WO2008085586A1 - Device monitoring system and method of monitoring - Google Patents

Device monitoring system and method of monitoring Download PDF

Info

Publication number
WO2008085586A1
WO2008085586A1 PCT/US2007/083106 US2007083106W WO2008085586A1 WO 2008085586 A1 WO2008085586 A1 WO 2008085586A1 US 2007083106 W US2007083106 W US 2007083106W WO 2008085586 A1 WO2008085586 A1 WO 2008085586A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
association
detected
monitoring
further characterised
Prior art date
Application number
PCT/US2007/083106
Other languages
French (fr)
Other versions
WO2008085586B1 (en
Inventor
Gottlieb Schwarz
Original Assignee
Motorola, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola, Inc. filed Critical Motorola, Inc.
Publication of WO2008085586A1 publication Critical patent/WO2008085586A1/en
Publication of WO2008085586B1 publication Critical patent/WO2008085586B1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Signal Processing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A method of monitoring a device (300) comprises the steps of: detecting and identifying a potential or actual user of a device (320); detecting substantially concurrently and identifying a device (330); creating an association between the detected user and the detected device (340); and storing the created association (350). Furthermore, a device monitoring system comprises a scanning component operably coupled to a controller. The scanning component is adapted for detecting at least one device and at least one potential and/or actual user and, upon detecting a device and user, provides an indication to the controller that a device and/or user has been detected. The indication comprises information identifying the device and/or user. The controller is adapted to, upon substantially concurrent detection of the device and the user, creating and storing an association between the device and the user.

