US20010040512A1 - Personal alarm monitor system - Google Patents

Personal alarm monitor system Download PDF

Info

Publication number
US20010040512A1
US20010040512A1 US09/266,449 US26644999A US2001040512A1 US 20010040512 A1 US20010040512 A1 US 20010040512A1 US 26644999 A US26644999 A US 26644999A US 2001040512 A1 US2001040512 A1 US 2001040512A1
Authority
US
United States
Prior art keywords
transmitter
location
code
gateway
receiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/266,449
Other versions
US6396413B2 (en
Inventor
Richard Hines
Edward Starling
Fred Pulver
Robert James Pang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telephonics Corp
Original Assignee
Telephonics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telephonics Corp filed Critical Telephonics Corp
Priority to US09/266,449 priority Critical patent/US6396413B2/en
Assigned to TELEPHONICS CORPORATION reassignment TELEPHONICS CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PANG, ROBERT JAMES, PULVER, FRED, HINES, RICHARD, STARLING, EDWARD
Priority to AU37417/00A priority patent/AU3741700A/en
Priority to PCT/US2000/006501 priority patent/WO2000054234A1/en
Publication of US20010040512A1 publication Critical patent/US20010040512A1/en
Application granted granted Critical
Publication of US6396413B2 publication Critical patent/US6396413B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Definitions

