a housing 1 704, a power interface element 1708 (e.g., plug) extending axially from the housing 1704. a status indicator 1.712 (e.g.,. LED) coupled to the housing 1704, and a USB power output element 1716 located on the housing 1 04. The adapter 1700 also includes two electrical contact member 1 20 that extend radially from the housing .1704 and are electrically coupled to or part of the power interface element 1708. The internal components of the adapter 170 (e. g., the transceiver, the processor, etc.) are the same as the wireless apparatuses 130. 140 shown in FIGS. 1 and 2.
[Ql&l] By using the power adapter 1700 as the w reless apparatus, the adapter 1700 can be left in a predetermined location (e.g., a user's car) to track the location of the user and the car each time the user enters and leaves the car. That is, when the user e ers or gets close to the ear. the mobile communication device 1 10 connects to the adapter 1700 and stores location .mfomiaiion. Th s location, information, can, therefore, correspond to the user departing from a certain location (e.g., home, work, school, etc.). When the user arrives at a new destination and exits the car, the mobile communication device 1 10 disconnects from the adapter 1700 and stores the location information. This location information can. therefore, correspond to the user arriving at a new destination. The mobile communication device 1 10 may be programmed to recognize certain locations by their GPS coordinate (e.g., home, work, school, etc.). As such, upon arrival to or departure from these locations, the device 1. 1 ma automatically identi fy the location as one of the pre-programmed locations of the user. In other embodiments, the device 1 10 may recognize or associate locations with street addresses.
(01.82] hi some embodiments, the power adapter Ϊ 700 may be powered by the car so thai the adapter 1700 only communicates with the mobile communication device 1 10 when the car is on. As such, when the car is turned, off* the adapter 1700 automatically disconnects from the device 1 10, even if the device 1 10 is still within a suitable range of the adapter 1700. Similarly, the de vice 1 1.0 does not connect to the adapter 1700 until after the car is turned on, e ve if the de vice 110 is within a suitable range of the adapter 1700.
|0183| In other embodiments, the other wireless apparatuses 130, 140 (FIGS, I and 2) can alternatively be left in the car in,, for example, the glove box. The wireless apparatuses 130, 140 can thereby serve the same functio as the power adapte 1.700. I further embodiments, the wireless apparatuses i 30, 140 may be left behind by a user in other locations (e.gf, a desk drawer or docking station at work, at home, etc,), in such
embodiments, each wireless apparatus may be associated with a certain location such that connecting to and disconnecting from the wireless apparatus conesponds to arriving at and departing from, respectively, the certain locations,
[0184] As the location information is gathered and stored by the mobile communication device 1 .10, the device 1 1.0 may display the location information, FIG. 1.8 is a screenshot of exemplary location information being displayed on a display ! 800 (e.g., a touchscreen) of the device i 10, The illustrated screenshot includes three location information entrie 804 A, 1804B, 1.804C. Each entry 1804A-C includes a map 1808A-C having an indicator 18i2A~C, or pin. thereon. The pin 1812 A-C identifies a more precise location of the device 1 10 when a tracking event (i.e., connection to or disconnectio from a wireless apparatus) occurred. In the illustrated embodiment, each entry 1S04A-C also includes a date I816A-C when the tracking event occurred, a time .1820A-C when the tracking even occurred, and a status identifier 182 A»€ for the type of event. Each entry S04A-C may also include and display address information or GPS coordinates by, for example, touching or clicking on the corresponding pin 1812 A-C A user may scroll through more than the three displayed entries 1804 A-C using a scroll bar 1828 on the display 1800. In addition, the user may sort the entries ! .804 A-C by time, location, status (e.g., departures versu arrivals), and the like.
(0185] Hie location information is also exportable for further processing to another application on the mobile communication device 1 10 or to an application on a separate computing system (e,g., a laptop or desktop computer). For example, the location
infbmiation may be exported to Microsoft® Excel© as a comma separated value file, FIG. 1 provides an example of a spreadsheet or data log to which the location information has been exported. Once exported, the location information may be manipulated, (e.g., sorted, etc) as desired.
