THUMB SUCKING DETERRENT SYSTEM
20230414400 · 2023-12-28
Inventors
Cpc classification
International classification
Abstract
A thumb sucking deterrent system comprising a tag configured to be removably fitted inside mouth of a child. The tag comprises a tag antenna which is anatomically shaped to correspond to sections of a child's dentition and an integrated circuit chip which is conductively mounted to the tag antenna. A wearable tag reader adapted to be worn on a part of a forearm of the child is provided. The tag reader comprises a transceiver module, a control module and an alarm module. The alarm module is configured to initiate alert actions when the control module determines an actual distance between the tag and the tag reader to be within a predefined range based on a reply signal generated by the tag in response to a first interrogation signal generated by the transceiver module. The distal ends of the tag antenna are structured to be secured to teeth of the child.
Claims
1. A thumb sucking deterrent system, said system comprising: a wearable tag configured to be removably fitted inside mouth of a person, said wearable tag comprising a tag antenna anatomically shaped to correspond to one or more sections of a person's dentition and an integrated circuit chip conductively mounted to said tag antenna; and a wearable tag reader adapted to be worn on a part of a forearm of said person, said wearable tag reader comprising a transceiver module, a control module and an alarm module; wherein said alarm module is configured to initiate one or more alert actions when said control module determines an actual distance between said wearable tag and said wearable tag reader to be within a predefined range based on a reply signal generated by said wearable tag in response to a first interrogation signal generated by said transceiver module.
2. The thumb sucking deterrent system of claim 1, wherein a water resistant coating is provided over at least a section of said wearable tag to electrically insulate said tag antenna and said integrated circuit chip from an outer environment.
3. The thumb sucking deterrent system of claim 1, wherein said one or more alert actions include an audible alarm emitted by a speaker disposed in said wearable tag reader and/or a visual alarm emitted by a light source disposed in said wearable tag reader.
4. The thumb sucking deterrent system of claim 1, wherein said control module is configured to adjust said predefined range and/or said first interrogation signal as per one or more instructions.
5. The thumb sucking deterrent system of claim 4, wherein said one or more instructions are received from a remote server, said control module being communicatively connected to said remote server over a network.
6. The thumb sucking deterrent system of claim 4, wherein a computing device is communicably connected to said wearable tag reader, said computing device comprising one or more physical processors programmed with computer program instructions that, when executed by said one or more physical processors, program said computing device to transmit said one or more instructions.
7. The thumb sucking deterrent system of claim 6, wherein said one or more alert actions include a notification sent to said computing device.
8. The thumb sucking deterrent system of claim 1, said system further comprises a slave wearable tag reader adapted to be worn on said part of said forearm of said person, said slave wearable tag reader comprising a slave transceiver module being configured to generate a second interrogation signal in response to said first interrogation signal to induce said reply signal.
9. The thumb sucking deterrent system of claim 1, wherein said wearable tag reader is further configured to identify said wearable tag by a unique identity.
10. The thumb sucking deterrent system of claim 1, wherein said tag antenna comprising distal ends structured to be secured to one or more teeth of said person and a frontal section configured as an RFID tag antenna.
11. A thumb sucking deterrent system, said system comprising: a wearable tag adapted to be worn removably inside a mouth of a person, said wearable tag comprising a tag antenna anatomically shaped to correspond to one or more sections of a person's dentition and an integrated circuit chip conductively mounted to said tag antenna, said tag antenna having distal ends structured to be secured to one or more teeth of said person; a wearable tag reader adapted to be worn on a part of a forearm of said person, said wearable tag reader comprising a transceiver module, a control module and an alarm module; and a computing device communicably connected to said wearable tag reader, said wearable tag reader comprising one or more physical processors programmed with computer program instructions that, when executed by said one or more physical processors, program said computing device to: configure said wearable tag reader generate a first interrogation signal as per requirement; configure said wearable tag reader to determine an actual distance between said wearable tag and said wearable tag reader based on a reply signal generated by said wearable tag in response to said first interrogation signal generated by said transceiver module; and initiate one or more alert actions if said actual distance is found to be falling within a predefined range.
