[Technical Field]
[0001] The disclosure relates to an emergency notification system and, specifically, a personal safety mobile notification system with geographic tracking and emergency sensing capabilities for assets.
[Background Art]
[0002] Current mobile technology schemes exist for warning the general public of an emergency situation, for example a terrorist act, crime, fire, natural disaster, or any other category of potentially or actually harmful event have numerous inherent disadvantages. For example, broadcast messaging (like Short Message Service (SMS) messaging), are a passive technology that do not allow subscribers to actively interact, interface, trigger or activate a location's alarm or siren network within a proximity of the emergency. Current mobile technology schemes generally do not allow for "real time" forensic information to be electronically collected, stored or transferred to emergency personnel and/or other organizations in order to help prevent further injury or to gather information about the emergency. Additionally, "emergency situation" can also affect tangible and intangible assets, but emergency warning systems employing mobile technology do not integrate monitoring and warning of emergency situations that might be associated with these assets.
[Disclosure]
[Technical Problem]
[0003] Existing mobile technology schemes for warning of an emergency situation related to various types of assets do not allow subscribers to actively interact, interface, trigger or activate a location's alarm or siren network within a proximity of the emergency, and do not allow for "real time" forensic information to be electronically collected, stored or transferred to emergency personnel and/or other organizations in order to help prevent further injury or to gather information about the emergency.
[Technical. Solution to Problem]
[0005] Monitoring and tracking of assets might be achieved through radio frequency identification (RFID) technology, radio tags, optical emitters and the like. RFID technology might be integrated with a wireless smartphone or other mobile device enabling reading of, and interaction with, active and/or passive RFID tags as well as with databases containing information related to the assets. The wireless smartphone might interface one or more other mobile devices within a system comprising RFID readers, RF tags, and environmental sensors.
[0006] In accordance with the invention there is provided a system for safety and protection of assets according to claim 1.
[Advantageous Effects of Invention]
[0007] Embodiments of the present invention might be employed to aid in safety and protection of property including tangible objects or intangible objects of any value, importance, or personal interest. Intangible or tangible property or asset might be monitored and tracked both when stationary or in motion. Monitoring of assets might be conducted through a constant or periodic evaluation of various environmental occurrences or other events that occur outside of a predetermined acceptable range. Occurrences or events that occur outside of this range or are otherwise deemed to be unacceptable might trigger sending of an alert.
[Description of Drawings]
[0008] Other aspects, features, and advantages of the present invention wilt become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements.
FIG. 1 shows a block diagram of a mobile device having a radio frequency identification (RFID) reader integrated circuit (IC) in accordance with exemplary embodiments;
FIG. 2A shows a diagram of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers in accordance with exemplary embodiments;
FIG. 2B show a block diagram of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers in accordance with exemplary embodiments;
FIG. 3 shows an exemplary smartphone equipped with a reader screen display exemplifying various real-time and archival sensor data from one or more RFID sensor devices;
FIG. 4A shows an exemplary smartphone equipped with a reader screen display exemplifying an alert based on temperature monitoring;
FIG. 4B shows an exemplary smartphone equipped with a reader screen display exemplifying an alert based on asset tracking;
FIG. 5A shows an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and global temperature alerts;
FIG. 5B shows an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and global InTransit tracking alerts;
FIG. 6 shows an exemplary tracking system of assets when being transported from pickup through delivery;
FIG. 7 shows an exemplary tracking system of assets in which guest-smartphones are moving toward a site established by a host-smartphone;
FIG. 8 shows an example of a host-locator campus meeting place and time with two tracked independent guest-smartphone devices in accordance with exemplary embodiments;
FIG. 9 shows an exemplary host-smartphone alert based on failure of a guest-smartphone arrival to a designated site in accordance with exemplary embodiments; and
FIG. 10 shows an asset at a location, equipped with a RFID sensor/tag and in communication with a smartphone operating in accordance with exemplary embodiments.
[Best Mode]
[0009] Described embodiments relate to various aspects of devices, systems and methods for safety and protection of tangible and intangible assets that might be integrated within a mobile technology-based safety and warning system.
[0010] Hereinafter, exemplary embodiments are described with reference to the drawings.
[0011] The following detailed description utilizes a number of acronyms, which are generally well known in the art. While definitions are typically provided with the first instance of each acronym, for convenience, TABLE 1 provides a list of the acronyms and abbreviations used along with their respective definitions.
TABLE 1 |
MSM |
Mobile Safety Management Software Program |
|
UMTS |
Universal Mobile Telecommunications System |
GSM |
Global System for Mobile Communications |
|
PCS |
Personal Communications Service |
PLMN |
Public Land Mobile Network |
|
GPS |
Global Positioning System |
SMS |
Short Message Service |
|
IC |
Integrated Circuit |
USB |
Universal Serial Bus |
|
SD |
Secure Digital |
PDA |
Personal Digital Assistant |
|
DSP |
Digital Signal Processor |
RFID |
Radio Frequency Identification Device |
|
NFC |
Near Field Communication |
UID |
Unique Identifying Number |
|
GPRS |
General Packet Radio Service |
API |
Application Program Interface |
|
CCM |
Central Control Manager software |
EPC |
Electronic Product Code |
|
ISO |
International Organization for Standards |
GIS |
Geographical Information System |
|
AO/M |
Asset Owners and Manager |
PID |
Personal Identification Data |
|
GPX |
GPS eXchange Format |
KML |
Keyhole Markup Language |
|
NMEA |
National Marine Electronics Association |
CAN |
Controller Area Network |
|
CST |
Central Standard Time |
UDP |
User Datagram protocol |
|
CDMA |
Code Division Multiple Access |
IDENT |
Identification Protocol |
|
IP |
Internet Protocol |
CGI |
Cell Global Identity |
|
LAI |
Location Area Identity |
IDE |
Integrated Development Environment |
|
GUI |
Graphical User Interface |
IVR |
Interactive Voice Response |
|
|
|
[0012] FIG. 1 shows a block diagram of a mobile device having a RFID reader IC, in accordance with embodiments of the present invention. In one embodiment, mobile device
100 might be a cellular telephone, Personal Digital Assistant (PDA), or other mobile communications device. As shown, mobile device
100 includes RFID reader IC
132 and RF antenna
134 for reading data from RFID tags associated with sensors and writing data to the RFID tags. While the present embodiments are described with respect to RFID tags and RFID technology, one skilled in the art will realize that the techniques might be extended to near-field communication devices and technologies. Mobile device
100 includes GPS transceiver
104 for communication with the satellite-based global positioning system, and Wi-Fi transceiver
106 for communication with a wireless network, for example, a wireless network operating in accordance with one or more of the 802.11 communication standards. Mobile device
100 includes Bluetooth® transceiver
108 for communication with wireless peripheral devices, for example, devices operating in accordance with the 802.15 communication standard.