Id 186} In some embodiments, a user can select an indi vidual, record or entry 1804A-C (FIG. 18) to provide additional: information regarding that entry. For example, the user may provide a name or mnemonic for an entry. This personalized information ma he used to help i iter, display, or export more meaningful records for the user. For example, the user ma desire to name only records that are related to work, and then choose to display or export those locations for billing or reimbursement purposes. i 87} Although the mobile communication device 1.1.0 has been described as only recording and storing location information when the device 1 10 connects to or disconnects from a wireless apparatus, in other embodiments the device 1 10 may be triggered to record and store location information in response to other events. For example, the device 1 10 may log location information at set time intervals (e.g., every hour) if the devic 1 1.0 remains connected to the wireless apparatus for extended period of time without disconnecting.
Alternatively, the device 1 10 may log location information at set distances (e.g., every 10 miles) if the device 10 remains connected to the wi reless apparatus without disconnecting. Furthermore, the device 110 may log location information based on sensed conditions of the wireless apparatus itself (e.g., if power to the wireless apparatus is turned on/off, if power of the wireless apparatus drops belo or increases above preset thresholds, changes in ambient light, changes in ambient temperature, etc,). 10188} Specific details regarding some of the above-described aspects are provided. The specific details of the specific aspects ma be combined in any sui table manner without departing from the spirit and scope of embodiments of the disclosure.
V, TECHNICAL ADVANTAGES
}Ό189] Embodiments of the present invention pro vide a number of technical advantages. The security system provides a simple, efficient, interacti ve, customizable, and effective solution to monitoring, tracking, and receiving notifications regarding objects of interest. The system increases security for a consumer's personal objects leading to less identity theft and allows a consumer to rest assured that their moni ored objects are within a sale distance of them at all times and that the user may be notified if their objects of interest move out of a predetermined distance.
{0190} Anot her advantage of the present invent ion is that some embodiments of the proximity application implement an adaptable alert threshold. The adaptable alert threshold may be implemented b determining an expected signal strength reading and calculating a difference between the expected signal strength reading and the recei ved signal strengt reading. If the difference is larger than an allowed change value, the application may
calculate a threshold change value and change or update the alert threshold b the threshold change value. The updated alert threshold may then be used to determine whether the received signal strength reading is below the updated alert threshold Accordingly, if an environmental change impacts a signal strength reading drastically, the application may adapt the behavior of the system. Therefore, an adaptable alert threshold allows the application to limit false alarms that are caused by environmental interference or disturbances which do not necessarily indicate an alarm or danser situation. fO J.9.1] Another technical advantage of some embodiments of the present invention is provided by implementin a hold-off period and/or a buffer threshold to limit fal se alarm s. A hold-off period may be implemented to delay the entering of an alarm condition until a predetermined number of signal strength readings from a wireless apparatus are below the alert threshold. Accordingly, if the received signal strength readings are. below the alert threshold for a brief or momentary time period which is smaller than the predetermined hold- off period, the alarm condition may not be entered and the user may not be alerted.
Furthermore, in some embodiments, a buffer threshold may be implemented such that if the filtered signal strength reading is below an alert threshold, an alarm condition may not be entered until the filtered signal strength reading is below an additional buffer threshold that may be a further predetermined signal strength value below the alert threshold. As such, if the wireless apparatus is close to the sensitivity limit corresponding to the alert threshold, the alarm condition is not entered repeatedly if the filtered si gnal strength readings are impacted by environmental disturbances. Accordingly, both of these features provide the technical advantages of reducing false alarms which lead to higher consumer satisfaction, increase security tor the system as the user may not decrease the sensitivity setting just to limit false -alarms, and overall better performance for the system.
[01 2] Additionally, embodiments of the present invention provide the technical advantages of more efficient power usage through adaptable configuration settings.