  • the present invention pertains to a new and improved method and apparatus for determining the location of an individual within a specified area. More particularly, this invention relates to an apparatus which comprises the combination of a portable device which, in conjunction with a series of fixed transmitters, provides information which may be processed by a monitoring station to determine the location of a user carrying the portable device.
  • PAM personal alarm monitoring
  • active PAM systems determine the location of the user when requested or required through a communication system with the user.
  • active PAM systems utilizing a variety of technologies, including infrared, ultrasonic, and radio frequency systems
  • Radio frequency schemes can report wrong locations due to the inability of such systems to properly account for attenuation or multiple reflections or receptions of the radio frequency signals.
  • Infrared and ultrasonic locating systems are often ineffective due to interference problems caused by smoke or noise, and may suffer from directionality limitations.
  • Such installations are also usually expensive, since the sensors or receivers are typically hand-wired to the monitoring station.
  • Another object of the present invention is to provide a system which is simple and inexpensive to install and operate, and which can function in a defined area having hallways, rooms and open areas.
  • Still a further object of the present invention is to provide a method and apparatus for location determination which utilizes a series of fixed transmitters located throughout the area to be monitored and portable transceivers which are carried by the individuals whose whereabouts are to be monitored.
  • a personal alarm monitor system in accordance with the present invention utilizes radio frequency identification (RFID) tag transmitters positioned throughout a building or other specified area or premises; one or more portable personal alarm monitor transceivers or “body units”; and a monitoring station.
  • RFID radio frequency identification
  • a body unit is carried by a user whose location is desired to be monitored.
  • the RFID tags are installed throughout the premises at fixed locations; each is provided with a unique identification code. The identification codes and corresponding locations for the RFID tag units are known by the monitoring station.
  • the RFID tags broadcast low-level identification radio signals, preferably on an intermittent basis.
  • Each body unit is capable of receiving the signals from all RFID tags.
  • the identification data is stored by the body unit.
  • the most-recently received data is indicative of the current location of the body unit and its wearer.
  • the collection of identification data stored by the body unit provides a history of the wearer's path of travel.
  • the stored identification data can be downloaded or transmitted by the body unit to the monitoring station to provide location information to supervisory personnel.
  • the RFID tags are located throughout the premises as appropriate to provide useful location data. Even though the tags are low-power devices, and may include antenna structures to direct the broadcasts in particular directions, there exists the possibility that a body unit will receive identification data from RFID tags which are not directly along the wearer's path of travel. Accordingly, the invention embodies logic, enabled by a microprocessor in the body unit, to process the signals received by the body unit, the logic allowing rejection of signals from RFID tags which would not logically correspond to a path of travel dictated and permitted by the geometry and layout of the premises. The logic also allows compensation to be made for defective or inoperative RFID tags. Only when a received identification signal is verified is it passed to a list which serves as the travel history for the body unit and its wearer and can be transmitted to the monitoring station for use in determining the current location of the body unit/user as well as its path of travel.
  • the positioning of RFID tags, and the identification scheme associated therewith, interfaces with the processing logic.
  • the placement of RFID tags include the placement of paired tags at portals or gateways, such as doorways, linking defined designated areas of the premises to be monitored.
  • the identification data associated with each such gateway RFID tag identifies it as a gateway tag and allows its complementary tag to be identified, as well as identifying its location in the monitored premises.
  • the identification data transmitted by a gateway tag allows a body unit receiving the data to identify its linked complement gateway tag; the processing logic recognizes that sequential reception of signals from both linked tags is required for a valid passage through the referenced gateway or portal between defined areas.
  • body unit processing logic can reject a received RFID tag broadcast if it corresponds to a location in an area which has not been previously entered by a previously recorded passage through a gateway as reflected by previous receipt of identification data from the associated pair of gateway tags.
  • FIG. 1 is a schematic representation of an area in which the location of individuals carrying body units can be monitored, depicting an illustrative positioning of RFID tags therein;
  • FIG. 2 is a block diagram of the components of an RFID tag
  • FIG. 3 is a block diagram of the components of a body unit
  • FIG. 4 is a flow diagram depicting the processing of RFID tag data by a body unit
  • FIG. 5 is a flow diagram detailing initial processing of a valid data signal by a body unit.
  • FIG. 6 is a depiction of a look-up table for received signal strength adjustment.
  • the present invention incorporates the use of portable transceiver body units 20 which are carried by personnel and which receive signals generated by low-power RFID transmitters 18 , situated throughout an environment or premises of defined boundaries in which the travel and location of the personnel is sought to be monitored.
  • the premises is represented by a portion 10 of a building having a series of hallways 12 a - d and a series of offices and other rooms 14 a, b, c . . . .
  • the hallways and the other designated area are interconnected by gateways 16 , such as doorways, one of which must be traversed to pass from one designated area to another.
  • the designated areas need not be on a single level. Stairways, which themselves can be designated areas, can link different floors of the premises, each floor forming one or more designated areas.
  • the RFID tags 18 are placed at particular locations throughout the premises to be monitored to permit distinct location resolution.
  • a unique identification assigned to each RFID tag in addition to providing location information, provides data to the body unit which allows RFID tag discrimination and signal validation to be performed.
  • pairs of RFID tags 18 denominated as gateway tags, are located at opposite sides of each of the gateways 16 between designated areas.
  • single, unpaired RFID tag units are located as desired within the designated areas, to further provide location reference.
  • the specific locations of the single RFID units are chosen with consideration of the degree of position resolution desired.
  • the overall operation of the system is intended to provide general position information rather than pinpoint coordinates.
  • Each defined area will have at least one gateway tag.
  • Each of the RFID tags 18 broadcasts, preferably at intervals, a unique identification code which identifies the location of the RFID tag.
  • the identification codes follow a unique format, to be described infra, which provides for error handling and processing to minimize inaccuracies due to the potential reception by a body unit of signals from RFID tags throughout the premises.
  • a body unit 20 receives the transmitted identification data, processes it to determine its validity, and stores the thus validated identification code, along with a time stamp, in memory. The collection of such data forms a historical record for the body unit and its wearer, and provides a record of the proximity of the individual to RFID tags and thus a finite history of the travel of the body unit and its wearer throughout the monitored premises. Because the locations of the RFID tags are known and fixed, the identity of the most recently encountered or current RFID tag may be used to determine the current location of the individual within the monitored premises.
  • a wireless link is established between a central monitoring station 22 , which may be remote from the monitored premises and the body units, allowing the data stored by a body unit to be processed by the central monitoring station to provide location data as needed or required.
  • the transmission to the central monitoring station can be on command of the body unit or can be on a preset basis, controlled by the body unit microprocessor.
  • the body unit can also be polled by the monitoring station via the wireless link.
  • FIG. 2 depicts the circuitry for the RFID tags 18 .
  • a lithium battery 24 provides power for the tag.
  • Timer 26 activates microprocessor 28 on intervals determined by the specific system architecture utilized.
  • the architecture is chosen to minimize collisions with the broadcasts of other RFID tags.
  • One such architecture comprises a transmission time of 20 msec at an interval of between 300 and 700 msec, each RFID tag being assigned a fixed interval within that window. Alternatively, random or pseudo random broadcast intervals may be designated.
  • microprocessor 28 When activated, microprocessor 28 enables switch 32 which feeds regulated power from regulator 30 to the power node of RF oscillator 34 .
  • the oscillator then outputs an on-off keyed modulated RF carrier data packet to antenna 36 .
  • the frequency of operation may be within the 2.4 GHz ISM band.
  • the circuitry may be developed on a printed circuit board consistent with known design techniques for the frequency range employed.
  • the data packet includes the identification of the RFID as well as monitor/health bits.
  • the tags transmit their identifications at low power.
  • the identification number of the tag is received by the body unit and processed.
  • the combination of low power and antenna design and orientation, as known in the art, is intended to limit the broadcast range of the tag to body unit receivers in close proximity thereto.
  • FIG. 3 depicts the layout of a body unit 20 , which both receives RFID unit transmissions and transmits position data to the remote monitoring station.
  • Antennas 38 receive the incoming signals transmitted by the RFID tags and transmit the outgoing signals to the monitoring station.
  • First RF switch 40 controlled by microprocessor 42 , couples the antenna having the greater incoming signal strength to RF filter 44 and subsequent receiver system components.
  • Second RF switch 46 couples the incoming signal from RF filter 44 to receiver circuitry or, when the transmission mode is enabled, couples the transmitter circuitry to the RF filter and antenna system in accordance with instructions generated by the microprocessor. Only one antenna is used during transmission.
  • second RF GLOBAL CHANGE switch 46 couples the incoming signal to frequency convertor 48 , which down converts the signal to an intermediate frequency (IF) of 27 MHz.
  • Reference oscillator 50 and RF synthesizer 52 provide the local frequency signal for the downconversion process.
  • the received signal is filtered by IF filters 54 and amplified by detecting logarithmic amplifier stage 56 .
  • the output of the amplifier is filtered and buffered at 74 and simultaneously peak detected at 58 .
  • the peak reading is compared to a threshold reference generated by a digital-to-analog convertor 60 which is under the control of microprocessor 42 .
  • the sensitivity of the system to received signals is selectable by the setting of the reference, typically within a range of ⁇ 20 dBm to ⁇ 85 dBm into the antenna. If the sensitivity threshold of the receiver is exceeded, an interrupt is sent to microprocessor 42 . An algorithm is then executed which reads the received RFID tag data and further processes the information, as will be discussed infra.
  • the buffered data signal generated by data filter 74 is used to determine the signal strength of the received broadcast and control first rf switch 40 .
  • analog-to-digital convertor 78 reads the signal and provides a digital data signal, corresponding to the identification of the tag broadcasting the signal, to microprocessor 42 .
  • a percentage of the peak reading level determined at 58 is also used as a reference to slice the received data signal into sequential data bit intervals at 76 and provide logic level information to the microprocessor for processing in conjunction with the conversion of the data signal at 78 . If a data packet is determined to be corrupt, or the data packet ends, the peak value is dumped and the receiver becomes immediately available to receive another packet.
  • activation of alarm switch 62 delivers an interrupt to the microprocessor which triggers entry into the transmit mode.
  • RF synthesizer 52 is used to generate a frequency shift-keyed signal burst bearing the data to be transmitted, which signal is amplified at 64 , buffered by isolator 66 and forwarded to second rf switch 46 .
  • the switch delivers the signal to the antennas 38 .
  • the transmission may typically include an identification of the body unit as well as position data.
  • the microprocessor can also be programmed to enter the transmit mode on a scheduled basis.
  • microprocessor 42 includes memory registers and firmware/software which allows it to supervise and control data reception and transmissions well as process the data as required.
  • the body unit may be powered by a 6-volt rechargeable nickel-metal hydride battery 68 , regulated at 70 for the receive path circuitry and unregulated for the transmit path. Voltage sensor 72 verifies the charge state of the battery and passes such information to microprocessor 42 .
  • An RS-232 port 44 may be used to up-load program memory for the microprocessor and can allow monitor and control functions in a test mode. It may also be used to communicate with an optional GPS unit.
  • the RFID tags are low-power devices intended to broadcast a signal for reception only in the direct proximity of the tag, all RFID tags broadcast on a common frequency, and a body unit is capable of reception of signals from all RFID tags whose signals reach the body unit. Accordingly, the present invention is configured to discriminate between and among RFID broadcast signals such that an accurate record can be formed of the location of the body unit wearer.
  • the identification associated with each RFID tag comprises two data element portions, the combination of which uniquely identifies the tag.
  • the first portion identifies the designated area in which the tag is located. With reference to FIG. 1, the designated areas would be the hallway 12 , conference room 1 , executive area, office A, or the like. Each designated area is assigned a different identifier.
  • the second portion of the identification distinguishes the tag from the other tags located in the same designated area and associates the tag, if it is a gateway tag, with the corresponding paired gateway tag in the adjacent designated area.
  • the identifications associated with RFID tags located in the hallway system are assigned the first data or group element 01.
  • the first data element for RFID tags located in the executive area is 02
  • the first data element for conference room one is 03
  • for conference room two is 05.
  • the second data elements may be assigned consecutively, with the additional requirement that corresponding gateway tags, each of which has a different designated area number, have the identical second data element.
  • the RFID gateway tag in the hall at the entrance to conference room one is identified by second element 07, the full identification of the hall RFID being 01,07, the corresponding conference room RFID gateway tag is 03,07.
  • the hall gateway tag at the south entrance to the executive area is designated 01,01
  • the corresponding executive area gateway tag is 02,01.
  • the north entrance to the executive area from the hallway is hall location 02, yielding the tag ID's for the paired gateways tags as 01,02 for the hall tag and 02,02 for the executive area tag.
  • the paired gateway tags at the entranceway to conference room two are similarly designated by the respective identifiers 01,05 and 05,05. Additional intermediate locations in the hallway are designated as locations 03 and 04.
  • the identification for such ID tags are 01,03, and 01,04.
  • gateway tag data facilitate error correction and failure detection logic, allowing the system to discriminate among signals which emanate from RFID tags logically within a path of travel and those which emanate from other tags and to apply error correction and compensation as required.
  • FIG. 4 sets forth the processing of RFID tag data as received by a body unit and implemented by the body tag microprocessor.
  • a body unit upon start-up a body unit initially enters idle state 400 . Memory registers are cleared and the body unit awaits the receipt of a data packet from an RFID tag. This occurs at 402 . The format of the received data is checked to confirm that it represents the identity of an RFID tag and is not corrupt. If not confirmed, the data packet is rejected and the idle state is re-entered, awaiting a new, valid signal.
  • Tag encounter list 502 is an ongoing record of the identification of each tag who's transmission is received and processed by the body unit.
  • History list 504 is also an ongoing record, similar to the tag encounter list, which includes the identification of all tag transmissions received, but also includes further data associated therewith, including a timestamp. This history list is intended to be of limited, fixed size; when the capacity is reached the addition of newly encountered tag data causes the oldest tag data to be dropped from the list.
  • Position list 506 is a listing of the identifications of RFID tags which pass the validated process, and accordingly represents the validated positional history for the body unit. Tag data is entered into the position list only after the appropriate processing and verification of FIG. 4 is completed. It is information on this list which is transmitted as position information to the central monitoring station.
  • Look-up table 508 associates an adjustment value applicable to the received signal strength of a signal for each tag in the system.
  • the identification of the tag is placed on both the tag encounter list 502 and the history list 504 . Because of potential unit-to-unit manufacturing variations, as well as variations in the field strength of the broadcast RFID signals at the position of the body units due to the particular placement of individual RFID units, the received signal must be normalized. This allows comparisons to be made between signal strengths from different RFID tags, as relative signal strength is used to determine the validity of a particular received signal.
  • the identification of the received tag signal is utilized to identify the normalization factor to be applied; the normalization factors may be in a lookup table 508 in body unit memory, and are programmed into the table as part of initial calibration of the body unit. The normalization factors are derived from actual signal readings mode during system installation.
  • the normalized value is entered in the history list 504 along with tag identification and a time stamp value.
  • the received tag group i.e., the first or designated area data element
  • the group identification of the most recent (or “current”) position which has been previously validated and thus placed on the position list 506 . If the group is the same, it indicates that the location of the received RFID tag is in the same designated area (i.e., hall, conference room, etc.) as the current position. A different group number indicates that a potential transition between areas has occurred.
  • the RSSI for the received signal is compared to a reference minimum value at 406 .
  • This comparison is used to insure that the body unit is likely within a generally accepted distance from the RFID tag whose broadcast has been received to at least broadly validate position. If the adjusted RSSI is below the minimum, it suggests that the distance is too great; the data is discarded and the idle phase is re-entered to await the receipt of new data.
  • the information in the data packet received by the body unit may be an indicator bit. The indicator bit provides independent identification of the type of RFID tag.
  • Presence of the bit classifies the RFID tag as a gateway tag; lack of the bit classifies the tag as a non-gateway tag.
  • the bit may be used in connection with RSSI comparisons to assign a minimum reference value for signal strength comparisons. A higher reference for gateway tags may be desired to improve reliability.
  • RSSI value exceeds the required minimum, a comparison is made at 408 between the RSSI value and the RSSI value for the most recently encountered tag as found on the history list, irrespective of whether that tag is also on the position list, as further explained infra.
  • the current position for the body unit is updated at 410 to that of the RFID tag encountered by adding the identification added to the position list as the new current position.
  • the second portion of the tag identification is compared to the corresponding portion of the current location at 412 . If the value is different, indicating a change of position within the designated area, the adjusted RSSI value is checked at 406 to determine whether it meets the required signal strength threshold. If the minimum is met, the RSSI is compared at 408 to an adjusted value for the RSSI for the last encountered tag as set forth on the history list. This comparison, at 408 , further validates the position of the body unit.
  • the RSSI value to which the received RSSI is compared is subject to a negative time-based weighing adjustment. The greater the time between tag data receptions, the smaller the reference value.
  • the RSSI weighing correction is applied through a look-up table, as shown in FIG. 6. Based on the number of transmit intervals between the signal being processed and the most recent history list entry, the RSSI value of the reference is decremented accordingly. At an interval of 6 periods and beyond, the signal strength of the reference is decremented to zero.
  • the current position of the body unit is updated at 410 to reflect the identification received, with the new position being placed on the position list.
  • the body unit then again enters the idle state 400 awaiting the receipt of new data. If the differential is not met, the current position is not updated, and the idle state is immediately re-entered.
  • each time the same id is encountered a search is performed in the tag encounter list 502 for a gateway RFID tag pair associated with the identified designated area of the received tag data.
  • gateway tags have different first or group identification portions but the same second identification portion, such a search can be readily performed. If a pair of tags is found it suggests that both gateway tags are operating, and that the body unit has not crossed through the gateway (and passed into a new designated area) and returned undetected, and accordingly that the received position is properly the same as the previous position. The idle stage is thus re-entered and a subsequent signal awaited.
  • the logic branches to 420 .
  • the receipt of a different first data element value indicates that a gateway should have been traversed.
  • the second identification portion of the received tag data is compared to the identification of the previously encountered tag on the history list. If the id's are the same, it indicates that the two tags are gateway tags (as only corresponding gateway tags have different first values and the same second id values) and that a valid gateway traverse has occurred.
  • the minimum RSSI value of the received signal is checked at 406 , compared to the time-adjusted value for the previously encountered tag at 408 and, if signal strength is validated, the current position for the body unit is updated at 410 and the current position added to the position list.
  • the determination commences at 422 .
  • a first check is made to determine whether or not the tag from which information is being received is a gateway tag.
  • the gateway identification bit of the received data is checked; if the check confirms the identity of the received signal as being from a gateway tag a search is performed of the history list for the compliment of the tag.
  • the failure of either condition to be met causes the transmission to be discarded and the idle condition at 400 is reentered.
  • the processing of received data signals will continue to cycle through steps 400 , 402 , 404 , 420 , 422 and 400 until a gateway tag signal is encountered or the user leaves the designated area.
  • the received tag data is continuously entered into the encounter and history lists, however.
  • the RSSI of its received signal is compared to the required minimum at 424 . Once again, if the signal strength is below the minimum the signal is discarded and the idle state is re-entered. If the received signal strength is above the required minimum the signal strength is compared to the time adjusted RSSI of its found compliment on the history list. If the difference is less than the required differential the idle phase is entered; if the required differential is satisfied the determination is made that there is a possibility of a non-operable RFID tag, and particularly the received gateway tag's complement. The identification of the encountered tag is marked as the fault location, to be transmitted or otherwise downloaded at the central station as appropriate.
  • the identified location is not, strictly speaking, the actual location of the fault, it provides an indication of the general location of the fault. Investigation and maintenance of the tags can then be performed to identify the problem. Again, the identification of a potential fault location does not affect the receiver's ability to receive and process subsequent data from RFID tags in the fault area.
  • Gateway tag 01,01 data is received, its data initially processed at 402 and its identification is place in the history and encounter lists 504 , 502 .
  • the RSSI of the tag is checked at 406 , and with the assumption that the minimum value is met, its identification is entered into the position list 506 at 410 and a new signal is awaited.
  • the body unit receives a signal from gateway tag 02,01, and its data is processed. As the first or group value (02) is different from the current group (01) the second or id values are compared at 420 . As they are the same (01) the RSSI of the received signal and the differential RSSI are checked at 406 , 408 . The body unit's current position is then updated at 4100 as the body unit's current position.
  • the body unit receives a signal from gateway tag 03,07 in the conference room. After initial processing it is determined that the group of the received signal (03) is different from the current group 02, and the id value for the new signal is checked at 420 . As the id is different (07 v 01) the “lost body unit” routine of 424 is entered. While the received tag data is from a gateway tag, its complement does not appear on the history list. Thus the signal is discarded and idle is reentered.
  • the body unit wearer exits the executive area through the north entrance. As he approaches, the body unit receives a transmission from gateway tag 02,02. As the group of the received data is the same as that of the body unit's current position and the id is different the RSSI is validated and the body unit's position is updated.
  • gateway tag check is performed at 414 .
  • the history list is checked for the received tag's complement (02,02) and since it appears, the reception can be discarded and idle reentered.
  • each of the RFID transmitters broadcasts its identification data on short intervals as compared to the speed at which the movement of body units is expected, and the processing time of received by a body unit fast as a result of microprocessor speed, the system is able to both update position data and overcome the effects of signal overlap in a manner which significantly improves the accuracy and reliability of position information generated.

Abstract

A personal alarm monitor system provides a means for recording the location of a person as the person travels through a designated premises comprising a series of designated areas interconnected by portals or gateways, such as doorways. The person carries a receiver capable of receiving broadcasts from a plurality of preferably low-power transmitters specifically located throughout the premises. Pairs of transmitters are located at each gateway, one transmitter being placed in each of the adjacent designated areas to broadcast a signal primarily into the designated area about the gateway. Additional unpaired transmitters may be located at additional locations in the designated areas. Each transmitter is assigned and broadcasts a unique code corresponding to its location and status as either a gateway or non-gateway tag. A portable receiver, carried by a person whose location is to be monitored, receives the unique code broadcasts from the transmitters and processes the code data to validate the position it represents. When validated, the code is stored by the receiver. A list of the validated codes can be downloaded or transmitted to a remote location for tracking purposes.