[0013] Cellular transceiver
110 is in communication with Public Land Mobile Network (PLMN), for example, in accordance with one or more mobile communications standards such as Universal Mobile Telecommunications System (UMTS), Personal Communications Service (PCS), global system for mobile communications (GSM), 3G, 4G, or others. As indicated by the dashed line, one or more of transceivers
104,
106,
108 and
110 might share one or more common antennas
102.
[0014] Mobile device
100 includes one or more microcontrollers or digital signal processors (DSPs), shown collectively in FIG. 1 as processor
114. Processor
114 includes at least a portion of an operating system of mobile device
100, perform signal processing for signals received from or transmitted to transceivers
104,
106,
108 and
110, and generally control operation of other modules of mobile device
100. Processor
114 interfaces with memory
112, which includes one or more memories for storage of, for example, the operating system of mobile device
100, software applications installed on mobile device
100, various user data such as contact information, calendar information, text messages, email messages, photographs, videos, or other electronic files. Memory
112 might be internal to the hardware of mobile device
100, might be on a memory card, such as a micro Secure Digital (SD) card, inserted into mobile device
100, or some combination thereof
[0015] Mobile device
100 is powered by battery
118 via power supply and power manager
116, which might typically provide required operating voltages of mobile device
100 and manage recharging of battery
118. User entry
120, which might include a touch screen input, keypad, buttons, scroll wheel, touch pad, voice commands, or other input device, allows a user to interface, make selections, and input data to mobile device
100. Mobile device
100 displays output data on video screen
122, and provides output audio data to and receives audio input data from audio input and output
126. Mobile device
100 might typically include camera
124 for taking photos and/or videos. Universal Serial Bus (USB) interface
128 might allow mobile device
100 to be plugged in to various USB devices, such as a computer. In accordance with embodiments of the present invention, mobile device
100 also includes secure encapsulator
130.
[0016] Secure encapsulator
130 might, when activated, record at least some portion or all of sensor based data received from mobile device
100. The sensor data might be sourced in a given format, protocol and technology including, but not limited to, audio, video, thermal imaging, still images, biological data, GPS location data, cellular tower data, and the like. Secure encapsulator
130, when activated, might store such data leading up to, and during, the activation of an emergency alert mode of mobile device
100. Alternatively, secure encapsulator
130 might collect sensor data over a predefined period, where when the period is reached newer data overwrites older data. In addition, secure encapsulator
130 might activate additional sensors, either local to mobile device
100, or remote to mobile device
100 through one or more of transceivers
104,
106,
108 and
110, to help record data pertaining to the emergency alert and enhance any sensors available on mobile device
100. Secure encapsulator
130 might typically, in order to save memory space, store data for a determined period of time, before erasing or overwriting the stored data. Thus, secure encapsulator
130 might be configured with programmed time duration to track, or a programmed time duration to maintain, the tracked data.
[0017] FIG. 1 shows exemplary GPS receiver, Wi-Fi transceiver, Bluetooth® transceiver, memory, processor, power supply and power management, battery, user entry touchscreen, video screen, camera, audio (speaker, headset, earpiece, microphone), USB interface and secure encapsulator) as might be incorporated in a smartphone. As described above, processor
114 includes at least a portion of an operating system of mobile device
100, to perform signal processing for signals received from or transmitted to transceivers
104,
106,
108 and
110, and generally control operation of other modules of mobile device
100. Processor
114 interfaces with memory
112, which might include one or more memories for storage of, for example, the operating system of mobile device
100, software applications installed on mobile device
100, various user data such as contact information, calendar information, text messages, email messages, photographs, videos, or other electronic files, messages, or transmissions.
[0018] In addition, a smartphone operating in accordance with described exemplary embodiments might interface to one or more other mobile devices within a system comprising RFID readers, RFID tags, and environmental sensors. Although RFID technology is specifically referred to herein, one skilled in the art might employ other systems or technologies capable of achieving the same functionality. In this particular example, RFID tag and/or sensor information is sent to a reader and the reader might write information back to the RFID tag and/or report the information to the PLMN and/or Mobile Safety Management Software Program (MSM) system and/or mobile devices, peripheral devices, or other devices capable of accepting and/or transmitting data. A mobile device antenna or other transceiver might be employed to connect to a wireless network. The device might also possess the ability to directly or indirectly communicate with an RFID reader or device controlling the RFID reader. A smartphone or other mobile device when interfaced, equipped or otherwise integrated with an RFID reader might collects data from various devices, connect to wireless networks and send and receive information across those networks related to the RFID tags, environmental sensors, encapsulators, security systems, and any other information derived from those devices. For example, smartphone technology might be integrated with RFID tags, tag readers, and sensors which might monitor changes in the environment such as climate, motion, and vibration. Mobile devices and smart phones might read and interact with RFID tags at any distance, however several mobile devices might also be integrated or networked together in communication and in some cases a mobile device within said network might remain within a designated proximity of the RFID tags to eliminate the need for mobile devices to remotely interact constantly thus saving battery power, network bandwidth, and other resources.
