专利摘要:

公开号:DK200700306U1
申请号:DK200700306U
申请日:2007-12-13
公开日:2008-02-08
发明作者:Jerry W Culpepper;Lawrence M Smith;James P Vancleave
申请人:Spectrum Tracking Systems Inc;
IPC主号:
专利说明:

DK 2007 00306 U3
VALUE BACKGROUND TRACKING SYSTEM
The present invention generally relates to tracking systems ten. tracking and locating valuable materials, people, objects, and in particular, without limitation, for the detection of stolen effects, objects or missing persons through existing mobile network infrastructure, the Global Positioning System (GPS), WiFi networks, WiMax networks and the like. The invention further relates to location and tracking systems and algorithms using a combination of directional vectors and signal strength estimates and position identifiers based on radio frequency transmissions. The generation also relates to a valuation tracking system which is less likely to give false alarms, thereby eliminating or reducing concerns about moving valuables with acceptable or limited risks.
There are past location systems that use the constellation of global orbiting satellites orbiting the Earth. These systems range from navigation aids to tracking devices. For example, there is a vehicle tracking and safety system that allows immediate response in case of vehicle theft, accident, accident or other critical situation. Monitoring and tracking features are provided by mobile devices installed in hidden locations in vehicles to be monitored. The mobile devices communicate with a control center. Preferably, the mobile unit provides protection against theft of and entry into the vehicle by means of an alarm and security system in the car which is connected to the control center by means of a transmitter / receiver in the mobile unit. In addition, a keypad or other user interface is typically provided which allows a driver or passenger in the vehicle to signal to the control center that a certain type of assistance is needed. The vehicle position can be automatically transmitted to the control center along with any automatic alarm signal or manually entered request. The position can be accurately determined anywhere in the world by using global positioning information (GPS). The system provides continuous monitoring of a large number of vehicles for a wide range of status and emergency conditions in a truly unlimited geographical area and also enables manual communication of requests for assistance to the specific site.
i DK 2007 00306 U3
Another example of the use of GPS to track an automobile's position is an automatic vehicle location system which includes a radio positioning system receiver that receives GPS radio signals and includes a two-gimbal gyroscope used by a cutlery billing system. A controller determines the position by means of the radio positioning system when the radio signals are available and by the cutlery billing system when the radio signals are not available. The cutlery billing process is based on a compensation factor, which is determined from data received from the radio positioning system. The compensation factor acts as an adjustment of an inner gimbal angle to compensate for a smaller drift away from the internal gimbal levels.
A further example is a method for determining the position of a moving body, by which method the position of a moving body, such as a vehicle, can be determined with a high degree of precision. It is possible to perform data communication using radio waves between radio base stations and a moving vehicle. Precise positions are stored in the radio base stations in advance. The radio base stations also include radio wave clocks which hold a common time. The radio base stations transmit radio waves containing this time information. The vehicle receives these radio waves and determines the difference between the time information received and the time provided by a clock in the vehicle to determine the current position of the vehicle when calculating the distances between the vehicle and each of the radio base stations. Furthermore, it is also possible to calculate the position of the mobile station using a combination of information from the fixed station and information from GPS satellites. Using this type of structure, it is possible to calculate the position of the mobile station even when it is not possible to calculate the position of the mobile station using the fixed stations alone or GPS satellites alone. Therefore, it is possible to determine the position of the mobile station more precisely than when using a conventional method.
There is also a tracking device which is designed to resemble a bundle of banknotes and which constitutes a system for the capture of thieves. The device is associated with the electronic tracking of cash stolen from a bank or institution by means of an electronic signal device placed inside a bundle of banknotes which transmit position information to the authorities while the cash is moved from place to place. The tracking device allows police officers to electronically monitor money stolen from a bank. The tracking device is sized to fit a bundle of banknotes in a cashier's drawer or a bank's safe. When the tracking device is activated, it transmits a bearing signal that lasts for the life of the battery. Thus, the tracking device will automatically send a signal to either fixed surveillance stations, such as antennas located on tall buildings, or to mobile surveillance stations, such as helicopters and / or police cars, thereby enabling continuous tracking of the thief, who is in possession of the stolen money. Knowing the position of the money, the police can track and arrest the perpetrators. The device is designed as a circuit card smaller than a dollar bill and thin enough to be hidden between two sealed banknotes, enabling it to be placed undetected in a bundle of banknotes. In addition, the device is flexible and can also be waterproofed, which will not affect its ability to be continuously tracked, but which will prevent anyone from short-circuiting it in liquid. Alternative embodiments allow variations of the tracking device to be placed within other valuable effects. An alternative embodiment allows the tracking device to be automatically activated when brought past a particular point, such as an electronic fence, at the place where it is stored.
Furthermore, there are tracking systems for tracking the position of stolen items, and in particular, for tracking down disguised banknote bundles to help officers of the Order Force apprehend thieves and provide stolen money. Such tracking is tracked by a tracking service that may work with the ordering authority. In other situations, the functions of the tracking service are handled by the authority itself. Such a tracking system may include a security package to assist with the provision of stolen money, which includes a cabinet disguised as a bundle of banknotes, but which contains a GPS receiver for receiving GPS signals from imminent satellites combined with a mobile telephone transmitter (module), a microprocessor, antennas and a battery. After a bank robbery, the microprocessor activates the mobile telephone transmitter, which calls the telephone number of a central monitoring station. The microprocessor collects location data from the GPS receiver and transmits this location data along with identification information to the central monitoring station. The security package may also include a separate conventional RF transmitter to enable authorities to access the security package inside a large building or other structure, either after the GPS signal is lost or after the location of the security package is located to a specific area or to a specific building.
All of the devices described above are deployed or require deployment access to GPS or a dedicated network of radio receivers. This is an expensive requirement that increases the overall cost and size of the units. Thus, there is a need for a smaller and less expensive solution for tracking and assisting government officials in providing lost or stolen effects or missing children in using existing cellular network infrastructure,
SUMMARY DESCRIPTION OF THE MOVEMENT
In light of the aforementioned needs, a system and device has been devised that can be implemented using existing communications infrastructure to locate a lost, stolen or lost power or person.
In accordance with the present invention, a system for coordinated valuation of valuables is provided. Position data is received from a device such as a mobile, WiFi, WiMAx or other suitable transmitter belonging to a selected valuables. This location data includes data representing a mobile receiver with which direct communication with the mobile transmitter is performed. The location data is then communicated to a tracking service system, which includes a database representing geographical positions of a plurality of mobile receivers. Next, a query is executed in the database based on received location data, thereby generating geographical tracking data associated with the mobile receiver's location. The geographic tracking data includes image data arranged to generate a map image containing data representing a position of the selected valuables. The geographic tracking data is then communicated to an associated security service, enabling the display of an image generated in accordance with the image data, as well as at least one of tracking and interception of the selected valuables.
In one embodiment, updated location data is received periodically and communicated to the tracking service system, thereby generating updated geographical location data. The geographic location data is then communicated to the security service, enabling the display of the updated images representing the position of the valuables. In a preferred embodiment, a secondary tracking signal is received from a radio frequency transmitter belonging to the selected value object. The secondary tracking signal is then communicated to at least one associated tracking vehicle. This embodiment further includes tracking vehicle sdata from each associated tracking vehicle, which tracking vehicle data represents the position of the tracking vehicle, the direction of the tracking vehicle, the speed of the tracking vehicle, or the signal strength of a secondary tracking signal received by the tracking vehicle. The tracking data is then communicated to the security service or another monitoring service, enabling the display of updated images representing the position of each tracking vehicle.