Embodiments' of the present invention allow the application to determine a power reading of the wireless apparatus and dependin on the power reading and the received signal strength reading, the system may update the configuration settings including transmission power, rate of transmission of wireless communications including signal strength readings, and notification settings for the wireless apparatus. Allowing the application to change the configuration settings of a wireless apparatus allows the system to implement adaptable transmission power based on the current filtered signal strength readings of tire -wireles apparatus, which saves power so that the wireless apparatus does not send a wireless
communication with a transmission distance that is further than necessary, thus wasting power. Additional ly, the adaptable transmission rate can save the power supply of the wireless apparatus when the wireless apparatus is not in a dangerous situation by slowing the rate of transmission of signal strength readings,. Furthermore, increasing the adaptable transmission rate when the wireles apparatus is m a dangerou situation may lead to a more secure system as less time may lapse between received signal strength readings.
Additionally, updating the configuration settings to change the notification settings allows the system to be easily customizable by a user and allows a variety of functionality to be
implemented with the same wireless apparatus.
{0193] Finally, another advantage of embodiments of the invention is that while the fob and the mobile communication device are in range, they can be used to find each other in the case of accidental loss or misplacement of one apparatus or the other. One ma issue the request to the other, via button-press on the fob or via the application fo the mobile communication device. Accordingly, embodiments of toe present invention, provide a number of technical advantages. jO J 94] The system, and method disclosed i the present application provides selective and automatic recording of locations. The user can determine if the records are to be taken based on temporal and geographic specifications either pre-set or post-set by the user.
[01951 FIG, 15 shows a block diagram of subsystems that may be present in computer apparatuses that are used in system shown in FIGS. 1 and 2. The various participants and elements in the previously described figures may operate using one o more computer apparatuses to facilitate the functions described herein. Any of the elements in the figures ma use any sui table number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown in. FiG, 15. The subsystems shown in FIG. 15 are interconnected via a system bos 1575. Additional subsystems such as a printer 1574, keyboard 1.578, fixed disk 1579 (or other memory comprising computer readable media), monitor 1576, which is coupled to display adapter 1582, and others are shown.
Peripherals and input/output (I/O) devices, which couple to I/O controller 157.1, can be connected to the computer system by any number of means known in the ait, such as serial port 1577. For example, serial port .1577 or external interface 1581 can be used to connect the computer apparatus to wide area network such as the Internet, a mouse input de vice, or a scanner. The interconnection, via system, bus allows the central processor 1573 to communicate with each subsystem and to control the execution of instructions from sy stem memory 1582 or the fixed disk 1579, as well as the exchange of information between Subsystems. The system, memory 158.2 and or the fixed disk 1579 may embod a computer readable medium.
10196] It should be understood thai the present disclosure as described above can be implemented in the form of control logic using computer software in a modular or integra ted manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present disclosure using hardware and a combination of hardware and software.
|0197j Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C+÷ or Perl, using, for example, conventional or object- oriented techniques. The software code may be stored as a series of instructions, or commands on a non-transitory computer readable medium, such as a random access memor (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computet' readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
10.1.98] Hie above description is illustrative and is not restrictive. Marl variations of the disclosure wilt become apparent to those skilled in the art upo review of the disc losure. The scope of the disclosure should, therefore, be determined not with reference to the above description, but instead should be determined wit reference to the pending claims along wit their full scope or equivalents.
{0199] A recitation of "a", "an" or "the" is intended to mean "one or more" unless
Specifically indicated to the contrary.
|02OO] Various features and advantages of the invention are set forth in the following