[0019] In another embodiment of the present invention, intangible assets such as digital intellectual property might be monitored and tracked virtually either on the internet, a private network, or a public network to ensure against corruption of data, unauthorized use, unauthorized access, and unauthorized distribution. As shown in FIG. 1, mobile device
100 also includes secure encapsulator
130. Encapsulator
130 might transmit real-time information regarding aspects of the asset, such as video, pictures, text and other information regarding the asset. The asset might be monitored and tracked to ensure against the escalation of any undesirable event, status, or state of being (e.g., theft, damage by fire or environmental conditions, and unauthorized movement). Secure cloud networks might be employed to disseminate environmental alerts endangering a tangible or intangible asset or person when an emergency situation occurs.
[0020] Any tangible or intangible item of any value might be monitored, tracked, and thereby protected. Monitoring, tracking, and reporting on the safety of the assets might be achieved in a number of ways including but not limited to: inventory/asset management software, active and passive RFID technology, RFID readers, Near Field Communication (NFC) enabled devices, distributable nodes, environmental condition sensors, forensic data, global positioning technology, wireless transceivers, cellular transceivers, mobile devices, peripheral devices operating in accordance with the 802.15 communication standard or other wireless standards.
[0021] RFID is an auto identification technology where a physical object is associated with a unique identifying number (UID) that incorporated in an RFID transponder, or tag. The RFID system has three primary components: a transceiver with a RFID decoder, an antenna or coil and a RFID tag programmed with the UID. In another example of the disclosure, asset protection might integrate any form of Application Program Interface (API), web-based or otherwise, with the asset. Smartphones or other mobile devices as described herein and equipped with RFID readers might be defined as a gateway between a tag and an intelligent distributed database system connected to enterprise and commercial software applications and other mobile devices.
[0022] Identification data might be transmitted using RF frequencies to the RFID enabled smartphone or mobile device which might then transmit said data over a General Packet Radio Service (GPRS), GSM, or other phone network and on to a networked centralized management system. The data might be gathered within open or closed loop systems, transferred to public or private networks, stored by one or more centralized databases, or any combination of the above.
[0023] Received RFID tag data might be transmitted either over a serial port or a network interface to a corporate enterprise system server or other servers. In addition, the current invention might include various safeguards allowing individuals or organizations secure access to current or past data, reporting, and other valuable information regarding the asset(s) such as history, ownership, title, financial, insurance, location, alert history, current alerts and the status of the resolution of a pending undesirable situation. Note that a redundant system might also be implemented to increase the efficiency of the network of devices involved in the current invention. A user might also access information regarding their own assets or regarding information concerning the assets. The alerts might in some embodiments transfer text, audio, video and or multimedia information related to the asset, the environment, or the status and resolution process of a pending undesirable situation.
[0024] Assets protected, monitored, and tracked might include any tangible or intangible material item such as, but not limited to paintings, classic cars, coins, stamps, autographs, books, manuscripts, fine art and photographs, films, recordings, compositions, musical instruments, electronics, museum pieces, antiques, memorabilia, patents and intellectual property (IP), music distribution rights, film distribution rights, web content, digital information or artwork, copyright protected IP, confidential documents, or any other privately and/or publically held asset and/or government owned asset. Tangible or intangible assets might be located, stored and/or displayed in one or more countries, and one or more locations such as homes, museums, office buildings, banks, bank vaults, safe deposit boxes, commercial centers, galleries, industrial centers, park and recreation geographies or any other location. In addition, the asset might be tracked when in transit between one or more locations.
[0025] The RFID reader might be integrated with the smartphone components such as those described above with respect to FIG. 1. In terms of hardware, the RFID reader IC
132 and the RF antenna
134 desirably fits within a standard handheld mobile device or smartphone. The RFID enabled mobile device or smartphone might include software (e.g., an application or "APP") that programs and/or reprograms RFID tags. In addition, the software might be enabled to both reading from the RFID tags and writing to the RFID tags as shown in FIG. 2A.
[0026] There are four frequency bands for RFID communication varying from low frequency, high-frequency, ultra-high frequency and microwave. The appropriate frequency for the RFID-enabled smartphone depends on the range required by the application for which it is going to be used. High-frequency bands that allow communication in a few meters are expected to be appropriate for the RFID enabled smartphone. More specify the appropriate frequency ranges in different parts of the globe causing incompatibility issues between tags and RFID readers. The current invention enables RFID equipped smartphones to interface multiple standards, protocols and platforms.
[0027] For example, one application might allow a museum patron of the arts to interface in a museum guide of assets through the smartphone device. The smartphone device might provide an interactive asset map of all exhibits within the complex. A virtual tour or exhibit might be customized in accordance to the patron's interest and accessed through their mobile device.
[0028] FIG. 2A and FIG. 2B show aspects of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers. FIG. 2A shows a RFID network
1406 (a.) including a smartphone RFID equipped reader
1401 (a.) which reads one or more RFID sensor tags
1403 (a.) in one or more environmental sensors. The sensor tag might enable various asset environmental monitoring as described subsequently with respect to FIG. 3.
[0029] A mobile device or smartphone is a device connecting to GPRS, GSM or other wireless networks and is able to run on its operating system an application/software and Graphical User Interface (GUI) for the purposes of RFID reading, tracking, and monitoring. In addition, FIG. 2A and FIG. 2B show an exemplary network database and system transferring RFID information to one or more external databases that enable one or more value-added services. The mobile device communicates with a centralized asset management and control system via any of the various communication protocol, platform, format, frequency, database network or system. In addition, it should be easily integrated with call initiation or wireless data transmission so that data collected via the RFID reader can be transmitted over the wireless phone network to a centralized database. It may also require special provisions from the smartphone operating system, to generate alerts related to the sensor RFID tag. The communication between the RFID tags and the RFID enabled smartphone might be encrypted using cryptographic algorithms and authentication. The RFID tag sends identification data using RF frequencies and the RFID enabled cell phone transmits it over the GPRS or GSM and phone network to the central ized asset management and control system.