Description

DEVICE MONITORING SYSTEM AND METHOD OF MONITORING
TECHNICAL FIELD
The technical field relates generally to a device monitoring system, method of monitoring and apparatus for tracking devices, and in particular for monitoring radio handsets and associating users therewith.
BACKGROUND
It is known for personnel in various occupations to be required to carry electronic devices, for example radio handsets, during a working shift. In general, each individual takes, for example, a radio handset at a beginning of the individual's shift, and returns the radio handset at an end of the individual's shift. A problem that has been identified with this scenario is that each individual generally takes a different radio handset/electronic device during each shift. Consequently, it is difficult to track a location or therefore a usage of a particular radio handset or a number of radio handsets. Further, any communication between users of the radio handsets needs to be initiated between known users (and hence between user identifiers (IDs)) as there is no association between an ID of a specific handset (electronic device) and a user of that particular handset (electronic device) at that particular time. This is an undesirable limitation in using a plurality of radio handsets. For example, in some situations an initiator of a radio communication may be required to broadcast to all other radio handsets, in order to set up a call with a particular radio handset. This may be particularly problematic if the broadcasting radio handset is required to broadcast sensitive information. Such a broadcast may also be distracting for personnel to whom the communication is not intended.
Thus, there exists a need for an improved electronic device monitoring system and method of monitoring therefor.
SUMMARY OF THE INVENTION According to the present invention in a first aspect there is provided method of monitoring a device as defined in claim 1 of the accompanying claims. According to the present invention in a second aspect there is provided a device monitoring system being as defined in claim 11 of the accompanying claims.
According to the present invention in a third aspect there is provided a device adapted to be detected by a device monitoring system as defined in claim 25 of the accompanying claims.
According to the present invention in a fourth aspect there is provided a computer-readable storage element as defined in claim 26 of the accompanying claims.
Further features of the invention are as defined in the accompanying dependent claims and are disclosed in the embodiments of the invention to be described.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views and which together with the detailed description below are incorporated in and form part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the invention.
FIG. 1 illustrates a device monitoring system according to an embodiment of the invention.
FIG. 2 illustrates an implementation of the device monitoring system of FIG. 1.
FIG. 3 illustrates a method of monitoring a device according to an embodiment of the invention. FIG. 4 illustrates a method of monitoring a device according to an alternative embodiment of the invention.
DESCRIPTION OF EMBODIMENTS OF THE INVENTION
Before describing in detail embodiments that are in accordance with the invention, it should be observed that the embodiments reside primarily in combinations of method steps and apparatus components related to a method and apparatus for monitoring devices. Accordingly, the apparatus components and method steps have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. Thus, it will be appreciated that for simplicity and clarity of illustration, common and well-understood elements that are useful or necessary in a commercially feasible embodiment may not be depicted in order to facilitate a less obstructed view of these various embodiments.
It will be appreciated that embodiments of the invention described herein may be comprised of one or more generic or specialized processors (or "processing devices") such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and apparatus for monitoring devices described herein. The non-processor circuits may include, but are not limited to, a radio receiver, a radio transmitter and user input devices. As such, these functions may be interpreted as steps of a method to perform the monitoring of devices described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used. Both the state machine and ASIC are considered herein as a "processing device" for purposes of the foregoing discussion and claim language. Moreover, an embodiment of the invention can be implemented as a computer-readable storage element having computer readable code stored thereon for programming a processor or a computer (e.g., comprising a processing device) to perform steps of creating an association between a detected user and a detected device and storing the created association, as described and claimed herein. Examples of such computer-readable storage elements include, but are not limited to, a hard disk, a CD-ROM, an optical storage device and a magnetic storage device. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Generally speaking, pursuant to the various embodiments, and according to a first aspect of the invention, there is provided a method of monitoring an electronic device, the method comprising the steps of: detecting and identifying a potential or actual user of a device; detecting substantially concurrently and identifying a device; creating an association between the detected user and the detected device; and storing the created association.
Generally speaking, pursuant to the various embodiments, and according to a second aspect of the invention, there is provided an electronic device monitoring system comprising a scanning component and a controller. The scanning component is adapted for detecting devices and potential and/or actual users and, upon detecting a device and a potential and/or actual user, providing an indication to the controller that a device and potential and/or actual user has been detected, the indication comprising information identifying the device and/or user. The controller is adapted to, upon substantially concurrent detection of the device and potential and/or actual user, creating and storing an association between the device and the user. Thus, the invention provides a system for automatically associating an electronic device, such as a radio handset, with a user. As will be appreciated, such an automatic association substantially alleviates the problems of manual registration which is time consuming and prone to errors and/or abuse.
Those skilled in the art will realize that the above recognized advantages and other advantages described herein are merely exemplary and are not meant to be a complete rendering of all of the advantages of the various embodiments of the invention.