Description

  • The present invention pertains to a new and improved method and apparatus for determining the location of an individual within a specified area. More particularly, this invention relates to an apparatus which comprises the combination of a portable device which, in conjunction with a series of fixed transmitters, provides information which may be processed by a monitoring station to determine the location of a user carrying the portable device. [0001]
  • BACKGROUND OF THE INVENTION
  • There are numerous workplace situations where it is advantageous or essential for individuals to have a means of communicating to a monitoring station that they are in an emergency situation and simultaneously allowing their location to be determined. For example, in a correctional facility an officer may be unable to verbally communicate his location during an emergency. In addition, there are situations when it may be desirable to transmit one's location in a silent, non-obtrusive manner, either as a means of reporting a particular event or situation, or merely to allow a surveillance office to be apprised of the user's location. [0002]
  • There are two general types of personal alarm monitoring (PAM) systems for monitoring the location of a person. In a passive PAM system, a user simply follows a pre-arranged schedule. The monitoring station assumes the location of the user based upon the schedule. However, if a user travels to a location other than his assigned location, or alters the schedule, the user's location is unknown and cannot be determined by the monitoring station. [0003]
  • In contrast, active PAM systems determine the location of the user when requested or required through a communication system with the user. Although there are numerous active PAM systems utilizing a variety of technologies, including infrared, ultrasonic, and radio frequency systems, such conventional systems are often unable to reliably determine the location of a user. Radio frequency schemes can report wrong locations due to the inability of such systems to properly account for attenuation or multiple reflections or receptions of the radio frequency signals. Infrared and ultrasonic locating systems are often ineffective due to interference problems caused by smoke or noise, and may suffer from directionality limitations. Such installations are also usually expensive, since the sensors or receivers are typically hand-wired to the monitoring station. [0004]
  • It is thus an object of the present invention to provide an improved system for monitoring the location of an individual in a building or other defined area. [0005]
  • It is a further object of the present invention to provide a method and apparatus for determining the location of an individual with precision and accuracy. [0006]
  • Another object of the present invention is to provide a system which is simple and inexpensive to install and operate, and which can function in a defined area having hallways, rooms and open areas. [0007]
  • It is yet another object of the present invention to provide a system which allows for economical expansion of the range of coverage and/which exhibits improved precision over conventional systems. [0008]
  • Still a further object of the present invention is to provide a method and apparatus for location determination which utilizes a series of fixed transmitters located throughout the area to be monitored and portable transceivers which are carried by the individuals whose whereabouts are to be monitored. [0009]
  • SUMMARY OF THE INVENTION
  • A personal alarm monitor system in accordance with the present invention utilizes radio frequency identification (RFID) tag transmitters positioned throughout a building or other specified area or premises; one or more portable personal alarm monitor transceivers or “body units”; and a monitoring station. A body unit is carried by a user whose location is desired to be monitored. The RFID tags are installed throughout the premises at fixed locations; each is provided with a unique identification code. The identification codes and corresponding locations for the RFID tag units are known by the monitoring station. [0010]
  • The RFID tags broadcast low-level identification radio signals, preferably on an intermittent basis. Each body unit is capable of receiving the signals from all RFID tags. As a body unit wearer travels through the premises, the body unit receives identification data from each RFID tag it passes. The identification data is stored by the body unit. The most-recently received data is indicative of the current location of the body unit and its wearer. The collection of identification data stored by the body unit provides a history of the wearer's path of travel. The stored identification data can be downloaded or transmitted by the body unit to the monitoring station to provide location information to supervisory personnel. [0011]
  • The RFID tags are located throughout the premises as appropriate to provide useful location data. Even though the tags are low-power devices, and may include antenna structures to direct the broadcasts in particular directions, there exists the possibility that a body unit will receive identification data from RFID tags which are not directly along the wearer's path of travel. Accordingly, the invention embodies logic, enabled by a microprocessor in the body unit, to process the signals received by the body unit, the logic allowing rejection of signals from RFID tags which would not logically correspond to a path of travel dictated and permitted by the geometry and layout of the premises. The logic also allows compensation to be made for defective or inoperative RFID tags. Only when a received identification signal is verified is it passed to a list which serves as the travel history for the body unit and its wearer and can be transmitted to the monitoring station for use in determining the current location of the body unit/user as well as its path of travel. [0012]
  • The positioning of RFID tags, and the identification scheme associated therewith, interfaces with the processing logic. In a particular embodiment of the invention, the placement of RFID tags include the placement of paired tags at portals or gateways, such as doorways, linking defined designated areas of the premises to be monitored. The identification data associated with each such gateway RFID tag identifies it as a gateway tag and allows its complementary tag to be identified, as well as identifying its location in the monitored premises. [0013]
  • The identification data transmitted by a gateway tag allows a body unit receiving the data to identify its linked complement gateway tag; the processing logic recognizes that sequential reception of signals from both linked tags is required for a valid passage through the referenced gateway or portal between defined areas. Similarly, as all RFID tags in an defined area are logically linked through their identification codes, body unit processing logic can reject a received RFID tag broadcast if it corresponds to a location in an area which has not been previously entered by a previously recorded passage through a gateway as reflected by previous receipt of identification data from the associated pair of gateway tags.[0014]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A fuller understanding of the present invention will be achieved upon review of the following detailed description of a preferred, but nonetheless illustrative embodiment of the invention when considered in conjunction with the annexed drawings, wherein: [0015]
  • FIG. 1 is a schematic representation of an area in which the location of individuals carrying body units can be monitored, depicting an illustrative positioning of RFID tags therein; [0016]
  • FIG. 2 is a block diagram of the components of an RFID tag; [0017]
  • FIG. 3 is a block diagram of the components of a body unit; [0018]
  • FIG. 4 is a flow diagram depicting the processing of RFID tag data by a body unit; [0019]
  • FIG. 5 is a flow diagram detailing initial processing of a valid data signal by a body unit; and [0020]
  • FIG. 6 is a depiction of a look-up table for received signal strength adjustment.[0021]
  • DETAILED DESCRIPTION OF THE INVENTION
  • With initial reference to FIG. 1, the present invention incorporates the use of portable [0022] transceiver body units 20 which are carried by personnel and which receive signals generated by low-power RFID transmitters 18, situated throughout an environment or premises of defined boundaries in which the travel and location of the personnel is sought to be monitored. As depicted in FIG. 1, the premises is represented by a portion 10 of a building having a series of hallways 12 a-d and a series of offices and other rooms 14 a, b, c . . . . The hallways and the other designated area are interconnected by gateways 16, such as doorways, one of which must be traversed to pass from one designated area to another. The designated areas need not be on a single level. Stairways, which themselves can be designated areas, can link different floors of the premises, each floor forming one or more designated areas.
  • The [0023] RFID tags 18 are placed at particular locations throughout the premises to be monitored to permit distinct location resolution. A unique identification assigned to each RFID tag, in addition to providing location information, provides data to the body unit which allows RFID tag discrimination and signal validation to be performed. As shown in the figure, pairs of RFID tags 18, denominated as gateway tags, are located at opposite sides of each of the gateways 16 between designated areas. In addition, single, unpaired RFID tag units are located as desired within the designated areas, to further provide location reference. The specific locations of the single RFID units are chosen with consideration of the degree of position resolution desired. The overall operation of the system, however, is intended to provide general position information rather than pinpoint coordinates. Each defined area will have at least one gateway tag.
  • Each of the [0024] RFID tags 18 broadcasts, preferably at intervals, a unique identification code which identifies the location of the RFID tag. The identification codes follow a unique format, to be described infra, which provides for error handling and processing to minimize inaccuracies due to the potential reception by a body unit of signals from RFID tags throughout the premises. A body unit 20 receives the transmitted identification data, processes it to determine its validity, and stores the thus validated identification code, along with a time stamp, in memory. The collection of such data forms a historical record for the body unit and its wearer, and provides a record of the proximity of the individual to RFID tags and thus a finite history of the travel of the body unit and its wearer throughout the monitored premises. Because the locations of the RFID tags are known and fixed, the identity of the most recently encountered or current RFID tag may be used to determine the current location of the individual within the monitored premises.
  • A wireless link is established between a central monitoring station [0025] 22, which may be remote from the monitored premises and the body units, allowing the data stored by a body unit to be processed by the central monitoring station to provide location data as needed or required. The transmission to the central monitoring station can be on command of the body unit or can be on a preset basis, controlled by the body unit microprocessor. The body unit can also be polled by the monitoring station via the wireless link.
  • FIG. 2 depicts the circuitry for the RFID tags [0026] 18. As depicted therein, a lithium battery 24 provides power for the tag. Timer 26 activates microprocessor 28 on intervals determined by the specific system architecture utilized. Preferably, the architecture is chosen to minimize collisions with the broadcasts of other RFID tags. One such architecture comprises a transmission time of 20 msec at an interval of between 300 and 700 msec, each RFID tag being assigned a fixed interval within that window. Alternatively, random or pseudo random broadcast intervals may be designated.
  • When activated, [0027] microprocessor 28 enables switch 32 which feeds regulated power from regulator 30 to the power node of RF oscillator 34. The oscillator then outputs an on-off keyed modulated RF carrier data packet to antenna 36. The frequency of operation may be within the 2.4 GHz ISM band. Preferably, the circuitry may be developed on a printed circuit board consistent with known design techniques for the frequency range employed. The data packet includes the identification of the RFID as well as monitor/health bits.
  • The tags transmit their identifications at low power. When a person wearing a body unit is within range of the tag, the identification number of the tag is received by the body unit and processed. The combination of low power and antenna design and orientation, as known in the art, is intended to limit the broadcast range of the tag to body unit receivers in close proximity thereto. [0028]
  • FIG. 3 depicts the layout of a [0029] body unit 20, which both receives RFID unit transmissions and transmits position data to the remote monitoring station. Antennas 38 receive the incoming signals transmitted by the RFID tags and transmit the outgoing signals to the monitoring station. First RF switch 40, controlled by microprocessor 42, couples the antenna having the greater incoming signal strength to RF filter 44 and subsequent receiver system components. Second RF switch 46 couples the incoming signal from RF filter 44 to receiver circuitry or, when the transmission mode is enabled, couples the transmitter circuitry to the RF filter and antenna system in accordance with instructions generated by the microprocessor. Only one antenna is used during transmission.
  • During reception, second RF GLOBAL CHANGE switch [0030] 46 couples the incoming signal to frequency convertor 48, which down converts the signal to an intermediate frequency (IF) of 27 MHz. Reference oscillator 50 and RF synthesizer 52 provide the local frequency signal for the downconversion process. Once downconverted, the received signal is filtered by IF filters 54 and amplified by detecting logarithmic amplifier stage 56. The output of the amplifier is filtered and buffered at 74 and simultaneously peak detected at 58. The peak reading is compared to a threshold reference generated by a digital-to-analog convertor 60 which is under the control of microprocessor 42. The sensitivity of the system to received signals is selectable by the setting of the reference, typically within a range of −20 dBm to −85 dBm into the antenna. If the sensitivity threshold of the receiver is exceeded, an interrupt is sent to microprocessor 42. An algorithm is then executed which reads the received RFID tag data and further processes the information, as will be discussed infra.
  • The buffered data signal generated by data filter [0031] 74 is used to determine the signal strength of the received broadcast and control first rf switch 40. In addition, analog-to-digital convertor 78 reads the signal and provides a digital data signal, corresponding to the identification of the tag broadcasting the signal, to microprocessor 42. A percentage of the peak reading level determined at 58 is also used as a reference to slice the received data signal into sequential data bit intervals at 76 and provide logic level information to the microprocessor for processing in conjunction with the conversion of the data signal at 78. If a data packet is determined to be corrupt, or the data packet ends, the peak value is dumped and the receiver becomes immediately available to receive another packet.
  • In the transmit mode, activation of [0032] alarm switch 62 delivers an interrupt to the microprocessor which triggers entry into the transmit mode. RF synthesizer 52 is used to generate a frequency shift-keyed signal burst bearing the data to be transmitted, which signal is amplified at 64, buffered by isolator 66 and forwarded to second rf switch 46. The switch delivers the signal to the antennas 38. The transmission may typically include an identification of the body unit as well as position data. The microprocessor can also be programmed to enter the transmit mode on a scheduled basis.
  • As known in the [0033] art microprocessor 42 includes memory registers and firmware/software which allows it to supervise and control data reception and transmissions well as process the data as required.
  • The body unit may be powered by a 6-volt rechargeable nickel-metal hydride battery [0034] 68, regulated at 70 for the receive path circuitry and unregulated for the transmit path. Voltage sensor 72 verifies the charge state of the battery and passes such information to microprocessor 42. An RS-232 port 44 may be used to up-load program memory for the microprocessor and can allow monitor and control functions in a test mode. It may also be used to communicate with an optional GPS unit.
  • Although the RFID tags are low-power devices intended to broadcast a signal for reception only in the direct proximity of the tag, all RFID tags broadcast on a common frequency, and a body unit is capable of reception of signals from all RFID tags whose signals reach the body unit. Accordingly, the present invention is configured to discriminate between and among RFID broadcast signals such that an accurate record can be formed of the location of the body unit wearer. [0035]
  • The identification associated with each RFID tag comprises two data element portions, the combination of which uniquely identifies the tag. The first portion identifies the designated area in which the tag is located. With reference to FIG. 1, the designated areas would be the [0036] hallway 12, conference room 1, executive area, office A, or the like. Each designated area is assigned a different identifier. The second portion of the identification distinguishes the tag from the other tags located in the same designated area and associates the tag, if it is a gateway tag, with the corresponding paired gateway tag in the adjacent designated area.