[0030] Referring to FIG. 2A, smartphone device
1401 (a.) is equipped with one or more RF applications (e.g., RFID reader
132 shown in Fig. 1) and is RFID-enabled. The equipped smartphone reader is embedded with at least one RF transceiver (e.g., Wi-Fi or Bluetooth®), an RFID-reader, and environmental sensor readers). RFID-tagged tangible asset
1404 (a.), is integrated with the asset management and control system, central database and server and network architecture, as well as a graphical user interface that might be in the form of a software application or hosted on a web server and accessed by way of the internet. Smartphone device
1401 (a.) includes a graphical user interface that might be used by a user to access the features as outlined in FIG. 2A and FIG. 2B. Information associated with any given asset might be accessed by the general public or in cases in which information regarding some assets is proprietary and thus access would be restricted and/or limited. Information for assets might be organized and referenced in the database by their unique RFID number and other identifying information that might also be associated directly with the RFID tag itself.
[0031] Environmental occurrences include, but are not limited to, temperature, humidity, gaseous content, chemicals, air quality, air pressure, radiation, vibration, exposure to light and other factors which will trigger an alert if the optimum range is exceeded or falls below the thresholds of what is determined or generally considered by experts to be optimal conditions. For example, if the active RFID Sensor monitoring of the asset exceeds 23.89°C (75°F) the sensor would trigger an alert.
[0032] In FIG. 2B, three logical processing sections are shown for the system illustrated in FIG. 2A: the Sensor RFID processing, the mobile reader protocol processing, and the central database/server processing (shown as ProActive Alert API). The smartphone equipped with an RFID reader
1401 (a.) collects information from active and/or passive RFID tags during Sensor RFID processing and transfers the information to the mobile reader protocol processing. The exemplary communication network as shown in FIG. 2A and 2B might interface any platform and architectures as well as a multitude of devices through location Base Network
1402(a.) or a wireless network (e.g., GSM or Wi-Fi). Referring to FIG. 14B, an RFID reader (interrogator) extracts the UID from the tag as referenced by the UID architecture at Sensor RFID processing
1407 (b.).
[0033] In some embodiments, the smartphone includes an RFID tag (hereinafter, a "smartphone/RFID tag"). In other words, the smartphone has an embedded or attached RFID chip with identification information programmed on it. When the smartphone/RFID tag including the RFID reader (e.g.,
1401 (a.) and
1406 (b.)) is within range they can communicate: the RFID tag information is sent to the reader and the reader might write some information back to the smartphone's RFID tag. Cloud storage
1410 (a.) through
1413 (a.) represent at least four distinct organizations which might securely access asset information including, but not limited to, alert notifications of information corresponding to actions based on their ownership and service. Cloud storage
1410 (a.) might represent the individual asset owners, financial companies or investment banks' managed investment vehicles that include the assets, private placement investment vehicles including the assets, all of which might access asset information regarding their property, cloud storage
1411 (a.) might represent a manner for insurance companies to manage, track, and monitor assets they insure or are providing policy quotes for, cloud storage
1412 (a.) might represent emergency organizations and other related fields such as forensic laboratories which might be granted limited access based on the severity of a situation or the needs of any investigations they may conduct. Cloud storage
1413 (a.) might represent public access to information regarding their security if held by a public security vehicle such as a mutual fund for example. One skilled in the art will realize that various levels of security and access as well as scope of access might be restricted and controlled by an asset management and control system as described by the current invention. It is also understood that firewalls might be incorporated in order to help retain the integrity of the safety, security and privacy of each asset and or asset classification or fund.
[0034] Cloud storage processing
1411 (b.) represents actions such as by insurance companies and other asset owners monitoring and tracking assets that they have insured, and this might be performed in real-time. Mobile sensor smartphone reader module
1404 (b.) and other LAN networks
1402 (a.) might detect alert warnings, environmental warnings and other information if warranted and authorized as represented by processes
1408 (b.) and
1409 (b.). For example, module
1404 (b.) shows a TRIGGER ACTIVATION (ON) switch which might be activated when and if various environmental thresholds are reached. Threshold set-points might be dynamically programmed through a central server
1410 (b.) local severer where the asset is held represented by location base network
1402 (a.) and/or by a smartphone reader equipped device (as shown by
1401 (a.) and
1404 (b.) and herein described).
[0035] Non-wired RFID sensors generally rely on an independent battery power source. The current invention includes periodic and or constant monitoring of the asset. However, periodic monitoring and constant monitoring when not wired to a power source might exhaust battery power. One of the main benefits of the current embodiments is that threshold set-points and ALERT TRIGGERING extends the life of the RFID battery when armed to protect the asset. Alert threshold set-points
1403 (b.) are generally predetermined through industry practice or experiment. A Mobile Sensor Reader module
1404 (b.) defines TRIGGER ACTIVATION (ON) as harmful or otherwise unacceptable situation occurring (usually in real-time). This alert activated TRIGGER ACTIVATION (ON) thus minimizes battery consumption by activating full functionality only in the event that undesirable conditions occur outside of the predetermined acceptable optimal limits required to maintain and protect the asset. For example, instead of constant monitoring of temperature, the alert trigger(s) might be engaged if the thermometer crosses a programmed minimum or maximum temperature threshold and/or a humidity set-point, maximum light exposure, or unauthorized movement or proximity. When the set-point threshold is crossed the sensor will activate and signal an alert to an asset management and control system. For example, the RFID sensor threshold set-points
1403 (b.) might be programmed to monitor the air for smoke or other gases, chemicals, and airborne substances that might potentially damage the asset. If it were determined that the air quality around the asset had exceeded acceptable levels, this would automatically trigger and set in motion the alert process.
[0036] The advantages of the automatic triggering of the alert system include maximizing battery life while minimizing monitoring requirements. In addition, solar powered RFID sensors and other similar green technologies might be used to power RFID and sensor units in order to extend battery life while in transit over long distances.
[0037] Key environmental monitoring and tracking data module
1405(b.) receives and processes data that might be entered from one or more databases in order to provide various functional asset sensor control tools (e.g., management/managerial command control)
1402 (b.) and set-points (thresholds)
1403(b.). Optimal environmental conditions might vary greatly depending on the classification of an asset. For example, rare coins might not be as susceptible to exposure to sunlight, but rare painting are. One skilled in the art will realize that the alert threshold set-points as well as the types of environmental and other conditions being monitored might vary widely depending on the asset and the situation. In some cases, comprehensive monitoring and tracking measures might be required, while for other cases monitoring and tracking might be handled to a more limited degree. This level of monitoring and tracking might be determined, for example, by an asset owner, experts, managers, or by insurance companies.