As detailed in the detailed description, a tracking system according to the present invention comprises a tracking device (hereinafter "device" or "device"), the existing network infrastructure for mobile telephony or for wireless network, database, analysis and display software and / or equipment (hereinafter "unit controls"), and directional transmit / receive units that can be transported in vehicles and portable, by a person, (hereinafter "handheld signposts") directional receivers (hereinafter collectively referred to as "signposts").
The device comprises a wireless mobile data modem or wireless network device and is suitably supplemented with a GPS receiver, a sound signal transmitter, a logic for overall control, antennas, a mobile power supply, a user interface and an application-specific enclosure.
In a preferred embodiment, the device controller comprises a network provider server, a system server provided with a computer-readable medium with instructions for receiving status data from a field unit, sending command data to the field unit, providing database registration / unregistering for a device being deployed or commissioned. out of service, providing an event log for the device in operation, providing a graphical tactical screen that locates all active devices and directories and handheld directories, and communicating tracking and location information to a hosted web site over the Internet. The device controller appropriately shares the tracking data it has collected from all roadmaps and handheld roadmaps, giving every single roadmap and handheld roadmap in the field with full access to see the tactical screen for a developing track. In addition, the device controller is capable of acting as a general repository for tracking event data, as well as for system administration functions. In addition, the device controller displays appropriately, on a website, tracking and location information.
In another aspect of the present invention, a signpost comprises a directional ("DF") receiver which can be transported in a vehicle and which is capable of projecting onto a bearing signal generated by a device. The guide is equipped with knowledge of both network and position. The guide is capable of transmitting its own position and the absolute bearing angle and / or distance to the bearing transmitter, ie. device, back to the device controller using the existing mobile phone network. The directory is further provided with a means arranged to receive tracking data from the unit controller which the unit controller receives from other directories and handheld directories, thereby providing the user of the directory with access to the full tactical display of a tracking under development. In essence, the guide is able to collaborate with other field guides and handheld guides, enabling activities to be coordinated in “wolf coupling ways”. In an alternate embodiment, the guide is also suitably equipped with a global positioning system to provide fine positioning resolution.
In a further embodiment, the signpost is a handheld module, that is, a handheld signpost receiver, for use in environments that do not allow access to vehicles, that is, in buildings, malls and so on. These devices are also appropriately knowledgeable about networks and positioning, and possibly also provide the opportunity for fine position resolution using the Global Positioning System (GPS). Each directory is capable of transmitting its own position and the absolute bearing angle and / or distance to the bearing transmitter back to the device controller via the existing mobile telephone network or wireless network. The handheld directory is furthermore equipped with a display and a user interface, a mobile telephone modem or other suitable network interface, a microcontroller and a directional receiver. In an alternative embodiment of the hand-held guide, a directional sensor compass and a GPS receiver are provided.
Even more aspects of the present invention will be readily apparent to the person skilled in the art from the following description, in which a preferred embodiment of this invention is shown and described, simply by illustrating one of the best ways of carrying out the invention. As will be seen, the production is capable of other different embodiments and its many details can be modified in various obvious aspects without departing from the production. Therefore, drawings and description are considered to be illustrative and not restrictive.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated into and form part of the specification, illustrate several aspects of the present invention and, together with the description, serve to explain the principles of the invention. In the drawings are
FIG. 1 an illustration of a flowchart showing a method for locating a valuables, 6 DK 2007 00306 U3
FIG. 2 is an illustrative example of determining threat to valuables;
FIG. 3 is an illustrative example of client mediation and security service,
FIG. 4 is an illustrative example of determining the needs and design of a tracking system,
FIG. 5 is an example of a unit block diagram,
FIG. 6 is an example of a block diagram of a tracking receiver unit,
FIG. 7 is an example of a system implementing the present invention;
FIG. 8A is an illustrative example of installing a tracking system on the client;
FIG. 8B is an illustrative example of an installation of a tracking system at the security service;
FIG. 9 is an illustrative example of initiating a tracking of a device,
FIG. 10 is an illustration of a flowchart of a method in accordance with one aspect of the present invention;
FIG. 11 is an illustrative example of the status update,
FIG. 12 is a template illustrating an activation alarm screen,
FIG. 13 is a template illustrating a tracking event screen,
FIG. 14 a template illustrating a device database screen,
FIG. 15 a template illustrating an event history screen,
FIG. 16 a template illustrating a service log screen,
FIG. 17 is a template illustrating a tracking log screen; and FIG. 18 illustrates an embodiment in which a wireless network, such as a WiFi or WiMax network, provides cell-based value tracking.
DETAILED DESCRIPTION OF THE MOVEMENT
This invention is defined in the enclosed utility model requirements and generally relates to tracking systems for tracking and locating valuable materials, persons, objects, and in particular, without being limited thereto, for tracking stolen effects, objects or persons through existing mobile network infrastructure, such as the global positioning system (GPS), and location algorithms using a combination of directional vectors and signal strength estimates based on radio frequency transmissions. As will be apparent from this disclosure, the present invention provides an accurate, less expensive tracking system which enables improved tracking and interception of tracked valuables.
7 DK 2007 00306 U3
Referring now to FIG. 1, a flowchart 100 in FIG. 1, illustrating a method ten! providing a valuables tracking and locating service in accordance with the present invention. Starting in step 102, a determination or recognition of a value item threat is performed by the service provider. The valuation threat determination is based on a plurality of indicators, including criminal activity in a particular area, potential concerns about client safety, historical indicators, and the like. For example, FIG. 2 shows an example 200 of the involvement of a client and a security service in determining threats to the client's valuables. In 202, the service provider first determines the clients and / or security services that are potential subscribers. The client's security department, staff, and the like were prompted in 204 to assess the threats to the client's valuables. In addition, the Security Service or Powers Authority evaluates crime trends and statistics in 206, while in 208 the service provider identifies both the potential client's and the potential active security services's needs for valuables tracking solutions. It will be appreciated by those skilled in the art that various of the service provider's components, such as a marketing department, will advantageously coordinate the client and security service's recognition of threats to valuables.
In step 104, the service provider provides active subscriptions for the client and the security service. As will be appreciated by those skilled in the art, the client's subscription may suitably be different from that of the security service. For example, the client's subscription requires the payment of a monthly, quarterly or annual fee, while the security service or the order's power subscription may be free of charge. FIG. 3 illustrates an example 300 of the provision of client and security service engagements. In 302, the service provider organizes the potential clients into groups that share the same or similar threats. When these groups are organized around common threats to valuables, the service provider enters into sales, leasing and / or service agreements with clients 310. It will be appreciated by those skilled in the art that sales, leasing and / or service agreements advantageously include monitoring, payment and other provisions. provisions as are generally known in the art.
In addition to providing clients with the valuation tracking services offered by the service provider, the service provider also in 304 undertakes commitments from the security service to participate in the tracking and location system. In the preferred embodiment, the security service at 306 conveniently appoints a contact person to handle the communication between the service provider and the client. The Security Service was then prompted in 312 to draw up an appropriate agreement regarding the use of equipment and participation in the tracking system. It will be appreciated by those skilled in the art that the provision of security service and client participation does not need to take place in any particular order and that concurrent dissemination is used to facilitate the explanation. Thus, this provision is not limited to concurrent dissemination of client and security service participation.