12. The thumb sucking deterrent system of claim 11, wherein a water resistant coating is provided over at least a section of said wearable tag to electrically insulate said tag antenna and said integrated circuit chip from an outer environment.
13. The thumb sucking deterrent system of claim 11, wherein said one or more alert actions include an audible alarm emitted by a speaker disposed in said wearable tag reader and/or a visual alarm emitted by a light source disposed in said wearable tag reader.
14. The thumb sucking deterrent system of claim 11, wherein said control module is configured to adjust said predefined range and/or said first interrogation signal as per one or more instructions.
15. The thumb sucking deterrent system of claim 11, said system further comprises a slave wearable tag reader adapted to be worn on said part of said forearm of said person, said slave wearable tag reader comprising a slave transceiver module being configured to generate a second interrogation signal in response to said first interrogation signal to induce said reply signal.
16. The thumb sucking deterrent system of claim 11, wherein said wearable tag reader is further configured to identify said wearable tag by a unique identity.
17. The thumb sucking deterrent system of claim 11, wherein said one or more alert actions get recorded in said computing device.
18. The thumb sucking deterrent system of claim 11, wherein said tag antenna comprising a frontal section configured as an RFID tag antenna.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] In order to describe the manner in which features and other aspects of the present disclosure can be obtained, a more particular description of certain subject matter will be rendered by reference to specific embodiments which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments and are not therefore to be considered to be limiting in scope, nor drawn to scale for all embodiments, various embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
DETAILED DESCRIPTION OF THE INVENTION
[0029] Embodiments of the invention are discussed below with reference to the figures. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments. For example, it should be appreciated that those skilled in the art will, in light of the teachings of the present invention, recognize a multiplicity of alternate and suitable approaches, depending upon the needs of the particular application, to implement the functionality of any given detail described herein, beyond the particular implementation choices in the following embodiments described and shown. That is, there are numerous modifications and variations of the invention that are too numerous to be listed but that all fit within the scope of the invention. Also, singular words should be read as plural and vice versa and masculine as feminine and vice versa, where appropriate, and alternative embodiments do not necessarily imply that the two are mutually exclusive.
[0030] Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art to which this invention belongs. Preferred methods, techniques, devices, and materials are described, although any methods, techniques, devices, or materials similar or equivalent to those described herein may be used in the practice or testing of the present invention. Structures/computer architectures described herein are to be understood also to refer to functional equivalents of such structures. The present invention will now be described in detail with reference to embodiments thereof as illustrated in the accompanying drawings.
[0031]
[0032] Reference to
[0033] Reference to
[0034] Reference to
[0035] The computing device 222 comprises a processor 223 and a device memory 225. The device memory 225 may comprise any computer-readable storage media readable by the processor 223 and capable of storing software such as program instructions 227 for operating the wearable tag reader 210. In the present example, the computer program instructions 227 may be a mobile application or mobile app that may be downloaded and operably installed in a computing device using methods known in the art. This mobile app, also referred to herein as thumb sucking deterrent app, enables a user to do various tasks related to activation, operation and control of the thumb sucking deterrent system. Examples of computing device may include, but not limited to mobile devices, tablets, hand-held or laptop devices, smart phones, personal digital assistants or any other similar devices.
[0036] Examples of device memory include random access memory (RAM), read only memory (ROM), magnetic disks, optical disks, write-once-read-many disks, CDs, DVDs, flash memory, solid state memory or any other suitable storage media. Certain implementations may involve either or both virtual memory and non-virtual memory.
[0037] The network module 216 may enable communication between one or more devices. In a non-limiting, a network module 216 may enable communication between a computing device 222 and the wearable tag reader 210, between a remote server such as 224 and the wearable tag reader 210 as shown in
[0038] In the present embodiment, computing device 222 may use a GUI module to provide a user interface on the computing device 222. The GUI module enables a user to view the activities related to operation of the thumb sucking deterrent system.
