Patent classifications
G08B21/0261
Generating Unexpected Location Notifications
In some implementations, a first computing device can send notifications at times that the first computing device is not in an expected location. A user of a second computing device can remotely configure an expected location for the first computing device, which may be a particular location for a certain period of time. During that time, the first computing device can monitor its own location and check whether it is within the expected location. If the first computing device unexpectedly leaves or fails to enter the expected location, the first computing device may transmit a notification to the second computing device. Similarly, if the first computing device loses connectivity with other devices, a server device may notify the second computing device that the location of the first computing device cannot be determined.
Systems and Methods for Semi-Autonomous Individual Monitoring
Various embodiments provide systems and method for monitoring individuals.
Tracking device for a track and locate system
A tracking device for a track and rescue system that wirelessly couples to a control system via a first link established between a control system first type wireless communication interface coupled to the control system and a tracking device first type wireless communication interface included in the tracking device when the tracking device first type wireless communication interface is within range of the control system first type wireless communication interface. The tracking device determines that a first predetermine time period has been satisfied, and in response, determines location information for the tracking device using the positioning system. The tracking device sends, in response to the first predetermined time period being satisfied, an alive signal to the control system via the first link, and the alive signal includes the location information.
Estimating motion of wheeled carts
Examples of systems and methods for locating movable objects such as carts (e.g., shopping carts) are disclosed. Such systems and methods can use dead reckoning techniques to estimate the current position of the movable object. Various techniques for improving accuracy of position estimates are disclosed, including compensation for various error sources involving the use of magnetometer and accelerometer, and using vibration analysis to derive wheel rotation rates. Also disclosed are various techniques to utilize characteristics of the operating environment in conjunction with or in lieu of dead reckoning techniques, including characteristic of environment such as ground texture, availability of signals from radio frequency (RF) transmitters including precision fix sources. Such systems and methods can be applied in both indoor and outdoor settings and in retail or warehouse settings.
Generating unexpected location notifications
In some implementations, a first computing device can send notifications at times that the first computing device is not in an expected location. A user of a second computing device can remotely configure an expected location for the first computing device, which may be a particular location for a certain period of time. During that time, the first computing device can monitor its own location and check whether it is within the expected location. If the first computing device unexpectedly leaves or fails to enter the expected location, the first computing device may transmit a notification to the second computing device. Similarly, if the first computing device loses connectivity with other devices, a server device may notify the second computing device that the location of the first computing device cannot be determined.
MULTI-ENTITY MANAGEMENT OF A NODE IN A WIRELESS NODE NETWORK
Methods and apparatus are disclosed for multi-entity management of an ID node in a wireless node network. The ID node associates with a first entity user access device, which operates as a master node and communicates directly with a server over a first communication path. The first device separately communicates with the ID node over a second communication path, but the ID node is unable to directly communicate with the server. The ID node provides the first device with access to data collected by the ID node if an initial privilege authorizes it. After associating with a shipping entity master node, the ID node provides the shipping entity master node with the data collected based on a transferred privilege from the server. And then after associating with a second entity user access device, the ID node provides access to this second device if authorized by a destination privilege from the server.
COMPLIANCE METRICS FOR OFFENDER MONITORING DEVICES
- Jonathan Dale Gandrud ,
- Nicholas Andrew Asendorf ,
- Deepti Pachauri ,
- Gautam Singh ,
- Guruprasad Somasundaram ,
- Jennifer Frances Schumacher ,
- Nitsan Ben-Gal Nguyen ,
- Robert W. Shannon ,
- Saber Taghvaeeyan ,
- Arash Sangari ,
- Himanshu Nayar ,
- Mojtaba Kadkhodaie Elyaderani ,
- James Bevan Snyder ,
- James William Howard ,
- David Solomon Segal
Example techniques of this disclosure are directed determining one or more values that represent a monitoring attribute for one or more body-worn tracking devices (BWTDs). In some instances, the techniques include determining a compliance metric that represents a level of compliance for at least one offender. That is, the compliance metric may be a quantitative value that represents whether a user wearing BWTD is complying with established rules or desired behaviors.
ABANDONED OBJECT DETECTION
System and techniques for abandoned object detection are described herein. a fence is established about a person and an object is detected within the fence. An entry is created in an object-person relationship data structure to establish a relationship between the person and the object within the fence. Then, the position of the object is monitored until an indication that the fence is terminated is received. If it is detected that the object is outside the fence during the monitoring, the person is alerted.
SPATIOTEMPORAL ANALYSIS FOR EMERGENCY RESPONSE
Described herein are systems, devices, methods, and media for emergency spatiotemporal analysis. One or more emergency response resources may be returned, transmitted and displayed. In some embodiments, emergency metrics may be determined and displayed.
Methods and systems for deterring animals to approach or enter identified zones
A system and method for deterring animals, such as pets, from entering, getting onto, or being in certain defined zones/locations created by a user. The pet monitoring system includes a smart collar configured to communicate with a plurality of powered transceivers/transmitters, particularly Bluetooth transmitters and transceivers. Each of the transceivers or transmitters has a unique ID associated with it. The smart collar, a smartphone or other wireless communicating device can read and record the signal strength of each of the transmitters at various locations and use that information to create prohibited zones that can be downloaded onto the smart collar. The smart collar can also contain a stimulus emitter for providing a warning to the animal and a communication device configured to alert the owner.