[0038] The host database and server represented by
1407(a.),
1408(a.),
1410(b.) might store information regarding the asset such as, but not limited to, history of the asset, location, environmental historical archive of alerts, financial information, title and ownership history, market price valuation data, quality evaluation data, forensic history and data, appraisal information and other qualitative and quantitative analysis.
[0039] Access to asset information might be controlled by incorporating a user ID, biometric access and other means of secure login registration via module
1408(b.). In addition, management control system
1400(b.) and central database and server module
1408 (a.)/ 1409 (a.)/ 1410(b.) might generate, store, and present real-time and archival data on an individual asset or group of assets, location(s) of the asset(s), information regarding storage and the archival history of placement and other management tools including but limited to location tracking, environmental sensor alerts, theft alerts, alerts concerning important market information regarding the asset(s), and other information regarding the monitoring or history of the asset(s).
[0040] In another embodiment of the current invention, alert threshold set-points
1403 (b.) based on the acceptable range of conditions might be dynamically adjustable when moving the asset from one approved location to another in order to adjust to altitude, humidity, temperature and other factors. FIG. 2A shows RFID sensor
1403 (a.) attached or in proximity of the asset. These sensors might detect any environmental threshold which might affect the tangible or intangible asset. Detector
1416 (a.) might be, for example, a motion detector attached to the RFID sensor which might monitor the movement or proximity of a person to the asset as well the proximity of a person getting too close to the asset as exemplified by a person crossing the line and moving too close when viewing a museum art asset. If a person goes over the designated line the motion detector might trigger the sending of an alert notification to museum security guard(s) mobile devices within the area (as represented by alert
1505, described subsequently for FIG. 3).
[0041] The programming of set-points for each RFID sensor tag monitoring the asset might be programmed to trigger an alert based on exceeding various environmental set-points (e.g., programmed to trigger warning when environmental conditions warrant). For example, if a temperature set-point optimal storage temperature is 68°F and elevates to 70°F, given the danger threshold alert was set at 72°F the warning alert might be sent to the persons responsible for the asset. The programming of set-points for each RFID sensor tag monitoring the asset might also be programmed to dynamically adjust set-point thresholds to meet all unique conditions of place and environment. The programming of set-points for each RFID sensor tag monitoring the asset might further be programmed to trigger an alert based on periodic or constant monitoring of environmental conditions. Constant monitoring might be necessary in certain conditions when transporting the asset for example or after an alert has been activated. When an alen has been activated the environmental sensor might be reset and rearmed (as shown in FIG. 2B by processes
1412 (b.) and
1413 (b.)). The alert or alert information might be logged and archived in the central database for future reference.
[0042] Table 2 shows an exemplary set of threshold set-points which might be programmed onto the RFID tags themselves via the wireless network or on site. As shown in Table 2, a temperature set-point, for example, for a Van Gough painting represented by the RFID tag serial number/ UID number (as referenced in FIG. 2B and FIG. 3 as
1407 (b.) and
1504) might, for example, refer to the specific asset 177408748124549018. Asset serial number177408748124549018 has, for example, an optimal temperature range of 68° F-72°F (20-22.22°C), if a temperature over 72°F (22.22°C) is reached an alert might be sent out to all parties associated with the asset. In addition, Table 2 exemplifies other environmental condition set-points such as humidity and lumens. One skilled in the art might extend the teachings herein to set other condition and environmental set-points, which are then programmed and monitored.
TABLE 2. ENVIRONMENTAL RFID SENSOR THRESHOLDS SETPOINTS
Form of Asset / Material | Relative humidity in % | Temperature in °C/FH | Illuminance in Lux |
1. |
Optimum Painting Setpoint RFID No. 177408748124549018 Van Gough |
45-50 |
+20-22.22/68-72 |
Varies, stability is best for all |
2. |
Oil and Acrylic Paintings on wood or canvas |
50-65 |
+20-23.89/68-75 |
150-200 max. 500 short term |
[0043] FIG. 3 shows a smartphone equipped with a reader screen display (mobile device
1500) exemplifying various real-time and archival sensor data from one or more RFID sensor devices. Mobile device
1500 as described by FIG. 3 is equipped with a sensor reader reads tags and is alerted if the RFID Tag reader and/or sensor monitoring the asset detects an environmental condition that falls outside of an acceptable range of measurements or threshold set-points (thus triggering an alert). Optimal threshold set-points might be defined as a measure of temperature or a maximum relative humidity percentage, the detection a vibration which exceeds an acceptable m/s
2, light exposure which exceeds an acceptable level of lumens, static electricity exceeding beyond an acceptable kv unit, and other environmental conditions which might affect the value and longevity of an asset. In addition, smoke detection, motion detection and a multitude of other environmental sensors set-points might be monitored by the current invention as represented by
1503.
[0044] RFID Alert data
1504 as shown might include information of standards established by the Electronic Product Code (EPC) and international Organization for Standards (ISO), which define data structures within the tag and allowed/available frequencies. One skilled in the art will recognize that the current invention might utilize any frequency, standard or platform available for such purposes described herein. RFID numbers might include a comprehensive database of information pertaining to one asset or a group of assets.
[0045] Smartphone equipped readers might access global sensor alerts resulting from environmental triggers, as referenced by various entries
1503. A central computer system might log, trace and monitor one or a multitude of various asset classifications, located in various geographies and stored under a wide variety of conditions and programmed setpoint thresholds. Each art asset and corresponding RFID tag might be globally monitored by authorized personnel order to protect the asset.
[0046] The RFID tag might also contain information regarding history of the asset, ownership history, financial data, present location, past locations, location tracking, asset security, environmental climate security and other information regarding the asset. Sensor alerts
1503 reference various environmental sensor alerts from one or more location. Environmental sensors as exemplified by alerts
1503 represent buill-in sensors including but limited to temperature monitoring alerts, light exposure monitoring alerts, humidity alerts, air composition alerts, chemical alerts, vibration alerts, weather alerts and the like. A comprehensive Geographical Information System (GIS)
1506 might integrate with the asset management and control system, as well as other personal safety and/or security alert systems, to track and monitor assets as well as capture, store, manipulate, analyze, manage, and present all types of geographical data information as shown in the Mobile Asset Management Reader icon represented by FIG 3. The alert information might be accessed through one or more secure networks or central servers as previously described.