Again with reference to flowchart 100 in FIG. 1, the process proceeds following the provision of client and security service participation in steps 104 to step 106, determining the needs and design of the tracking system. The process for determining the design of the tracking system to be used by the subscribing client is best illustrated with reference to Figs. 4. As shown in FIG. 4, based on the input from the client and the security service, the service provider in 402 selects an available position tracking type. As discussed above, location tracking type, without being limited thereto, includes tracking, radio frequency triangulation tracking and combined radio frequency triangulation and mobile sector tracking.
1404, based on the available operators, the service provider selects a signal operator. For example, the service provider chooses a paging service provider, a protected wide area network operator or a mobile network operator. After determining the tracking system needs in step 106, the tracking system components are assembled in step 108. Referring to FIG. 4, the service provider then assembles the device in accordance with the selected tracking type and the selected operator in 106. Those skilled in the art will understand that the device advantageously comprises transmitters corresponding to the selected tracking type. The device controller and the directories are then assembled into 108 with components advantageously arranged to receive signals generated by the device components. After the various tracking components have been manufactured in step 108, in step 110, the service provider begins the installation of the system and its associated infrastructure.
First with reference to FIG. 5, a block diagram of a tracking unit 500 is illustrated. The tracking unit 500 comprises a trigger switch 502 operatively connected to a microcontroller 504. Those skilled in the art will appreciate that the trigger switch is suitably constituted by a plurality of different mechanisms and electromechanical means. For example, the trigger switch 502 is advantageously an active or passively integrated radio frequency identification circuit, a reed switch, an active or passively integrated radio frequency identification circuit (RFID), a motion detector, a clock and a counter, internally or externally activatable. A power source 510 is suitably constituted by internal or external means, for example rechargeable batteries, alkaline batteries, photovoltaic cells, fuel cells, lithium ion, nickel-cadmium or nickel-metal hybrid, and provides electrical energy to the various other components of the tracking unit 500.
Further, the tracking unit 500 is provided with a pointer transmitter 506 and a mobile data cam 508 capable of comprising a global positioning system transmitter / receiver. IN
In the preferred embodiment, the GPS transmitter is one which is available in location-aware mobile phones or modems, which GPS transmitters are able to provide the associated communication network with information related to their geographical position. The transmitter and its associated antenna 512 are connected to the microcontroller 504 and receive energy from the energy source 510. Similarly, the transmitter / receiver 508 of the mobile data modem / global positioning system and its respective antennas 514 and 516 are also connected to the microcontroller 504 and draw energy from the energy source 5 Those skilled in the art will note that the type of energy source depends on the application in which the tracking device 500 is used. Therefore, the capacity of the energy source 510 is of a size determined by compatibility with the tracking device's specific application, application environment and operational endurance requirements. In use, for example, in persons or in contexts where invisibility or size is of minor importance, the endurance of the tracking device 500 will be noticeably longer than in the hidden application of the tracking device 500 to a valuable object, such as a bundle of banknotes.
The microcontroller 504 functions in that it provides controlling logic control over the tracking unit 500. The microcontroller 504 is responsible for controlling and operating the transmitter 506, controlling the mobile data modem 508, receiving input from the trigger switch 502, and regulating the power source 510. The logic section of the microcontroller, exemplified in FIG. FIG. 5 at microcontroller 504, is responsible for coordinating communications over the existing mobile telephone network, for monitoring device 500's user interface (if present), and for managing resources used by tracking device 500. Firmware stored in microcontroller 504 provides for transfer of small amounts of data to and from the tracking device 500. One of ordinary skill in the art will understand that such transmission is suitably implemented using standard text message protocols that are currently in widespread use. A call thus made contains inherent information associated with a call, which information is either available from the message itself, at the same time transmitted call information or information available from the mobile telephone network. The firmware stored in the microcontroller 504 is equipped to accept commands regarding operating modes, including adjustment parameters. This allows the tracking unit's 500 features to be dynamically and accurately matched to a given tracking situation by making transmission rates, mobile modem 508 reporting intervals, message receivers, and so on remote controlled. Those skilled in the art will also appreciate that microcontroller 504 appropriately comprises ports (not illustrated) for a variety of sensors, microphones, IP cameras and the like. The addition of various ports to the microcontroller 504 allows the tracking device to collect a wider range of data. Such additional information is digitized appropriately and communicated via the mobile call. It should be noted that such devices are also appropriately switched on or off of data communicated to the device 500 via a mobile call, as noted in more detail below in connection with the transmitter 506 and the mobile data modem 509, in order to advantageously also realize energy conservation and selective use thereof.
Advantageously, the mobile data modem 508 contains an easily accessible modular sub-unit, or, for extensive applications, is suitably based on a fully integrated chip-level design. The mobile modem antenna 514 is operatively connected to the mobile modem 508. It should be noted that the antennas 514 and 516, or a single dual-use antenna, can be mounted either internally or externally, depending on the application to which the tracking unit 500 is correspondingly deployed. . That is, the dual-use antenna 514 combined into 516 may be externally visible, for example in the case of a baby shoe, a belt buckle or the like, or it may be operatively integrated with the tracking unit's 500 enclosure for use with banknotes, artwork or other valuable objects. As will be appreciated by those skilled in the art, the protocols used by mobile modem 508 will depend on the application of the tracking device 500, the position of the device and the specific modem implemented. Protocols used by the mobile data modem 508 include, but are not limited to, TDMA, CDMA, GSM, 1P, TCIP, 802.1 lx, 802.16x, 802.20 * or the like. The choice of mobile phone or mobile-based network protocol will be dictated by the device's 500 specific application and scope.
The transceiver 506 may be any radio frequency (RF) transmitter known or known in the art. By way of example only, a suitable variable frequency transmitter of 160 MHz to 460 MHz can be used. An example of such a transmitter is the ETS product manufactured and distributed by Spectrum Management, LCC. A system consists of a proprietary antenna array distributed around an area of interest. This array permits coarse tracking of a transmitter located within an area covered by the proprietary array. Information provided from this coarse tracking enabled the placement of secondary tracking devices so that the position of the transmitter could be tracked more precisely. Such a system, although fully functional, requires the additional expense of installing and maintaining the proprietary send / receive network. As such, some areas, such as rural locations, would often lack the necessary commercial activity or infrastructure to enable operation . In addition, a growing number of sites, especially urban and corporate sites and corporate or university campuses, include wireless network coverage.
The bearing transmitter 506 added in the preferred model of the tracking unit 500 is an amplitude-shift-keyed (ASK) very-high-frequency (VHF) RF transmitter circuit which emits 100 mW RF energy in a 50 Ohms load. The transmitter 506 is controlled and driven by a support logic controller implemented in the microcontroller 504. The transmitter 506 is operatively connected and communicatively coupled to the transmitter antenna 512.1 In one embodiment, the antenna 512 is integrated into the enclosure of the tracking unit 500. Those skilled in the art will appreciate that antenna 512 can be mounted externally, depending on the application for which the tracking device is currently being implemented. It should be noted that each mirror transmitter 506 used in the implementation of the present invention makes bmg a unique identification code. Such code is typically distinguished by software internally in the transmitter 506 or by the program code stored in the microcontroller 504.