The invention will now be described with reference to monitoring radio handsets. However, it will be appreciated that the inventive concept may be applied to any manner of monitoring electronic devices as desired.
Referring to FIG. 1, there is illustrated a device monitoring system 100 according to an embodiment of the invention. The device monitoring system 100 comprises a scanning component 110, a controller 120 and a storage component, such as a database, 130. In use, the scanning component 110 scans for radio handsets, as described in more detail below. The scanning component 110 also scans for identifiers of potential and/or actual users of radio handsets. Upon detection of a user and/or a radio handset, the scanning component 110 provides a signal to the controller 120, informing the controller 120 that the user and/or radio handset has been detected. In one embodiment of the invention, the signal provided to the controller 120 comprises information identifying the user and/or radio handset.
Upon a substantially concurrent detection of both a user and of a radio handset, the controller 120 creates an association between the radio handset and the user. The controller 120 then stores the created association in the database 130. Continuing with an example of a radio handset, an ability to associate a radio handset to a specific user is advantageous since it allows an initiator of a communication between, for example, two or more radio handsets, to initiate the communication with only those radio handsets associated with desired users.
Referring now to FIG. 2, there is illustrated an implementation 200 of the device monitoring system of FIG. 1. A room 210 comprises a rack 220, or similar apparatus, for stowing a plurality of radio handsets 230. The rack 220 may provide charging means for re-charging batteries of the plurality of radio handsets 230. A doorway 240, or similar access way, is provided, within which the scanning component 110 is located. For example, the scanning component 110 may be inset within the doorframe of the doorway 240. The scanning component 110 may alternatively be located substantially adjacent the doorway 240, for example mounted on an adjacent wall. In this manner, the scanning component 110 is configured to be able to detect users and/or radio handsets 230 passing through the doorway 240.
For the illustrated embodiment, the scanning component 110 is capable of detecting users and/or radio handsets 230 within a certain range 250 thereof, where the range 250 extends substantially across the doorway 240. The rack 220 may be located such that the radio handsets 230 stowed therein are outside the range 250, and as such may not detected by the scanning component 110.
In operation, when a user requires a radio handset 230, the user enters the room 210 and removes a radio handset 230 from the rack 220. Upon leaving the room 210, the user and the radio handset 230 pass within range of the scanning component 110, and are substantially concurrently detected by the scanning component 110. The scanning component 110 then provides a signal to the controller, such as controller 120 of FIG. 1, indicating that both the user and radio handset 230 have been detected. In some embodiments, the scanning component 110 provides information identifying the user and the radio handset 230, for example using identifiers thereof. In one embodiment, the scanning component 110 provides two signals to the controller 120, one for the user and one for the radio handset 230. Upon receipt of the signals from the scanning component 110, the controller 120 creates an association between the radio handset 230 and the user, and stores the association in the database 130. As will be appreciated by a skilled artisan, such an automatic association may alleviate one or more problems associated with manual registration of radio handsets, for example due to manual registration being time consuming, and being prone to errors and/or abuse. In order for users to be identified, each user is assigned, or otherwise provided with, a user identifier (ID). Likewise, in order for radio handsets to be identified, each handset is assigned, or otherwise provided with, a handset ID. When the scanning component 110 detects a user and/or radio handset, the scanning component may thus be configured to detect, or otherwise obtain, the user ID and/or handset ID of a detected user and/or detected radio handset.
The doorway 240, or alternative access way to the room 210, may be configured such that only one person may enter or exit the room at any one time. In this manner, only one user may be detected as passing through the doorway 240 at any single moment in time, thereby ensuring integrity of users' signals being passed to the controller 120.
In an exemplary embodiment of the invention, the scanning component 110 comprises a radio frequency (RF) transponder, adapted to detect RF identification (RFID) tags.
It is envisaged, in some embodiments of the invention, that the controller 120 and database 130 may be co-located within or adjacent the room 210 or may be located separately or in a different room or building. In one embodiment of the invention, the controller 120 and database 130 may comprise the same hardware or may comprise separate physical hardware. It is also envisaged that the controller 120 may communicate with the scanning component 110 and/or database 130 in any suitable manner, for example via a wireline or wireless connection.
RFID tags are small integrated circuits connected to a printed antenna. Details of RFID tags may be found at: http://www.gs luk.org/txl_temp.asp?fid=201 . Such tags may be adhered to any article or device, or may be integrated in identification cards, for example employee passes or the like.
In use, the transponder transmits a high frequency (HF) radio signal. When an RFID tag receives the HF signal, the HF signal creates a signal oscillation within the antenna of the RFID tag. This signal oscillation generates power within the circuitry of the RFID tag. When the RFID tag is within a close enough proximity to the transponder, the signal oscillations created by the HF signal generate sufficient power within the RFID tag for the RFID tag to transmit pre-programmed information back to the transponder. In this manner, the transponder is able to detect an RFID tag that is 'within range', i.e. within a close enough proximity for the RFID tag to transmit information back to the transponder, by way of receiving this information that is transmitted back.