[0047] In addition, the host computer as well as mobile devices equipped with readers might securely access and receive information and alerts from one or more locations. For example, temperature sensor alerts
1501 (and
1601 of FIG. 4A described subsequently) reference six alerts related to assets in different locations that exceed the optional range of 72°F. Intangible and tangible assets and property locations might be vaulted, in a home, commercial building, displayed in a museum or gallery or any other outdoor or indoor environment.
[0048] If the RFID system detects a problem associated with the asset, an alert might be sent to various smartphones and closed end or opened ended databases or sub-databases. Information pertaining to a single RFID monitored asset might for example, provide text and or audio, and or visual and or multimedia commentary of the art asset through the smartphone or other device.
[0049] The application might be capable of utilizing Wi-Fi or Wi-Max communication, or communication via other wireless frequencies, and access a wireless router in order to disseminate any and all information regarding one or more assets within a given geographic location or a multitude of locations. It must also be noted that the coordinates of an asset might be determined according to not only the "x" and "y" values but the "z" indicating altitude as well.
[0050] Theft alerts as represented by alert
1507 are based on the theft of any asset of any value tangible or intangible. The alert process might include the addition of RFID sensors monitoring the theft of the asset as previous described in the context of the asset based sensor alert management system.
[0051] Alerts
1502(a.) represent various GPS asset tracking alerts, which in the example shows 8 assets in different locations that are accessed through the Mobile Asset Management System through one or more servers and subservers. In addition, Locator
1502(b.) refers to a locator GPS Beacon for each transit alert which logs and stores the position and trail of the asset within the transporting vehicle at regular intervals.
[0052] FIG. 4A and FIG. 4B show two views of an exemplary smartphone equipped with a reader screen display exemplifying an alert based on temperature monitoring and asset tracking, respectively. Alerts triggered by an unacceptable change in temperature are a component of the environmental threshold set-point as shown by alert
1601. Alert
1601 shows six global alerts that were sent to the owner(s) of the assets or organizations involved with the assets. Address data
1602 shows the location address of one of the exemplified alerts. RFID number: 177408748124549018, in this example, is located at 150 Price Rd. St. Louis MO, 63124, USA. Also, detailed current and historical information regarding the asset(s) and related or unrelated to alerts might be accessed. RFID serial number
1604 might be cross referenced to the specification of the temperature alert
1605 which posts a current temperature of 87.1°F, and which might be updated regularly in real-time. Maximum allowable temperature
1606 exemplifies the maximum allowable temperature programmed through the threshold set-point parameters. Time duration alert
1607 shows an example of the time duration of the alert from the time it was initiated up to the present time. The time might be translated to any standard time zone, date and time scale. Alert
1603 refers to a "Mobile Asset Network" alert sent to Asset Owners and Managers (AO/M's) exemplified by M45233j and other mobile shared mobile access codes. Alert scale
1608 quantifies a dynamic analysis management tool that is capable of prioritizing incoming alerts according to their urgency and state of resolution.
[0053] InTransit tracking alerts
1609 references an example of an alert in which an asset is being tracked as it is moves and lists the number of managed InTransit alerts (which in this particular example is one). Screen area includes data
1610 that identifies the RFID number and current location of the asset in transit. A map
1611 might be used to display the location of the asset, the destination, structures that are being entered or exited, a time locator matrix, GPS guidance system accident alert, arrival notification and in-transit tracking set-point and reset-points as described in FIG. 2B, as well as the optimal approved route. 124988 referenced by data
1614, represents a serial number for a designated destination. Data
1615 references the time the alert was sent. Data
1612 exemplifies an accident and a route detour in order to avoid weather conditions, road construction, reported theft alerts and other hazardous conditions which might otherwise jeopardize the safety of the assets. In addition, other information might accompany the InTransit alert, such as but not limited to traffic patterns, maps and other environmental conditions. Such collection and in transit tracking might allow for, for example, allocation of liability for damage to an asset as it travels to the destination by identifying and/or detecting events that might have caused the damage while in an agent's and/or carrier's possession.
[0054] FIG. 5A and FIG. 5B show two views of an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and alerts, respectively. Temperature alerts detected globally total six in example. Map display area
1702 enables the user to pinpoint one or more assets which a temperature alert has been detected and through the touch screen zero in on the precise GPS location. In addition, other information regarding the temperature and other related sensor activity might be viewed in real-time. Archival alerts for asset shown on map display area
1702 might be accessed as described previously in the current invention. Mobile InTransit alerts tracking alert globally total 8 in this example as shown in alerts
1706 (a.) and
1706 (b.). The RFID serial number might be accessed in order to check transit status, cargo authorization, vehicle registration, transit route, third party transportation companies and organizations, driver's licenses, weather and other conditions, road construction, purpose of shipment, value, information about the asset and it history, ownership and other information.
[0055] A Mobile Asset Management network might give users the ability to keep track of a vehicle charged with transporting an asset as well as the individual asset itself. The system of the current invention, might link the assets RFID to the vehicle's RFID through a Personal Identification Data (PID) data pusher or other data archetypes. GPS or other similar technologies might be used for asset tracking, personal tracking, vehicle tracking and other related tracking requirements relative to the global tracking of assets
1706(b.) and
1707(b.) that are classified as in transit.
[0056] FIG. 6 shows an exemplary tracking of assets when being transported in conjunction with a network of mobile devices and alert notification based on weather and traffic conditions from the pickup location through delivery. A GPS logger might record the in transit (InTransit) positions of one or more asset as shown at display
1801 at regular intervals in its internal memory within the RFID chip and or mobile reader. Display portion
1803 shows eight InTransit alerts having been logged and tracked through GPS from the original starting point exemplified by displayed global position
1802. A memory card slot, or internal flash memory and a USB port might be interface the mobile device allowing downloading of the track log data for further analysis from the cloud network through the mobile asset tracking and management system. In addition, various tracking technologies might be used including but not limited to GPS eXchange Format (GPX), Keyhole Markup Language (KML), National Marine Electronics Association (NMEA) or other format.