  • For example, and with continued reference to FIG. 1, the identifications associated with RFID tags located in the hallway system are assigned the first data or group element 01. The first data element for RFID tags located in the executive area is 02, while the first data element for conference room one is 03 and for conference room two is 05. Within a designated area, the second data elements may be assigned consecutively, with the additional requirement that corresponding gateway tags, each of which has a different designated area number, have the identical second data element. Thus, since the RFID gateway tag in the hall at the entrance to conference room one is identified by second element 07, the full identification of the hall RFID being 01,07, the corresponding conference room RFID gateway tag is 03,07. In a like manner, since the hall gateway tag at the south entrance to the executive area is designated 01,01, the corresponding executive area gateway tag is 02,01. The north entrance to the executive area from the hallway is hall location 02, yielding the tag ID's for the paired gateways tags as 01,02 for the hall tag and 02,02 for the executive area tag. The paired gateway tags at the entranceway to conference room two are similarly designated by the respective identifiers 01,05 and 05,05. Additional intermediate locations in the hallway are designated as locations 03 and 04. Thus, the identification for such ID tags are 01,03, and 01,04. Because the locations of both gateway tags of a pair must be traversed when passage between designated areas occurs, and the RFID tags of each designated area are distinguishable from those in all other areas, the receipt (or non-receipt) of gateway tag data facilitate error correction and failure detection logic, allowing the system to discriminate among signals which emanate from RFID tags logically within a path of travel and those which emanate from other tags and to apply error correction and compensation as required. [0037]
  • FIG. 4 sets forth the processing of RFID tag data as received by a body unit and implemented by the body tag microprocessor. As depicted therein, upon start-up a body unit initially enters idle state [0038] 400. Memory registers are cleared and the body unit awaits the receipt of a data packet from an RFID tag. This occurs at 402. The format of the received data is checked to confirm that it represents the identity of an RFID tag and is not corrupt. If not confirmed, the data packet is rejected and the idle state is re-entered, awaiting a new, valid signal.
  • When [0039] 402 is entered with the receipt of a valid RFID tag signal, initial processing of the data occurs, as further detailed in FIG. 5. Among the information stored in body unit memory are several lists, depicted in FIG. 5. Tag encounter list 502 is an ongoing record of the identification of each tag who's transmission is received and processed by the body unit. History list 504 is also an ongoing record, similar to the tag encounter list, which includes the identification of all tag transmissions received, but also includes further data associated therewith, including a timestamp. This history list is intended to be of limited, fixed size; when the capacity is reached the addition of newly encountered tag data causes the oldest tag data to be dropped from the list.
  • [0040] Position list 506 is a listing of the identifications of RFID tags which pass the validated process, and accordingly represents the validated positional history for the body unit. Tag data is entered into the position list only after the appropriate processing and verification of FIG. 4 is completed. It is information on this list which is transmitted as position information to the central monitoring station.
  • Look-up table [0041] 508 associates an adjustment value applicable to the received signal strength of a signal for each tag in the system.
  • If a valid RFID data packet is received the identification of the tag is placed on both the [0042] tag encounter list 502 and the history list 504. Because of potential unit-to-unit manufacturing variations, as well as variations in the field strength of the broadcast RFID signals at the position of the body units due to the particular placement of individual RFID units, the received signal must be normalized. This allows comparisons to be made between signal strengths from different RFID tags, as relative signal strength is used to determine the validity of a particular received signal. The identification of the received tag signal is utilized to identify the normalization factor to be applied; the normalization factors may be in a lookup table 508 in body unit memory, and are programmed into the table as part of initial calibration of the body unit. The normalization factors are derived from actual signal readings mode during system installation. A received signal strength indication, or “RSSI” value, representing the normalized value for the received signal, is generated by a look-up performed at 510 for the particular signal being received. The normalized value is entered in the history list 504 along with tag identification and a time stamp value. With initial processing performed substantive analysis of the received data packet information is performed as depicted generally at 120 in FIG. 5, and detailed in FIG. 4.
  • Referring again to FIG. 4, using the received tag identification data, the received tag group (i.e., the first or designated area data element) is compared at [0043] 404 to the group identification of the most recent (or “current”) position which has been previously validated and thus placed on the position list 506. If the group is the same, it indicates that the location of the received RFID tag is in the same designated area (i.e., hall, conference room, etc.) as the current position. A different group number indicates that a potential transition between areas has occurred.
  • On start-up, however, there is no prior position to be compared to and thus processing follows the “null position” path; the RSSI for the received signal is compared to a reference minimum value at [0044] 406. This comparison is used to insure that the body unit is likely within a generally accepted distance from the RFID tag whose broadcast has been received to at least broadly validate position. If the adjusted RSSI is below the minimum, it suggests that the distance is too great; the data is discarded and the idle phase is re-entered to await the receipt of new data. Among the information in the data packet received by the body unit may be an indicator bit. The indicator bit provides independent identification of the type of RFID tag. Presence of the bit classifies the RFID tag as a gateway tag; lack of the bit classifies the tag as a non-gateway tag. The bit may be used in connection with RSSI comparisons to assign a minimum reference value for signal strength comparisons. A higher reference for gateway tags may be desired to improve reliability.
  • If the RSSI value exceeds the required minimum, a comparison is made at [0045] 408 between the RSSI value and the RSSI value for the most recently encountered tag as found on the history list, irrespective of whether that tag is also on the position list, as further explained infra. On start-up, no previously encountered tag exists and thus, so long as the received RSSI exceeded the required minimum, the current position for the body unit is updated at 410 to that of the RFID tag encountered by adding the identification added to the position list as the new current position.
  • Referring back to [0046] location 404, if after start-up, the first or group value for the received signal is the same as the group of the current location, indicating that the wearer of the body unit has changed position in the same designated area, the second portion of the tag identification is compared to the corresponding portion of the current location at 412. If the value is different, indicating a change of position within the designated area, the adjusted RSSI value is checked at 406 to determine whether it meets the required signal strength threshold. If the minimum is met, the RSSI is compared at 408 to an adjusted value for the RSSI for the last encountered tag as set forth on the history list. This comparison, at 408, further validates the position of the body unit.
  • If the signal strength of the received data signal is greater than the signal strength of the previously encountered tag, it is assumed that the body unit is closer to the new tag than the previous tag, thus further justifying its acceptance as a new current position for the body unit. The RSSI value to which the received RSSI is compared is subject to a negative time-based weighing adjustment. The greater the time between tag data receptions, the smaller the reference value. Typically, the RSSI weighing correction is applied through a look-up table, as shown in FIG. 6. Based on the number of transmit intervals between the signal being processed and the most recent history list entry, the RSSI value of the reference is decremented accordingly. At an interval of 6 periods and beyond, the signal strength of the reference is decremented to zero. [0047]
  • If the RSSI of the received signal exceeds the adjusted reference value, the current position of the body unit is updated at [0048] 410 to reflect the identification received, with the new position being placed on the position list. The body unit then again enters the idle state 400 awaiting the receipt of new data. If the differential is not met, the current position is not updated, and the idle state is immediately re-entered.
  • In the event that the check of the identification at [0049] 412 reveals the same identification as the previously encountered tag as shown on the history list, the check is then performed for a bad gateway tag at 414. This routine provides a self-resetting feature for the body unit, preventing the malfunction of a gateway tag from defeating the subsequent recordation of validly encountered tags.
  • In particular, each time the same id is encountered a search is performed in the [0050] tag encounter list 502 for a gateway RFID tag pair associated with the identified designated area of the received tag data. As gateway tags have different first or group identification portions but the same second identification portion, such a search can be readily performed. If a pair of tags is found it suggests that both gateway tags are operating, and that the body unit has not crossed through the gateway (and passed into a new designated area) and returned undetected, and accordingly that the received position is properly the same as the previous position. The idle stage is thus re-entered and a subsequent signal awaited.
  • In the event that both tags of a gateway pair are not found, an assumption is made that at least one of the gateway tags is not operating properly and thus that there has been unrecorded gateway transits. In such a case, the tag encounter list and history list are zeroed out at [0051] 418 beyond the received RFID tag data and an independent notation is made in an appropriate storage register. Such information, when downloaded at a later time, can allow supervisory personnel to check the gateway tags associated with the event. The position list is not zeroed; it continues to be maintained and incremented as appropriate. With the lists re-set, the idle stage is entered for receipt of the next data packet. The notation of a potential gateway tag and re-set of the lists does not affect the body unit's ability to subsequently receive data from the so-noted tag. It merely serves as an internal correction procedure allowing the continuing operation of system logic.
  • When the inspection of the received data from an RFID tag at [0052] 404 indicates a different designated area from that of the body unit's current position as shown on the position list, the logic branches to 420. The receipt of a different first data element value indicates that a gateway should have been traversed. Accordingly, the second identification portion of the received tag data is compared to the identification of the previously encountered tag on the history list. If the id's are the same, it indicates that the two tags are gateway tags (as only corresponding gateway tags have different first values and the same second id values) and that a valid gateway traverse has occurred. The minimum RSSI value of the received signal is checked at 406, compared to the time-adjusted value for the previously encountered tag at 408 and, if signal strength is validated, the current position for the body unit is updated at 410 and the current position added to the position list.
  • If, on the other hand, a different identification is received, indicating that the encountered RFID tag and the previously received tags are not gateway compliments, a determination is made to see whether or not the body unit is “lost”. That is, that for some reason it has not received appropriate signals which correspond to a logical path of travel, further indicating that one or more RFID tags are not operating properly. If received data is from a non-gateway tag the area's gateway tag may be inoperable; if the received data is from a gateway tag its complement may not be functioning. [0053]
  • The determination commences at [0054] 422. A first check is made to determine whether or not the tag from which information is being received is a gateway tag. The gateway identification bit of the received data is checked; if the check confirms the identity of the received signal as being from a gateway tag a search is performed of the history list for the compliment of the tag. The failure of either condition to be met causes the transmission to be discarded and the idle condition at 400 is reentered. Assuming that the received signal was in fact from the closest RFID tag and a gateway transition into the designated area of that tag was made without sensing the appropriate gateway RFID tag, the processing of received data signals will continue to cycle through steps 400, 402, 404, 420, 422 and 400 until a gateway tag signal is encountered or the user leaves the designated area. The received tag data is continuously entered into the encounter and history lists, however.
  • If the reception is identified as a valid gateway tag transmission the RSSI of its received signal is compared to the required minimum at [0055] 424. Once again, if the signal strength is below the minimum the signal is discarded and the idle state is re-entered. If the received signal strength is above the required minimum the signal strength is compared to the time adjusted RSSI of its found compliment on the history list. If the difference is less than the required differential the idle phase is entered; if the required differential is satisfied the determination is made that there is a possibility of a non-operable RFID tag, and particularly the received gateway tag's complement. The identification of the encountered tag is marked as the fault location, to be transmitted or otherwise downloaded at the central station as appropriate. While the identified location is not, strictly speaking, the actual location of the fault, it provides an indication of the general location of the fault. Investigation and maintenance of the tags can then be performed to identify the problem. Again, the identification of a potential fault location does not affect the receiver's ability to receive and process subsequent data from RFID tags in the fault area.
  • An example will further illustrate the operation of the invention. With reference to FIG. 1, assume that the wearer of [0056] body unit 20 activates the body unit while in the hallway proximate the south entrance to the executive area. Gateway tag 01,01 data is received, its data initially processed at 402 and its identification is place in the history and encounter lists 504, 502. As body unit memory is clear, the RSSI of the tag is checked at 406, and with the assumption that the minimum value is met, its identification is entered into the position list 506 at 410 and a new signal is awaited.
  • As the user enters the executive area, the body unit receives a signal from gateway tag 02,01, and its data is processed. As the first or group value (02) is different from the current group (01) the second or id values are compared at [0057] 420. As they are the same (01) the RSSI of the received signal and the differential RSSI are checked at 406, 408. The body unit's current position is then updated at 4100 as the body unit's current position.
  • Assume that, while in the executive area, the body unit receives a signal from gateway tag 03,07 in the conference room. After initial processing it is determined that the group of the received signal (03) is different from the current group 02, and the id value for the new signal is checked at [0058] 420. As the id is different (07 v 01) the “lost body unit” routine of 424 is entered. While the received tag data is from a gateway tag, its complement does not appear on the history list. Thus the signal is discarded and idle is reentered.
  • The body unit wearer exits the executive area through the north entrance. As he approaches, the body unit receives a transmission from gateway tag 02,02. As the group of the received data is the same as that of the body unit's current position and the id is different the RSSI is validated and the body unit's position is updated. [0059]
  • Assume next that the user has returned to the hall and that the signal from the complementary gateway tag [0060] 01,02 has been read and the body unit's position updated. As the wearer heads towards the north hall, the body unit again receives data from gateway tag 01,02. As the second or id value is the same as that of the current position (at 412) a gateway tag check is performed at 414. The history list is checked for the received tag's complement (02,02) and since it appears, the reception can be discarded and idle reentered.
  • Because each of the RFID transmitters broadcasts its identification data on short intervals as compared to the speed at which the movement of body units is expected, and the processing time of received by a body unit fast as a result of microprocessor speed, the system is able to both update position data and overcome the effects of signal overlap in a manner which significantly improves the accuracy and reliability of position information generated. Those skilled in the art will appreciate that modifications and adaptations of the invention beyond the illustrative embodiment set forth herein may be achieved without departing from the intended scope of the invention as claimed. [0061]