A special adaptation of the tracking unit 500 makes it possible to realize energy savings when the transceiver 506 is not yet required, since tracing at the level via the antenna 512 has not yet begun. In this embodiment, the microcontroller is advantageously responsive to a selected input received in the mobile modem 508. This input includes encoded data which selectively activates or deactivates the operation of the transmitter 506. Therefore, battery power is saved by first activating the transmitter 506 at a time desired. from a monitoring service or associated order authority. In addition, the absence of signal, in addition to that of a conventional mobile phone call, can make a signal more difficult to detect with an external signal detection means. In addition, the microcontroller 504 is advantageously provided with an appropriate timing algorithm which periodically activates and deactivates the mobile data modem 508 for a selected length of time. A special operating cycle is selected such that necessary tracking intervals can be maintained for a given situation or application. This cycle is appropriately defined in software or communicated to the microcontroller from a monitoring service via a mobile link to meet the needs of a particular tracking event. This functionality advantageously allows to minimize interference associated with mobile data transmissions. As an example, mobile data transmissions, in particular some GSM transmissions, can be detected by RF noise which would be noticed in conventional radio receivers. Minimizing the operating cycle will minimize the possibility of anyone noticing that mobile transmissions are being made.
It should be noted that, as will be appreciated by those skilled in the art, in embodiments using wireless network protocols, such as 802.1 lx protocols, many additional energy-saving hardware and software systems are available which advantageously allow additional energy savings.
The tracking device 500 can be implemented in a variety of ways, depending on the application to which the tracking device 500 is used. For example, with no intention of limiting the protection to which this invention is legally and fairly and reasonably justified, there are planar embodiments, designed cavity embodiments, modular and integrated embodiments, embodiments utilizing camouflaged bodies, and so on. A representative embodiment is that which is a flat, flat shape that can be inserted between two (2) banknotes which are tightly packed without visible deformation. There is also insertion into a shoe sole or belt which allows a missing person to be located. Further insertion embodiments are advantageously adapted to represent the desired object for attachment of the tracking unit 500,
Referring now to FIG. 6, there is provided a block diagram which currently exemplifies the receiver components of the tracking receiver 600, or the internal components of the directory and the handheld directory. As will be apparent to one skilled in the art, the enclosure to the directory and the handheld directory may take any number of formats, from a laptop, a Personal Data Assistant (PDA), a mobile phone, a desktop computer, or the like. Of importance, as may be appreciated by those skilled in the art, is the inclusion of the components outlined in FIG. 6. In order to explain FIG. 6, the term "track receiver 600" is used to denote the signpost and the handheld signpost.
The tracking receiver 600 in FIG. 6 includes a microcontroller 604 which is suitably adapted to control a plurality of integrated components and external devices. Those skilled in the art will appreciate that the microcontroller 604 is suitably implemented in the form of the microprocessor in a typical laptop, desktop or PDA. A directional (DF) receiver 602 with three associated antennas 618, 620 and 622 is operatively connected to the microcontroller 60 of the tracking receiver 600. As contemplated in the present invention, as will be apparent to those skilled in the art, the three antennas 618, 620 and 622 enable for the DF receiver 602 to triangulate the signal emitted by the tracking transmitter unit 50 of the tracking unit 500. The DF receiver 602 is communicatively connected to the microcontroller 604. The microcontroller 604 then implements a controlling logic means stored therein to simplify the translation of the input received via the DF receiver 602 to an integrated user interface 6 The microcontroller 604 is suitably realized from a microprocessor installed in a laptop, PDA or other mobile computing device.
The microcontroller 604 is operatively connected to an optional GPS receiver 612 and an optional direction sensor / compass 608. The optional equipment provides greater reach and mobility to the tracking receiver 600 than the DF receiver 602 alone. The tracking receiver 600 further includes a mobile data modem 610 and a mobile data modem antenna 616 in operative communication with the microcontroller 604. The GPS receiver 612 and the direction sensor (compass) 608 are optionally depicted in FIG. 6 and does not form part of the preferred embodiment.
The screen and user interface 606 is any screen and / or user interface known in the art, from any suitable video screen, such as CRT, LCD, TFT, plasma or other visual means for displaying the output. from the microcontroller 604 which allows an operator to see the position of the tracking device 500. A standard QWERTY keyboard, touchpad, mouse, light pen, directional pad, Stylus or other input means is used to implement the user interface depicted as screen and user interface 606 in FIG. 6. The mobile data modem or wireless interface 610 of the tracking receiver of FIG. 6 receives information from the device controller via the existing mobile network infrastructure. The information is conveniently transmitted over the Internet over the existing mobile network infrastructure to the tracking unit 500. An antenna 616, which is alternatively integrated into the enclosure of the tracking receiver or extending externally therefrom, is operatively connected to the modem 610. Communication between the device controller and the tracking receiver is transmitted from the modem 610 to the microcontroller 604. This communication allows the tracking receiver to operate remotely from the device controller and for the operator to participate in the tracking of the tracking device 500.
In an alternative embodiment, the GPS receiver 612, the GPS antenna 614 and the directional sensor (compass) 608 are also depicted in FIG. 6. The inclusion of these two components in the tracking receiver allows the device controller to monitor and record the position of all tracking receivers currently in the field to search for the tracking device 500. While currently available mobile systems already integrate GPS functionality, it should be understood that GPS the receiver is not necessarily integrated into the tracking receiver. GPS modules can be retrofitted in any conceivable manner known to those skilled in the art.
Furthermore, the energy supply of the tracking receiver (not shown) will vary depending on the configuration of the tracking receiver. Such power supplies include, but need not be limited to, photovoltaic cells, rechargeable batteries, alkaline batteries, generator means, or in the case of the car-mounted embodiment, directly to the 12-volt system powering the vehicle's internal combustion engine.
As used in FIG. 7, the tracer unit 500, in the form of the planar embodiment, is implemented for use in tracking a stack of banknotes stolen by a robbery, and for purposes of explanation, the planar embodiment is represented by unit transmitter 702. It should be noted that The following example readily relates to another valuable item equipped with the tracking unit 500, or even to a missing tree, to whose clothing the tracking unit 500 is attached. It should also be understood by those skilled in the art that the use of a single tracking device 500 serves exemplary purposes only. The present invention is equally capable of making use of multiple units for use in a single bundle of banknotes, inserted in between or attached to different banknotes in the bundle. The technical expert will appreciate that several units in the bundle of banknotes 14 DK 2007 00306 U3 suitably enable continued tracking in case one or more units lose energy supply, are discovered or destroyed.
Returning to FIG. 7, there is shown a unit controller 706 which is communicatively connected to the mobile network represented by mobile trains 710, 712, and 714, and furthermore, in connection with the security service 715.1, the preferred embodiment, the security service is any appropriate order power, such as a local police force, the Federal Bureau of Investigation, a state highway patrol or the like. The unit controller 706, as explained above, serves to coordinate the effort of tracking the unit transmitter 702 as it moves ffa place to place. The device controller is any suitable prior art server or personal computer capable of executing computer software packages for operation in accordance with the present invention. As the bundle of banknotes (not shown) in which a unit transmitter 702 is stored is removed from the bank drawer in which they were previously stored, the solid strength of the magnet (not shown) mounted in the drawer and holding the trigger 502 is removed , for example, an inverse reed switch, open, allowing the circuit to be closed. This then activates the microcontroller 504 by supplying energy from the power supply 510. The microcontroller 504 uses the mobile modem 508 to establish a connection to the existing mobile telephone infrastructure represented by fogs 710, 712 and 714. At the same time as this activation of the mobile modem 508, the microcontroller 504 also instructs the transmitter to begin RF broadcasting.