Each RFID tag has a substantially unique identification (RFID). This RFID is provided within the information transmitted back to the transponder. In this manner, each RFID tag that comes within range of the transponder is not only detected, but can also be uniquely identified. Each user is provided with an RFID tag, for example by way of the RFID tag being integrated within an identification card of the user. The RFID for that RFID tag may be assigned as the user ID for that user. Furthermore, each radio handset may be provided with an RFID tag, for example by way of the RFID tag being adhered to a surface of a cover part of the radio handset. The RFID for this RFID tag may be assigned as a handset ID for the radio handset.
In this manner, when a user leaves the room 210 with a radio handset 230, both the user and the radio handset 230 pass within range of the scanning component 110, which in this example is in the form of a transponder. Thus, the HF radio signal from the transponder causes each of the RFID tags of the user and the radio handset 230 to transmit a signal back to the transponder, said signal comprising the RFID of the respective RFID tag. The scanning component 110 may then provide a signal to the controller 120 indicating that two RFID tags have been detected, and provide the RFIDs therefor to the controller 120. In an alternative embodiment, the scanning component 110 may provide two signals to the controller 120, one for each of the RFID tags detected. Upon receipt of the signals from the scanning component 110, the controller
120 creates an association between the two RFIDs, thus creating an association between the radio handset 230 and the user, and stores the association in the database, say database 130 of FIG. 1. The controller 120 may check that the two RFIDs detected relate specifically one to a user and one to a radio handset. In this manner, the controller may ensure that a radio handset is being associated with a user.
Alternatively, the controller 120 may be able to identify that three RFID tags are detected, with two radio handsets being removed from the room by an authorized (RFID tagged) person. Consequently, if two RFID tags are detected, both of which relate to radio handsets, the controller 120 may assume that the radio handsets are removed by an unauthorized person (that is a person that is not tagged).
As will be appreciated by a skilled artisan, use of a transponder and RFID tags provides an advantage that the RFID tags require no power source, thereby providing significantly reduced size and cost of tags to be used, as well as alleviating any need for the tags to be charged. It is envisaged that the inventive concept is not limited to a use of RFID tags, and any other suitable technology may alternatively be used. For example, each user and radio handset may be provided with any suitable type of powered RF transmitter. Alternatively, non-RF technology may be employed. For example, barcodes may be utilized, whereby a user simply scans bar codes located on his/her identification card and on the radio handset when exiting the room.
It is envisaged that once a radio handset has been associated with a user, when another person needs to contact that user, the other person can simply request from the controller 120 that a connection be established with the user ID for the desired user. In this manner, the controller 120 may be able to retrieve from the database 130 the association for the user, from which the handset ID can be obtained, and a connection may then be made to the appropriate radio handset. In this manner, and advantageously, the other person does not need to know the specific radio handset that the user has at that moment in time, or to broadcast to all radio handsets in order to establish a communication with the user.
In an alternative embodiment, a request for a connection may be made to a separate communication server (not shown), or the like. It is envisaged, in such an alternative embodiment of the invention, that the separate communication server may be co-located within, or adjacent, the room 210 or may be located separately or in a different room or building controller 120 and database 130. It is also envisaged that the separate communication server may communicate with the controller 120 in any suitable manner, for example via a wireline or wireless connection. The communication server may then request an association from the controller
120 for a user to which a connection has been requested. Upon receipt of such a request from the communication server, the controller 120 may retrieve the appropriate association from the database 130, and return it to the communication server. The communication server may then be able to determine with which radio handset the user to which a connection was requested is associated. Accordingly, the communication server is thereafter able to make the connection to the appropriate radio handset.
Referring now to FIG. 3, there is illustrated a method 300 of monitoring a device according to an embodiment of the invention. Once again, the invention will be described with reference to monitoring radio handsets. However, it will be appreciated that the inventive concept may be applied to any manner of electronic device as required.
In the context of the embodiments, it is envisaged that the term electronic device comprises any object that has an ID associated with it, for example electronic medical equipment being stored in a hospital ward or locker room or electrical building site equipment being stored on a building site. The method 300 commences in step 310 with assigning user IDs and device (or handset) IDs. Next, in decision step 320, it is determined whether a user ID is detected. If a user ID is not detected, then the method 300 loops back to the decision step 320. When a user ID is detected in step 320, the method 300 passes to a further decision step 330, where it is determined whether a handset ID is detected substantially concurrently with the detection of the user ID. If no handset ID is detected in step 330, the method 300 loops back to the first decision step 320. When a handset ID is substantially concurrently detected with the detection of the user ID in step 330, the method 300 moves to step 340, where the detected user ID is associated with the detected handset ID. This association is then stored, for example within a database, in step 350. Finally, the method 300 loops back to the first decision step 320, awaiting the next detection and association of IDs.
As previously mentioned, it is known for personnel in various occupations to be required to carry devices, for example radio handsets, during a working shift. In general, each user takes, for example, a radio handset at the beginning of their shift, and returns it at the end of the shift. In subsequent shifts, the user is likely to have a different handset. Consequently, a new association is likely to be required during each work shift, as well as associations created for previous shifts removed.