Claims (20)

We claim:
1. Apparatus for monitoring the location of a person within a monitored premises having a plurality of designated areas interconnected by gateways, comprising
a plurality of transmitters located throughout said monitored premises, at least one of said transmitters being located in each designated area, each of said transmitters broadcasting a signal comprising a unique code identifying the transmitter;
a portable receiver carried by the person capable of receiving the signals broadcast by each of the transmitters, said portable receiver having means for determining the code of a broadcast received, processing said code to determine its validity as representing a position within the monitored premises in close proximity to the person, and storing a validated code as a record of the location of the person at the time of the reception thereof.
2. The apparatus of
claim 1
, wherein each transmitter is configured to broadcast a signal intended to be received by a receiver only in close proximity to the transmitter.
3. The apparatus of
claim 1
, wherein said means for storing the code as a record of the person's location includes means for storing a time stamp associated with the code.
4. The apparatus of
claim 2
, wherein each designated area has a transmitter located proximate each gateway between the designated area and an adjacent designated area.
5. The apparatus of
claim 4
, wherein the unique code associated with each transmitter includes a first data portion indicating the designated area in which the transmitter is located and a second data portion indicating the location of the transmitter within the designated area.
6. The apparatus of
claim 5
, wherein the second data portions associated with first and second transmitters in adjacent designated areas opposite sides of a gateway are the same.
7. The apparatus of
claim 2
, wherein said portable receiver includes a transmitter for transmitting the stored codes for reception at a remote location.
8. The apparatus of
claim 2
, wherein said means for processing the code to determine its validity includes means for comparing the code to a list of previously-received codes.
9. The apparatus of
claim 8
, wherein the receiver further includes means for measuring and normalizing the signal strength of a received signal bearing a code and storing the normalized signal strength in association with the code and a reception time stamp.
10. The apparatus of
claim 9
, wherein said means for comparing the code to a list of previously-received codes includes means for comparing the normalized signal strength of the broadcast received to a time-weighted normalized signal strength value of a previously-received code.
11. The apparatus of
claim 2
, wherein said transmitters broadcast on an intermittent basis.
12. The apparatus of
claim 11
, wherein said transmitters broadcast on a common frequency.
13. The apparatus of
claim 7
, wherein said receiver includes means for activating the receiver's transmitter upon command from the person carrying the receiver.
14. The apparatus of
claim 7
, wherein said receiver includes means for activating the receiver's transmitter upon command from the remote location.
15. A method for determining the location of a person within a monitored premises having a plurality of designated areas in which the person's presence is intended to be detected interconnected by gateways, comprising the steps of
a) assigning each designated area a unique first identifier value;
b) assigning a unique second identifier value to each gateway;
c) locating a transmitter within each designated area proximate each gateway and assigning the transmitter a unique code corresponding to the unique first identifier for the designated area and to the unique second identifier for the gateway associated with the transmitter;
d) having the transmitter broadcast its unique code for reception by a receiver carried by the person;
e) processing the unique code by the receiver for validity; and
f) storing the validated code in the receiver as a record of the location of the person as of the time of reception.
16. The method of
claim 15
, wherein said broadcasting step is performed on an intermittent basis.
17. The method of
claim 15
further comprising the step of assigning a unique second identifier to a chosen location within a designated area not associated with a gateway, locating an additional transmitter at that location and assigning the additional transmitter a unique code corresponding to the unique first identifier for the designated area and to the unique second identifier for the location associated with the transmitter.
18. The method of
claim 15
further comprising the step of transmitting validated codes stored by the receiver to a remote location for display and correlation with the physical locations associated therewith.
19. The method of
claim 18
, wherein said step of transmitting validated codes occurs upon a command of the person carrying the receiver.
20. The method of
claim 18
, wherein said step of transmitting validated codes occurs upon a command of the remote location.
US09/266,449 1999-03-11 1999-03-11 Personal alarm monitor system Expired - Fee Related US6396413B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US09/266,449 US6396413B2 (en) 1999-03-11 1999-03-11 Personal alarm monitor system
AU37417/00A AU3741700A (en) 1999-03-11 2000-03-10 Personal alarm monitor system
PCT/US2000/006501 WO2000054234A1 (en) 1999-03-11 2000-03-10 Personal alarm monitor system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/266,449 US6396413B2 (en) 1999-03-11 1999-03-11 Personal alarm monitor system

Publications (2)

Publication Number Publication Date
US20010040512A1 true US20010040512A1 (en) 2001-11-15
US6396413B2 US6396413B2 (en) 2002-05-28

Family

ID=23014636

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/266,449 Expired - Fee Related US6396413B2 (en) 1999-03-11 1999-03-11 Personal alarm monitor system

Country Status (3)

Country Link
US (1) US6396413B2 (en)
AU (1) AU3741700A (en)
WO (1) WO2000054234A1 (en)

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020111819A1 (en) * 2000-12-07 2002-08-15 Savi Technology, Inc. Supply chain visibility for real-time tracking of goods
US20040008114A1 (en) * 2002-07-09 2004-01-15 Fred Sawyer Method and apparatus for tracking objects and people
WO2004068434A1 (en) * 2003-01-27 2004-08-12 Tracker Oy System for tracking individuals
US20050200476A1 (en) * 2004-03-15 2005-09-15 Forr David P. Methods and systems for gathering market research data within commercial establishments
US6989753B1 (en) * 2003-12-12 2006-01-24 Hewlett-Packard Development Company, L.P. Method of and computer for identifying reminder event
US20060160571A1 (en) * 1997-07-30 2006-07-20 Depani Sebastiano Cellular docking station
US20070126634A1 (en) * 2005-12-05 2007-06-07 Honeywell International Inc. Navigation system using radio frequency tags
US20070178900A1 (en) * 2001-12-26 2007-08-02 Bellsouth Intellectual Property Corp Auto Sensing Home Base Station For Mobile Telephone with Remote Answering Capabilities
US20070229274A1 (en) * 2005-03-04 2007-10-04 Cisco Technology, Inc. Navigation and coordination during emergencies
US20070236352A1 (en) * 2006-03-30 2007-10-11 Allen Lloyd W Jr Warning of hazardous conditions in monitored spaces using RFID technology
US20080042836A1 (en) * 2006-08-16 2008-02-21 James Christopher System and method for tracking shopping behavior
US20080082258A1 (en) * 2006-09-05 2008-04-03 Honeywell International Inc. Portable Positioning and Navigation System
WO2008085586A1 (en) * 2007-01-03 2008-07-17 Motorola, Inc. Device monitoring system and method of monitoring
US20090027165A1 (en) * 2007-07-27 2009-01-29 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US7496521B1 (en) * 2000-11-16 2009-02-24 Gsl Solutions, Inc. Prescription order identification system
US7703691B2 (en) 2005-03-16 2010-04-27 Cisco Technology, Inc. Multiple device and/or user association
US20100161356A1 (en) * 2000-11-16 2010-06-24 Shelton Louie Prescription Order Position Tracking System and Method
US7747477B1 (en) 2000-11-16 2010-06-29 Gsl Solutions, Inc. Pharmacy supply tracking and storage system
US20100168999A1 (en) * 2008-12-26 2010-07-01 Fujitsu Limited Computer readable medium for storing information display program, information display apparatus and information display method
US20100177659A1 (en) * 2005-09-09 2010-07-15 Thales Method and system for locating individuals inside a building
US7887146B1 (en) 2001-08-18 2011-02-15 Gsl Solutions, Inc. Suspended storage system for pharmacy
US20110105854A1 (en) * 2009-03-04 2011-05-05 Masimo Corporation Medical monitoring system
US20110109441A1 (en) * 2007-07-27 2011-05-12 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US8000682B2 (en) 2002-07-15 2011-08-16 At&T Intellectual Property I, L.P. Apparatus and method for restricting access to data
US8224664B1 (en) 2000-11-16 2012-07-17 Gsl Solutions, Inc. Portable prescription order distribution cart and tracking system
US8243908B2 (en) 2002-07-15 2012-08-14 At&T Intellectual Property I, Lp Systems and methods for restricting the use and movement of telephony devices
US8249570B2 (en) 1997-07-30 2012-08-21 At&T Intellectual Property I, L.P. Apparatus, method, and computer-readable medium for interfacing devices with communications networks
US8275371B2 (en) 2002-07-15 2012-09-25 At&T Intellectual Property I, L.P. Apparatus and method for providing communications and connection-oriented services to devices
US8416804B2 (en) 2002-07-15 2013-04-09 At&T Intellectual Property I, L.P. Apparatus and method for providing a user interface for facilitating communications between devices
US8479988B2 (en) 2000-11-16 2013-07-09 Gsl Solutions, Inc. System for pharmacy tracking and customer id verification
US8526466B2 (en) 2002-07-15 2013-09-03 At&T Intellectual Property I, L.P. Apparatus and method for prioritizing communications between devices
US8543098B2 (en) 2002-07-15 2013-09-24 At&T Intellectual Property I, L.P. Apparatus and method for securely providing communications between devices and networks
US8554187B2 (en) 2002-07-15 2013-10-08 At&T Intellectual Property I, L.P. Apparatus and method for routing communications between networks and devices
US20130278388A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20130278389A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375430A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375429A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375431A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20150177359A1 (en) * 2012-07-02 2015-06-25 Locoslab Gmbh Method for using and generating a map
US9092804B2 (en) 2004-03-15 2015-07-28 The Nielsen Company (Us), Llc Methods and systems for mapping locations of wireless transmitters for use in gathering market research data
US9142117B2 (en) 2007-10-12 2015-09-22 Masimo Corporation Systems and methods for storing, analyzing, retrieving and displaying streaming medical data
US9218454B2 (en) 2009-03-04 2015-12-22 Masimo Corporation Medical monitoring system
ES2559641A1 (en) * 2014-08-12 2016-02-15 Ignacio GÓMEZ MAQUEDA Method, system and device for real-time location, monitoring and protection of operators (Machine-translation by Google Translate, not legally binding)
US9323894B2 (en) 2011-08-19 2016-04-26 Masimo Corporation Health care sanitation monitoring system
US9705570B2 (en) * 2015-08-12 2017-07-11 Honeywell International Inc. Updating gas detector configuration using near field communication tags
US9743221B2 (en) 2015-08-12 2017-08-22 Honeywell International Inc. User association with passive tags
US20180173909A1 (en) * 2014-05-28 2018-06-21 Astoria Solutions Pte Ltd. Low cost, wide area rfid system
US10007758B2 (en) 2009-03-04 2018-06-26 Masimo Corporation Medical monitoring system
US10157337B1 (en) * 2017-06-16 2018-12-18 Amazon Technologies, Inc. Pre-notification with RFID dock door portals
US10565810B2 (en) 2007-07-27 2020-02-18 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US10725003B2 (en) 2015-01-19 2020-07-28 Honeywell International Inc. Automatic bump and calibration in gas detectors via short range communication
US11244747B2 (en) 2014-10-16 2022-02-08 Gsl Solutions, Inc. Pharmacy security system
US11580613B2 (en) * 2019-06-28 2023-02-14 Light Line Delivery Corp. Parcel conveyance system
US11745351B2 (en) 2019-01-03 2023-09-05 Lucomm Technologies, Inc. Robotic devices