As the banknotes in which the unit transmitter 702 is hidden are brought within the coverage area of the tower 710, a specific 120-degree sector 710A is identified from the 360-degree coverage area around the site for directional purposes when the transmitted signal is received and the unit controller 706 receives the information. The unit controller 706 processes the signal, noting that the mobile tower 710 is the tower from which the signal originates (or access point, in case of implementation in a wireless network application, as will be further specified below), the unit controller 706 then determines the mobile tower 710 position and the direction of the 120 degree sector 710A (the sectoral direction) and depicts this position on a tactical map for upload to the directories 707, 708, 709 and the handheld directory 704. The directories 707, 708 and 709 and the handheld directory 704 are then routed by the unit controller, for the specific coverage area of the mobile phone 710A sector 710. The 360-degree coverage area of any given mobile phone is divided into three (3) 120-degree sectors, as in Figs. 7 is represented as 710A, 712A and 714A, The size of the coverage area varies, but a typical coverage area extends a diameter of one mile to more than ten miles. Those skilled in the art will appreciate that this invention need not be limited to 120 degree sectors. For example, this generation may equally be implemented with six (6) 60 degree sectors, or various other coverage areas, depending on the conditions surrounding the implementation of this generation.
While shown as a PDA, it is evident that the handheld directory 704 can be implemented in the form of any other known portable communication device, provided that the components described herein are included. Furthermore, the unit controller 706 is depicted as a desktop personal computer, but those skilled in the art will appreciate that other computer processing units can be advantageously utilized in the present invention.
Device controller 706 can be implemented as a software application running on a standard PC or alternatively as a process on a multitasking server computer with the security service (not shown) or the service provider (not shown). The unit controller 706 provides rough tracking through a proprietary array of antennas distributed around a region of interest. These antennas are used to obtain information that enables the placement of secondary tracking devices. Device controller 706 receives status data from field directories 704, 707, 708 and 709, provides database registration / unregister for device 702 as it enters and exits the service area, provides event logging for all devices in the service, and provides a graphical representation of both the positions of devices and active tracking receivers.
As the signposts 707, 708, 709 and the handheld signpost 704 are vectored into the general proximity of the unit transmitter 702, the banknotes in which the unit transmitter is hidden are within the coverage area of the mobile bag 712. The typical procedure for mobile architecture is to allow the mobile phone 712 to start transmission and the mobile phone 710 to drop transmission. However, the present invention uses the known relative positions of the mobile barrels 710 and 712, whereby the unit controller 706 can narrow the position of the unit transmitter 702 to a much smaller area. The triangulation technique is well known in the art and need not be re-described for the purposes of this example. The narrowed position is then transmitted from the unit controller 706 to the directories 707, 708, 709 and the handheld directory 704 via the mobile modem 610. At this point in the tracking process, all vehicles in the order fleet equipped with vehicle data terminals 713, 717, 718, 719 and 720 , part of the tracking process.
Thus, having been directed at the unit transmitter 702, the directories 707, 708, 709 and the handheld directory 704 are now within range of the transmitter 506. As the four tracking units 704, 707, 708 and 709 approach the unit transmitter 702, the DF triangulates the receivers 602 ( located on each directory) the signal emitted by the unit transmitter 702, i.e. the tracking unit 500, which is located in the stolen banknotes. The directories 704, 707, 708, 709 16 DK 2007 00306 U3 microcontrollers 604 process the triangulated signals received by the DF receivers and present the operators with graphical information via the screen and the user interfaces 606. Updated information received via the mobile trains 710 and 712, as well as updated information from the directories 704, 707, 708 and 709 is continuously transmitted to the unit controller 706. This enables the unit controller 706 to monitor and direct the directories 704, 707, 708 and 709 still closer to the unit transmitter 702.
In an alternative embodiment, using the above example and FIG. 7, there is shown a satellite representing a constellation of global positioning satellites 716.1 In this embodiment, the guides 704, 707,708 and 709 are equipped with GPS receivers 612. At present, GPS information is available for use in tracking mobile phones. In one embodiment, GPS information is made available to a mobile service provider and location information is selectively made available from the mobile service provider in accordance with an approved request. In another embodiment, these GPS data are communicated directly to a monitoring service via the telecommunications network. In the embodiment in which information is provided through a service provider, a server or workstation located with a security service or order authority sends a GPS information request associated with a tracking call and this information is received and used to generate a screen image. This embodiment allows a service provider to use the directories 704, 707, 708 and 709 to track the tracking unit 500 and then notify authorities of approaching the subject. Such positioning would be extremely useful to the Federal Bureau of Investigation while hunting for a kidnapper. The agents in the field would be able to provide definitive positions, in the form of longitude and latitude coordinates, to other agents approaching the kidnapping victim.
It should be noted that the ability to transmit location data from a directory to the device controller 706 using existing mobile telephone infrastructure has a myriad of potential uses. Device Controller 706 is capable of recording and reporting the last known positions of Device 702, Directories 707, 708, 709 and Handheld Directory 704. Such reports are used by law enforcement or search and rescue services for both felony arrest and rescue of stranded hikers. The use of existing mobile telephone infrastructure further enables the device controller 706 to transmit small amounts of data to and from the device transmitter 702, implemented using standard text messaging protocols such as SMS. For example, a baby's shoe that is equipped with the device, the child or a responsible adult advises on a critical situation. The most appropriate format will be the latitude and longitude coordinates of the site and should include an average radius for the coverage area of the mobile sector 17 DK 2007 00306 U3. Data transfer protocols should be standardized across all network providers. The data interface between the existing mobile telephone network and the device controller 706 can take several forms, including, but not limited to, Internet connection through an Internet service provider, dial-in access or direct access via a mobile telephone modem in the display console.
Also illustrated in Figs. Figure 7 is a variation of a trigger mechanism which allows to reduce the risk of erroneous triggers as well as to allow predetermined areas to be acceptable valuables locations which are not considered unfavorable. Illustrated is an area 721, suitably any acceptable area or areas which depends on a specific situation. Such a defined area or areas constitutes a selected area with acceptable presence of valuables, or, conversely, a selected trigger area. Such a defined area permits limited movement of a valuables as being acceptable, for example, within the context of a bank in the case of currency, or within the framework of a day care institution in the case of a child. Conversely, in certain situations it may be appropriate to exclude valuables from specific areas. Analogies to such technology can be found in house arrest bracelets, or bracelets defined to force pursuers a select distance to their targets. In the case of coupling with the present tracking technology, additional benefits can be obtained immediately.
Such functionality is often referred to as "geo-fencing". In the present system, geo-fencing can conveniently be achieved by pre-selecting acceptable GPS coordinates, acceptable mobile masts or wireless access points, or by using RFID triggers. Such parameters are suitably set in either a unit belonging to a valuables, a transmitter, a server, or a tracking service or order authority.
As those skilled in the art will recognize, this invention is suitably designed to use existing telecommunications networks to simplify the transmission of position data from the unit 702 to the directories 704, 707, 708 and 709.1 in addition thereto, as shown in FIG. 8A and 8B, the present invention additionally includes installation of the tracking unit 500 in the client's valuables, for example, FIG. 8A, and installing the associated tracking equipment, for example, FIG. 8B. Referring to FIG. 8A, the installation of the tracking system begins with the installation 802 of the client terminals, or the tracking unit 500. In the preferred embodiment, the tracking unit 500 is installed unnoticed in the value item to be tracked. In an alternative embodiment, the tracking unit 500 is incorporated into the valuables, for example a bundle of banknotes, in a cash drawer in the client's business premises. Those skilled in the art will recognize that the tracking unit 500 is advantageously arranged to be incorporated into any valuables it wishes to protect. The service provider then trains the 804 clients to use and operate the tracking device 500. The tracking device 500 then reports, in a predetermined cycle, the status of the tracking device's 500 batteries at a given interval, such as on a weekly basis. This status is transmitted 806 to the unit controller 706.
