Method and apparatus to provide a wireless tether system is described. In one embodiment, one or more wireless tether apparatuses are in wireless communication with one or more base units. A wireless tether apparatus may be configured such that when separated from a base unit greater than a predetermined distance, such a wireless tether apparatus provides information to the user of the wireless tether apparatus to aid a user such as a human, animal, or machine in finding their way back to a desired location. A predetermined distance may be configured to change over time to accommodate different tether distance requirements at different times, e.g., closer to a home location at night and further away from the home location during the day. In one aspect, wireless tether apparatuses and base units communicate using a plurality of different communication modes such that when one mode fails other modes are utilized to reestablish a connection therebetween. In another aspect of the present invention, a plurality of wireless tether apparatuses are wirelessly tethered together such that individual proximities are maintained but still allow a plurality of wireless tether apparatus users to move about in an expanded range. In one aspect, a wireless tether system is employed such that one or more wireless tether apparatuses may be dynamically assigned to a plurality of base stations to allow changes to wireless tether apparatus locations and distances. In another aspect, when wireless tether apparatuses leave a predetermined tether distance, one or more alerts may be broadcast from the wireless tether apparatuses indicative thereof to other wireless signal receivers in proximity thereto not normally used as wireless tether signal receivers Users are located to determine if the user is within, or has departed from at least one bounded area established about a geographic location. The bounded area may be defined by setting one or more distance boundaries from the geographic location. A base station may monitor the location of a wireless device in proximity of the user. If the wireless device departs from a bounded area, a message containing information configured to be understandable and convey meaning to the user and/or a third-party is sent to the wireless device and/or the third-party. For example, the message may be configured to communicate to the user and/or third-party information pertaining to the departure from the bounded area, location information, navigation directions, instructions, etc. The message sent may include text and/or other symbols.
|
1. A method of utilizing a wireless tether, the method comprising:
determining when an apparatus used to wirelessly tether a being or a machine in proximity thereof to a location has exceeded at least one distance threshold from the location; and
when the apparatus exceeds the at least one distance threshold, providing an alert to the being, or the machine, or another party in proximity thereof, wherein the alert is configured to provide instruction meaningful to the being, or the machine, or the other party, on how to respond to the at least one distance threshold being exceeded.
9. A method of providing at least one wireless boundary about a geographic location, the method comprising:
determine a distance of a position location device from a geographic location; and
when the position location device has exceeded a first distance from the geographic location, and after a predetermined time has elapsed after the position location device exceeded the first distance, providing an instructional alert to a being or machine in proximity of and movable with the position location device, wherein the instructional alert is configured to instruct the being, the machine, or another party in proximity of the position location device how to respond to exceeding the first distance.
15. A non-transitory computer-readable medium storing a set of code modules which when executed by a processor of a computer system cause the processor to operate a wireless tether, the computer-readable medium comprising:
code for determining when an apparatus used to wirelessly tether a being or a machine in proximity thereof to a location has exceeded at least one distance threshold from the location; and
when the apparatus exceeds the at least one distance threshold, code for providing an alert to the being, or the machine, or another party in proximity thereof wherein the alert is configured to provide instruction meaningful to the being, or the machine, or the other party, on how to respond to the at least one distance threshold being exceeded.
2. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
16. The non-transitory computer-readable medium of
17. The non-transitory computer-readable medium of
18. The non-transitory computer-readable medium of
19. The non-transitory computer-readable medium of
20. The non-transitory computer-readable medium of
|
This application is a continuation of and claims priority to U.S. patent application Ser. No. 11/336,109, entitled “Method And Apparatus For A Wireless Tether System” filed Jan. 20, 2006, now U.S. Pat. No. 7,312,711,
While only three perimeters are shown, it is contemplated that virtually any number of communication pairs of wireless tether receivers 100RA-RD may be used to create a virtually unlimited overall distance. Such a chain-link mode is especially useful in rescue missions where rescuers must maintain a distance from one another in a chain. In the case where the distance between each communicating pair of wireless tether receivers 100RA-RD is important, perimeters PA-C may be configured with different perimeters such as shown in
Illustratively, if one or more communicating pair of wireless tether receivers 100RA-RD move outside their associated perimeters PA-C instructions will be provided to a user. For example as illustrated in
In this operational illustration, wireless tether group 502 has at least one predetermined group perimeter P-G from wireless tether transmitter 100AT. In this mode, there are at least two constraints that are implemented to keep wireless tether group 502 together and within such a group perimeter P-G; at least one wireless tether receiver 100RB-RD must be within a group perimeter P-G, and each wireless tether receiver 100RB-RD must be within a predetermined perimeter relative one another. In one aspect, each wireless tether 100 has their own perimeter associated with one or more other wireless tethers 100 defining such a wireless tether group 502. In one operational aspect, wireless tether receiver 100RB is in communication with wireless tether receiver 100RC via tether signal 506, and wireless tether receiver 100RC is in communication with wireless receiver 100RD via tether signal 508. Illustratively, the maximum distance apart between wireless tether receiver 100RB and wireless tether receiver 100RC is P-B. The maximum distance apart between wireless tether receiver 100RC and wireless tether receiver 100RD is P-C. As long as at least one wireless tether receiver 100RB-RD remain within P-G wireless tether group 502 may move about freely within their respective perimeters P-B and P-D. The maximum distance apart that the group may stray is similar to chain-link mode when wireless tether receivers 100RB-RD are about in a straight-line relative wireless tether transmitter 100AT.