Families Citing this family (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080192769A1 (en) * 1997-07-30 2008-08-14 Steven Tischer Apparatus and method for prioritizing communications between devices
US6411802B1 (en) * 1999-03-15 2002-06-25 Bellsouth Intellectual Property Management Corporation Wireless backup telephone device
US6871180B1 (en) 1999-05-25 2005-03-22 Arbitron Inc. Decoding of information in audio signals
JP3877514B2 (en) * 2000-11-28 2007-02-07 三洋電機株式会社 Entrance / exit monitoring system
EP1221678A1 (en) 2001-01-09 2002-07-10 Telectronic SA Receiver for sensing an electromagnetic signal and device using such a receiver
AU2002255568B8 (en) 2001-02-20 2014-01-09 Adidas Ag Modular personal network systems and methods
SE523510C2 (en) * 2001-05-18 2004-04-27 Jan G Faeger Method for determining the position and / or orientation of a creature in relation to an environment
US11341853B2 (en) 2001-09-11 2022-05-24 Zonar Systems, Inc. System and method to enhance the utility of vehicle inspection records by including route identification data in each vehicle inspection record
US8972179B2 (en) * 2006-06-20 2015-03-03 Brett Brinton Method and apparatus to analyze GPS data to determine if a vehicle has adhered to a predetermined route
US9563869B2 (en) 2010-09-14 2017-02-07 Zonar Systems, Inc. Automatic incorporation of vehicle data into documents captured at a vehicle using a mobile computing device
US7557696B2 (en) * 2001-09-11 2009-07-07 Zonar Systems, Inc. System and process to record inspection compliance data
US8400296B2 (en) * 2001-09-11 2013-03-19 Zonar Systems, Inc. Method and apparatus to automate data collection during a mandatory inspection
US20050256681A1 (en) * 2001-09-11 2005-11-17 Brinton Brett A Metering device and process to record engine hour data
US6671646B2 (en) 2001-09-11 2003-12-30 Zonar Compliance Systems, Llc System and process to ensure performance of mandated safety and maintenance inspections
US10185455B2 (en) 2012-10-04 2019-01-22 Zonar Systems, Inc. Mobile computing device for fleet telematics
US7362229B2 (en) * 2001-09-11 2008-04-22 Zonar Compliance Systems, Llc Ensuring the performance of mandated inspections combined with the collection of ancillary data
US20150170521A1 (en) 2001-09-11 2015-06-18 Zonar Systems, Inc. System and method to enhance the utility of vehicle inspection records by including route identification data in each vehicle inspection record
US7680595B2 (en) * 2006-06-20 2010-03-16 Zonar Systems, Inc. Method and apparatus to utilize GPS data to replace route planning software
US20110068954A1 (en) 2006-06-20 2011-03-24 Zonar Systems, Inc. Method and apparatus to collect object identification data during operation of a vehicle and analysis of such data
US8810385B2 (en) 2001-09-11 2014-08-19 Zonar Systems, Inc. System and method to improve the efficiency of vehicle inspections by enabling remote actuation of vehicle components
US7564375B2 (en) * 2001-09-11 2009-07-21 Zonar Systems, Inc. System and method to associate geographical position data collected from a vehicle with a specific route
US20030171391A1 (en) * 2002-01-25 2003-09-11 Boehringer Ingelheim Pharma Gmbh & Co. Kg Ambroxol for the treatment of chronic pain
US6867697B2 (en) * 2002-04-01 2005-03-15 Pravin L. Nanayakkara System for guiding the visually handicapped
US6917290B2 (en) * 2002-10-11 2005-07-12 Itt Manufacturng Enterprises, Inc. Zone detection locator
JP2004199196A (en) * 2002-12-16 2004-07-15 Aruze Corp Positional information management system
JP4188072B2 (en) * 2002-12-16 2008-11-26 アルゼ株式会社 Location information management system
US6909371B2 (en) * 2002-12-17 2005-06-21 Pitney Bowes Inc. Method for dynamically obtaining telephone numbers
US6882276B2 (en) 2002-12-17 2005-04-19 Pitney Bowes Inc. Method for dynamically addressing physical mail
US7224985B2 (en) 2003-01-16 2007-05-29 Lockheed Martin, Corp. Antenna segment system
US7167094B2 (en) * 2003-01-31 2007-01-23 Secure Care Products, Inc. Systems and methods for providing secure environments
US7123149B2 (en) * 2003-02-21 2006-10-17 Zachry Construction Corporation Tagging and tracking system for assets and personnel of a commercial enterprise
US6909367B1 (en) * 2003-02-24 2005-06-21 Larry P. Wetmore Method of determining the exact location of an individual in a structure
US7631382B2 (en) * 2003-03-10 2009-12-15 Adidas International Marketing B.V. Intelligent footwear systems
US7188439B2 (en) * 2003-03-10 2007-03-13 Adidas International Marketing B.V. Intelligent footwear systems
US7225565B2 (en) * 2003-03-10 2007-06-05 Adidas International Marketing B.V. Intelligent footwear systems
US7161482B2 (en) * 2003-05-30 2007-01-09 Sensormatic Electronics Corporation Integrated electronic article surveillance and people counting system
DE10347894B4 (en) * 2003-10-15 2005-11-24 Dräger Safety AG & Co. KGaA Device and method for controlled entry or exit of an area
US7242307B1 (en) 2003-10-20 2007-07-10 Cognetive Systems Incorporated System for monitoring hygiene appliances
US7388488B2 (en) * 2003-10-30 2008-06-17 Peter Lupoli Method and system for storing, retrieving, and managing data for tags
US6963282B1 (en) * 2003-12-05 2005-11-08 Microsoft Corporation Wireless self-describing buildings
US8406341B2 (en) 2004-01-23 2013-03-26 The Nielsen Company (Us), Llc Variable encoding and detection apparatus and methods
EP1732247A4 (en) * 2004-03-03 2011-05-04 Nec Corp Positioning system, positioning method, and program thereof
US20050195094A1 (en) * 2004-03-05 2005-09-08 White Russell W. System and method for utilizing a bicycle computer to monitor athletic performance
EP1577678B1 (en) * 2004-03-09 2019-05-01 Saab Ab A system and method for determining the location of a moving object in a secluded space
US7420464B2 (en) * 2004-03-15 2008-09-02 Arbitron, Inc. Methods and systems for gathering market research data inside and outside commercial establishments
DE102004045176B4 (en) 2004-09-17 2011-07-21 Adidas International Marketing B.V. bladder
WO2006037014A2 (en) * 2004-09-27 2006-04-06 Nielsen Media Research, Inc. Methods and apparatus for using location information to manage spillover in an audience monitoring system
US7403120B2 (en) * 2004-09-29 2008-07-22 Symbol Technologies, Inc. Reverse infrastructure location system and method
US7423533B1 (en) 2004-10-19 2008-09-09 Cognetive Systems, Incorporated System for monitoring and recording cross-contamination events
US7324476B2 (en) * 2004-11-04 2008-01-29 International Business Machines Corporation Establishing user accounts for RFID-based telecommunications routing
US7254516B2 (en) 2004-12-17 2007-08-07 Nike, Inc. Multi-sensor monitoring of athletic performance
DE102005014709C5 (en) 2005-03-31 2011-03-24 Adidas International Marketing B.V. shoe
JP2006319710A (en) * 2005-05-13 2006-11-24 Brother Ind Ltd Wireless tag communication system
US8028443B2 (en) 2005-06-27 2011-10-04 Nike, Inc. Systems for activating and/or authenticating electronic devices for operation with footwear
US7388490B2 (en) * 2005-06-29 2008-06-17 Lucent Technologies Inc. Methods and systems for locating VOIP terminals for improved 911 service
US20070006489A1 (en) * 2005-07-11 2007-01-11 Nike, Inc. Control systems and foot-receiving device products containing such systems
US8740751B2 (en) * 2005-07-25 2014-06-03 Nike, Inc. Interfaces and systems for displaying athletic performance information on electronic devices
CN1952602A (en) 2005-10-18 2007-04-25 国际商业机器公司 Method and apparatus for determining the location of a user in an area
AU2006327157B2 (en) * 2005-12-20 2013-03-07 Arbitron Inc. Methods and systems for conducting research operations
US20070205886A1 (en) * 2006-03-01 2007-09-06 Huseth Steve D RF/acoustic person locator system
US7769499B2 (en) * 2006-04-05 2010-08-03 Zonar Systems Inc. Generating a numerical ranking of driver performance based on a plurality of metrics
US7855651B2 (en) * 2006-04-07 2010-12-21 Cognetive Systems Incorporated System for monitoring and recording hand hygiene performance
US8188868B2 (en) 2006-04-20 2012-05-29 Nike, Inc. Systems for activating and/or authenticating electronic devices for operation with apparel
US9412282B2 (en) 2011-12-24 2016-08-09 Zonar Systems, Inc. Using social networking to improve driver performance based on industry sharing of driver performance data
US9230437B2 (en) 2006-06-20 2016-01-05 Zonar Systems, Inc. Method and apparatus to encode fuel use data with GPS data and to analyze such data
US9280435B2 (en) 2011-12-23 2016-03-08 Zonar Systems, Inc. Method and apparatus for GPS based slope determination, real-time vehicle mass determination, and vehicle efficiency analysis
US10056008B1 (en) 2006-06-20 2018-08-21 Zonar Systems, Inc. Using telematics data including position data and vehicle analytics to train drivers to improve efficiency of vehicle use
GB0612359D0 (en) * 2006-06-22 2006-08-02 Ibm An Apparatus for temporally associating a user with a location
TWI328935B (en) * 2006-08-02 2010-08-11 Univ Kao Yuan Patrolling system and method thereof
US8477013B2 (en) * 2006-08-31 2013-07-02 Sanjay Sarma Method and system for performing mobile RFID asset detection and tracking
WO2008076927A2 (en) * 2006-12-14 2008-06-26 Nielsen Media Research, Inc. Methods and apparatus to monitor consumer activity
US10885543B1 (en) 2006-12-29 2021-01-05 The Nielsen Company (Us), Llc Systems and methods to pre-scale media content to facilitate audience measurement
US20080221830A1 (en) * 2007-03-09 2008-09-11 Entelechy Health Systems L.L.C. C/O Perioptimum Probabilistic inference engine
US7573382B2 (en) * 2007-04-02 2009-08-11 General Electric Company System and method to manage movement of assets
US7605697B2 (en) * 2007-04-26 2009-10-20 Honeywell International, Inc. Wireless transceiver management system and method
US8026814B1 (en) 2007-07-25 2011-09-27 Pinpoint Technologies Inc. Wireless mesh network for an asset tracking system
US8400268B1 (en) * 2007-07-25 2013-03-19 Pinpoint Technologies Inc. End to end emergency response
EP2026291A1 (en) * 2007-08-14 2009-02-18 Siemens Aktiengesellschaft Radio ID-controlled presence recognition
JP5645809B2 (en) 2008-04-02 2014-12-24 ナイキ イノベイト セー. フェー. Wearable device assembly with exercise function
US9288268B2 (en) 2008-06-30 2016-03-15 The Nielsen Company (Us), Llc Methods and apparatus to monitor shoppers in a retail environment
US8791817B2 (en) * 2008-10-22 2014-07-29 Centurylink Intellectual Property Llc System and method for monitoring a location
US8983488B2 (en) * 2008-12-11 2015-03-17 Centurylink Intellectual Property Llc System and method for providing location based services at a shopping facility
US8239277B2 (en) 2009-03-31 2012-08-07 The Nielsen Company (Us), Llc Method, medium, and system to monitor shoppers in a retail or commercial establishment
US9307037B2 (en) * 2009-04-15 2016-04-05 Centurylink Intellectual Property Llc System and method for utilizing attendee location information with an event planner
US8428620B2 (en) * 2009-04-22 2013-04-23 Centurylink Intellectual Property Llc Mass transportation service delivery platform
US8655693B2 (en) * 2009-07-08 2014-02-18 Centurylink Intellectual Property Llc System and method for automating travel related features
US8436727B2 (en) * 2009-09-30 2013-05-07 James D. Todd Methods and systems for door access and patient monitoring
US8633817B2 (en) * 2009-10-21 2014-01-21 Qualcomm Incorporated Mapping wireless signals with motion sensors
US8514069B2 (en) * 2009-11-12 2013-08-20 MTN Satellite Communications Tracking passengers on cruise ships
US8855101B2 (en) 2010-03-09 2014-10-07 The Nielsen Company (Us), Llc Methods, systems, and apparatus to synchronize actions of audio source monitors
US9940682B2 (en) 2010-08-11 2018-04-10 Nike, Inc. Athletic activity user experience and environment
JP2012043159A (en) * 2010-08-18 2012-03-01 Fujitsu Ltd Rfid tag
US10600096B2 (en) 2010-11-30 2020-03-24 Zonar Systems, Inc. System and method for obtaining competitive pricing for vehicle services
US10665040B2 (en) 2010-08-27 2020-05-26 Zonar Systems, Inc. Method and apparatus for remote vehicle diagnosis
US8717174B2 (en) 2010-09-07 2014-05-06 3M Innovative Properties Company Monitoring apparatus for a tag having an engaged and a non-engaged mode
US10706647B2 (en) 2010-12-02 2020-07-07 Zonar Systems, Inc. Method and apparatus for implementing a vehicle inspection waiver program
US8736419B2 (en) 2010-12-02 2014-05-27 Zonar Systems Method and apparatus for implementing a vehicle inspection waiver program
US9527515B2 (en) 2011-12-23 2016-12-27 Zonar Systems, Inc. Vehicle performance based on analysis of drive data
US8914184B2 (en) 2012-04-01 2014-12-16 Zonar Systems, Inc. Method and apparatus for matching vehicle ECU programming to current vehicle operating conditions
US10431020B2 (en) 2010-12-02 2019-10-01 Zonar Systems, Inc. Method and apparatus for implementing a vehicle inspection waiver program
US8885842B2 (en) 2010-12-14 2014-11-11 The Nielsen Company (Us), Llc Methods and apparatus to determine locations of audience members
US9424696B2 (en) 2012-10-04 2016-08-23 Zonar Systems, Inc. Virtual trainer for in vehicle driver coaching and to collect metrics to improve driver performance
DE102013202485B4 (en) 2013-02-15 2022-12-29 Adidas Ag Ball for a ball sport
US9021516B2 (en) 2013-03-01 2015-04-28 The Nielsen Company (Us), Llc Methods and systems for reducing spillover by measuring a crest factor
US9118960B2 (en) 2013-03-08 2015-08-25 The Nielsen Company (Us), Llc Methods and systems for reducing spillover by detecting signal distortion
US9219969B2 (en) 2013-03-13 2015-12-22 The Nielsen Company (Us), Llc Methods and systems for reducing spillover by analyzing sound pressure levels
US9191704B2 (en) 2013-03-14 2015-11-17 The Nielsen Company (Us), Llc Methods and systems for reducing crediting errors due to spillover using audio codes and/or signatures
US20140379421A1 (en) 2013-06-25 2014-12-25 The Nielsen Company (Us), Llc Methods and apparatus to characterize households with media meter data
US9426525B2 (en) 2013-12-31 2016-08-23 The Nielsen Company (Us), Llc. Methods and apparatus to count people in an audience
US9528837B2 (en) * 2014-06-04 2016-12-27 Qualcomm Incorporated Mobile device position uncertainty based on a measure of potential hindrance of an estimated trajectory
US9680583B2 (en) 2015-03-30 2017-06-13 The Nielsen Company (Us), Llc Methods and apparatus to report reference media data to multiple data collection facilities
US9924224B2 (en) 2015-04-03 2018-03-20 The Nielsen Company (Us), Llc Methods and apparatus to determine a state of a media presentation device
CN104766444B (en) * 2015-04-22 2017-06-09 国网四川省电力公司 Post operation multidimensional behavioural norm monitoring system
US9848222B2 (en) 2015-07-15 2017-12-19 The Nielsen Company (Us), Llc Methods and apparatus to detect spillover
US10127747B2 (en) 2016-12-22 2018-11-13 Active8 Software, LLC Systems and methods for electronic ticketing, monitoring, and indicating permissive use of facilities