Referring to the installation of the tracking equipment in Figs. 8B, the person skilled in the art will recognize that, in accordance with the description above, one or more signposts 704, 707, 708 and 709 are installed for the security service in step 810. In the preferred embodiment, signposts 704, 707, 708 and 709 are appropriately installed in one or more of the security service's 715 vehicles, for example, patrol cars. The handheld directory 704 does not require the device to be incorporated into a vehicle and rather remains independent of the vehicle for locating a valuables on foot. A communication link between the service provider and the security service 715 is also installed, enabling direct communication and transmission of position signals from the service provider to the security service 715 and from the security service 715 to the service provider. Those of skill in the art will recognize that the transmission of position signals from the directories 704, 707,708 and 709 to the unit controller 706 enables the service provider to update the location or location of a valuables to the subscribing client. In the preferred embodiment, the directories 704, 707, 708 and 709 are provided to the security service 715 for a low price, or free of charge, so that adaptation of the tracking system of the security service 715 according to the present invention is simplified.
The security service personnel, or police officers, are then trained in step 812 using the directories 704, 707, 708 and 709 to locate a valuables containing the unit 702. In the preferred embodiment, the training provided to the security service 715 includes staff training at all levels, including, but not limited to, officials, dispatchers, managers, and the like. Directories 704, 707, 708 and 709 transmit, in step 814, a periodic status report to the security service 715 and / or the service provider. Those skilled in the art will recognize that the status report is transmitted to the unit controller 706 at the service provider or to a communication link at the security service 715. In a preferred embodiment, the installation of both client unit 702 and the directories 704, 707, 708 and 709 also include regular system maintenance and user training.
Returning to FIG. 1, after a client has subscribed and the tracking system is installed, the service provider activates the unit 702 and invoices the client for the associated costs in step 112.1. In the preferred embodiment, the client leases each unit 702 and pays a monthly fee for the provided tracking. and monitoring services. In an alternate embodiment, each unit 702 is purchased for a set price and the client is billed a subscription fee on a daily, weekly, monthly or yearly basis. As previously mentioned, the security service 715 purchases the directories 704, 707, 708 and 709 at a reduced price or receives the directories 704, 707, 708 and 709 without billing the security service 715. After activation, the client device 720 is monitored by the service provider in step 114. Status reports are continuously updated while monitoring takes place.
In step 116, the service providers detect that the tracking device 500 has been involved in an episode, such as theft or robbery. The detection of an episode in step 116 initiates the tracking of the tracking unit 500 in step 118. Now with reference to FIG. 9, an example of the initiation of the tracking of the tracking device is shown in accordance with the present invention. Following the detection of the episode, such as robbery or theft, the transmitter of the trace unit 500 is activated in step 902. It will be recognized by those skilled in the art that the activation of the transmitter appropriately comprises registration of the transmitter in a mobile telephone network, as described in detail above. The activation thus requires the transmitter to initiate a telephone call to the selected mobile service provider. The mobile operator then contacts the service provider with location data which includes the mobile mast (s) from which the tracking unit 500 transmits. It will be recognized by those skilled in the art that appropriate communication between the mobile operator and the service provider takes place through such communication systems as the public landline telephone network, a mobile telephone network, data communication via wireless WAN, or the Internet.
The person skilled in the art will recognize that the call appropriately contains identification data that identifies the device making the call. When using CDMA or Code Division Multiple Access, identification data is automatically transmitted with the mobile call. The degree of encoding built into such a call requires the mobile operator to participate in the tracking operations, commonly referred to as location-based service. Using, for example, GSM or the Global System for Mobile Communications, the degree of encoding by appropriate decoding does not require the participation of the mobile operator in tracking. The mobile mast that receives and transmits the call can be identified from the call itself. This type of positioning can use accidental information that is built into the network communication in the mobile network and describes the available mobile location, or intended information on the mobile location, direction and signal strength. Alternatively, when properly selected by the client, the tracking unit 500 may use GPS transmissions, thereby enabling location through the direct use of GPS coordinates or as forwarded through a mobile provider. Such tracking information is available as ownership and access to the mobile medium is controlled.
20 DK 2007 00306 U3
After registration in the mobile network, a request is preferably made to the operator network server to determine the transmitter in that network, for example, paging, home-developed wide area network, or mobile network. As will be appreciated by those of ordinary skill in the art, the tracking unit 500, as mentioned above, is capable of being tracked by means of a radio frequency bearing transmitter, the mobile location methods, or the mobile location methods combined with the GPS coordinate system, as more fully described herein. After activating the transmitter component, a closed viewing system is activated in step 904, if available at the client where the tracking unit 500 was stored.
The transmitter activation and closed-loop transmission are then uploaded to a Web server at step 906. At step 908, the service provider is notified of the episode and verifies at step 910 that the transmitter has actually been activated. In the preferred embodiment, the web server initiates a web tracking session which allows a client to log on to the web server and view status information regarding the transmitter and the effort made to locate and provide the value object. Once the episode has been verified, the security service is notified in step 912. The security service 715 then activates the directories 704, 707, 708 and 709 during the preparation to respond to it. In an alternative embodiment, the web tracking session additionally includes a post session analysis on the value of the value item, ffa loss for provision.
Referring now to FIG. 10, a flowchart is shown showing the operation of the system according to the present invention. The operation of the system requires that a number of operations be performed to allow the position of the tracking device 500 to be used by the directories 704, 707, 708 and 709. Starting in step 1002, the tracking device 500's mobile modem 508 is activated and registered in the mobile network. It will be understood, with respect to the present invention, as described above, that the triggering event, that is, the event triggering the activation, is any movement or other means of activating the tracking unit 500. The process proceeds to step 1004 where a a decision is made as to whether the mobile network has failed to recognize the mobile modem. If the mobile modem is not recognized by the mobile network, the method returns to step 1002 and the mobile modem again attempts to register in the existing mobile network. If the tracking unit 500 has successfully registered in the mobile network in step 1004, the procedure proceeds and in step 1006 requests the mobile network location-based service server for the mobile location information.
Upon receipt of the location information, the system proceeds to step 1008, where the location information is transmitted to the tracking service provider or the internet service provider. The service provider or alternatively, depending on the type of service provided, the Internet service provider, passes the information to the unit controller 706 in step 1010, or the location of the tracking device 500 to the owner as part of the service terms provided to it. . In case the information is forwarded to the unit controller 706 in accordance with step 1010, the unit controller 706 in step 1014 receives the information and processes the mobile / sector data and the corresponding data from the tracking vehicle to determine the speed and direction of the tracking unit 500.
In step 1015, the security service 715 receives the information and displays the location on a local map screen. Those skilled in the art will be able to understand that Security Service 715 is any state or security organization capable of locating and / or apprehending tracking device 500. It will be further appreciated by one of ordinary skill in the art that any other suitable monitor will be sufficient to achieve the foregoing.
The security service 715 is then able, in step 1016, to forward the tracking information to its police units in the field. This is equivalent to the security service 715 using the information collected from the existing mobile network to direct its devices against the tracking unit 500. Once in the general area as directed by the security service in step 1016, the field units use a tracking device mounted in a vehicle or handheld signpost 704 to approach the tracking unit 500.