Claims

What is claimed is;
1. A method for tracking a location of a mobile communication device., the mobile communication device including a processor, a memory, a transceiver, and a display, the method comprising:
communicating, by the transceiver, with a wireless apparatus;
stor ing location information of the mobile communication device in response to the transceiver one of connecting to and di sconnecting from the wireless apparatus; and
displaying the location, information on the display.
2. The method of claim 1, wherein storing the location information includes storing a first location information of the mobile communication device in response to d e transceiver connecting to the wireless apparatus, and storing a second location information of live mobile communication device in response to the transceiver disconnecting from the wireless apparatus.
3. The method of claim L further comprising:
storing a plurality of location information of the mobile communication device in response to each time the transceiver erne of connects to and disconnects from the wireless apparatus; and
displaying the plurality of location information on the display.
4. The method of claim 1 s further comprising:
storing a plurality of location information, of the mobile communication de vice in response to each time the transceiver connects to the wireless apparatus and each time the transceiver disconnects from the wireless apparatus; and
displaying the plurality of location mformation on the display,
5. The method of claim 1 , further comprising receiving, by the tratisceiver, the locatio information of the mobile communicatio device.
6. The method of claim 5, wherein receiving the location information includes receiving GPS location mformation of the mobile eoraimmication device. ?. The method of claim !, wherein storing the location information includes storing GPS location informaiion of the mobile communication device.
8. The method of claim 7, wherein storing the GPS location informatio also includes storing a date and a time of when the transcei ver one of connected to and disconnected from the wireless apparatus,
9, The method of claim 1 , wherein storing the location information includes storing the location information of the mobile communication device in the memory.
10:, The method of claim 1 , -wherein displaying the locatio information includes generating a map on the display, the map including an indicator that identifies a position of the location information on the map.
J 1 , The method of claim 10, wherein displaying the location information also includes displaying a date and a time associated with the indicator of when the transceiver one of connected t and disconnected from the wireless apparatus.
12 , The method of claim 1, wherein storing the location infbrmation includes storing the location information of the mobile communication de vice only in response to the transceiver one of connecting to and disconnecting from the wireless apparatus,
13. A non-transitory computer program product comprising computer usable medium having a computer-readable program code stored thereon, the computer-readable program code comprising instructions that, when executed by a mobile communication device having a processor, a. memory, a transceiver, and a display, cause the mobile communication device to:
communicate, by the transceiver, with a wireless apparatus;
store location information of the mobile communication device in response to the transceiver one of connecting to and disconnecting from the wireless apparatus; and
displa the location information on the display.
14. A mobile communication device that is configured to communicate with a wireless apparatus, the mobile communication device comprising;
a processor; a transceiver coupled to the processor and operable to communicate with the wireless apparatus;
a memory coupled to the processor and operable to store location information of the mobile communication device in response to the trajisceiver one of connecting to and disconnecting from the wireless apparatus; and
a display coupled to the processor and operable to display the location information.
35. A system comprising:
a wireless apparatus including a first transceiver; and
a mobile communication device including
a processor,
a second transceiver coupled to the processor and operable to corniiiuoicate with the first transceiver of the wireless apparatus,
a memory coupled to the processor and operable to store location information of the mobile communicatio device in response to the second transceiver one of connecting to and disconnecting from the tlrst transceiver of the wireless apparatus, and
a display coupled to tire processor and operable to display the location information.
PCT/US2014/026417 2012-09-12 2014-03-13 User interface for object tracking WO2014160372A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/391,203 US20150126234A1 (en) 2012-09-12 2014-03-13 User interface for object tracking
GB1503337.6A GB2524174A (en) 2013-03-13 2014-03-13 User interface for object tracking

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361780576P 2013-03-13 2013-03-13
US61/780,576 2013-03-13
US201361792568P 2013-03-15 2013-03-15
US61/792,568 2013-03-15

Publications (1)

Publication Number Publication Date
WO2014160372A1 true WO2014160372A1 (en) 2014-10-02

Family

ID=51625414

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/026417 WO2014160372A1 (en) 2012-09-12 2014-03-13 User interface for object tracking

Country Status (2)

Country Link
GB (1) GB2524174A (en)
WO (1) WO2014160372A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3041280A1 (en) * 2014-12-29 2016-07-06 Xiaomi Inc. Method and apparatus for binding intelligent device
US9954691B2 (en) 2014-12-29 2018-04-24 Xiaomi Inc. Method and apparatus for binding intelligent device
RU2659805C2 (en) * 2015-12-11 2018-07-04 Сяоми Инк. Method and device for determining the location of the target portable device
US10026287B2 (en) 2012-08-22 2018-07-17 Connect-In Ltd. Monitoring system
US20220221575A1 (en) * 2021-01-08 2022-07-14 Ford Global Technologies, Llc Low-Power Vehicle Sentinel Systems And Methods

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030060212A1 (en) * 2000-02-28 2003-03-27 Invention Depot, Inc. Method and system for location tracking
US20060105795A1 (en) * 2004-11-18 2006-05-18 Cermak Gregory W Passive locator
US20070178908A1 (en) * 2006-02-01 2007-08-02 Doyle Thomas F Method and apparatus for interlocking communication and tracking applications in a wireless communication device
US20080070593A1 (en) * 2006-06-01 2008-03-20 Altman Samuel H Secure and private location sharing for location-aware mobile communication devices
US20080270606A1 (en) * 2007-04-30 2008-10-30 Mark Gooch Remote client remediation
US20090135002A1 (en) * 2007-11-27 2009-05-28 Yahoo! Inc. Mobile device tracking and location awareness
US20110002480A1 (en) * 2009-07-02 2011-01-06 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
WO2013023091A2 (en) * 2011-08-09 2013-02-14 ACCO Brands Corporation Proximity tag