This removal of associations may be achieved in any suitable manner. For example, referring to the embodiment illustrated in FIG. 1, each time a new association is created between a detected user and a detected radio handset, the controller 120 may search the database 130 for any associations relating to either of the user or radio handset. Upon locating one or more such previous association(s), the controller 120 may remove the previous association(s) from the database, prior to storing the new association. Referring now to FIG. 4, there is illustrated a method 400 of monitoring a device according to a further embodiment of the invention. Once again, the inventive concept will be described with reference to monitoring radio handsets, and in particular with reference to the device monitoring system of FIG. 1, and the implementation therefor of FIG. 2. However, it will be appreciated that the inventive concept may be applied to any manner of devices as required.
The method 400 commences in step 410 with assigning user IDs and radio handset IDs. Next, in decision step 420, it is determined whether a user ID is detected. If a user ID is not detected, then the method 400 loops back to the decision step 420. When a user ID is detected in step 420, the method 400 passes to a further decision step 430, where a determination is made as to whether a radio handset ID is substantially concurrently detected with a user ID. If no radio handset ID is substantially concurrently detected, the method 400 moves to step 435, where a determination is made as to whether the user ID is logged, for example by way of a record of the user ID being stored, say within the database 130 of FIG. 1. If, in step 435, a user ID is logged, the user ID is removed from the log in step 445. Alternatively, if, in step 435, a user ID is not logged, the user ID is added to the log in step 440. In this manner, when a user enters, say, the room 210 of FIG. 2, the user ID for that user is detected and logged, providing an indication that the user has entered the room. Furthermore, user may thus be detected as entering the room without a radio handset, as the user ID was not previously logged as shown in step 440 and subsequently may be determined as leaving without a radio handset with the user ID removed from the log in step 445 (there being no concurrent detection with a radio handset). The method 400 then loops back to the decision step 420. Alternatively, when a handset ID is also detected in decision step 430, a determination is again made as to whether the detected user ID has been logged in step 450. If the user ID has not been logged in step 450, this indicates that the user was not previously detected as entering the room. In this manner, it may be deduced that the concurrent detection of the user ID with a handset ID indicates that the user is returning a radio handset to the room.
Thus, when a user ID has not been logged, the method 400 moves to step 460, where a previously stored association between the detected user ID and radio handset ID is located, for example within the database 130. In this manner, a determination is made that a user has entered the room with a radio handset (via step 430 and step 460) and may subsequently leave the room without a radio handset (via step 445). This association is then removed from the database 130, in step 470, before the user ID is logged in Step 475 and the method 400 loops back to the decision step 420.
If the user ID has been logged in decision step 450, this may indicate that the user was previously detected as entering the room. In this manner, it may be deduced that a concurrent detection of the user ID with the radio handset ID may be indicative of the user subsequently leaving the room with a radio handset. Thus, when a user ID has been logged, the method 400 moves to step 480, where the user ID is associated with the handset ID. In this manner, a determination is made that a user has entered the room without a radio handset (via step 440) and has subsequently left the room with a radio handset (via step 480). Similarly, a determination may be made that a user entered the room with a radio handset (via step 460) and may subsequently leave with the initial or a new radio handset (via step 480). The association is then stored, for example in database 130 of FIG. 1, as indicated in step 490. Finally, in step 495, a log of the user ID is removed, and the method 400 loops back to the decision step 420.
The embodiment illustrated in FIG. 4 provides the additional advantage of a removal of associations when a user returns a handset.
In addition, in some embodiments of the invention, it is envisaged that the methods of monitoring an electronic device described above, and illustrated in FIG. 3 and FIG. 4, may additionally comprise steps of:
(i) receiving a request for an association;
(ii) retrieving the requested association; and
(iii) providing the retrieved association to a source of the request. In this context, it is envisaged that a user of a device, or someone associated with a user of the electronic device, such as a supervisor, or an owner or primary user of the electronic device, may wish to track a temporary ownership of the electronic device.
Alternatively, in some embodiments of the invention, it is envisaged that the methods of monitoring a radio handset described above, and illustrated in FIG. 3 and FIG. 4, may comprise the additional steps of:
(i) receiving a request for a connection to a user, or user ID;
(ii) retrieving an association for that user, or user ID;
(iii) from the retrieved association, determining an appropriate radio handset with which to establish a connection; and
(iv) establishing a connection to the appropriate radio handset.
In this manner, it is envisaged that a person may want to contact a user directly, or a temporary owner of the radio handset (say, in an attempt to have the radio handset returned to storage). Thus, by requesting a connection to a user or user ID, by retrieving an association for that user or user ID, the person may be able to contact the temporary owner/user of the radio handset directly. In the foregoing specification, specific embodiments of the invention have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the appended claims. Accordingly, the specification and FIGs. are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of invention. The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," "has", "having," "includes", "including," "contains", "containing" or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by "comprises ...a", "has ...a", "includes ...a", "contains ...a" does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms "a" and "an" are defined as one or more unless explicitly stated otherwise herein. The terms "substantially", "essentially", "approximately", "about" or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term "coupled" as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is "configured" in a certain way is configured in at least that way, but may also be configured in ways that are not listed.