Alternatively, as shown in FIG. 10, when the mobile network is unavailable, the tracking unit 500 activates a radio frequency (RF) transmitter in step 1007.1 in step 1009, the device controller 706 receives the RF transmission and becomes aware of the activation. The unit controller 706 then notifies tracking vehicles of the activation in step 1011. Starting in step 1012, the tracking vehicles receive the RF transmission from the tracking unit 500. The tracking vehicles then send their respective position, direction, signal strength and direction from which the RF transmission is received, to the unit controller 706 in step 1013. The system then returns to step 1014, where the unit controller 706 processes the incoming information to accurately determine the position, speed and direction of the tracking unit 500. The system continues to operate as stated above.
After initializing the tracking unit 500 - returning to FIG. 1 - In step 120, the system updates the real-time status information of the episode and the tracking device 500. For example, through the web session, the client and security service 715 can follow the real-time search and provision efforts. Referring now to Fig. 11, an illustrative example of the status update is shown in accordance with the present invention. Starting at step 1102, the service provider shows the position of the transmitter, for example, the tracking unit 500, and the directories, for example the directories 704, 707, 708 and 709, on the service provider's website. FIG. 12 illustrates a template for an activation alarm screen that is displayed to a user and informs the user that a tracking device 500 has been activated. As demonstrated in Figs. 12, a user is appropriately provided with relevant information regarding the episode that causes the activation alarm. For example, FIG. 12 confirmation of a person's identity, which confirms that activation is not a mistake. In addition, appropriate information for the orderly authority is provided, as well as information regarding the type of incident, description of the suspects and time / date information regarding the incident. Those of skill in the art will recognize that appropriate identification information regarding the suspects includes, without limitation, clothing items, vehicle data, suspect's armament and the like. The person skilled in the art will also acknowledge that appropriate incident information includes, without limitation, kidnapping, bank robbery, shop robbery, stolen car and the like. As additional information becomes available regarding the episode area, it is retrieved by the service provider in step 1104.1 step 1106, the additional information, if present, is uploaded to the site and displayed to the client and to all personnel from the security service 715 accessing the site. . FIG. 13 is a template that illustrates a suitable web-based screenshot of the episode or tracking event. As shown in FIG. 13, the client or security service 715 can selectively view various screens such as only the trace unit 500, the directories 704, 707, 708 and 709, or the trace unit 500 and the directories 704, 707, 708 and 709. Via the map screen, the viewer is able to zoom in or out on the tracking device 500, following the speed as well as the current position and the starting position of the tracking device 500. In addition, as shown in Fig. 13, the viewer can select audio, video or cut-off via access links located on the screen template.
The cut-off function as illustrated in FIG. 13 provides significant advances over previous tracking systems. In accordance with an embodiment using a tracking function, position data belonging to a value object is passed on to the security service. In this system, tracking data is also advantageously received for each of at least one tracking vehicle (or tracking person) related to the tracking of the valuables. Such vehicles are suitably provided with tracking devices such as tracking device 500 which are in use in connection with a tracked valuables. However, it should be understood that for a tracking vehicle, the tracking device is probably connected to a more durable energy supply and is suitably equipped with a more efficient transmitter. Furthermore, the system generally does not have to be hidden or camouflaged. Therefore, such tracking devices do not have limitations associated with a discrete or hidden tracking device. Tracking information from such vehicles may also be conveniently provided to the tracking service through a direct broadcast or communication through any suitable transmission medium such as WiFi, 802.x, WiMax or the like.
23 DK 2007 00306 U3
A security service, thus provided with position data of a tracked valuables, together with positions for tracking vehicles. This location information, together with readily available geographical information, enables immediate calculation of separation, relative displacement, relative velocity and parameters for optimal intervention. Suitably, such parameters for optimal intervention include a nearest vehicle and advantageously integrate readily available topographic and street system data so that a preferred route of intervention can be calculated. Also, with multiple vehicles, a calculation is made immediately that allows the location of different vehicles to cover possible, or probable, alternative routes that an offender with a wanted valuables can choose. Of course, since it is taken into account that tracking information associated with a valuables is continuously or periodically updated, tracking vehicles are positioned and repositioned in accordance with movement of the valuables. An optimal intervention route is advantageously taken into account travel length, speed restrictions, traffic jams and the like.
A screen such as that shown in FIG. 13, is capable of providing a visual representation of the tracked valuables as well as of each tracking vehicle. Intervention data is communicated either real-time or periodically to each tracking vehicle to provide better tracking, alignment and optimized vehicle coordination.
In step 1108, the service provider's server retrieves location information for the tracking unit 500 and the directories 704, 707,708 and 709 from the mobile network, as further described above. This location information is then uploaded to the site in step 1110 for the client to view. The person skilled in the art will understand that the site is capable of appropriately displaying past and current tracking information, such as on a map, grid or similar. The person skilled in the art will also acknowledge that the information uploaded to the website is continuous and real-time. In step 1112, the site displays the dispatch coordinate track with GPS. As the directories 704, 707, 708 and 709 converge towards the mobile position / pointer signal of the tracking unit 500, the respective positions of the directories 704, 707, 708 and 709 are updated on the website.
Referring to FIG. 1, in step 122, the service provider assists with the tracking and provisioning of the valuables. As shown above in connection with Figs. 10, assists the service provider in the provision of a stolen or missing valuables. A determination that the valuables have been obtained is then made in step 124.1, step 126, assists the service provider in prosecuting the arrested perpetrator at the request of security service 715. If the valuables were not provided in step 124, the device status information is updated in step 120 and the service provider continues. assisting the security service 715 with the arrest of the perpetrator and the provision of the valuables in step 122.
24 GB 2007 00306 U3 The present invention further provides for storing and displaying of tracking and service data in a database which can be viewed by the client and / or the security service 715. As illustrated in FIG. 14-17, various templates enable the client and / or security service 715 to access and search the database for information on a particular client, an incident, a specific tracking device 500, and the like. The person skilled in the art will recognize that various other screens may be displayed and that the screenshots illustrated in Figs. 14-17 merely serves as examples.
Referring now to FIG. 14, a template screenshot is shown showing a spreadsheet 1400 for various units 500. As will be appreciated by those skilled in the art, spreadsheet 1400 in FIG. 14 appropriately displays a visual representation of data stored in an associated database accessible through a website. From FIG. 14, a client or service provider is able to view the list of devices 500, positions, commissioning dates and the like. Those skilled in the art will recognize that other appropriate data fields other than those shown can be stored and displayed, and that this generation is not limited to the fields shown in FIG. 14. Spreadsheet 1400 is appropriately selected via the Device Database tab 1402, as shown. Additionally, those skilled in the art will recognize that the viewer is able to select other screens by selecting the event history tab 1404, service log tab 1406, and tracking log tab 1408. For spreadsheet 1400, various data fields, including a device ID field 1410, are displayed. a transmission codeD 1412, a telephone number 1414, a value item 1416, a client number 1418, the installation type 1420, the provided date 1422, the SIM number 1424, the installation date 1426, and the location where the unit 500 was installed. As will be appreciated by those skilled in the art, the viewer can search the database displayed in spreadsheet 1400 via the unit ID 1410, transmission code ID 1412, telephone number 1414, or valuation ID 1416 belonging to the requested unit 500.