For the case of a limited intellect being such as an animal, the wireless tether group 502 may be used to herd animals. For example, consider the case where sheep are wandering together in a herd. A directional tone or sound could be used to direct such herd of sheep within a predetermined group perimeter P-G. In addition, the group perimeter P-G may be adjusted over time using time mode described herein to slowly corral sheep within a final group perimeter P-G. In one aspect, it is contemplated that animals such as sheep could be moved from place to place by assigning a different wireless tether transmitter 100AT-1 to wireless tether group 502. Thus, in this a group-link configuration 500 wireless tether receivers 100RB-RD may act as “wireless” sheep dogs helping to dynamically herd animals into a plurality of predetermined grazing locations while maintaining a predetermined herd formation size.
In one aspect, in a group communication configuration, where at least one wireless tether receivers 100RB-RD is within a group perimeter P-G, group status may be shared by some or all members of the wireless tether group 502. In this case, if a member of wireless tether group 502 goes beyond its predetermined perimeter, e.g., P-B, members of wireless tether group 502 are alerted and the straying member of wireless tether group 502 may be given instructions such as “return to the group”. In base station communication configuration where at least one wireless tether receivers 100RB-RD is within group perimeter P-G, the status of each wireless tether receivers 100RB-RD of wireless tether group 502 is relayed from the wireless tether receivers 100RB-RD outside P-G though the at least one wireless tether receivers 100RB-RD within group perimeter P-G. In such a mode, base station, i.e., wireless tether transmitter 100AT, may be alerted that a member of wireless tether group 502 is outside its predefined perimeter. In this case, such a straying member may be giving similar instructions as above such as “return to the group”.
In summary, group-link configuration 500 is used to assign an overall group perimeter P-G to a group of wireless tether receivers 100RB-RD where each member of wireless tether group 502 is also required to maintain a preset distance from one or more members of wireless tether group 502, e.g., P-B. Such a mode of operation may be especially useful when a group such as travelers, for example, need to be kept together as they travel from a base area such as a base camp. This mode may also be useful to keep a herd of animals together and moving a desired direction.
At 622, communication thresholds are established. For example, for a wireless tether receiver configuration, communication detection would be the reception of one or more wireless tether signals. For two-way communication, communication detection may include detecting corresponding two-way communication using techniques such as handshake protocols, and the like. At 624, distance thresholds are checked, i.e. distance perimeters. If threshold is maintained, then method 600 returns to 622. If however, at least one distance threshold is not maintained, then at 626 method 600 attempts to determine if at least one perimeter threshold has been exceeded, or if communication has been compromised. Distance thresholds may be determined in a number of ways such as signal strength, Doppler, pulse modulation time differential, phase shifts, and other distance determining methods as are known in the art. Illustratively, as described above, communication may be tested and re-established in a plurality of ways. For example, if tether signals are lost, signal scanning as described above may be used to re-establish a signal connection. At 630, re-establishment of one or more distance thresholds is checked. If one or more distance thresholds are re-established, method 600 proceeds to 622. If one or more distance thresholds are not re-established then method 600 proceeds to 634. At 634, information is provided in response to the inability to reestablish distance threshold. For example, a user moves beyond a predefined perimeter from a base unit (e.g., see
While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Fong, Gordon D., Perez, Cuauhtemoc, Sullivan, C. Bart
Patent | Priority | Assignee | Title |
10223881, | Feb 18 2015 | InVue Security Products Inc | System and method for calibrating a wireless security range |
10227796, | Jun 11 2013 | InVue Security Products Inc. | Anti-theft device for portable electronic device |
10482734, | Sep 29 2013 | InVue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
10482739, | Jun 25 2015 | InVue Security Products Inc.; InVue Security Products Inc | Wireless merchandise security system |
10738508, | Jun 11 2013 | InVue Security Products Inc. | Anti-theft device for portable electronic device |
11113940, | Jun 25 2015 | InVue Security Products Inc. | Wireless merchandise security system |
11293202, | Jun 11 2013 | InVue Security Products Inc. | Anti-theft device for portable electronic device |