Claims

1. A method of monitoring a device, the method comprising: detecting and identifying a potential or actual user of a device; the method characterized by: detecting substantially concurrently and identifying a device; creating an association between the detected user and the detected device; and storing the created association.
2. The method of monitoring a device of Claim 1 further characterised in that the step of detecting and identifying a potential or actual user comprises identifying the user by way of a user identifier (ID) assigned to the user; and the step of detecting and identifying a device comprises identifying the device by way of a device ID assigned to the device.
3. The method of monitoring a device of Claim 2, further characterized in that each device of a plurality of devices comprises a radio frequency identification (RFID) tag; the device being detected by way of a detection of the RFID tag, and identified by way of the RFID associated with the RFID tag.
4. The method of monitoring a device of Claim 2 or Claim 3 further characterised in that a plurality of users are provided with an RFID tag; each user being detected by way of the detection of the RFID tag, and identified by way of an RFID associated with the RFID tag.
5. The method of monitoring a device of any preceding claim further characterised in that detecting a user and detecting a device each comprise detecting when a user and device enters within range of a scanning component respectively.
6. The method of monitoring a device of any preceding claim further characterised by: determining whether the user has been previously detected; and if the user has previously been detected, creating and storing the association between the detected user and the detected device.
7. The method of monitoring a device of Claim 6 further characterised in that if the user has not previously been detected, removing an association previously created and stored.
8. The method of monitoring a device of any preceding claim further characterised by the steps of: receiving a request for an association; retrieving the requested association; and providing the retrieved association to a source of the request.
9. The method of monitoring a device of any preceding claim further characterised by: receiving a request for a connection to a user, or user ID; retrieving an association for that user, or user ID; from the retrieved association, determining a device with which to establish a connection; and establishing a connection to the device.
10. A device monitoring system comprising a scanning component operably coupled to a controller; wherein the scanning component is adapted for detecting at least one device and at least one user and, upon detecting at least one device and at least one user, providing an indication to the controller that a device and user has been detected, the indication comprising information identifying the device and user; and the controller is adapted to, upon substantially concurrent detection of the device and the user, creating and storing an association between the device and the user.
11. The device monitoring system of Claim 10 further characterised in that, in use, the scanning component is located within, or substantially adjacent, an access way such that the scanning component detects at least one device and at least one user passing through the access way.
12. The device monitoring system of Claim 10 further characterised in that the scanning component is located within, or substantially adjacent, a doorway into a room in which devices to be detected are stored.
13. The device monitoring system of any of claims Claim 10 to 12 further characterised in that the scanning component comprises a radio frequency (RF) transponder.
14. The device monitoring system of Claim 13 further characterised in that at least one of:
(i) the user; and
(ii) the device, are provided with, or fitted with, an RFID tag.
15. The device monitoring system of any of Claims 10 to 14 further characterised in that the controller is further adapted to remove associations.
16. The device monitoring system of any of Claims 10 to 15 further characterised in that the controller is adapted to create or remove an association of a user with a device upon substantially concurrent detection of that user and that device if that user has previously been detected.
17. The device monitoring system of any of Claims 10 to 16 further characterised in that, upon detection of a user without substantially concurrent detection of a device, the controller is adapted to log the detection of that user.
18. The device monitoring system of any of Claims 10 to 17 further characterised in that the controller is further adapted to, upon receipt of a request for an association, retrieve the association and return the retrieved association to a source of the request.
19. The device monitoring system of any of Claims 10 to 18 further characterised in that the controller is further adapted to, upon receipt of a request for a connection to be established with a user, or user ID, to retrieve an association for that user or user ID, obtain from that association a device ID, and to make a connection to the device to which the device ID relates.
PCT/US2007/083106 2007-01-03 2007-10-31 Device monitoring system and method of monitoring WO2008085586A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0700049A GB2445395B (en) 2007-01-03 2007-01-03 Device monitoring system and method of monitoring
GB0700049.0 2007-01-03