Referring to FIG. 15, a template screenshot is shown illustrating an event history spreadsheet 1500 corresponding to a specific client or to a specific service provider. As will be appreciated by those skilled in the art who consider the spreadsheet shown in Fig. 15, it is possible to see a historical listing of an event from the initiation of the tracing to the final location of the valuables. As shown in the template of FIG. 15, a viewer has selected the event history tab 1504 to view the event history of the unit 500. The viewer can select other data views with data stored in the database by selecting the device database tab 1502, service log tab 1506 and tracking log tab 1508. The Event History Spreadsheet 1500 appropriately displays a variety of data fields representing data stored in the database. As shown, spreadsheet 1500 includes an event number 1510, a start time 1512, a start position 1514, a position request time 1516, a request type 1518, a network type 1520, a network response time 1522, and location / coordinates 1524 for the unit 500. A viewer can conveniently search the database 25 DK 2007 00306 U3 after a selected event and view the information corresponding to that selected event in the spreadsheet 1500.
As noted above, this invention can conveniently be realized in a mobile environment. Mobile telephony and mobile networks, such as WiFi and WiMax, generally access points that typically defined overlapping regions. FIG. 18 is provided to illustrate an environment specific to an ordinary 802.lix setup. In the illustration, a series of 1, 2, n wireless access points (APs) cover respective regions 1800, 1802 and 1804, which overlap, thereby forming coherent, or nearly coherent, coverage in a larger area.
The environment of FIG. 18 is configured as a wireless local area network (WLAN), such as a standard 802.11 network. The wireless network includes access points (AP) 1802, 1804 and 1806 which have known positions. Access points 1802, 1804 and 1806 are connected via a backbone network 1810 to an Authentication, Accounting, and Authorization (AAA) server 1812, for example a Remote Authentication Dial-In User Service (RADIUS) server. The backbone network 1810 is suitably any wireless or wired topology. Device transmitter 1814 is configured as a mobile device to operate in the network. When unit transmitter 1814 is activated, it establishes a session with an access point nearby, as in the example of FIG. 18 is AP 1804, indicated by the bidirectional arrow 1816. When the unit transmitter 1814 establishes a session with an access point (e.g., AP 1804), the access point authenticates the unit transmitter 1814 with the AAA server 1812. Therefore, since the AAA server 1812 knows the identity of that access point to which the mobile unit 1814 is connected, the position of the unit transmitter 1814 is determined.
Newer wireless networks such as wireless networks that live up to the I.E.E.E 802.1 list standard also allow mobile devices 1814 to pre-authenticate with access points in the network from which they receive bearing signals. For example, as shown in FIG. 18, unit transmitter 1814 receives bearings from access point 1806. Device transmitter 1814 pre-authenticates with access point 1806 by sending a message to the access point to which it is currently associated, i.e. in this example access point 1804, which sends the pre-authentication request to the AAA server 1812. The pre-authentication requests received by the AAA server 1812 allow for more precise position determination as well as directional and speed determination. Therefore, it can be recognized that such wireless networking technologies are analogous to mobile telephony, as described herein.
The above embodiments allow a non-governmental entity, in the form of a service provider, to offer security to a customer. That is, the service provider can provide the customer with the places of residence for the objects designated by the customer at any time. In the event that the designated object has been stolen, the service provider can even direct the police to the location of the stolen object without using anything other than the existing mobile telephony infrastructure.
The generation extends to computer programs in the form of source code, object code, intermediate source code and object code (such as, for example, in partially compiled form), or in any other form that can be suitably used to implement the generation. Computer programs are appropriate standalone applications, software components, scripts or plug-ins for other applications. Advantageously, computer programs containing the creation are performed on a carrier which is any device capable of carrying the computer program: for example, a storage medium such as ROM or RAM, optical recordable media such as CD-ROM or magnetic recording media such as floppy disks. The carrier is any transmissible carrier, such as an electrical or optical signal carried by an electrical or optical cable or by radio or other means. Computer programs can conveniently be downloaded from a server over the Internet. Computer programs may also be encapsulated in an integrated circuit. All such embodiments, which include code which will cause a computer to perform substantially the principles of creation as described, fall within the scope of the generation.
The foregoing description of a preferred embodiment of the invention is presented for purposes of illustration and description. It is not intended to be exhaustive or to limit production to the precise form described. Obvious modifications or variations are possible in light of the above. The embodiment was selected and described to provide the best illustration of the principles of the invention and its practical applications, thereby enabling a person skilled in the art to utilize the manufacture in various embodiments and with various modifications to suit the particular desired application. All such modifications and variations are within the scope of manufacture as determined by the appended claims when interpreted with the width to which they are reasonably and legally justified.
27
权利要求:
Claims (5)
[1]
A system for coordinating valuables, the system comprising means adapted to receive position data from a mobile transmitting unit associated with a selected valuables, the position data including data representing a mobile receiving unit with which direct communication with the mobile transmitting hand is carried out. means arranged to communicate received position data to a tracking service system, which includes a database representing geographical positions of a plurality of mobile receivers, means arranged to query the database based on received position data and thus generate geographical tracking data associated with it. mobile receiver position, which geographical tracking data includes image data adapted to generate a map image containing data representing a position of the selected value object, and means adapted to communicate the geographical tracking data to a associated security service, thereby enabling the display of an image generated in accordance with the image data, as well as enabling at least one of the tracking and interception of the selected object.
[2]
The system of coordinated valuation of valuables according to claim 1, further comprising means arranged for periodically receiving updated position data, means adapted to communicate the updated position data to the tracking service system so that updated geographical position data can be generated therefrom, and means arranged to communicate the updated geographic location data for the associated security service, thus enabling the display of updated images representing the location of the selected valuables.
[3]
The system for coordinating valuables according to claim 2, further comprising means adapted to receive a secondary tracking signal from a radio frequency transmitter belonging to the selected valuables, and means adapted to communicate the secondary tracking signal to at least one associated tracking vehicle. 28 DK 2007 00306 U3
[4]
The system for coordinating valuables according to claim 3, further comprising a means adapted to receive tracking vehicle data from at least one associated tracking vehicle, which tracking vehicle data represents at least one of the tracking vehicle's position, the direction of the tracking vehicle, the speed of the tracking vehicle and the signal strength of that of the tracking vehicle. secondary tracking signal.
[5]
The system for coordinating valuables according to claim 4, further comprising a means adapted to communicate the tracking vehicle data to the associated security service, thereby enabling the display of updated images representing the position of each tracking vehicle. 29
类似技术:
公开号 | 公开日 | 专利标题
US9000915B2|2015-04-07|Method and system for providing tracking services to locate an asset
US20160302039A1|2016-10-13|Method and system for providing tracking services to locate an asset
US7292159B2|2007-11-06|Method and system for providing tracking services to locate an asset
US7135967B2|2006-11-14|Method for locating an asset
US7151446B2|2006-12-19|System for tracking and locating an object using a cellular network
US20110285535A1|2011-11-24|Mobile Asset Security and Tracking System and Method
EP1728222A1|2006-12-06|Method and system for providing tracking services to locate an asset
DK200700306U3|2008-04-11|Valuation tracking system
Radinski et al.2015|Comparative Analysis of Several Real-Time Systems for Tracking People and/or Moving Objects using GPS
同族专利:
公开号 | 公开日
DK200700306U3|2008-04-11|
DK200700303U3|2008-04-11|
DK200700304U1|2008-02-08|
DK200700303U1|2008-02-22|
DK200700152U3|2007-12-28|
DK200700304U3|2008-04-11|
DK200700305U1|2008-02-22|
DK200700305U3|2008-04-11|
DK200700152U1|2007-07-27|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

法律状态:
2015-01-09| UUP| Utility model expired|Expiry date: 20141214 |
优先权:
申请号 | 申请日 | 专利标题
DK200700152U|DK200700152U3|2007-05-24|2007-05-24|Valuation tracking system|
[返回顶部]