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030060212A1 (en) * 2000-02-28 2003-03-27 Invention Depot, Inc. Method and system for location tracking
US20060105795A1 (en) * 2004-11-18 2006-05-18 Cermak Gregory W Passive locator
US20070178908A1 (en) * 2006-02-01 2007-08-02 Doyle Thomas F Method and apparatus for interlocking communication and tracking applications in a wireless communication device
US20080070593A1 (en) * 2006-06-01 2008-03-20 Altman Samuel H Secure and private location sharing for location-aware mobile communication devices
US20080270606A1 (en) * 2007-04-30 2008-10-30 Mark Gooch Remote client remediation
US20090135002A1 (en) * 2007-11-27 2009-05-28 Yahoo! Inc. Mobile device tracking and location awareness
US20110002480A1 (en) * 2009-07-02 2011-01-06 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
WO2013023091A2 (en) * 2011-08-09 2013-02-14 ACCO Brands Corporation Proximity tag

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10026287B2 (en) 2012-08-22 2018-07-17 Connect-In Ltd. Monitoring system
US11854358B2 (en) 2012-08-22 2023-12-26 Connect-In Ltd. Monitoring system
EP3041280A1 (en) * 2014-12-29 2016-07-06 Xiaomi Inc. Method and apparatus for binding intelligent device
KR101759306B1 (en) 2014-12-29 2017-07-18 시아오미 아이엔씨. Method, apparatus, program and recording medium for binding smart device
US9954691B2 (en) 2014-12-29 2018-04-24 Xiaomi Inc. Method and apparatus for binding intelligent device
RU2659805C2 (en) * 2015-12-11 2018-07-04 Сяоми Инк. Method and device for determining the location of the target portable device
US20220221575A1 (en) * 2021-01-08 2022-07-14 Ford Global Technologies, Llc Low-Power Vehicle Sentinel Systems And Methods
US11650309B2 (en) * 2021-01-08 2023-05-16 Ford Global Technologies, Llc Low-power vehicle sentinel systems and methods

Also Published As

Publication number Publication date
GB201503337D0 (en) 2015-04-15
GB2524174A (en) 2015-09-16

Similar Documents

Publication Publication Date Title
US9196139B2 (en) Proximity tag for object tracking
US20150126234A1 (en) User interface for object tracking
US20140173439A1 (en) User interface for object tracking
US20150177362A1 (en) Proximity tags for vehicles
JP5972858B2 (en) Target search system and search method thereof
US9366746B2 (en) Comprehensive system and method of universal real-time linking of real objects to a machine, network, internet, or software service
US9270319B2 (en) Mobile device utilizing time of flight for personal security and localization
EP2876616B1 (en) Device location monitoring
WO2014160372A1 (en) User interface for object tracking
CN104008664A (en) Method and device for obtaining road condition information
US11663896B2 (en) Comprehensive system and method of universal real-time linking of real objects to a machine, network, internet, or software service
KR101482000B1 (en) Portable device for preventing breakaway
CN108108090B (en) Communication message reminding method and device
KR101637378B1 (en) Missing child preventing system using wearable Bluetooth device
CN107005821A (en) Method, apparatus and system for the operator scheme that sets the communicator in communication network
US20120127983A1 (en) Electronic device and method for transmitting warning information, and security monitoring system
US20180336382A1 (en) Systems and Methods for Generating Alert to Avoid Misplacement of a Device or Item
US20200349824A1 (en) Systems and methods for using bluetooth and gps technologies to assist user to avoid losing eyeglasses
CN103905982A (en) System for emergency rescue
CN109544871A (en) Safe range monitoring method and device
US20190311596A1 (en) Enhanced gps tracking devices and associated methods
TWI542187B (en) Warning tracker used in cooperation with smartphone and warning and tracking method for the same
CN102236953A (en) Tracking method of fallen mobile electronic equipment and mobile electronic equipment
CN110767285A (en) Reminding method and terminal equipment
US20150356330A1 (en) Method and apparatus for battery operated radio tags

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 14391203

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14773140

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 1503337

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20140313

WWE Wipo information: entry into national phase

Ref document number: 1503337.6

Country of ref document: GB

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14773140

Country of ref document: EP

Kind code of ref document: A1