Publications (2)

Publication Number Publication Date
WO2008085586A1 true WO2008085586A1 (en) 2008-07-17
WO2008085586B1 WO2008085586B1 (en) 2008-09-25

Family

ID=37759198

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/083106 WO2008085586A1 (en) 2007-01-03 2007-10-31 Device monitoring system and method of monitoring

Country Status (2)

Country Link
GB (1) GB2445395B (en)
WO (1) WO2008085586A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097710A (en) * 2019-05-13 2019-08-06 三门核电有限公司 Wireless handset is self-service to be distributed and gives back method, wireless handset self-service diostribution device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2016406294B2 (en) 2016-05-13 2019-04-04 Motorola Solutions, Inc. Systems and methods to provide wireless accessory backup communication links

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010040512A1 (en) * 1999-03-11 2001-11-15 Richard Hines Personal alarm monitor system
US20030216969A1 (en) * 2002-01-23 2003-11-20 Bauer Donald G. Inventory management system
US20060189326A1 (en) * 2005-02-18 2006-08-24 Black John J Sr Tracking system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9906746D0 (en) * 1999-03-23 1999-05-19 Nokia Telecommunications Oy Vehicle telephone system
US8214465B2 (en) * 2005-04-27 2012-07-03 Comcast Cable Holdings, Llc Method and system of transporting media signals and allocating assets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010040512A1 (en) * 1999-03-11 2001-11-15 Richard Hines Personal alarm monitor system
US20030216969A1 (en) * 2002-01-23 2003-11-20 Bauer Donald G. Inventory management system
US20060189326A1 (en) * 2005-02-18 2006-08-24 Black John J Sr Tracking system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097710A (en) * 2019-05-13 2019-08-06 三门核电有限公司 Wireless handset is self-service to be distributed and gives back method, wireless handset self-service diostribution device
CN110097710B (en) * 2019-05-13 2022-04-05 三门核电有限公司 Self-service distribution and return method for wireless handset and self-service distribution device for wireless handset

Also Published As

Publication number Publication date
GB2445395B (en) 2009-08-26
WO2008085586B1 (en) 2008-09-25
GB2445395A (en) 2008-07-09
GB0700049D0 (en) 2007-02-07

Similar Documents

Publication Publication Date Title
JP5201409B2 (en) Radio tag communication apparatus and article management system
US20070241901A1 (en) System and method for object tracking via tag readings
CN108335234B (en) Linen information sending method and device, electronic equipment and readable storage medium
EP1898362B1 (en) Document management system
US8253538B1 (en) Asset management using mobile radio-frequency identification (RFID) readers
WO2013077961A1 (en) Method and apparatus for determining a location of an item attached to a radio frequency identification tag
WO2001090849A2 (en) Trackable files and systems for using the same
US10796519B2 (en) System and method for monitoring an access key from a key box
JP2011108155A (en) Access control system
JP2011210206A (en) Terminal device and program
US20100237989A1 (en) Goods management device and goods management system
US9262897B2 (en) Image information management system
JP4899711B2 (en) Management system, server and program
WO2008085586A1 (en) Device monitoring system and method of monitoring
JP2010165144A (en) Access control system and access control terminal
JP4857651B2 (en) Goods management system
JP2010089870A (en) Article management system, method, server, ic tag reader and article management program
JP2011063380A (en) Medium management system and management method
JP2013242831A (en) Room entry/exit management system and method
JP4752276B2 (en) Shooting information retrieval system
JP2009251624A (en) Destination detection server, destination detection method, destination detection program and recording medium
GB2515629A (en) Authentication registration and cancellation device
JP2004250952A (en) Locking/unlocking device of cabinet door
JP2000011123A (en) System for managing position/entering and leaving
JP4882589B2 (en) Entrance / exit management device, managed device and management system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07871301

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07871301

Country of ref document: EP

Kind code of ref document: A1