[0057] A GPS navigation device and GPS-integrated mobile devices or smartphones running GPS tracking software might enable the device to be a data pusher (or logger) device. "Bread crumb" GPS asset tracking exemplified by transit path display
1804 might track the transported asset from its original designation. Point-to-point access to the InTransit cargo might be achieved by a combination location hardware (or tracking devices) and (racking software. This combination is often referred to as an Automatic Vehicle Location system. The tracking device might be hardwired and installed in the vehicle; connected to the Controller Area Network bus (CAN-bus), Ignition system switch, battery. It allows collection of extra data, which might be transferred to the GPS tracking server and available for viewing via a secure website accessed over the internet, where asset tracking can be viewed live or digital maps and reports to its final designation as exemplified by endpoint
1805 might be stored and referenced at any time.
[0058] GPS data pullers, also known as GPS transponders, might be incorporated to track the position of assets position at regular intervals; these devices are "always-on" and might be queried as often as required. GPS data pullers can often be used in the case where the location of the tracker will only need to be known occasionally e.g. placed in area with high risk of a theft alert, or that does not have constant supply of power available therefore limiting the ability to send data on a constant basis.
[0059] FIG. 7 shows an exemplary tracking system of assets in which guest-smartphones are moving toward a designated site established by the host-smanphone. Host-smartphone
1901 establishes a hosted meeting designation including xyz coordinate locator and time. The setting of a campus based environment might include any building and or geography. The "campus" in this example a stadium was entered by the host-smartphone as the meeting place (section 204, Row F, seats 17-20, is shown in FIG. 7 as the designated location). The time established by the host-smartphone is 7:00 PM central standard time (CST). Guest-smartphone invitees are limitless and might include guests carrying smartphones which travel to the hosted meeting designation by car, foot, boat, plane, train or any other means of transportation. In addition, the smart system might include groups which are in real-time tracked by one or more guest or host-smartphones. In another example of the disclosure a GPS logger might log the position of one or more devices and not only track real-time positions, but also the positions of any guest-smartphone or other mobile device as well as access archival information such as positioning, information regarding the event or place, warnings, alerts and other safety information.
[0060] GPS pathways
1904 (a.) and
1904 (b.) illustrate paths taken by two guest-smartphones as logged through respective GPS coordinates. GPS pathway
1904 (a.) exemplifies a guest traveling at 3 mph toward the host-smartphone designation. The guest-smartphone (with user named "John") has an estimated time of arrival of 6:55PM as given in label
1902. Although the user in this example is traveling by foot, it is understood by anyone familiar with the art that any transportation method might be used and displayed as such to users. Another guest-smartphone (with user named Jane) is traveling at 2 mph with an estimated time of arrival of 7:01 PM as given in label
1903.
[0061] FIG. 8 shows an example of a host-locator campus meeting place and time as well as two independent guest-smartphone devices being tracked. GPS pathway
2002 (a.) illustrates John's path to the host-smartphone's meeting designation. Path
2004 is an example of a "best" path, where "best" is, for example, either a shortest, a fastest, or a safest course of travel to destination
2001. However, in this example John has taken an alternative path which now increased the estimated time of arrival to 6:58 PM. The other user (in this example, named Jane)
2006 along GPS pathway
2002 (b.) is provided optimal and alternative route information and is also provided with the other user's (John's) route information and options as well. In another example of the disclosure, when Jane's guest-smanphone approaches the stadium, a diagram map of the stadium might be displayed on the corresponding smartphone in a manner as a street map if "walking" is displayed. The football game's score, game brochure, concession stand locations, menus and specials, electronic tickets for admission into the stadium and other information might also be embedded on the phone and securely accessed and retrieved. Radio Frequency identification might be integrated in a combination with other wireless platforms, databases and cellular networks in order to provide seamless access to enriched data. Guest-smartphone users as well as host-smartphone users might access all types of data including, but limited to, text, maps, video, audio or multimedia.
[0062] FIG. 9 shows an exemplary host-smartphone alert, based on a failure of the guest-smartphone's arrival to the designated and scheduled-time meeting site. Event
2105 shows an exemplary confirmation that the guest-smanphone
2103 held by Jane has safely arrived at the host-smartphone designated site. Concurrently, the host-smartphone GPS tracking system warns the host that one of the guest-smartphones is nine minutes late and not moving.
2102 shows John's guest-smartphone is travelling at 0 mph and that the MSM system has determined through collecting encapsulator data the possibility that John may be in distress.
[0063] The "Mobile Safety Network" might enable the host-smartphone to directly contact the guest-smartphone inquiring if they are in distress or lost and or send a message to the general public within various set radiuses. In addition, as referenced previously in the current invention, one or more host-smartphones might attempt to contact one or more guest-smartphones if a delay in arrival occurs.
[0064] For an example an overriding message to the guest-smartphone might send an audio, text, or other message regarding if the user is distressed or in trouble. Overriding, as defined in the present invention, is the ability to remotely to activate the guest-smartphone
2102 based on previous permission from John to allow environmental encapsulator functionality. The ability to activate a cell phone that is turned off or not functioning might be utilized by the
2101 host-smartphone or emergency dispatch authorities
2104 as previously described. The permission to allow another device to remotely access encapsulate the audio, video, photos, real-time or archival location tracking might be either temporarily granted or controlled by the guest-smartphone. It is obvious that in case that an alert is sent from the host to the emergency dispatch units and or in this example stadium security
2104, emergency authorities might circumvent access any data necessary to assist the individual in need.