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3739329A (en) 1971-05-24 1973-06-12 Recognition Devices Electronic system for locating
US3818345A (en) 1972-12-29 1974-06-18 Nepon Kk Low frequency signal transmission and indicating system
SE413209B (en) * 1978-09-15 1980-04-28 Ericsson Telefon Ab L M SYSTEM FOR TRANSMISSION OF ALARMS, PREFERABLY IN THE EVENT OF ATTACK BY PERSON, AND LOCATION OF ALARM SENSORS
US4225953A (en) 1978-09-29 1980-09-30 Simon William F Personnel locator
US4275385A (en) 1979-08-13 1981-06-23 Bell Telephone Laboratories, Incorporated Infrared personnel locator system
US4658357A (en) * 1983-10-04 1987-04-14 B.I. Incorporated Time and accounting system
US4688026A (en) * 1984-05-15 1987-08-18 Scribner James R Method of collecting and using data associated with tagged objects
US4955000A (en) 1986-07-17 1990-09-04 Nac Engineering And Marketing, Inc. Ultrasonic personnel location identification system
US4990892A (en) 1989-08-07 1991-02-05 Westcom, A Division Of Westside Communications Of Jacksonville, Inc. Personnel locator system
US4998095A (en) 1989-10-19 1991-03-05 Specific Cruise Systems, Inc. Emergency transmitter system
US5390339A (en) * 1991-10-23 1995-02-14 Motorola Inc. Method and apparatus for selecting a serving transceiver
US5426425A (en) 1992-10-07 1995-06-20 Wescom, Inc. Intelligent locator system with multiple bits represented in each pulse
US5806017A (en) * 1996-08-19 1998-09-08 Board Of Regents The University Of Texas System Electronic autorouting navigation system for visually impaired persons