[0039] The process of providing deterrence to thumb sucking involving the present invention may happen under at least partial control and/or in communication with a remote server as shown in
[0040] The thumb sucking deterrent system server 224 includes an application server or executing unit 226 and a data store 234. The application server or executing unit 226 comprises a web server 228 and a computer server 230 that serves as the application layer of the present invention. The computer server 230 may comprise one or more physical processors 232. The data store 234 is or includes a non-transitory computer-readable storage medium. The data store 234 may store computer program instructions to operate the thumb sucking deterrent system server 224.
[0041] The Web server 228 is a system that sends out Web pages containing electronic data files in response to Hypertext Transfer Protocol (HTTP) requests or similar protocol requests from remote browsers (i.e. browsers installed in the computing device) or in response to similar requests made through a mobile app or mobile application of the present invention installed on a computing device. The web server 228 can communicate with the mobile app of the present invention, with a firmware or software installed on a network appliance and/or with a web browser installed on a computing device 222 to provide the user interface required for the thumb sucking deterrent system 200.
[0042] Reference to
[0043] The control module 214 uses various methods to measure an actual distance between a wearable tag 202 and a wearable tag reader 210 and compare it against a predefined range of distance. If the actual distance is found to be less than the predefined range of distance then the alarm module 218 initiates one or more alert actions.
[0044] In one embodiment, to measure the distance between the wearable tag 202 and wearable tag reader 210, the control module 214 calculates the difference between the time the first interrogation signal 236 is sent and the time the reply signal 238 is received by the transceiver module 212. In another embodiment, the transceiver module 212 may generate a plurality of first interrogation signals 236 within an interrogation range. The characteristics of the received reply signals 238 are then analyzed by the control module 214 to determine the distance between the wearable tag 202 and wearable tag reader 210. An example could be use of Received Signal Strength Indicator (RSSI) to measure the distance. The control module 214 measures the RSSI of a reply signal 238 and calculates the distance between the wearable tag 202 and wearable tag reader 210. Another option is to make the transceiver module 212 generate the first interrogation signals 236 at differing frequencies. The differing frequencies will produce differing phases, and the differing frequencies and phases of the reply signals 238 are used by the control module 214 to compute the distance between the wearable tag 202 and wearable tag reader 210. In all the cases, the wearable tag reader 210 can identify a wearable tag 202 by the unique code assigned to each wearable tag 202 which the chip 206 stores.
[0045] For use, the wearable tag 202 is fitted inside the mouth of a child who has thumb/finger sucking habit and the wearable tag reader 210 is worn on the forearm, especially in the wrist region, of the child as shown in
[0046] The predefined range is set in such a way that, when the hand 102 of the child 100 is at a reasonable distance away from its mouth 104, for example at a distance of 1 foot as indicated by reference numeral 502 shown in
[0047] One of the alert actions initiated by the alarm module is an audible alarm emitted by a speaker included in said alarm module and/or a visual alarm emitted by a light source disposed in said wearable tag reader. So, with the implementation of the present invention, every time the child brings its hands close to its mouth for sucking a thumb/finger/digit, the audible alarm buzzes. This audible alarm generated by the wearable tag reader 210 will scare the child and is likely to act as a deterrent against thumb/finger sucking. In another embodiment, a notification is sent to the computing device 222 and/or to the thumb sucking deterrent system server 224 over the network 220 against every alert action. Such notifications can make a person taking care of the child aware of the attempts being made by child for thumb sucking. The notifications also get stored in the computing device 222 or in the remote thumb sucking deterrent system server 224 so that those can be reviewed for analyzing thumb sucking habit of the child.
[0048] If a child has a habit of sucking thumbs/fingers of its both hands then it is required that the alert actions are initiated whenever either of the hands comes closer to the mouth of the child. In such cases the wearable tag reader 210 can be worn on both the hands of a child. However, reference to
[0049] Reference to
[0050] While the present invention is susceptible to various modifications and alternative user interfaces, a certain illustrated embodiment thereof is shown in the drawings and has been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific form or forms disclosed, but on the contrary, the intention is to cover all modifications, alternative user interfaces, similar features and equivalents falling within the spirit and scope of the invention, as defined in the appended claims.