[0065] FIG. 10 shows an asset
2203(a.) at a location, equipped with an RFID sensor/tag and in communication with a smartphone
2201. The asset of FIG. 10 might be, for example, located in a museum, art gallery, show room, corporate or government building, historical site, architectural structure, bridge, tower, monument, gravesite, ocean geography, recreational park and/or other geographic/campus location whether indoors or outdoors. Asset
2203 (a.) represents an exemplary painting referred to in the current invention as an asset. The exemplary asset is displayed to the public in a museum or any other location. The current invention includes a Smart Location Platform
2201 which might be defined as asset information database and server which might dynamically receive and transmit information regarding asset
2203 (a.) or other assets when in proximity or upon demand by the smartphone reader user, such as described above. The Smart location Platform
2201 might include a wireland or wireless sensor device which monitors the asset as herein described. In addition, as understood by those skilled in the art, integrated voice, Interactive Voice Response (IVR), SMS, SMS aggregation might be carrier independent (GSM, CDMA, Identification Protocol (IDENT)) and network independent (lP, radio, User Datagram protocol (UDP)). In addition Smart location Platform
2201 might interface one or more deliverable nodes and modules, a secure mash-up using Integrated Development Environment (IDE) and a secure database information archive server when accessing asset information.
[0066] In yet another example of the disclosure, flexible message delivery and content type might utilize push and or pull technologies. The RFID tag chip and programmed software shown as RFID sensor
2204 might contain any type of environmental sensor as well as previously described herein. The RFID tag might be equipped with a distance proximity algorithm
2206; the programmed distance
2205 from the asset might vary and be adjusted by the owner of the asset on display. Distance
2205, in this example, might be established as a security set-point by museum administration. If the security line is crossed by a person or object (e.g., a security guard) guard alert
2204 (a.) might notify security personnel in real-time of the situation, which in this case presents immediate danger the asset.
[0067] Another example of the disclosure, using the same example of a museum asset which is on display to the public, alert
2204 (a.) allows smartphone
2201 (by action of its user) to trigger a notification based on their "in the field" observation. Signal
604 (b.) from smartphone
2201 triggers a notification to a guard, an emergency responder, or other authority relative to the degree of potential harm to, or theft of, the asset. In addition, a user of smartphone
2201 might initiate an encapsulation of asset
2203 (a.) by activating button
2204 (c.). The encapsulation of the situation might be by activating the video, facial recognition, photos, audio and other technologies which might capture information regarding a situation which might endanger the asset.
[0068] Smartphone
2201 is capable of dynamically accessing information regarding asset
2203 (a.) display information, and an asset information archive might be accessed through the smartphone, instead of the current method of handing out phone devices or headsets (e.g., station information
2207 and video/audio/multimedia and track information
2208, 2209). The smartphone might detect which asset, station or asset through the RFID tag proximity reading application, the station or what area of the museum or campus, relative to an exhibit or selected patron interest in a certain asset such as 16
th century art or Chinese Ming Dynasty sculpture for example. The museum patron in this case might customize Italian Renaissance paintings query through the Mobile Asset Management system and Smart Location Platform. A GPS-based guiding system and map helps guide the patron to one asset to another as shown and exemplified by title
2210, history
2211, related historical archive (e.g., other similar artists)
2212; other exhibits
2213 at the site or other geographies; special features
2214 (such as for example interviews, documentaries, books, and news articles, Internet and other data access), artist archive
2215 (e.g., other paintings by the artists and where the paintings etc.), and other historical data
2216.
[0069] The smartphone reading application might provide detail of the asset when in proximity of the asset. Asset information might be in any form of text, video, audio, pictures and or multimedia regarding the painting for example or its historical linage and heritage. In addition, solar powered RFID sensors and other technologies might be used to powered units in order to extend battery life while in transit over long distances.
[0070] GPS data pullers, also known as GPS transponders, might also be incorporated to track the asset's position at regular intervals; these devices are always-on and can be queried as often as required. GPS data pullers might be used in the case where the location of the tracker will only need to be known occasionally e.g. placed in area with high risk of a theft alert, or that does not have constant supply of power available, therefore limiting the ability to send data on a constant basis.
[0071] As described herein, some examples of the disclosure, might be implemented as a software application downloadable to a mobile device. The downloaded software application might work with existing hardware of the mobile device to implement an emergency notification alert system as described herein. For example, some examples might be available as an "app" or icon on the screen of the mobile device. Alternatively, some examples of the disclosure, might require special purpose hardware, and this might only be compatible with mobile devices having the emergency notification hardware.
[0072] While the exemplary examples of the disclosure, have been described with respect to processing blocks in a software program, including possible implementation as a digital signal processor, micro-controller, or general purpose computer, the present invention is not so limited. As would be apparent to one skilled in the art, various functions of software may also be implemented as processes of circuits. Such circuits may be employed in, for example, a single integrated circuit, a multi-chip module, a single card, or a multi-card circuit pack.
[0073] The present invention can be embodied in the form of methods and apparatuses for practicing those methods. The present invention can also be embodied in the form of program code embodied in tangible media, such as magnetic recording media, optical recording media, solid state memory, floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. The present invention can also be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium or carrier, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code segments combine with the processor to provide a unique device that operates analogously to specific logic circuits. The present invention can also be embodied in the form of a bitstream or other sequence of signal values electrically or optically transmitted through a medium, stored magnetic-field variations in a magnetic recording medium, etc., generated using a method and/or an apparatus of the present invention.
[0074] As used herein in reference to an element and a standard, the term "compatible" means that the element communicates with other elements in a manner wholly or partially specified by the standard, and would be recognized by other elements as sufficiently capable of communicating with the other elements in the manner specified by the standard. The compatible element does not need to operate internally in a manner specified by the standard.
[0075] Also for purposes of this description, the terms "couple," "coupling," "coupled," "connect," "connecting," or "connected" refer to any manner known in the art or later developed in which energy is allowed to be transferred between two or more elements, and the interposition of one or more additional elements is contemplated, although not required. Conversely, the terms "directly coupled," "directly connected," etc., imply the absence of such additional elements. Signals and corresponding nodes or pons may be referred to by the same name and are interchangeable for purposes here.
[0076] It will be further understood that various changes in the details, materials, and arrangements of the parts which have been described and illustrated in order to explain the nature of this invention may be made by those skilled in the art without departing from the scope of the invention as expressed in the following claims.