Cited By (110)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8249570B2 (en) 1997-07-30 2012-08-21 At&T Intellectual Property I, L.P. Apparatus, method, and computer-readable medium for interfacing devices with communications networks
US8583106B2 (en) 1997-07-30 2013-11-12 At&T Intellectual Property I, L.P. Cellular docking station
US9258845B2 (en) 1997-07-30 2016-02-09 At&T Intellectual Property I, L.P. Cellular docking station
US20060160571A1 (en) * 1997-07-30 2006-07-20 Depani Sebastiano Cellular docking station
US8584941B2 (en) 2000-11-16 2013-11-19 Gsl Solutions, Inc. Pharmacy tracking system with automatically-entered customer transaction information
US20100161356A1 (en) * 2000-11-16 2010-06-24 Shelton Louie Prescription Order Position Tracking System and Method
US7747477B1 (en) 2000-11-16 2010-06-29 Gsl Solutions, Inc. Pharmacy supply tracking and storage system
US8479988B2 (en) 2000-11-16 2013-07-09 Gsl Solutions, Inc. System for pharmacy tracking and customer id verification
US7496521B1 (en) * 2000-11-16 2009-02-24 Gsl Solutions, Inc. Prescription order identification system
US8224664B1 (en) 2000-11-16 2012-07-17 Gsl Solutions, Inc. Portable prescription order distribution cart and tracking system
US7136832B2 (en) * 2000-12-07 2006-11-14 Savi Technology, Inc. Supply chain visibility for real-time tracking of goods
US20020111819A1 (en) * 2000-12-07 2002-08-15 Savi Technology, Inc. Supply chain visibility for real-time tracking of goods
US8474716B2 (en) 2001-08-18 2013-07-02 Gsl Solutions, Inc. Suspended storage system for pharmacy
US7887146B1 (en) 2001-08-18 2011-02-15 Gsl Solutions, Inc. Suspended storage system for pharmacy
US9047992B2 (en) 2001-08-18 2015-06-02 Gsl Solutions, Inc. Suspended storage system for pharmacy
US20070178900A1 (en) * 2001-12-26 2007-08-02 Bellsouth Intellectual Property Corp Auto Sensing Home Base Station For Mobile Telephone with Remote Answering Capabilities
US8046007B2 (en) 2001-12-26 2011-10-25 At&T Intellectual Property I, L.P. Auto sensing home base station for mobile telephone with remote answering capabilities
US8515417B2 (en) 2001-12-26 2013-08-20 At&T Intellectual Property I, L.P. Auto sensing home base station for mobile telephone with remote answering capabilities
US7834766B2 (en) 2002-07-09 2010-11-16 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10496859B2 (en) 2002-07-09 2019-12-03 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7551089B2 (en) 2002-07-09 2009-06-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8842013B2 (en) 2002-07-09 2014-09-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20090278686A1 (en) * 2002-07-09 2009-11-12 Frederick Sawyer Method and apparatus for tracking objects and people
US20090295582A1 (en) * 2002-07-09 2009-12-03 Frederick Sawyer Method and apparatus for tracking objects and people
US8742929B2 (en) 2002-07-09 2014-06-03 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20040008114A1 (en) * 2002-07-09 2004-01-15 Fred Sawyer Method and apparatus for tracking objects and people
US8896449B2 (en) 2002-07-09 2014-11-25 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10152620B2 (en) 2002-07-09 2018-12-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US6933849B2 (en) 2002-07-09 2005-08-23 Fred Sawyer Method and apparatus for tracking objects and people
US8866615B2 (en) 2002-07-09 2014-10-21 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7834765B2 (en) 2002-07-09 2010-11-16 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8279069B2 (en) 2002-07-09 2012-10-02 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US9619679B2 (en) 2002-07-09 2017-04-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8243908B2 (en) 2002-07-15 2012-08-14 At&T Intellectual Property I, Lp Systems and methods for restricting the use and movement of telephony devices
US8885666B2 (en) 2002-07-15 2014-11-11 At&T Intellectual Property I, L.P. Apparatus and method for providing a user interface for facilitating communications between devices
US8000682B2 (en) 2002-07-15 2011-08-16 At&T Intellectual Property I, L.P. Apparatus and method for restricting access to data
US8554187B2 (en) 2002-07-15 2013-10-08 At&T Intellectual Property I, L.P. Apparatus and method for routing communications between networks and devices
US8543098B2 (en) 2002-07-15 2013-09-24 At&T Intellectual Property I, L.P. Apparatus and method for securely providing communications between devices and networks
US8526466B2 (en) 2002-07-15 2013-09-03 At&T Intellectual Property I, L.P. Apparatus and method for prioritizing communications between devices
US8275371B2 (en) 2002-07-15 2012-09-25 At&T Intellectual Property I, L.P. Apparatus and method for providing communications and connection-oriented services to devices
US8416804B2 (en) 2002-07-15 2013-04-09 At&T Intellectual Property I, L.P. Apparatus and method for providing a user interface for facilitating communications between devices
US20060022818A1 (en) * 2003-01-27 2006-02-02 Harri Piltonen System for tracking individuals
WO2004068434A1 (en) * 2003-01-27 2004-08-12 Tracker Oy System for tracking individuals
US6989753B1 (en) * 2003-12-12 2006-01-24 Hewlett-Packard Development Company, L.P. Method of and computer for identifying reminder event
US20050200476A1 (en) * 2004-03-15 2005-09-15 Forr David P. Methods and systems for gathering market research data within commercial establishments
US9092804B2 (en) 2004-03-15 2015-07-28 The Nielsen Company (Us), Llc Methods and systems for mapping locations of wireless transmitters for use in gathering market research data
US7463143B2 (en) * 2004-03-15 2008-12-09 Arbioran Methods and systems for gathering market research data within commercial establishments
US20070229274A1 (en) * 2005-03-04 2007-10-04 Cisco Technology, Inc. Navigation and coordination during emergencies
US7703691B2 (en) 2005-03-16 2010-04-27 Cisco Technology, Inc. Multiple device and/or user association
US20100177659A1 (en) * 2005-09-09 2010-07-15 Thales Method and system for locating individuals inside a building
US20070126634A1 (en) * 2005-12-05 2007-06-07 Honeywell International Inc. Navigation system using radio frequency tags
US7339523B2 (en) 2005-12-05 2008-03-04 Honeywell International Inc. Navigation system using radio frequency tags
US20070236352A1 (en) * 2006-03-30 2007-10-11 Allen Lloyd W Jr Warning of hazardous conditions in monitored spaces using RFID technology
US8179257B2 (en) * 2006-03-30 2012-05-15 International Business Machines Corporation Warning of hazardous conditions in monitored spaces using RFID technology
US20080042836A1 (en) * 2006-08-16 2008-02-21 James Christopher System and method for tracking shopping behavior
US8441351B2 (en) * 2006-08-16 2013-05-14 Insight Holding Group, Inc. System and method for tracking shopping behaviors
US8207851B2 (en) * 2006-08-16 2012-06-26 James Christopher System and method for tracking shopping behavior
US20080082258A1 (en) * 2006-09-05 2008-04-03 Honeywell International Inc. Portable Positioning and Navigation System
US7584048B2 (en) 2006-09-05 2009-09-01 Honeywell International Inc. Portable positioning and navigation system
WO2008085586A1 (en) * 2007-01-03 2008-07-17 Motorola, Inc. Device monitoring system and method of monitoring
US20130278388A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20110109441A1 (en) * 2007-07-27 2011-05-12 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20130278389A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375430A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375429A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20140375431A1 (en) * 2007-07-27 2014-12-25 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US20130278390A1 (en) * 2007-07-27 2013-10-24 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US10495745B2 (en) * 2007-07-27 2019-12-03 Lucomm Technologies, Inc. Localization system
US8514081B2 (en) * 2007-07-27 2013-08-20 Lucian Cristache Systems and methods for object localization and path identification based on RFID sensing
US10635867B2 (en) * 2007-07-27 2020-04-28 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US10565810B2 (en) 2007-07-27 2020-02-18 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US20180217250A1 (en) * 2007-07-27 2018-08-02 Lucomm Technologies, Inc. Localization system
US10262166B2 (en) * 2007-07-27 2019-04-16 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US8665067B2 (en) 2007-07-27 2014-03-04 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US9514340B2 (en) * 2007-07-27 2016-12-06 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US9513370B2 (en) * 2007-07-27 2016-12-06 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US10191149B2 (en) * 2007-07-27 2019-01-29 Lucomm Technoligies, Inc. Systems and methods for semantic sensing
US20090027165A1 (en) * 2007-07-27 2009-01-29 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on rfid sensing
US9720081B2 (en) * 2007-07-27 2017-08-01 Lucomm Technologies, Inc. Systems and methods for object localization and path identification based on RFID sensing
US9142117B2 (en) 2007-10-12 2015-09-22 Masimo Corporation Systems and methods for storing, analyzing, retrieving and displaying streaming medical data
US20100168999A1 (en) * 2008-12-26 2010-07-01 Fujitsu Limited Computer readable medium for storing information display program, information display apparatus and information display method
US11158421B2 (en) 2009-03-04 2021-10-26 Masimo Corporation Physiological parameter alarm delay
US10255994B2 (en) 2009-03-04 2019-04-09 Masimo Corporation Physiological parameter alarm delay
US10007758B2 (en) 2009-03-04 2018-06-26 Masimo Corporation Medical monitoring system
US11133105B2 (en) * 2009-03-04 2021-09-28 Masimo Corporation Medical monitoring system
US11087875B2 (en) 2009-03-04 2021-08-10 Masimo Corporation Medical monitoring system
US11145408B2 (en) 2009-03-04 2021-10-12 Masimo Corporation Medical communication protocol translator
US20110105854A1 (en) * 2009-03-04 2011-05-05 Masimo Corporation Medical monitoring system
US10032002B2 (en) * 2009-03-04 2018-07-24 Masimo Corporation Medical monitoring system
US11923080B2 (en) 2009-03-04 2024-03-05 Masimo Corporation Medical monitoring system
US20190122763A1 (en) * 2009-03-04 2019-04-25 Masimo Corporation Medical monitoring system
US10325681B2 (en) 2009-03-04 2019-06-18 Masimo Corporation Physiological alarm threshold determination
US9218454B2 (en) 2009-03-04 2015-12-22 Masimo Corporation Medical monitoring system
US10366787B2 (en) 2009-03-04 2019-07-30 Masimo Corporation Physiological alarm threshold determination
US11430554B2 (en) 2011-02-14 2022-08-30 Gsl Solutions, Inc. Pharmacy stock supply tracking system
US9323894B2 (en) 2011-08-19 2016-04-26 Masimo Corporation Health care sanitation monitoring system
US11816973B2 (en) 2011-08-19 2023-11-14 Masimo Corporation Health care sanitation monitoring system
US11176801B2 (en) 2011-08-19 2021-11-16 Masimo Corporation Health care sanitation monitoring system
US20150177359A1 (en) * 2012-07-02 2015-06-25 Locoslab Gmbh Method for using and generating a map
US20180173909A1 (en) * 2014-05-28 2018-06-21 Astoria Solutions Pte Ltd. Low cost, wide area rfid system
US10346651B2 (en) * 2014-05-28 2019-07-09 Astoria Solutions Pte Ltd. Low cost, wide area RFID system
ES2559641A1 (en) * 2014-08-12 2016-02-15 Ignacio GÓMEZ MAQUEDA Method, system and device for real-time location, monitoring and protection of operators (Machine-translation by Google Translate, not legally binding)
US11244747B2 (en) 2014-10-16 2022-02-08 Gsl Solutions, Inc. Pharmacy security system
US10725003B2 (en) 2015-01-19 2020-07-28 Honeywell International Inc. Automatic bump and calibration in gas detectors via short range communication
US9705570B2 (en) * 2015-08-12 2017-07-11 Honeywell International Inc. Updating gas detector configuration using near field communication tags
US9743221B2 (en) 2015-08-12 2017-08-22 Honeywell International Inc. User association with passive tags
US10157337B1 (en) * 2017-06-16 2018-12-18 Amazon Technologies, Inc. Pre-notification with RFID dock door portals
US20180365542A1 (en) * 2017-06-16 2018-12-20 Amazon Technologies, Inc. Pre-notification with rfid dock door portals
US11745351B2 (en) 2019-01-03 2023-09-05 Lucomm Technologies, Inc. Robotic devices
US11580613B2 (en) * 2019-06-28 2023-02-14 Light Line Delivery Corp. Parcel conveyance system

Also Published As

Publication number Publication date
AU3741700A (en) 2000-09-28
WO2000054234A1 (en) 2000-09-14
US6396413B2 (en) 2002-05-28

Similar Documents

Publication Publication Date Title
US6396413B2 (en) Personal alarm monitor system
US7362656B2 (en) Ultrasonic locating system
US10107655B2 (en) Systems and methods of device-free motion detection and presence detection
EP0904582B1 (en) Personnel monitoring tag
US6150936A (en) Method and system for analyzing received signal strength
US4494119A (en) Distress radiolocation method and system
EP0974101B1 (en) Random interval inventory system
US6750765B1 (en) Tracing of transponder-tagged objects
US20030201889A1 (en) Remote security condition detection and notifcation system
US20090040026A1 (en) Monitoring system, terminal device and main control device thereof, and method and program for registering terminal device
WO2004051304A1 (en) Ultrasonic tracking and locating system
US6992581B2 (en) Method and apparatus for attenuating of a broadcasting received signal for achieving a better distance resolution in monitoring systems
US20070132577A1 (en) Method and apparatus for estimating the location of a signal transmitter
US20080316022A1 (en) Beacon Based Tracking Devices and Methods for Using Such
WO2008113104A1 (en) Coarse and fine location for tagged items
US20190362111A9 (en) Tracking system for persons and/or objects
US7437167B2 (en) Apparatus, system, and method for locating a transceiver using RF communications and radio services
US11105909B2 (en) Tracking system for persons and/or objects
US20200037053A1 (en) Low Power Remote Monitoring System With Pyroelectric Infrared Sensor And False Detect Discriminator
JP3674161B2 (en) Telemeter / Telecontrol device
US20180261084A1 (en) Apparatus and method for detecting temperature and occupied status of space
US6661343B1 (en) Adapter for motion detector
KR20190134262A (en) System for controlling entrance and exit using BLE and method for controlling entrance and exit using thereof
GB2277850A (en) Intelligent radio frequency transponder system
GB2223869A (en) Alarm system

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEPHONICS CORPORATION, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HINES, RICHARD;STARLING, EDWARD;PULVER, FRED;AND OTHERS;REEL/FRAME:009821/0705;SIGNING DATES FROM 19990308 TO 19990309

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Expired due to failure to pay maintenance fee

Effective date: 20060528