11694527, | Sep 29 2013 | InVue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
11749076, | Feb 18 2015 | In Vue Security Products Inc. | System and method for calibrating a wireless security range |
12159517, | Feb 18 2015 | InVue Security Products Inc. | System and method for calibrating a wireless security range |
12165483, | Sep 29 2013 | InVue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
9437088, | Sep 29 2013 | InVue Security Products Inc | Systems and methods for protecting retail display merchandise from theft |
9567776, | Jun 11 2013 | InVue Security Products Inc | Anti-theft device for portable electronic device |
9970217, | Jun 11 2013 | InVue Security Products Inc. | Anti-theft device for portable electronic device |
Patent | Priority | Assignee | Title |
4593273, | Mar 16 1984 | NARCISSE, BERNADINE, TRUSTEE OF THE NARCISSE 1985 FAMILY TRUST DATED JULY 15, 1985 | Out-of-range personnel monitor and alarm |
4598272, | Aug 06 1984 | A + H INTERNATIONAL, INC , A CORP OF DE | Electronic monitoring apparatus |
5245314, | Sep 18 1985 | Location monitoring system | |
5337041, | Apr 13 1992 | Personal safety guard system for stray person or pet | |
5461365, | Oct 27 1994 | CONVERSANT INTELLECTUAL PROPERTY MANAGEMENT INC | Multi-hazard alarm system using selectable power-level transmission and localization |
5552773, | Nov 23 1994 | Method and apparatus for the protection of people or objects | |
5661460, | Dec 13 1994 | SHERMAN, WILFRED M | Distance determination and alarm system |
5731785, | May 13 1994 | System and method for locating objects including an inhibiting feature | |
6075443, | Jul 31 1998 | SRI International | Wireless tether |
6313733, | Jan 23 1998 | Child pager system | |
6353390, | Dec 31 1999 | Qualcomm Incorporated | Method and system of configuring a boundary and tracking an object thereby |
6510380, | Mar 31 1999 | C2 Global Technologies, Inc. | Security and tracking system |
6529131, | Jun 13 2001 | Electronic tether | |
6552661, | Aug 25 2000 | RFC MERGER CORP , A DELAWARE CORPORATION; RF CODE, INC , A DELAWARE CORPORATION | Zone based radio frequency identification |
6714132, | Oct 11 2001 | The United States of America as represented by the Administrator of the National Aeronautics and Space Administration | Self-activating system and method for alerting when an object or a person is left unattended |
6788199, | Mar 12 2001 | Eureka Technology Partners, LLC | Article locator system |
6888464, | Apr 19 2002 | Child locating system | |
7061385, | Sep 06 2003 | RPX Corporation | Method and apparatus for a wireless tether system |
7071814, | Jul 31 2000 | Google Technology Holdings LLC | Contextually aware network announcements of people |
7312711, | Sep 06 2003 | RPX Corporation | Method and apparatus for a wireless tether system |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 04 2011 | TV—Tether, LLC | (assignment on the face of the patent) | / | |||
Apr 24 2012 | FONG, GORDON D | TV - TETHER, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 028239 | /0545 | |
Apr 25 2012 | SULLIVAN, C BART | TV - TETHER, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 028239 | /0545 | |
May 11 2012 | PEREZ, CUAUHTEMOC | TV - TETHER, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 028239 | /0545 | |
Jan 25 2016 | TV - TETHER, LLC | RPX Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037637 | /0867 | |
Jun 19 2018 | RPX Corporation | JEFFERIES FINANCE LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 046486 | /0433 | |
Aug 23 2020 | RPX CLEARINGHOUSE LLC | BARINGS FINANCE LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 054244 | /0566 | |
Aug 23 2020 | RPX Corporation | BARINGS FINANCE LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 054244 | /0566 | |
Oct 23 2020 | JEFFERIES FINANCE LLC | RPX Corporation | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 054486 | /0422 | |
Oct 23 2020 | RPX Corporation | BARINGS FINANCE LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 054198 | /0029 | |
Oct 23 2020 | RPX CLEARINGHOUSE LLC | BARINGS FINANCE LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 054198 | /0029 |
Date | Maintenance Fee Events |
Feb 16 2016 | STOL: Pat Hldr no Longer Claims Small Ent Stat |
Nov 21 2016 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 04 2021 | REM: Maintenance Fee Reminder Mailed. |
Jun 21 2021 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Aug 13 2016 | 4 years fee payment window open |
Feb 13 2017 | 6 months grace period start (w surcharge) |
Aug 13 2017 | patent expiry (for year 4) |
Aug 13 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 13 2020 | 8 years fee payment window open |
Feb 13 2021 | 6 months grace period start (w surcharge) |
Aug 13 2021 | patent expiry (for year 8) |
Aug 13 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 13 2024 | 12 years fee payment window open |
Feb 13 2025 | 6 months grace period start (w surcharge) |
Aug 13 2025 | patent expiry (for year 12) |
Aug 13 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |