Method and system for connectivity and control of a hazard-prone environment using a low power wide area network

ABSTRACT

A personal area network that includes a wearable electronic device, a system and methods of using the personal area network that includes a wearable electronic device. The wearable electronic device can act as an aggregator of the data that is being acquired by the one or more sensors and from other devices that are within wireless signal range of the personal area network in order to send some or all of the data over a wireless low power wide area network to remote locations within a larger network for subsequent processing, user notification, analysis of location-determination, contact tracing or the like. Data may flow in a bidirectional manner between the wearable electronic device and at least some of the other devices within the personal area network. In one form, the aggregated data may be used to control access to a hazard-prone environment in order to reduce the likelihood of exposure of a service technician to unsafe conditions within such environment. In one form, a communication network formed by the wearable electronic device is used with the hazard-prone environment in order to control access, while in another to control a lockout/tagout procedure.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority to and is a continuation-in-part ofpending U.S. patent application Ser. No. 17/236,358 that was filed onApr. 21, 2021 that in turn claims priority to U.S. ProvisionalApplication Ser. No. 63/101,273 that was filed on Apr. 22, 2020.

The present disclosure relates generally to a wearable electronic deviceand corresponding personal area network (PAN) for monitoring datapertaining to and received by a wearer of the device, and moreparticularly to a PAN where the wearable electronic device automaticallyand wirelessly communicates such data to a larger network through lowpower wide area network (LPWAN) connectivity to provide location-basedsafety and health solutions.

BACKGROUND

The relatively recent emergence of the Internet of Things (IoT) has madeit possible for sensor-based devices to collect unprecedented amounts ofdata. Unfortunately, traditional telecommunication architectures such asa cellular one using a smartphone—sometimes in conjunction with ashorter-range network and protocols such as a local area network (LAN)that may include Bluetooth (including its low-energy (BLE) variant),radar-based or WiFi or related networks based on ANT™, Infrared DataAssociation (IrDA), radio-frequency identification (RFID), Zigbee,Z-Wave or the like—are not capable of acting as an intermediary forpromptly and efficiently offloading the generated data to a remotelocation where the information contained within the data may be put touse. For example, data collected from endpoint IoT devices oftenrequires long-range transmission capability while also beingpower-limited. While some of the aforementioned protocols may meet alimited number of power requirements, they are incapable of long-range(that is to say, a kilometer or more) signal transmission. Similarly,cellular-based protocols may satisfy long-range requirements, but theirhigh power consumption make them prohibitive for devices that need longbattery life. As such, without a significant redesign and rebuild of thehardware, issues such as cost, security, battery power, bandwidthutilization or the like may hamper the ability of IoT-compatible devicesto connect to an end user of the collected data through these limitingintermediaries on their way to an internet protocol (IP)-based network.Moreover, in cases where these devices are being used in medical orrelated health-care situations, they may have already been subjected torigorous FDA medical device approval and clearance in their currentembodiments. At least in these situations, it may be difficult,expensive and time-consuming to repurpose the devices to be able toserve populations of people using them, particularly for such people whomay have neither ready access nor inclination to connect via LAN,cellular or other traditional telecommunication architectures.

A PAN allows communication between a larger network (such as theinternet) and one or more end user devices. The PAN needs a way to getthe data that is coming from these devices to the larger network andthat may use or otherwise manage the data, including storage, cleansing,training and inference for analysis and related end-use. Traditionally,such connection necessitates additional infrastructure within the PAN inthe form of high-bandwidth, comprehensive communication protocols. Theseprotocols typically leverage licensed parts of the spectrum through anextensive array of wired or hybrid networks, including those associatedwith a public switched telephone network (PSTN) or mobile wirelessnetwork such as those that operate under the 3^(rd) GenerationPartnership Project (3GPP) and their related standards such as Long-TermEvolution (LTE) or the Global System for Mobile Communications (GSM).The corresponding additional cost and complexity associated with suchinfrastructure is in many cases prohibitively expensive and inconvenientfor the user of the PAN.

Contact tracing is the process of identifying individuals who may havebeen exposed to a contagious disease or related communicable agent,typically through another infected individual, animal or other source. Anon-exhaustive list of such diseases includes tuberculosis, as well asvaccine-preventable infections such as measles, sexually transmittedinfections, blood-born infections, some serious bacterial infections,viruses and novel infections such as the coronavirus that producesCOVID-19, SARS-COV or the like. With contact tracing, once a person hasbeen identified as having a confirmed case of a communicable disease,proximity information (which may be thought of as a subset of locationinformation) may be gathered on other individuals who may have hadsufficient interaction with the confirmed person so that these otherindividuals may in turn be monitored for signs or symptoms associatedwith infection of the disease Known approaches of determining thelocation of persons under a contact tracing analysis involve the use ofconventional cellular-based devices and communication protocols similarto the aforementioned IoT and PAN scenarios. The challenges orlimitations with such devices and approaches may include: the inabilityto get fine (that is to say, granular) indoor location information; theuse of an active rather than passive process for the applicationsoftware which in turn necessitates that it is always operational ratherthan merely residing in the background; and the consumption ofsignificant amounts of battery power and the need for universally uniqueidentifiers (UUIDs) in order for the receiving device to know whichother broadcasting device to listen for, particularly if the otherdevice does not intend on advertising to the public.

SUMMARY

With the foregoing in mind, the authors of the present disclosure havedeveloped a PAN that may be used to collect data from nearby sensors orother devices and then wirelessly send the data to a larger networkwithout having to rely upon cellular infrastructure as an intermediarytelecommunication platform. Understanding that a sensor-enabled PANneeds a way to get the data that their sensors have collected to aremote location for subsequent management, storage or use of such data,the authors of the present disclosure discovered a simple low-costcommunication network that allows wireless connectivity and datatransfer between the PAN and the remote location using LPWAN as theintermediary.

The authors of the present disclosure have further developed the PAN tobe a particularly efficacious way to perform real-time diseaseidentification and propagation monitoring. By tracking the location ofinfected persons using the wearable electronic device PAN and LPWANdisclosed herein, significant reductions in disease spread may beachieved through one or more of interrupting ongoing transmission of thedisease, alerting contacts to the possibility of infection, offeringpreventative counseling or prophylactic care, assisting in diagnosis,counseling and treatment to already-infected individuals to help preventtheir reinfection, as well to learn about the epidemiology of a diseasein a particular population. As such, in situations where time is of theessence, the devices, systems and methods disclosed herein foridentifying contacts allow decision-makers to ensure that infectedpersons do not interact with others in order to reduce or eliminatefurther spread. In this way, a disease outbreak and spread may be tracedquickly as a way to assist public health officials with more adequatelyaddressing the spread of an infection, even in regions or areas that donot have significant existing communication infrastructure.

The PAN disclosed herein uses the wearable electronic device to act as acoordinator, reconfigurator or aggregator for various devices within alarger system in order to form an end-to-end approach to track and tracecontacts, document outbreaks and manage cases, as well as to informemployers, visitors and staff (such as those associated with hospitals,senior living facilities or related businesses that provide health careand related services) for of a potential exposure. In another context,the PAN may be employed for other forms of socialization and measuringthat operate in a manner analogous to contact tracing, such as forpeople-to-people, as well as for workplace scenarios such aspeople-to-staff or people-to-boss. Details associated with acomprehensive embodiment of such wearable electronic device and itsassociated LPWAN may be found in US Published Application 2019/0209022entitled WEARABLE ELECTRONIC DEVICE AND SYSTEM FOR TRACKING LOCATION ANDIDENTIFYING CHANGES IN SALIENT INDICATORS OF PATIENT HEALTH thatcorresponds to pending U.S. patent application Ser. No. 16/233,462 thatwas filed on Dec. 27, 2018, is owned by the Assignee of the presentdisclosure and the entirety of which is incorporated herein byreference. In one form, the PAN and methods disclosed herein includesome or all of the components and associated functionality associatedwith the wearable electronic device that is disclosed in US PublishedApplication 2019/0209022.

In one form, the LPWAN is based on a LoRa chipset with its chirpspread-spectrum radio-frequency (RF) signal generation such that thedevices and systems disclosed herein may utilize compatible stackprotocols such as LoRaWAN (which is IEEE 802.15.4g-compliant) as a wayto establish a PAN-to-IP network communication channel. Moreparticularly, when viewed within the context of an IP suite conceptualmodel in general and the transmission control protocol (TCP) and the IPin particular, the LoRa chipset defines the physical layer (PHY) whileLoRaWAN defines the Media Access Control (MAC) layer (as well as thenetwork layer and other layers) to define the basic architecture for afull-stack protocol for use as the intermediary between the wearableelectronic device and the end-use IP-based network. In this way, the PANcan leverage inexpensive sensors, beacons and associated components thatare situated in nearby data-acquisition devices that are within thecommunication range of the PAN in order to aggregate the informationcontained within these other devices, yet take advantage of onlyrequiring the single master (that is to say, source node) device toperform the downstream communication functions. In one form, nearbysensors that are on other devices that are within communication range ofthe PAN, as well as on-body sensors of the wearer, could send data tothe master device for subsequent conveyance via LPWAN to the largernetwork. In this way, the PAN as disclosed herein may be used inconjunction with an individual or group of individuals to communicateand exchange data that in turn may be analyzed for determination of oneor more characteristics of the person or people associated with thewearable device or devices.

By using a LoRa-based approach to communicating acquired data betweenthe PAN and a wirelessly remote end-use application as disclosed herein,the authors of the present disclosure have found that certain expensesand infrastructural complexities associated with conventionalhigh-bandwidth cellular-based approaches, including those that may useone or more of the LTE, GSM, code division multiple access (CDMA), timedivision multiple access (TDMA), Universal Mobile TelecommunicationsSystem (UMTS), General Packet Radio Service (GPRS), Voice over IP (VoIP)or the like, may be reduced or eliminated.

According to a first aspect of the present disclosure, a PAN that uses awearable electronic device as a source node is disclosed. The wearableelectronic device includes a wireless communication module configured toreceive at least one incoming signal from a remote device, anon-transitory computer readable medium, a processor electricallycoupled to the non-transitory computer readable medium and a set ofmachine codes stored in the non-transitory computer-readable medium andoperated upon by the processor. The set of machine codes includes amachine code to cause the wireless communication module to receive froma mobile beacon of a one or more peripheral nodes that are within rangeof the PAN at least device identifier information that uniquelyidentifies the mobile beacon and associated peripheral node, and eventdata associated with the peripheral node. The set of machine codes alsoincludes a machine code to cause the wireless communication module totransmit the received event data using an LPWAN protocol. In one form,the PAN is used for one or more of testing, contact tracing, proximitymonitoring and geofencing.

According to a second aspect of the present disclosure, a wearableelectronic device is disclosed. In one form, the wearable electronicdevice is used for one or more of testing, contact tracing, proximitymonitoring and geofencing.

According to a third aspect of the present disclosure, a non-transitorycomputer readable medium that has executable machine code that uponexecution on a machine causes the machine to operate a PAN. In one form,the resulting PAN is used for one or more of testing, contact tracing,proximity monitoring and geofencing.

According to a fourth aspect of the present disclosure, a method ofmonitoring an individual with a wearable electronic device is disclosed.In one form, the method is used for one or more of testing, contacttracing, proximity monitoring and geofencing.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The following detailed description of specific embodiments of thepresent disclosure can be best understood when read in conjunction withthe following drawings, where like structure is indicated with likereference numerals and in which:

FIG. 1 depicts a simplified view of wireless signal connectivity betweena wearable electronic device that forms a PAN and the internet throughan LPWAN gateway or network, as well as how the PAN may be used to forma geofence, all according to one or more embodiments shown or describedherein;

FIG. 2 depicts an exploded upper perspective view of the wearableelectronic device of FIG. 1 , as well as a block diagrammaticrepresentation of its logic device, various sensors and hybrid wirelesscommunication module;

FIG. 3 depicts a simplified view of using the PAN of FIG. 1 to track awearer that may or may not have been identified as being infected with acontagious disease;

FIG. 4 depicts a perpetual circle showing a summary of strategies usedto control the spread of a contagious disease and that includesidentification and testing functions that can be performed by the PANdiscussed herein;

FIGS. 5A through 5D depict a conventional sequence of events of how anemployee of a health care or related facility may infect at-riskresidents of such facility to a contagious disease;

FIG. 6 depicts a notional dashboard used with the PAN disclosed hereinto provide organization management for persons who may be at elevatedrisk of potential exposure to a contagious disease;

FIG. 7 depicts a notional display such as a mobile phone screen and thatis used with the PAN disclosed herein to provide a notification to theone viewing the display that they may be at elevated risk of potentialexposure to a contagious disease;

FIG. 8 depicts a contact report shown by a notional display and that isused with the PAN disclosed;

FIG. 9 discloses a room-based indoor tracking within a multi-roombuilding where both point-of-departure warnings and color-codedrepresentations of locations within the building of an individual thatis being monitored with the wearable electronic device of FIG. 2 ;

FIG. 10 depicts a program structure in the form of a flow diagram of howthe wearable electronic device may be used to develop a machine learningmodel according to one or more embodiments shown or described herein;

FIG. 11 depicts a program structure in the form of a flow diagram of howto perform at least one of contact tracing, proximity monitoring andhotspot detection;

FIG. 12 depicts an embodiment of a system architecture for thecommunication network that is configured to operate with the wearableelectronic device of FIGS. 1 and 2 on a hazard-prone environment;

FIG. 13 depicts an embodiment of the hazard-prone environment of FIG. 12as a confined space where a continuous monitoring process is takingplace;

FIG. 14 depicts the various forms of data transmission and system statesthat take place within the communication network of FIG. 12 ;

FIG. 15A depicts a program structure in the form of a flowchart for anauthentication process that occur within the communication network ofFIG. 12 to produce an authentication state;

FIG. 15B depicts a program structure in the form of a flowchart for anauthorization process that occurs within the communication network ofFIG. 12 to produce an authorization state;

FIG. 15C depicts a program structure in the form of a flowchart for apre-entry test process that occurs within the communication network ofFIG. 12 to produce a sensor state;

FIGS. 16A and 16B depict a program structure in the form of a flowchartto determine if a worker who is using the communication network of FIG.12 and who has gone through the processes of FIGS. 15A through 15C willbe permitted to gain access to the hazard-prone environment undernumerous scenarios;

FIG. 17 depicts a program structure in the form of a flowchart todetermine if a worker who has gained access to the hazard-proneenvironment is being continuously monitored under numerous scenarios;and

FIG. 18 depicts a representative lockout/tagout process using thecommunication network of FIG. 12 .

It will be appreciated that for the sake of clarity, elements depictedin the drawings are not necessarily to scale, and that certain elementsmay be omitted from some of the drawings. It will further be appreciatedthat certain reference numerals may be repeated in different figures toindicate corresponding or analogous elements.

DETAILED DESCRIPTION

The disclosed devices, systems and methods allow for real-time trackingthrough a PAN to provide data-informed insights of people and activitiesthat are within communication range of the PAN. While much of thepresent disclosure emphasizes the wearable electronic device, PAN andperipheral components and systems for use in providing informationpertaining to the potential or actual spread of a virus or relateddisease that if left unchecked could to cause an epidemic, pandemic orthe like, it will be appreciated that such devices, components andsystems may be used for other applications as well, such as foracquiring other forms of location, environmental, activity,physiological (LEAP) or other data associated with the individual towhom the wearable electronic device is attached. For example,accelerometer data may be grouped as activity data, while heart rates,blood oxygenation, cardiac, temperature, incontinence (such as throughdiaper moisture sensing) may be grouped as physiological data,temperature, humidity and barometric pressure may be grouped asenvironmental data; all of these are directly-measurable forms of data.It will be appreciated that other types of data may be derived, such asthrough analysis or computation, including that arising out ofconducting machine learning analyses such as those discussed herein; oneexample of such derived data may include activities of daily living(ADL) data that in one form is correlated to accelerometer data throughmachine learning. Likewise, some data may have both direct and derivedattributes, such as location data that may be both relative and absolutevia radio signal strength indication (RSSI) variables derived therefrom.It will be appreciated that these and other forms of data (such asdepicted in FIG. 2 ) may be subjected to additional analysis in order toperform one or more of the contact tracing, proximity monitoring,geofencing or related activities disclosed herein. The PAN disclosedherein refers to the interconnection of peripheral informationtechnology devices, sensors, beacons or the like (individually orcollectively referred to as peripheral nodes) that are within theenvironment of an individual user that is associated with the wearableelectronic device (also referred to as a source node). In onenon-limiting form, such peripheral nodes are within about ten meters ofthe source node.

The prevention of communicable disease spread may be enhanced through acombination of functions that are within the capability of the PAN. Suchfunctions include—among others—testing, contact tracing, proximitymonitoring and geofencing. While clinical-based testing of an individualis beyond the scope of the present disclosure, the authors herein haveadditionally determined that the acquisition of various types of senseddata by the wearable electronic device—in conjunction with on-devicereal-time analysis based on such data—can accurately predict whether theindividual being monitored by such device has a high likelihood ofcontracting the communicable disease. This in turn can lead to thedevice, PAN and system to perform additional activities relating to oneor more of location tracking, contact tracing, proximity monitoring andhotspot detection, as well as corresponding informing functions of suchlikelihood through dashboards, reports, messages or the like that can beconveyed to caregiver, employees, family, friends, public health policyorganizations or the like on a mobile device, computer screen or thelike. In one form, the inclusion of one or more beacons (such as in ahospital, retirement community, assisted living community or relatedhealthcare facility) may be used to promote additional locationtracking; this latter form is particularly useful for hotspot detection,that is, to know within a building where the sites are where the mostcontact between people has been occurring. Once these hotpots (such asbathrooms, or break rooms, random hallways or the like) and theircorresponding levels of increased risk are identified, the resultinginformation can be of use for planning, risk avoidance or relatedmeasures.

In one form, the contact tracing may include logging interaction detailsof the individual being monitored, including details associated withelapsed time, distance, device identifiers or the like. In this way, andusing validated exposure notification protocols, suitable interactionrecording and associated notifications may be made by one or more of thedevices, PAN and system. In one form, geofencing or related zonemonitoring may include sending or receiving notifications when theindividual being monitored enters or exits a designated, geofenced area.In one form, proximity monitoring may include sending or receivingdevice alerts (such as through audible, visual or haptic means) when thewearable electronic device is within a preset distance (for example, sixfeet, per current Centers for Disease Control (CDC) guidelines) ofanother such device. In one form, when two wearable electronic devicessuch as those disclosed herein experience an interaction where they comewithin such preset distance, the devices are configured to exchange data(such as through anonymized tokens or the like), where such data mayinclude the duration of the interaction and the date and time of theinteraction. This information is then sent to a remote location (such asa secure cloud-based location) where it can be retrieved in the eventthat a disease outbreak has been detected. As mentioned elsewhere,device and system-based operations associated with these activities arein one form automated.

In one form, the proximity monitoring may include the detection of otherdevices in order to ensure that minimum distances are being maintained,as well as providing visual, haptic, audio or related alerts, warningsor the like when such minimums have been breached to serve as a reminderto adhere to social distancing guidelines. In one form, machine learning(including on-device machine learning) may be used to help with suchproximity monitoring. As previously mentioned, information gleaned fromproximity monitoring may be thought of as a subset of locationinformation; however, it does not necessarily mean that proximitymonitoring is the same as location tracking. For example, in situationswhere increased security or user privacy may be important to the usersof other devices within the PAN, if the beacons or other sources of RFsignals being transmitted from such other devices do not include GNSS,their own static geofences or other sources of absolute (orquasi-absolute) frame of reference locationing, then the proximityinformation acquired by the central device within the PAN becomes moreanonymized, due at least in part to its ever-changing (that is to say,dynamic) nature.

In one form, hotspot detection may include having the wearableelectronic device cooperate with adjacent (that is to say, those withinwireless signal communication range) beacons to gain a more accuraterepresentation of indoor location and interpersonal interaction. In oneform, the identity of the people making such interactions may beanonymized, while still allowing a system administrator (such as thoseassociated with a nursing home, assisted living community, group home orthe like) the ability to monitor the interactions and adjust protocolsaccordingly.

In one form, a dashboard or other display-based approach may be used toprovide various organization management functions. For example, when theorganization is a place of employment, place of public accommodation,healthcare facility or other entity where groups of people can beexpected to congregate, the dashboard may be made to providenotification functions, as well as the results of analytic-basedassessments (such as those from one or more machine learning algorithmsas is discussed in more detail herein), as a way to vieworganization-wide risks, create and track infection cases, sendautomatic messages (such as short message system (SMS), push or voicenotifications), as well as—in the case of a healthcare facility—tomanage staff, residents and visitors. In configurations where machinelearning is being used to analyze data collected by the wearableelectronic device and its associated PAN, one form involves using themachine learning model to evaluate a health condition of an individualbeing monitored. In a more particular form, such evaluation is takingplace at the edge (that is to say, on the device). Likewise, regardlessof whether such machine learning takes place at the edge (that is tosay, on the wearable electronic device) or in a remote computer, serveror other platform or system, the analysis or inference producedtherefrom may be made analyzing the health condition of an individualbeing monitored, perform contact tracing on infected persons, performproximity monitoring or other related functions. In another form, otheruses beside health condition evaluation may be performed by the device,PAN and system disclosed herein. For example, sensing and associatedanalysis, reporting or the like may be used to help evaluate anenvironmental issue around the person being monitored, such as in anindustrial or related setting where high levels of a gas or dangerouschemical may be present. It is understood that all such uses andscenarios are within the scope of the present disclosure.

In one form, a notional display such as a mobile phone screen, tabletscreen, computer screen or the like may be used to present notification,warnings or the like. For example, an API loaded onto the mobile phoneof an employee of a healthcare facility may provide summary information,testing recommendations or the like in order to give employees access torisk levels based on sensed interactions. In addition, an analysis ofhistorical or past interactions may be presented, as can a list ofresource such as local healthcare providers, testing center locationsand hours of operation. In addition, it allows the person to manage hisor her bubble. Within the present disclosure, such a bubble may be auser interface or related component on an a mobile or website-basedapplication programming interface (API) that allows the individual tosee the number of interactions and risk level of a group of other people(such as friends, family, co-workers or the like) with which theindividual may have frequent encounters. In one form, the bubble alsocan serve as a safegroup whereby the people in that bubble are knowncontacts and may categorized differently that other people (such as arandom stranger) that is outside such group. One form of differentcategorization may include not counting the people in the group in thesame way for contact tracing purposes, while another form may includeassigning a different risk level or priority level to people in thegroup than outside the group owing to known behavior or interactionpatterns. In a related way, this may allow the selective disabling ofcertain functions (such as social distancing alerts) of the device forpeople in the bubble when they are near each other.

Referring first to FIG. 1 , a system 1 is shown in the form of anetwork-based or network-accessible computing platform configured toperform various data acquisition activities associated with theoperation of a PAN P. In one form, system 1 may be referred to as anetwork-capable computing platform to perform software as a service(SaaS), cloud services, on-demand computing, platform computing, datacenter computing or the like. A wearable electronic device (alsoreferred to herein as a source node) 100 is used as a central part ofthe PAN P and may be affixed to a wearer W so that data related to oneor more of the wearer W location, environment, activity andphysiological (LEAP) attributes may be collected by sensors S₁, S₂, S₃ .. . S_(n) or other devices (collectively referred to as peripheral nodesor end nodes) 200 in order to be wirelessly conveyed to the internet Ithrough at least one LPWAN gateway 300 (also referred to herein asgateway 300, only one of which is shown) and then to the cloud 500. Inone form, the internet I may include—among other things—various servers400 that in turn may be made up of various network servers 410,application servers 420 or the like, all of which are understood bythose skilled in the art as being useful in order to establish backhaulconnectivity throughout the internet I. In one form, the network server410 may perform various transmission functions, such as— among otherthings—acknowledgement of a transmission, selection of which of severalgateways 300 is to be used for sending any necessary downlinktransmissions to the wearable electronic device 100 or gateway 300, aswell as for eliminating duplicate receptions. In one form, the networkserver 410 may receive uplink transmissions from multiple gateways 300,but might only send downlink transmissions to a single one of suchgateways 300. Likewise, application server 420 may function as acomputing nerve center for system 1 to run protocols and interfaces,such as web-based APIs or the like in order to perform LoRa-basedmessage handling and archiving, end user identification,notification-sending rules, security and software or firmware upgrades,among other functions. Within the present context, the servers 400,internet I and cloud 500 may form the backhaul that, depending on theconfiguration, may be situated at one of numerous geographic locations,including a geographically remote location with respect to PAN P, andthat all such variants are deemed to be within the scope of the presentdisclosure. In one form, server 400 may include built-in redundancyfeatures. For example, communication between the wearable electronicdevice 100 and the gateway 300 may be configured such that up to sixdifferent LoRaWAN network credentials may be stored. This in turnpermits hopping between credentials to take place seamlessly such thatnetwork 300 or server 400 isn't available (such as through a loss inconnectivity), the data acquired through the PAN P and transmitted bythe wearable electronic device 100 is still conveyed to its end usedestination. Such functionality may also work in situations when aprivate network between the various components is being employed (suchas for a nursing home, hospital, assisted living facility or the like)and there becomes a need to switch to a public network (such as thatprovided by internet service providers (ISPs) for example).

The use of LoRa-based chipsets, coupled with various protocols andsystem architectures such as those associated with a wirelesstelecommunication protocol such as LoRaWAN, allows long-range, low-powercommunication for low-to-medium bandwidth data requirements such asthose being delivered from PAN P in general and the wearable electronicdevice 100 in particular to such backhaul while taking advantage of (inone form) a star network topology (more particularly, a star-of-starsprotocol) such that the gateways 300 act as a transparent bridge betweenone or more wearable electronic devices 100 and the backhaul. Within thepresent disclosure, in a star-of-stars topology, the various wearableelectronic devices 100 are wirelessly coupled to one or more of thegateways 300 via single-hop LoRa link, while the gateways 300 areconnected (such as through the internet I, for example) to a commonnetwork server 400 (such as server 400). In fact, the star-basedtopology is consistent with the LoRaWAN protocol in that the protocoldoes not support direct communication between the wearable electronicdevices 100. As mentioned elsewhere, such data acquisition—as well asrelated analysis and wireless transmission of such data—is performedautomatically. Within the present disclosure, such automated operationmay include having the wearable electronic device 100 join an LPWANnetwork (such as a Helium Hotspot or related peer-to-peer wirelessnetwork, for example) that encompasses one or more of the gateways 300,forwarding the data that was received by the gateway 300 to theinternet-based servers 400 such that the network server 410 will forwardthe data to a backend (such as AWS IoT Core, for example) for one ormore of recordation, processing, analysis or the like, and enablefrontend APIs to retrieve the recorded, processed, analyzed data suchthat a localized report of contact tracing data may be presented to theindividual associated with the wearable electronic device 100, familymembers, caregivers, public health and policy centers, governmentagencies or other interested people or institutions. In one form, theLPWAN network is configured to offer cryptographic proof of thetransmission of various data (such as time and location) from thewearable electronic device 100 to the gateway 300; such proof may be inthe form of permanent recordation on a distributed ledger such asBlockchain.

In one form, the LPWAN signal used to convey data collected by thewearable electronic device 100 is predominantly used in a one-way flowof such information in an uplink manner to the gateway 300, while inanother form, two-way (that is to say, bidirectional) mode ofcommunication that includes downlinks is possible. In this latter mode,information that is generated, processed or otherwise acquired from aremote location such as the backhaul server 400, cloud 500 or the likemay be returned to the PAN P through the wearable electronic device 100in its capacity as the master device within the PAN P. Also in thislatter mode, and consistent with any of Classes A (ALOHA-style), B (withtime-synchronized, scheduled receiving slots to promote additionaldownlink capacity and lower latency) or C (where downlink and associatedwearable electronic device 100 ability to receive transmissions is onsubstantially all of the time) communication, some form of downlink mayalso be employed in order to establish security updates, datatransmission (i.e., received packet) acknowledgement, other over-the-air(OTA) updates, activations or the like. Significantly, this provides theopportunity for the wearable electronic device 100 to change its classdynamically depending on the level of data being shared via the PAN P.For example, if more data is required in a particular downlink, thewearable electronic device 100 could switch to a Class C device for morefrequent or more bidirectional modes of communication, after which itcan then switch back to a Class A or Class B mode after eithercompletion of the transmission, a set amount of time specified or bydefault. Furthermore, the use of downlink capability is such that adownlinked inquiry can be made of the wearable electronic device 100 tohave it in turn inquire of the devices in the PAN P for data, as well asto give it instructions about what data is to be received at thebackend. Considerations for choice of class may be based on variousoperational considerations such as power usage (which corresponds tobattery life), duty cycle and latency requirements, message content andbroadcasting status (that is to say, unicast versus multicast),situation exigency, threshold-exceeding movement,communication-initiation source or the like. Moreover in such downlinkcommunication, an application server 420 that is part of the backhaulserver 400 may communicate with a network server 410 that is also partof the backhaul server 400 and that in turn sends each downlink messageto a single gateway 300 that then transmits the message to the wearableelectronic device 100. Furthermore in this latter mode, the gateway 300may act as a duplicating, packet-forwarding device by first receivingLPWAN radio signals from events recorded and stored in the wearableelectronic device 100 and then forwarding them to the backhaul server400. In this mode of operation, the wearable electronic device 100 iscapable of encrypting and decrypting packets, as well as be observant ofduty cycles and perform network authentication functions.

As previously discussed, in one form where the signal transmissionprotocol is based on LoRaWAN, various functionalities are enabled,including the ability of a large number of the wearable electronicdevices 100 to be monitored simultaneously, the ability to engage inadaptive data rate (ADR) transmission (which can reduce the need forsignal-hopping), the ability to have bidirectional end-to-endcommunication, OTA software or firmware upgrades, range-versus-messageduration tradeoffs, more accurate localization and the ability to roambetween gateways 300 without a disruption in connectivity in a mannerthat substantially mimics the movement of a mobile telephone betweencell towers. Furthermore, communication between the wearable electronicdevice 100 and the gateway 300 may be configured such that up to sixdifferent LoRaWAN network credentials may be stored to allow seamless(that is to say, automatically and without a substantial break inconnectivity) hopping between credentials, as well as public-privatenetwork switching, depending on the circumstance or need. When multiplecredentials are used, they may be further set up to prioritize aparticular order, such as first, second, third and so on. In one form,each gateway 300 can serve numerous (for example, in excess of athousand or more) wearable electronic devices 100. Having multiplegateways 300 may be helpful in establishing a star topology for anetwork formed between such gateways 300 and the PAN P through one ormore of the wearable electronic devices 100. By having thisbidirectional capability, the wearable electronic device 100 andassociated PAN P can—in addition to operating in a passive mode formonitoring location, activity, behavior or the like—operate in aninteractive way with other components within the system 1 or otherdevices within a particular environment, including within the PAN Pitself.

In this latter form, the bidirectional exchange of information withinthe PAN P between the wearable electronic device 100 as the source nodeand the remaining peripheral nodes 200 (whether in the form of beacons,other wearable electronic devices 100, sensors S₁, S₂, S₃ . . . S_(n) orthe like and all of which are in signal communication with the sourcenode) may be used to conduct handshaking between them. Such handshaking,as well as the repeated bidirectional communication between source andperipheral nodes 100, 200 within the PAN P, ensures that a substantialentirety of the data being transmitted back and forth actually reachesits intended destination. For example, by including a checksum orrelated algorithmic function, potential errors in the transmission ofthe data may be readily identified and corrected. Thus, in situationswhere integrity of the data is required or otherwise important, dataacquired by and contained by the peripheral node or nodes 200 may onlybe removed from its internal queue of data once the peripheral node hasbeen assured from the source node 100 that the data has been correctlyreceived and processed. Such assurance may use checksum or othersuitable algorithms in responses from the source node 100 to theperipheral node 200 after data transmission. By way of example when theintra-PAN P wireless transmission is using a BLE-based protocol, BLEindications from the peripheral node 200 (as a BLE server) are made tothe source node 100 as a BLE client as a way to establish suitableacknowledgment rather than mere notification; this in turn results inconfirmed data transmissions. The use of a cyclic redundancy check (CRC)and parity check may further help to ensure transmitted data validity,while the assurance of specific types of data may similarly beundertaken in the form of a data assurance transmission method,algorithm or the like.

Within the present disclosure where health, medical and relateddisease-spread information may be transmitted both within the PAN P andbetween the PAN P and gateway 300, servers 400, cloud 500 or otheroutside systems, networks or the like through the bidirectional wirelesssignal communications discussed herein, data validity measures such asthese are particularly beneficial. As discussed elsewhere, the use ofbidirectional intra-PAN P communication may further help with powermanagement functions. For example, active transmission of data from theperipheral node 200 to the source node 100 is initiated by the sourcenode and can be made to only occur when the source node 100 canreasonably assume that transmission is needed and that the transmissionwill succeed based on its internal state, measured values of itsenvironment and the peripheral node 200. In other words, the source node100 will not connect to download data from the peripheral node 200unless it detects a sufficient signal strength from the peripheral node200, and for a sufficient amount of time. This in turn may include theuse of machine code to prioritize certain kinds of peripheral nodes 200,as well as prioritizing based on how much data the source node 100 candetect has been backlogged by the peripheral node 200. This has theeffect of minimizing wasted dataflow traffic and the concomitantunnecessary usage of battery power by both source and peripheral nodes100, 200.

This relatively high degree of interactive (rather than merely passive)involvement enabled by bidirectional communication that is used toensure validity of the data being transferred in turn allows for theformation of a self-configuration network (or a self-organizing network(SON)) such that the PAN P may manage itself. By way of example, machinecode that is discussed in more detail herein may cause the PAN P toperform at least one of configuration, registration and calibration.This in turn enables various updates to the same, including those tosoftware or firmware, including to the peripheral node or nodes 200.Non-limiting examples of configuration updates may include those for theselective engagement or disengagement of certain functions (such as apanic button on the wearable electronic device 100), LPWAN power levelchanges, such as to get extended distance or range versus extendedbattery life and changing request and response status between the sourceand peripheral nodes 100, 200 to acquire certain forms of LEAP data,among others. In this last example, by assuring bidirectionalcommunication between the source and peripheral nodes 100, 200, the PANP enables requests for a particular peripheral device 200 to acquire ameasurement, such as an electrocardiogram (EKG) reading or the like.Such targeted (rather than indiscriminate) requesting is especiallybeneficial for measurements that are taken at peripheral devices 200that consume larger amounts of power during the measurements but lowpower during idle as a way to conserve battery power. In another use forself-administered configuration changes, restrictions may be made on thenumber or type of possible networks that can join the PAN P; this hasthe effect of conserving power on the various peripheral devices 200. Inaddition, further measures may be undertaken to ensure proper datatransmission within the PAN P. For example, data transmission from theperipheral node (or nodes) 200 to the source node 100 is only allowed tooccur when the signal strength threshold between them is great enough toensure complete transmission and when the data to be transmitted can beassured to be completed in full (such as through checksum or othersuitable algorithms). It will be appreciated that these are but a fewexamples of how the bidirectional communication between the source nodeof the wearable electronic device 100 and the peripheral nodes 200promotes a SON.

Within the present disclosure, registration could be achieved by placingthe wearable electronic device 100 in close proximity with a measurableparameter of interest (such as a heartbeat being sensed by a heart ratemonitor) for a short period of time (for example, around five seconds)in situations where near-field communication (NFC) or related wirelesscommunication is enabled. Registration could also be conducted through aregistration process, through an exchange of keys back and forth orthrough a BLE connection that accepts the two devices as a part of thePAN P of the source node 100. Likewise, calibration could be applicableto numerous features. In one form, the source node 100 may be used tocalibrate or configure one or more of the peripheral nodes 200. Usingthe previously-discussed detection of heart rate as an example,calibration of the heart rate monitor may take place such that itmonitors for a duration (for example two hours) at predetermined rate(for example, every one minute) after which it reverts back to itsdefault monitoring rate. Self-calibration is also possible in that in asituation where a sensor or related device may have to adjust to a new,updated standard, it can reset, balance out and then confirm that it wascalibrated to the new standard, as well as send a status update uponcompletion. In a similar manner, the bidirectional nature of thecommunication between the source and peripheral nodes 100, 200 may beused to conduct diagnostic tests, system information or related statusupdates for the various components that make up the PAN P, such as whensuch diagnostics, tests or status information is transmitted to thesource node 100 from the one or more peripheral nodes 200. For example,an error code or an update (such as an update on the number of batterycharge cycles or an indication that it is time for some predictive orpreventative maintenance of a particular device) may be transmitted inorder to allow machine code (such as that resident on the wearableelectronic device 100) to conduct an analysis, prepare a report or thelike.

Furthermore, data compression may take place on the wearable electronicdevice 100 before sending such data to the gateway 400 and backhaul. Asdiscussed elsewhere within the present disclosure in conjunction with amachine learning workflow 1000, one form of such data compression may bein the form of data cleaning in general, with a more particular formbeing dimensionality reduction. As a corollary, native intelligence onthe wearable electronic device 100 helps to promote some measure ofself-backhauling, which is beneficial in situations where access to thebackhaul server 400 is not available. Moreover, such bidirectionalcapability may help with registration of the various devices, such asthrough short range RFID, BLE or NFC connectivity. In one form, theregistration may be event-based.

In one form, the sensors S₁, S₂, S₃ . . . S_(n) may be distributed overvarious places on or adjacent the wearer W such that they are physicallydistinct components that are separate from the wearable electronicdevice 100, while in another, the sensors S₁, S₂, S₃ . . . S_(n) may becontained within the wearable electronic device 100, while in stillanother, some of the sensors S₁, S₂, S₃ . . . S_(n) may be separatecomponents while others are part of the wearable electronic device 100.In yet another form, one or more of the sensors S₁, S₂, S₃ . . . S_(n)may form autonomous or semi-autonomous data-collecting devices. Withinthe present disclosure, a sensor detects events or changes within theenvironment in which it is placed, and may record, indicate, forward orotherwise respond to a particular physical property that is beingmeasured. Depending on the configuration, and as will be discussed inmore detail as follows, in one form, communication between the varioussensors S₁, S₂, S₃ . . . S_(n) and the wearable electronic device 100may be thought of as an intra-PAN construction, while in another as aninter-PAN construction where the former is that which takes place withinthe PAN P while the latter is that which takes place outside of the PANP. It will be appreciated that both variants are deemed to be within thescope of the present disclosure. By way of example, in one form, aninter-PAN communication may be formed between the wearable electronicdevice 100 and sensors S₁, S₂, S₃ . . . S_(n) and other devices externalto the PAN P, while in another form, a substantial majority or entiretyof the acquired data may be conveyed to the wearable electronic device100 from devices that form part of the PAN P. Moreover, inconfigurations where one or more of the various sensors S₁, S₂, S₃ . . .S_(n) are physically distinct components that are separate from thewearable electronic device 100, they may be made to establish signalcommunication with the wearable electronic device 100 through one ormore short-range or very short-range radio signals using a suitable NFC,or in the alternative through one or more short-range protocols orwireless interfaces such as Bluetooth, WiFi, Zigbee, BLE, 6LoWPAN, IrDa,RFID or the like.

In one form, the sensors S₁, S₂, S₃ . . . S_(n) form so-called “smartdevices” in that they are made IoT-compatible through suitable RFconnection such that data that they acquire may be conveyed based oncertain triggering criteria. In one form, the acquired data may beconveyed based on triggering criteria established by logic containedwithin the sensors S₁, S₂, S₃ . . . S_(n) or wearable electronic device100, while in another form via logic contained within the gateway 300,servers 400 or cloud 500. In one form, such triggering may involve thetransmission of previous measurements that may have been acquired by—andlocally stored upon memory contained within—one or more of the sensorsS₁, S₂, S₃ . . . S_(n). Regardless of where such logic is situated, itwill be appreciated it may exist in a known form, such as through asoftware development kit (SDK) or the like, and that in addition toperforming various calculations and event-triggering or event-respondingactivities, may also detect and interpret wireless and related radiobroadcasts that take place between the various components that make upPAN P.

Examples of how various triggering events may be used to initiate actionby the wearable electronic device 100 include text, call or e-mails fromoutside sources, as well as certain threshold-exceeding or time-basedevents. Within the present disclosure, events are those situations,conditions, locations or related measurable quantities that may have animpact on contact tracing, proximity monitoring, geofencing or relatedfunctionality associated with the wearable electronic device 100, system1 or PAN P. These events and triggers may take place regardless ofwhether the wearer W is being monitored for location, health and relatedphysiological data, contact tracing, ambient environment conditions,activity or purposes as may be discussed herein. As shown in exemplaryform, example, sensors S₁, S₂, S₃ . . . S_(n) may include chemicalsensors, radiation sensors, accelerometers (such as to detectvibrations, falls, extreme movements or the like), cathodic protectionsensors (such as for pipelines or other remote or hard-to-reachlocations where the use of a LoRaWAN-based approach would beparticularly beneficial), various physiological sensors (includingtemperature sensors that may include infrared (IR) or related thermalimaging functionality) and others that may be signally coupled to theservers 400 through a public or private LoRa-based network thatestablishes wireless communication between the wearable electronicdevice 100 and the gateway 300.

In one form, the sensors S₁, S₂, S₃ . . . S_(n) can receivecommunication from the LPWAN through the gateway 300, but can only sendinformation to the LPWAN through the wearable electronic device 100. Inthis way, the common device credentials associated with each of theseand other components within PAN P gives the appearance to the LPWAN thatthe PAN P is a single device. In another form, the sensors S₁, S₂, S₃ .. . S_(n) may possess some measure of both send and receivecommunication with the LPWAN through the wearable electronic device 100.By way of example for this latter configuration, the wearable electronicdevice 100 may send out a signal to wake up a first sensor S₁ in orderto initiate a task such as to first clear a memory (not shown) in sensorS1 and then to have sensor S₁ start performing its particulardata-acquisition process, such as measuring heart rate, O₂ saturation orthe like. Additionally, time limits (for example, one minute) may beplaced on the length of time for sensor S₁ to acquire the data, afterwhich it may then be instructed to transmit the acquired data back tothe wearable electronic device 100. In certain operating modes such asthe one associated with the form where one or more of the sensors S₁,S₂, S₃ . . . S_(n) may possess some measure of both send and receivecommunication from the LPWAN, certain commands (such as that to clearand retest) need not include having to route such commands through thewearable electronic device 100 for handling other than for the purposeof having it act as the communication gateway. Likewise, in certainoperating modes such as the one associated with the form where one ormore of the sensors S₁, S₂, S₃ . . . S_(n) may possess only sendcommunication capability to the LPWAN, the wearable electronic device100 may take on a more comprehensive role as the command handler.

In one form, the data generated by the one or more of the sensors S₁,S₂, S₃ . . . S_(n) and that is delivered to or otherwise managed by thewearable electronic device 100 may be delivered directly from thewearable electronic device 100 to the cloud 500 through the gateway 300.This obviates the need for intervening infrastructure such satellites(either terrestrial, space-based or nano satellite-based) or a cellulartower, thereby allowing a wireless connection to be established betweenthe PAN P and an end user of the data on the cloud 500 through theinternet I without the presence between the wearable electronic device100 and the cloud 500 of a cell phone, mobile phone, smartphone or thelike, while reducing—if not outright eliminating—the need for WiFi. Sucha configuration is particularly suitable in situations where analytics,predictions or the like based on such acquired data needs to take placein real-time or near real-time situations such as infectious diseasecontact tracing, wearer W wandering, health monitoring, locationdetermination or the like. In this way, the insights gleaned from theacquired data may be more quickly put into a form suitable fordecision-makers or other interested individuals.

Within the present disclosure, it is understood that the cloud 500 mayexist in two forms. First, it may be on the internet I such that it isreached by the gateway 300 through the server 400. Second, it could belocally transferred from the gateway 300 to an intranet or to a specificserver (neither of which are shown). Either variant of cloud 500cooperation with the wearable electronic device 100 and gateway 300 iswithin the scope of the present disclosure.

Depending on the extent of physical connectivity between the sensors S₁,S₂, S₃ . . . S_(n) and the wearable electronic device 100, the lattermay be configured to be coupled to the wearer W in various form factors,including wrist-worn (as shown), bandage, article of clothing, or otheron-body format, as well as attachable to the wearer W through anexternal device attached onto a belt clip, in a pocket, on a necklace,on a shoe, helmet, hardhat, safety glasses or the like, in addition tobeing affixable to a purse, backpack, a subcutaneous implantable (thatin one form may be charged like a pacemaker) or the like. Additionally,the wearable electronic device 100 may be configured as a smartwatch, asmartband, smartring or the like, while the sensors S₁, S₂, S₃ . . .S_(n) may either on the wearable electronic device 100 or placedsomewhere on or adjacent the wearer W, such as through nearby a sensorpatch, embedded in or on the clothing, as a subcutaneous implantablesensor (such as a thermometer, insulin detector that—as mentionedpreviously—can be charged like a pacemaker) or the like. Furthermore,the wearable electronic device 100 and PAN P may be used in variousapplications, including by way of example and not by limitation: insulindevices, wearable heart rate patches, seizure-monitoring apparati,body-mounted sensors for falls, smart clothing or as an add-on product.

In one form, the wearable electronic device 100 acts as the aggregatoror master node of the PAN P, while sensors S₁, S₂, S₃ . . . S_(n) orother external devices 200 may act as peripheral data-acquisition nodes,and as such are also referred to herein (depending on the context) asperipheral nodes, peripheral devices, BLC-capable devices, beacons,mobile beacons or the like. In one non-limiting form, the externaldevices 200 may include personal digital assistants (PDAs), mobiletelephones, personal computers (PCs), laptop computers, mobile phones,fitness trackers, headphones, heart rate monitors or otherradio-equipped platforms, as well as IoT-based beacons, radio-equippedsensors such as the sensors S₁, S₂, S₃ . . . S_(n) all of which may formpart of an individual's living or work space. Within the presentdisclosure, one or more additional wearable electronic devices 100 mayalso be included among these PAN-compatible devices when they are notacting in their capacity as the source node or master aggregator of PANP. Within the present context, many if not all of these peripheraldevices will include BLE or other short-range protocol modes oftransmission. Likewise, many or all of the peripheral device may includelocationing functionality through GNSS or related satellite-basedinertial frame of reference positioning system sources, as well asrelative locationing functionality through triangulation or relatedcooperation with other similar devices. It will be understood that evenin situations where one or more of the sensors S₁, S₂, S₃ . . . S_(n)are integral with (that is to say, forms a part of) the wearableelectronic device 100, they may still be considered to be peripheralnodes for functional purposes. In acting as the master or aggregatornode, the first or primary wearable electronic device 100 managescommunication between the sensors S₁, S₂, S₃ . . . S_(n) and the LPWANgateway 300, as well as various management, control and network accessand connectivity functions as a way to connect one or more endpoints toa broader network. Within the present disclosure, this aggregatorcapability allows such wearable electronic device 100 to operate as afull function device (FFD) which—in addition to otherfunctionality—allows it to be configured to have a full infrastructurenetwork access protocol, as well as full control and user planefunctionality, including the ability to adaptively change data rates orthe like. In this way, application-specific data may be conveyed in MACframes between various end node devices and the network server 410.Likewise, the MAC frames may be used to transmit control plane databetween the end nodes and the network server 410. The structure of thesignal and data (that is to say, the payload being carried) may beestablished within known frameworks within the various headers orcontrol frames as is known in the art. Moreover, various knownnetwork-joining strategies and infrastructure may be used within theLPWAN network that includes gateway 300, including—among otherthings—the use of network address (NwkAddr), application extended uniqueidentifier (AppEUI), device extended unique identifier (DevEUI),application key (AppKey) and the IP address-like device address(DevAddr). To enhance security of the wearable electronic device 100,the AppKey (which is subject to the 128 bit Advanced EncryptionStandard, (AES) with public key and private key components), as well asthe derived application payload encryption key (AppSKey) and the MACcommands and application payload key (NwkSKey) may receive additionalsecurity through their use with—or incorporation into—a secure element.In one form, such a secure element may be thought of as aprocessor-based physical module with cryptographic code capability tocooperate with a suitably configured API. It will be appreciated that inthe use of a secure element, IoT-specific and LPWAN-specificconsiderations may be made in the design thereof to account for datapayload limitations within the communication link. In such circumstance,some form of adaptive cryptographic keys may be used to be responsive toexpect future upgrades to IoT devices such as the sensors S₁ . . . S_(n)or the peripheral nodes in the form of BLE beacons 200 to ensureadditional security of LPWAN IoT communications such as those discussedherein.

In one form, one or more of the various data-acquisition nodes (which inone form may be the same as, or form a part of the peripheral nodes 200)such as those associated with one or more of the sensors S₁, S₂, S₃ . .. S_(n), BLE-capable devices 200 or the like may do more than merelypassively acquire data. For example, one or more of these nodes mayfurther include active features. Thus, for instance, if the first sensorS₁ (which in one form may be an accelerometer, gyroscope or the like)detects that the wearer W has fallen, the sensor S₁ in combination withthe wearable electronic device 100 may send out a signal to a brakingdevice that is affixed to a walker or related mobility aid (not shown)that is known to be associated with—and currently being used by—thewearer W in order to engage the brakes and stop or reduce additionalmovement of such mobility aid.

Communication (both one-way and two-way, depending on the need) betweenthe PAN P and the gateway 300, servers 400, internet I or cloud 500,also allows for ease of parameter reconfiguration within the wearableelectronic device 100 through suitable files, instructions or relatedupdates from one or more backhaul sources that either form part of orare otherwise connected to the gateway 300, servers 400, internet I orcloud 500. As such, the PAN P may operate in two different link modes:first as a link between it and the LPWAN; and second as a link betweenthe wearable electronic device 100, sensors S₁, S₂, S₃ . . . S_(n) (andoptionally other components—such as the BLE-capable devices 200 that maybe cooperative with the wearable electronic device 100) within the PANP.

In one form, the wearable electronic device 100 as an FFD may act as anintermediary between two more or more of the sensors S₁, S₂, S₃ . . .S_(n) in order to deliver a function without having to backhaul theinformation to the cloud 500. For example, in such a configuration, theother external devices such as the BLE-capable devices 200 may transmitdata to the wearable electronic device 100 which then determines thatone or more of the data content, signal strength or other parameter ofinterest is too low to be of value. This in turn may cause the wearableelectronic device 100 to provide some indicia of a potential problemwith the acquired data or signal, such as through vibration of a hapticmotor, flashing light, audible alarm or the like, as well as possiblycommunicating back to the BLE-capable device 200 of interest for asimilar alert or alarm at the local site of the particular BLE-capabledevice 200. Relatedly, in situations where the data being offloaded fromthe sensors S₁, S₂, S₃ . . . S_(n) to the wearable electronic device 100may be present in various forms, including summary data, continuous dataor the like, the wearable electronic device 100 may contain configuredor pre-set parameters stored in its memory to allow it to determine whattype, frequency, size or other attributes of the data to send throughthe LPWAN gateway 300 and what data to ignore. In addition, theseparameters could be adjusted somewhere within other parts of the system1 (such as the servers 400) as needed based upon current and futuredesired performance implementations of the wearable electronic device100. Due to limited resources of—among other things—memory and power,the ability of the wearable electronic device 100 in one form todiscriminate between various types of data allows it to allocateresources in an efficient manner to ensure the correct type of data getstransmitted rather than indiscriminately sending all sensed data.

By way of example, predetermined actions may be initiated by thewearable electronic device 100 based on the data acquired from thesensors S₁, S₂, S₃ . . . S_(n) or other peripheral devices 200.Furthermore, such acquired data need not be related to the particularfunctionality of the wearable electronic device 100, PAN P and system 1,such as when they are configured to perform contact tracing or the like.For example, if a detected heart rate of the wearer W is very low, thenthe wearable electronic device 100 could initiate an action to callemergency services instead of sending data to the cloud 500.

In a similar way, various other data discrimination or filteringprotocols may be established within the wearable electronic device 100and PAN P. For example, in more densely-populated situations, a list ofpeople or maximum number of other devices the wearable electronic device100 can “listen in” on may be included, such as by a lookup table or thelike in the memory of the wearable electronic device 100. This could beconfigurable based on various needs, including user input, devicecapacity, mode of operation or the like. Thus, for example, if thewearer W is on a train, it may be undesirable for every nearbyBLE-capable device 200 to share data with the wearable electronic device100. In one form, the wearable electronic device 100 could prioritizeother wearable electronic devices 100 or BLE-capable devices that arewithin the PAN P, as well as on the nature of the information that theseother devices carry. In one form, one could adjust the distance the PANP is around the wearer W, or the number of devices it is monitoring fornew data or the people of those devices.

In addition to allowing the wearable electronic device 100 to determinecertain data acquisition functions based on need, computationalcapabilities of the various parts of system 1 may be configured based ondata processing needs, including how such computational capacity(including data storage, operation of one or more parts of the machinelearning workflow 1000 of FIG. 10 , for example) needs may be met eitherlocally at the wearable electronic device 100 or remotely in other partsof the system 1. In a similar manner, the authors of the presentdisclosure anticipate that such computational and data storage capacitywill become significantly greater in the future as their underlyingchipsets and peripheral equipment adapt and improve over time, possiblyallowing for increasing amounts of computation to take place locally onthe wearable electronic device 100. In addition, when coupled to machinelearning capability, the wearable electronic device 100 may be tailoredto adjust to the behavior of the wearer W, as well as to optimize itsoperation (including battery power usage) for efficiency during aparticular mode of operation.

In one form, the PAN P is configurable to maintain certain preset orother prescribed parameters. For example, in one form, such parametersmay include those which are set by an end user such as a physician,caregiver, data analyst, system administrator or the like. Thus, inaddition to being used for contact tracing, the PAN P may be used toprovide real-time information on maintaining social distancing or thelike in order to fulfill at least a portion of its proximity monitoringfunction. In another form, the PAN P may be configured for resourcemanagement, such as the frequency of transmission between the wearableelectronic device 100 as the FFD and the larger (IP) network or otherbackhaul infrastructure, as well as the adjustment of power-consumingfunctions (which could be initiated either on the wearable electronicdevice 100 or by a remote user, either automatically or by a systemadministrator) such as those tied to frequency or immediacy of certaindata requirements, as well as for energy use throttling in situationswhere excessive energy use has been identified. Similarly, the use ofon-board memory within the wearable electronic device 100 could beadjusted depending on the needs of the data being acquired, in additionto time-sequencing and prioritization of such data such as a preferenceto get the most recent data and deleted older data that could not betransmitted with a particular time allotment.

While in one form the topology between the PAN P and backhaul isconfigured in a star-based configuration, other topologies within thePAN P that may be supported include mesh/peer-to-peer (P2P), clustertrees or the like. As such, at least at the less granular system 1level, there may be hybrid topology attributes, while at the moregranular level, the topologies exhibit their own unique characteristics.In one form, this helps promote how the wearer W of the wearableelectronic device 100 may serve as the focal point for communicationswithin PAN P while also allowing such wearer W to serve as a caregiverfor patients. By way of example in a hospital, residential care facilityor the like, a nurse may have his or her wearable electronic device 100configured as an FFD in order to monitor numerous patients within thefacility who may be wearing their own FFD or RFD devices that aresignally operating within the PAN P. Additional details of the wearableelectronic device 100 acting as part of a star topology may be found inthe previously-discussed US Published Application 2019/0209022, whilemore details of a mesh-based topology will be discussed herein relatingto a geofencing capability of PAN P. Moreover, the wearable electronicdevice 100 may be configured to have different capabilities, dependingon the end use. For example, it can be configured to include one or moreof indoor location tracking, outdoor activity tracking, activitymonitoring, touch-activated buttons (including, for example, a panicbutton), wireless charging and advanced sensor fusing (for gesturerecognition). One such use depicted by the notional interaction of FIG.1 between the wearable electronic device 100 and varioustelecommunication infrastructure is for use for triangulation or relatedlocation-determining or communication services.

Referring next to FIG. 2 , in one form, the cooperation of the sensorsS₁, S₂, S₃ . . . S_(n), wearable electronic device 100 and LPWAN gateway300 form system 1 that is configured for use in tracking the spread of acontagious disease. In a known disease outbreak situation, the locationwearer W may have been identified as having been infected with (or atleast exposed to) the contagious disease. Likewise, other people who maynot be suspected as having been infected may be outfitted with orotherwise have ready access to the one or more BLE-capable devices 200with which low data content messages may be sent or received. In suchcapacity, the BLE-capable device or devices 200 form a reduced functiondevice (RFD) that in contrast to the FFD functionality of the wearableelectronic device 100 can only transmit to the PAN P (such as to thewearable electronic device 100) rather than both transmit and receivewithin the PAN P. As such in this form, the RFD that is embodied in theBLE-capable device 200 serves the role of a simple switch or sensor thatin one form may emulate the functionality of the one or more of sensorsS₁, S₂, S₃ . . . S_(n) disclosed herein and that have no routingfunctionality. In such capacity, the peripheral node or nodes 200 cannotserve as the PAN P coordinator or master in the manner of the wearableelectronic device 100.

A logic device 173 includes a processor 173A, executable instructionsstored in a non-transitory computer readable medium (such as memory)173B, bus 173C, input/output 173D and machine code 173E that in one formmay reside on memory 173B. Significantly, the machine code 173E ispredefined to perform a specific task in that it is taken from a machinelanguage instruction set known as the native instruction set that may bepart of a shared library or related non-volatile memory that is specificto the implementation of the processor 173A and its particularInstruction Set Architecture (ISA). In such circumstance, the ISA actsas an interface between the hardware of the processor 173A and thesystem or application software through the implementation of the machinecode 173E that is predefined within the ISA. The machine code 173Eimparts structure to the successive architectures of processor 173A,logic device 173, PCB assembly 170 and wearable electronic device 100,specifically in the form of a program structure that may be made up of aset of one or more individual codes. Individual portions of the machinecode 173E, such as the machine code to cause a wireless communicationmodule 175 to receive location or event data from a mobile beacon of aperipheral node 200 or the signally cooperative sensors S₁ . . . S_(n)and to transmit the received data using an LPWAN protocol form finite,tangible and identifiable structural limitations to the logic device173, the hybrid wireless communication module 175 and wearableelectronic device 100. Within the present disclosure, and absent anyspecific indication to the contrary, the term “event data” may includeone or both of sensor-derived parameters from the sensors S₁ . . . S_(n)and location-derived data from various sub-modules 175A, 175B and 175Cof the hybrid wireless communication module 175.

The hybrid wireless communication module 175 is made up of at leastfirst, second and third wireless communication sub-modules 175A, 175Band 175 C. The wireless communication module 175 is hybrid in the sensethat it employs various forms of wireless signal receiving andtransmitting. For example, the signals being transmitted from thebeacons 200 as peripheral nodes can be received by a BLE, WiFi, RFID,NFC or related short-range signal-compatible radio that makes up a partof the first wireless communication sub-module 175A, while locationingsignals being transmitted by a GNSS or related satellite-based sourceare received by the radio that makes up a part of the second wirelesscommunication module 175B, and a third wireless communication sub-module175C includes a radio for outgoing (that is to say, transmitted) LPWANsignals from the wearable electronic device 100 and the gateway 300. Itwill be appreciated that any combination of two or more of thesedifferent wireless communication approaches (as well as their relatedsignal transmission protocols) may be within the scope of such hybridwireless communication. Together, the logic device 173 and itsstructural components may cause the third wireless communicationsub-module 175C to preferentially transmit the data received by thefirst wireless communication sub-module 175A when the wearableelectronic device 100 is within a predetermined distance from a sourceof a signal emanating from the corresponding BLE beacon or otherperipheral node 200, as well as cause the third wireless communicationsub-module 175C to preferentially transmit the data received by thesecond wireless communication sub-module 175B when the wearableelectronic device 100 is beyond the predetermined distance from a sourceof the BLE beacon 200 signal.

Within the present disclosure, the BLE-capable devices 200 may eitherform part of a larger system 1 that is based upon the PAN P and wearableelectronic device 100, or in another form as an RFD that the PAN P andwearable electronic device 100 have access to and knowledge of itscomplete configuration. For example, in this latter form, the PAN P andwearable electronic device 100 may have significant identificationinformation of the person assigned to the BLE-capable device 200 that isacting as the RFD. In addition, in situations where one or more of thewearable electronic devices 100 are within communication range with oneanother, their cooperation could provide indicia of them encounteringthe same population of BLE-capable devices 200. As such, contacttracing, proximity monitoring and related tracking may be performed onboth healthy and already-infected people within a larger population witha greater degree of certainty. In situations such as this, additionalsecurity may in one form be achieved through an additional layer ofencryption that would apply to devices and components such as the one ormore BLE-capable devices 200 or other wearable electronic devices 100that are within the communication range of PAN P.

In situations where enhanced levels of user privacy may be required (andin addition to the previously-discussed keys), recordkeeping of thesensed data could be achieved through additional anonymizing steps inorder to correlate particular device ownership without the use ofsensitive personal data (such as social security numbers, residenceaddresses, personal health data or the like). In one form, theBLE-capable devices 200 communicate a fingerprint or relateddevice-specific data package, indicia or signature, such as the UUID,personal UUID, RSSI-based transmission protocol or the like. In oneform, a rotating UUID may be used, where a beacon associated with aparticular peripheral node 200 may broadcast an identifier that changesperiodically. As long as some form of resolving service is coupled tothe beacon to share an encryption key between them, such identifier canbe resolved to stable, useful information. In one form, these devicescould communicate a fingerprint/signature including UUID, personal UUID,RSSI information or the like as part of a recognition process. In oneform, verification of the messages would be sourced through the wearableelectronic device 100 and forwarded to the gateway 300 servers 400 andto the cloud 500. In addition, post-processing of the data may occur atvarious ones of these locations along the way, depending on the intendedend-use of such data, computational requirements, time, expense or thelike. Thus, in situations where the data may need to be anonymized andwhere at least a portion of such data is acquired by third-partyBLE-capable devices 200, cooperative agreements may be formed by workingwith the manufacturers of such BLE-capable devices 200 to correlatesecurity, wearer ownership, data anonymity or the like prior tocontacting or otherwise notifying authorities of a potential diseaseoutbreak. In this way, these third-parties may be thought of as a listof so-called “trusted vendors”, particularly in situations wherethird-party variants of the BLE-capable devices 200 are not advertisingor otherwise broadcasting to the public. Such an arrangement would allowthe wearable electronic device 100 and the trusted vendor to communicatefreely in the transfer of information that could be helpful inmitigating the spread of a virus or other contagious disease. In oneform, such free exchange of information may take place at the cloud 500where personal information would be transferred using highcyber-security assurance such as that available through known encryptiontechnologies. It would also allow the wearable electronic device 100 tofilter the noise of other devices and only focus on the ones of value orthat are involved in the system. In another form, the security may beaffected at the PAN P level such that encryption may take place betweenthe BLE-capable devices 200 and the wearable electronic device 100 in anautonomous fashion.

Referring next to FIG. 3 , in operation, the wearable electronic device100 acts as the source (that is to say, primary, central or aggregator)node that dictates the operation of the PAN P can detect the presence ofother wearable electronic devices 100 and BLE-capable devices 200(collectively, the peripheral nodes) that are in the vicinity using BLEbeaconing and scanning. Upon receipt of information (such as numerouspositive ID tests for a given disease such as COVID-19 or the like), thewearer W may be considered at-risk as a possibly infected person P_(PI)or infected person P_(I).

In one form of contact tracing, instead of streaming all interactiondata to a central database and querying that database when there is aconfirmed (or otherwise positive) case and then notifying other peoplewithin a given at-risk population, the process may proceed in thereverse in a manner generally similar to computer virus softwaredetection and reporting. As can be seen, the nature of communicationbetween the wearable electronic device 100 and other devices such asmobile phones, other wearable electronic devices 100, BLE-enableddevices such as the BLE-enabled devices 200 that are discussed herein,NFC devices, other devices with suitably-equipped communicationprotocols and cloud 500 (which in one form may include numerousdatabases with which to store the acquired data from sensors S₁, S₂, S₃. . . S_(n)) is such that these other devices may serve as beacons. Thedual direction shown by the arrows indicates that information taken fromthese other sources could be sent to the other wearable electronicdevices 100. Various databases contained within the cloud 500 mayinclude a centralized database 510 and a more specific database 520 thatcan cooperate with the data that is collected by the sensors S₁, S₂, S₃. . . S_(n)) and received through LPWAN from the wearable electronicdevices 100, as well as with data taken from other sources as will bediscussed next.

Continuing with the computer virus analogy, periodically (for example,every week, every month or the like), the centralized database 510 maybe used to store information pertaining to all of the known virus cases,such as through digital signatures 600. Through suitable algorithmic orrelated analysis, the cloud 500 may in effect scan itself and thecentralized database 510 to determine from all of the digital signatures600 which ones meet a certain criteria, notably those where a particularvirus or other infectious disease is confirmed (rather than merelysuspected). Based on this analysis, the cloud 500 instructs thecentralized database 510 to push a list of the digital signatures 600 ofinfected persons P_(I) down to the more specific database 520. In thisway, instead of having the centralized database 510 maintain of all ofthe interaction data of every individual everywhere, the more specificdatabase 520 may be used to contain information pertaining to only theconfirmed cases of infected persons P_(I). Then every so often, displaydevices 900 (such as the mobile phone shown) will get an update of thelist of confirmed cases within a given area (for example, within 10miles of a GNSS location of the display device 900). Each display device900 may then store an individual's personal interaction data and comparethe confirmed cases with a history of that individual's personalinteraction data. If a positive match is identified, an alert may begenerated to bring to the attention of the individual associated withthe display device 900 the need to get tested. In one form as shown, thedisplay device 900 may also share this information through knowntelecommunication protocols to the wearable electronic device 100 toalert its wearer W.

In one form, a table of secure history of acquired data from a recentperiod (for example, from the last 14 days) may be stored in memory onthe specific cloud database 520, after which periodic updates ofconfirmed cases of infection may be transmitted back to the wearableelectronic devices 100 for an alert to be generated. In this way, theoverall configuration depicted in FIG. 3 allows the system 1 to beadapted for performing contact tracing or proximity monitoring on one ormore infected persons P_(I) using peripheral devices 200 and the two-waycommunication between them and the wearable electronic device 100.

Thus, in this version as shown, the display devices 900 (as well astheir telecommunication equivalents such as watches, tablets, personaldigital assistants (PDAs) or the like) act as a beacon broadcasting andtransmitting a suitable protocol such as Bluetooth, BLE or other IEEE802.15.4-compatible modes of communication, particularly thoseconfigured for mesh-based interactivity. It is understood that BLE canbe within such phone or smart device, thereby allowing such devices toact as the aforementioned beacons in the manner of the peripheral nodes200. In such circumstance, the wearable electronic device 100 senses theRSSI or related beacon-based signal and converts it to a distance, aswell as receives an anonymous token or related UUID to help identify thedevice from which the transmitted signal is being received. Thisinformation (about who the person is, and distance to the wearableelectronic device 100, person-to-person or the like) may then be sent tothe specific database 520 and then to the centralized database 510. Ifan individual within the population contracts a certain infectiousdisease (such as COVID-19 that is spread by the coronavirus), then thecentralized database 510 is notified after which a notification may besent to people who were interacted with during a certain time with theindividual within the population that has contracted such disease. Inone form, the LPWAN message that is transmitted from the wearableelectronic device 100 to the specific database 520 could be to aBluetooth gateway that then uses a LoRa-based or LoRa-supported)backhaul, as well as to other backhauls, such as WiFi or cellular, ifneeded.

By the operation of the system 1 in the manner depicted in FIG. 3 , thedisease rather than the person is being tracked. In that way, thefunctionality differs from that of tracking the location of anindividual wearer W as discussed elsewhere herein, as well as in USPublished Application 2019/0209022.

A geofence G may be formed around the various devices that make up PAN Pas a way to provide privacy-enabled virtual location boundary alertswhen other devices (including other wearable electronic devices 100being worn by other individuals) move beyond or within a pre-establishedrange. As shown, the geofence G may define various locations within itsboundaries at a particular site, including that of the wearableelectronic device 100 as a source node location, a range or distance(such as an RSSI or related straight-line distance) from the wearableelectronic device 100, a communication range of the various non-source(that is to say, peripheral) nodes 200 within the PAN P, transmissiontimes for message information, hop limits or the like. In one form, thegeofence G may be defined as a static one to surround a physicalstructure within a given site, such as a building or similar structure.Although the geofence G is notionally shown having a rectangularboundary, it will be appreciated that such shape is non-limiting, andthat geofence G may be defined as having any shape, whether geometricalor arbitrary. In another form, the geofence G may be defined as adynamic geofence G consistent with the mobile nature of the wearableelectronic device 100. Thus, unlike a static geofence G, the dynamicversion of the geofence G may adapt to changing circumstances, which inturn provide a more accurate representation of other devices coming andgoing out of the PAN P. Geofence G may acquire location information forthe source node wearable electronic device 100 or thenon-source/peripheral nodes 200 through absolute or relative frames ofreference. For example, an absolute frame of reference includes thoseavailable through a global navigationsatellite system (GLASS), while arelative frame of reference includes those from localized sources suchas RSSI, RFID, multi-beacon triangulation or the like.

In one form, the wearer W need not have been an infected person P_(I),but instead could be anyone in a community, locality or region ofinterest. In such a circumstance, the wearer W may be able to trackelderly individuals, children, physically or mentally handicappedpersons or other people of interest in large, dense crowds such as atsporting events, cultural, religious or civic gatherings, or the like.In these high human density environments, the venue could be populatedwith multiple gateways 300 using their well-known positions andtriangulation methods in order to help monitor the location of anat-risk population or other people of interest. Such a configuration mayalso be useful in establishing absolute (or near-absolute) location forcontact tracing, quarantine monitoring and enforcement or the like insituations where the risk of a contagious disease spread is imminent oridentified. In such circumstance, the wearable electronic device 100could pick up any signals from nearby peripheral devices 200 as thewearer W moves about. In such a scenario, the wearable electronic device100 acts as a mobile aggregator of BLE signals that it is receiving fromthese RFID-emulating BLE-capable devices 200, ingesting data and thenconveying such data via the LPWAN gateway 300. In one form, the wearableelectronic device 100 could ingest data in one of various ways, such as(i) encountering another wearable electronic device 100 that is withincommunication range, (ii) as a BLE-capable device 200 that in one formmay function similar to a nurse call ID beacon, room beacon, elopementbeacon or the like and (iii) as another external BLE-capable device 200with fingerprint/signature capability through RSSI, UUID or the like. Inthe configurations depicted in both FIGS. 2 and 3 , distance or relativelocation between the wearable electronic device 100 and one or moreother wearable electronic devices 100 and peripheral devices 200 may bedetermined through various algorithmic approaches, such as coordinatetransformation computations that use various RSSI, triangulation ortrilateration approaches.

If the wearer W has been identified as having a particular conditionsuch as a contagious disease that may require some measure ofquarantining, and has in fact been confined to their home, a geofencing(or virtual boundary) capability of the wearable electronic device 100can be employed in order to provide data (suitably transformed intodistance or location) that is useful to an end user. This in turn allowswearers of BLE-capable and related peripheral nodes 200 to be signaledthrough the PAN P that they may be at heightened risk for infectionthrough proximity to the infected wearer's wearable electronic device100. Likewise, governmental authorities or other decision-makers may besignaled that other such wearers of the BLE-capable devices 200 may beat risk. In one form, when family members must self-segregate, PAN Pcould help alert other members of the family that they are getting tooclose to one another; as mentioned elsewhere within the presentdisclosure, such alerting may take place through haptic motors, visualor audio alarms. In a similar manner, nursing home, group home or prisonpopulation segregation may be better enforced. As such, besides usingthe wearable electronic device 100 for analyzing the change in anindividual's health condition (including infected portions of a givenpopulation), other applications, such as for firefighters, schools(particularly those that deal with autistic children), militarypersonnel, construction workers, police officers, emergency medicaltechnicians (EMTs) and prison inmates or the like are also within thescope of the present disclosure. References in the present disclosure tothe various forms of the wearable electronic device 100, as well as tothe previously-mentioned aspects, are meant to indicate that such formsor aspects may include one or more particular features, structures orrelated characteristics particular to the end-use need, but that eachsuch form or aspect need not necessarily include all such particularfeatures, structures or characteristics, and that any claimedcombination of such features, structures or characteristics in part orin their entirety as described herein is has a basis in—and is thereforedeemed to be within the scope of—the present disclosure.

In one form, the static version of the geofence G may be enabled bybeacons placed at points of ingress or egress, such as doors or windows.In another form, beacons may be placed on adjoining properties, such ason a neighbor's residence. In one form, such alerting as to a breach(whether ingress or egress) of the geofence G may again be throughhaptic, visual or audio means within the PAN P, as well as having theinformation sent to the backhaul after which a text message is thengenerated and sent to the person or persons of interest, keeping in mindthat such an approach is slower than when sending the messageexclusively within the PAN P. In one form, the peripheral devices 200disclosed herein may possess the necessary beacon capability, while inanother form, stationary or other mobile beacons as discussed in USPublished Application 2019/0209022 may be used to assist the wearableelectronic device 100 and PAN P in its geofencing functionality. It willbe appreciated that while the beacons that may make up one or more ofthe peripheral devices 200 are generally understood within the presentdisclosure to be of a mobile variant (in that they may be affixed to aperson, animal, robotic drone, or other readily-movable host), there isno need that all such beacons must be. For example, one or more of thebeacons may be stationary (such as those that are affixed a buildingwall, or on permanently-installed equipment), and that either variant iswithin the scope of the present disclosure.

As mentioned previously, PAN P may in one form be configured to havemesh topology for use in the geofence G and related tracking. Within thepresent disclosure, a node within a mesh network is any signalconnection point that can receive, generate, store or transmit messageinformation along one or more routes that are defined within thenetwork. Regardless of whether each node is a source node or anon-source mode, it is clear from the figure that they may be situatedat different locations within PAN P. The wearable electronic device 100generates messages and related information for exchange with these oneor more non-source nodes 200 within the geofence G as long as thesenon-source nodes 200 are within communication range of the wearableelectronic device 100. In response, one or more of the BLE-capabledevices 200 and one or more sensors S₁, S₂, S₃ . . . S_(n) may be madeto respond to the geofenced information such that they can then transmitsuch information for reception to other BLE-capable devices 200 and oneor more sensors S₁, S₂, S₃ . . . S_(n) that are within a communicationrange of the particular non-source node 200 that is initially receivingthe information from the wearable electronic device 100. Moreover, whenconfigured as a mesh network, the various BLE-capable devices 200 andremote sensors S₁, S₂, S₃ . . . S_(n) may assume additional hierarchicalattributes; for example, a first of the BLE-capable devices 200 mayreceive the geofenced message information from the wearable electronicdevice 100 and then retransmit such information for reception by one ormore other downstream non-source BLE-capable devices 200 that are withincommunication range of the first non-source BLE-capable device 200. Inaddition, the first of the BLE-capable devices 200 may determine whetherits location is within the geofence G.

As previously mentioned, location or position information of theBLE-capable devices 200 and remote sensors S₁, S₂, S₃ . . . S_(n)relative to the boundary of geofence G may be determined by variousindoor or outdoor approaches, such as through (at least in outdoorgeofence G situations) GNSS or related global positioning system (GPS),information provided by one or more fixed beacons or other approaches asdisclosed in US Published Application 2019/0209022, while an indoorequivalent to geofence G may rely upon RSSI, triangulation or otherknown means. Based on information received from one or all forms of suchindoor and outdoor sources, the location of the BLE-capable devices 200and remote sensors S₁, S₂, S₃ . . . S_(n) relative to the boundary ofthe geofence G may be ascertained with a relatively high degree ofaccuracy.

In one form, the wearable electronic device 100 could be placed on arobotic device (such as a drone or autonomous vehicle) in its dataaggregation capacity. Such an approach could be particularly beneficialfor situations where a disease outbreak is either suspected or alreadyunderway, thereby reducing unnecessary exposure of health-care workersand other personnel that are either tracking or responding to theoutbreak.

Referring next to FIG. 4 , a perpetual circle showing how to control thespread of a communicable disease or related event through a combinationof mitigation, detection, identification and containment. Theidentification component of the perpetual circle can be in the form ofcontact tracing and other functions discussed herein through the use ofthe wearable electronic device 100, system 1 and PAN P. With theknowledge gained through the identification component, mitigationactivities such as the use of personal protective equipment (PPE),adhering to social distancing guidelines and (in the case of individualswho are in a group environment) visitor control. Likewise, detection mayinclude the use of testing, temperature screening and symptommonitoring. Lastly, containment may be in the form of isolating exposedindividuals and quarantining positive cases. Because the wearableelectronic device 100 may be used to track and perform contact tracing,while the dashboard 700 and contact report 800 (both as discussed asfollows) may be used to document and inform interested individuals.

Referring next to FIGS. 5A through 5D, an example of a conventionalapproach to performing contact tracing is shown. Referring first to FIG.5A, Ann, a nurse at Daisy Senior Living Facility, is exposed toSARS-CoV-2 on Monday, June 1. This is indicated as Day 0 on thehorizontal timeline. It has been previously reported that due to knownincubation periods, it may take approximately five days for Ann to begindeveloping any symptoms. Referring next to FIG. 5B, by Friday, June 5,Ann notices a runny nose and sore throat that she attributes to herallergies. Her temperature at this time is normal. While she doesn'trealize it, this is the day that Ann is most infectious. Referring nextto FIG. 5C, by Saturday morning, Ann has developed a fever and suspectsthat she may have COVID-19. She alerts her supervisor at Daisy SeniorLiving and goes for a COVID test. Unfortunately, her COVID test resultswill take a few days and the Director of Nursing that is in charge ofcontact tracing will not be back at Daisy Senior Living until Monday.Referring next to FIG. 5D, Ann's test comes back positive, and theDirector of Nursing interviews Ann and also reviews last week's nursingassignments for the residents in order to determine who may have beenexposed. During the interview, Ann recalls helping Charly with dinnerbut does not recall her brief but direct contact with Betty.

Referring next to FIGS. 6 through 9 in conjunction with FIGS. 1 and 3 ,use of the wearable electronic device 100 to overcome the shortcomingsof the conventional contact tracing of FIGS. 5A through 5D is shown. Inparticular, by automating the contact tracing process, large teams ofpeople, along with the concomitant potential for missed or incorrectlyassessing a potential disease-spreading scenario are reduced or avoided.In this way, the accuracy with which contact tracing, proximitymonitoring and hotspot detection on an infected person P_(I) (such asAnn from the example discussed in conjunction with FIGS. 5A through 5D)is shown. In one form, it is important to keep data associated with thepotentially infected person P_(PI) confidential and secure, as not allcases identified as being potentially infected are in fact infected.Moreover, in certain circumstances, it may be important to keep dataassociated with the infected person P_(I) similarly confidential andsecure. One way to determine if an individual is infected is to subjectthe individual to testing or other procedures. Upon testing and theattainment of certain metrics (some of which may be determined by themachine learning models and analysis discussed herein), the potentiallyinfected person P_(PI) may be labeled or otherwise identified as testingpositive and thus designated as an infected person P_(I). In any event,all individuals who have been tested may be given a digital signature600.

Referring with particularity to FIG. 6 , a dashboard 700 may be used toprovide displayed-based information of an event or analysis (includingmachine learning analysis) of an event. In one form, the dashboard 700is configured as a web-based enterprise dashboard that can be customized(such as for a system administrator) to better manage devices, users,reports or the like. In one form, the dashboard 700 may be used forregistration functions, including configuring an event-basedregistration such that attributes associated with people, locations,timing, incidents, adjacent environment and related content for aparticular situation may be collected, recorded and categorized so thatprofiles may be generated for subsequent use. In one form, the dashboard700 may be used to provide user-defined rules for the detection,proximity monitoring, contact tracing and hotspot monitoring discussedherein. In this way, when a disease outbreak occurs within a localcommunity, the system 1 automatically generates a report of allindividual that were within certain criteria thresholds such as one ormore of minimum distancing, duration or the like.

Referring with particularly to FIG. 7 , a contact report 800 may begenerated and sent to the display device 900 (such as a mobile phonescreen or the like) for viewing. In one form, the dashboard 700 of FIG.6 may be used to help configure information provided to the displaydevice 900. For example, if the display device 900 is an employee'smobile telephone, a mobile API can be used to work in conjunction withthe dashboard 700 to provide employee access to risk levels based onidentified interactions, analyze past interactions, provide testingresources, healthcare provider contact information or the like. In oneform, the report can be run for a specific case or group of contacts.The report 800 can be made to connect with an electronic medical record(EMR) or a case management software. The report 800 may also aggregateor display information from a nearby public health authority (PHA) orrelated organization that is tracking the spread of particular disease.In this way, once a case of an identified or identifiable diseaseoccurs, the system 1 can automatically notify all close contacts throughe-mail, SMS, texts, telephone calls or the like. In one form, additionalfunctionality such as periodic check-ins with the infected person P_(I),visitor management or the like is also provided.

Referring with particularly to FIG. 8 , the contact report 800 may be inthe form of a notification 810 that may be generated and sent to thedisplay device 900 that is presently within the infected person's PAN P.In one form, the same display device 900 may receive the message if suchdisplay device 900 was determined to have been within the infectedperson's PAN P of the infected person P_(I) within a preset prior timeframe. In one form, use of one or more of the wearable electronic device100, system 1 and PAN P automatically identifies direct contacts, closecontacts and proximate contacts. By way of example in a healthcarefacility context where nurses and other employees that are expected tohave interaction with patients or residents have access to theinformation being generated by such wearable electronic device 100,system 1 and PAN P, such information may be used to allow the nurse orother employee to quickly generate the contact report 800 or itsassociated notification 810.

Referring with particularity to FIG. 9 , a thermal map hot-spot is shownoverlaid on a multi-room building B. This shows the frequency with whicha wearer W that is associated with the wearable electronic device 100spends in a particular location, where such amount can be one or both ofan aggregate of the number of times the individual visits a particularlocation as well as the amount of time (for example, in seconds, minutesor hours) spent in such location. For example, if the location isindicated to be a bathroom, and sensor data additionally acquiresmovements consistent with tooth brushing (such as turning on a waterfaucet, reaching for a toothbrush or toothpaste, and repeated smallmovements adjacent the individual's mouth), an inference can be drawnthat the individual is brushing his or her teeth. In another form, ifcertain devices within the building B are configured with IoT capability(such as a smart toothbrush, to continue the present example) such thatthey can form one or more of the peripheral nodes 200, the wearableelectronic device 100 and is associated PAN P can sense such data andproceed accordingly. It will be appreciated that such ability to acquirean individual's movement and location data is particularly helpful whenother sources of wireless signal transmission (such as WiFi) are notavailable due to location, signal blockage, depth below ground orthickness of the building B or the like.

Referring next to FIG. 10 , a flow diagram of how the wearableelectronic device 100 and the data acquired therefrom may be used todevelop a machine learning model. In one form, the machine learningmodel and related algorithms and approaches disclosed herein may be partof a larger endeavor known as human-in-the-loop (HITL) learning whereadditional insights gleaned from the human labeling or annotation of atleast a portion of the data is used along with subsequent (oftenempirically-based or experienced-based) validation, particularly duringtraining and associated testing activities.

In particular, the flow diagram forms a program structure in that it isdepicted as an ordered sequence of particular and tangible stepsassociated with the previously-mentioned machine learning workflow 1000.In one form, this ordered sequence may be used to provide predictiveanalytics to assist in contact tracing or related diagnoses as discussedherein. This sequence may include one or more of the following steps:(1) a raw data acquisition (first) step 1100; (2) a raw data cleansingor preprocessing (second) step 1200; (3) a feature extraction (third)step 1300 of derived values which may include placing the data intofeature vector or related form; (4) a training (fourth) step 1400 foriterating the machine learning algorithm through testing, calibration or(in the case of HITL) additional insights gained from human experienceor other observations; and (5) a model use or (fifth) step 1500 withwhich to operate the trained machine learning model on some or all ofthe acquired data in order to draw inferences from such acquired data.It will be appreciated that the first three steps 1100, 1200, 1300, asthe data management portion of the machine learning workflow 1000, maybe performed independently—as well as part of—the training step 1400 andinference step 1500 for any particular machine learning-based analysis.Likewise, some or all of these steps may be performed on a remotecomputing platform, where at least the first, second, third and fifthsteps may be performed either on the wearable electronic device 100, andthat all such variants are within the scope of the present disclosure.In one form, the process of converting data that is taken from sensorsS₁, S₂, S₃ . . . S_(n) into a form suitable for use in a machinelearning algorithm may form part of an activity known as extraction,transformation and loading (ETL) that may make up part of thepreviously-discussed second and third steps 1200, 1300 of the machinelearning workflow 1000. Within the present context, ETL may be used todecompose multi-sensor data into a suitable feature vector within agiven feature space.

The use of the information generated by collection of sensed data (suchas the aforementioned LEAP data, including data acquired by the varioussensors S₁ . . . S_(n)) by the wearable electronic device 100 and PAN Pmay be done in a spatio-temporal way that helps to better perform a timeseries analysis to in turn better identify the likelihood of spread of acommunicable disease. In one form, the time series nature of theacquired data (for example, ambulatory data) can be subjected topredictive analytics (including analytics arising out of the use of oneor more of the machine learning models discussed herein) as a way topredict or otherwise forecast arbitrary future location, activities orbehaviors.

Such temporal data may include—in addition to time stamping—frequency ofoccurrence, duration of occurrence, elapsed time between occurrences,running averages of occurrences or the like. In one form, themeasurement of the temporal data helps in establishing norms, such asthose that may form part of an inter-patient or intra-patient baselinedata. This indexing of the data over the time dimension is valuable inhelping to identify movement traits, patterns or the like that in turnmay be correlated to interactions with other people and which may bringto bear additional data for the determination of a possible spreadingevent. As with other forms of acquired data, the temporal data may besubjected to a feature extraction process (such as included in stepthree of the machine learning workflow 1000) in order to allowcomparison of potentially disparate pieces of information. For example,because various activities S₁, S₂, S₃ . . . S_(n), it may be beneficialto recognize such activities over one or more time-sampled slidingwindows. Because the received data is unlikely to be identical (even forthe same individual performing the same activity), it may be helpful touse statistical or structural filters in order to transform the raw datainto a set of feature vectors for each given window.

Referring next to FIG. 11 , a program structure 2000 in the form of aflow diagram of how to perform at least one of contact tracing,proximity monitoring and hotspot detection is shown. Although not shown,it will be appreciated that the geofence G of FIG. 3 may be set up inaddition to—or in place of—one or more of these functionalities. In oneexemplary form, the flow diagram forms the program structure 2000 whilevarious arrays (including multidimensional arrays) of event data, linkedlists, trees or the like form data structures. Both of these forms ofstructures constitute specific, tangible features or elements that mayrecited in one or more of the claims and that help to illustrate thearchitecture and operation of the various forms of the wearableelectronic device 100, PAN P and system 1. Thus, by describing thevarious computer software elements in conjunction with the variousfunctional activities that are depicted in the flow diagram of FIG. 11(as well as all related flow diagrams that are not presently shown butthat correspond to particular contact tracing, proximity monitoring,hotspot identification or geofencing activities as discussed herein),the machine code 173E cooperates with one or both of the processor 173Aand memory 173B to perform a set of particular manipulations of theacquired event data (including its LEAP data variants) to constrain theoperation of one or both of the wearable electronic device 100, PAN Pand system 1 in a particular way for the purposes of identifyingpatterns that may be useful in preventing the spread of a communicabledisease.

Initially, event data is received from one or more of the peripheralnodes 200 (which may correspond to one or more devices associated with,carried by or worn by other people) into the wearable electronic device100, this is shown as event 2100. Second, proximity risk data may beanalyzed based at least in part on location data that corresponds to adistance between the wearable electronic device 100 and the peripheralnode (or nodes) 200, this is shown as event 2200. Next, an inquiry maybe made in event 2300 may be generated to determine if social distancingguidelines are satisfied by the proximity risk data. In the event thatsuch distancing guidelines are satisfied, no further proximitymonitoring may be needed, as shown in event 2400, while event 2500 showsthat an alert be sent in the event that social distancing guidelines arenot satisfied by the proximity risk data. Event 2600 includescorrelating information that uniquely identifies particular ones of theperipheral nodes 200 to infection data (such as that from the cloud 500or other remote database) in order to determine at event 2700 whether ornot a contact risk has been confirmed. Depending on whether there is oris not a risk determines whether the inquiry returns to event 2300 orterminates at event 2800).

In one particular form (not shown) of the program structure 2000, amethod of contact tracing may include configuring a wearable electronicdevice to form a source node for a personal area network, determining,by the wearable electronic device, if at least one peripheral node iswithin wireless signal communication of the personal area network,acquiring, by the wearable electronic device, event data that is beingtransmitted thereto from the at the least one peripheral node,wirelessly transmitting, by the wearable electronic device, at least aportion of the acquired event data to a receiver using an LPWAN that isenabled by the wireless communication module, wirelessly receiving overthe LPWAN, by the wearable electronic device, information pertaining toa first individual, correlating, by the wearable electronic device, theinformation pertaining to the first individual to the at least oneperipheral device and in the event that the correlation establishes apositive match, informing, by the wearable electronic device, a secondindividual that such second individual is at risk of being exposed to acommunicable disease.

As previously discussed in conjunction with FIG. 1 , the wireless signalconnectivity between the wearable electronic device 100 that forms thePAN P may be used to form a geofence G, including either of theaforementioned static or dynamic variants. As noted, geofence G may beused to perform zone or proximity monitoring so that when the wearableelectronic device 100 enters or exits a designated region that isdefined by the geofence G or is within a preset distance of certainsignally-cooperative components, signal communication between thewearable electronic device 100 and such components is enabled. In oneform, this dynamic interaction takes places when the wearable electronicdevice 100 is affixed to the wearer W such that his or her movementpatterns may be made to coincide with the geofence G. As will beapparent from FIGS. 1 and 3 , proximity data related to the geofence Gflows from the wearable electronic device 100 through an LPWAN-basedprotocol and gateway 300 and associated backhaul such as the servers 400or cloud 500 to these or other remote locations for collection, storage,analysis, visualization or the like.

Moreover, and as previously mentioned, the wearable electronic device100 may take on various form factors, depending on to whom or what it isto be affixed, attached, secured or otherwise associated. Likewise, asdiscussed herein, in some embodiments or configurations, the wearableelectronic device 100 may take on various form factors that areunrelated to those affixed to or otherwise associated with a humanwearer W, and as such may be either stationary or mobile so long as itremains in signal communication through its multimodal wirelessfunctionality with such machinery, equipment, device or other asset.Thus, there may be numerous wearable electronic devices 100 in servicesimultaneously within a particular industrial setting (such as the PAN Pamong others, as will be discussed in more detail as follows) such thatone or more may be worn by respective wearers W as mobile form factorswhile others are affixed or otherwise secured to a particular piece ofmachinery or equipment as a static or stationary form factor. It will beappreciated that in some embodiments where the wearable electronicdevice 100 is affixed or otherwise situated on or near a particularindustrial asset, it may assume a non-wearable form, including thosewith supplemental means with which to affix it to such asset. Suchsupplemental means may include adhesives, fasteners or other related andknown approaches. In such form factors, each is still referred to as thewearable electronic device 100 notwithstanding that it is not actuallyworn by an individual.

Referring next to FIGS. 12 through 18 , it is with the foregoing in mindthat the authors of the present disclosure have discovered that it ishelpful to define secure, objective criteria by which individualworkers, managers, safety compliance or other interested personnelassociated with the industrial setting can make a data-informeddetermination about when it is safe for individual workers (such asservice technicians or the like) to gain access to various industrialassets, including those within or that make up a hazard-proneenvironment (HPE) 3000 where—among others—excessive risks of bodily harm(such as due to mechanized equipment), toxic exposure (whether gaseous,liquid, powder or the like), electrical shock or unavailability ofbreathable air may be present.

Referring with particularity to FIG. 12 , a communication network 4000formed by the wearable electronic device 100 of FIG. 2 is particularlyadvantageous in situations within an industrial setting where a workeris placed in the HPE 3000. In a similar manner, remote monitoringthrough the communication network 4000 is particularly useful insituations where connected devices or nodes (shown presently as sensorsS₁, S₂, S₃ . . . S_(n) in a manner similar to those previouslydescribed) that are in signal communication through the PAN P areequally inaccessible, as well as in situations involving other connecteddevices that don't require hands-on human interaction for their normaloperation. It will be appreciated that in situations such as these, thebeacons as discussed herein may be affixed or otherwise placed adjacent(that is to say, in, on or next to) such HPE 3000, such as shown withparticularity in FIG. 13 . In one form, the beacons such as the sensorsS₁, S₂, S₃ . . . S_(n) and related peripheral nodes 200 are so-calledIoT-compatible “smart” devices that may possess optional embedded dataprocessing and other so-called “intelligent” functionality) and may beconfigured as either mobile or stationary devices, depending on the rolethey play in data gathering within the HPE 3000.

Industries where the communication network 4000 is particularly usefulinclude construction, manufacturing, oil & gas, mining, pharmaceuticals,food and beverage, automotive, aviation, railroads and utilities.Relatedly, examples of industrial settings where such HPEs 3000 may beencountered include those associated with chemical or nuclear processingequipment, mining and related mineral extraction, oil & gas (includingone or more of extraction, refining, transportation or storage, as wellas offshore oil platforms) or related energy production facilities(including electric power utilities and related grid electric demandmanagement), steel plants, automobile assembly lines, wastewatertreatment facilities, order-fulfillment facilities, scrap metalrecycling facilities or the like. It will be appreciated that all ofthese industries and individual industrial settings, as well as how theHPEs 3000 are used therein, are within the scope of the presentdisclosure.

In the form shown for the HPE 3000, the sensors S₁, S₂, S₃ . . . S_(n)or other peripheral devices may be configured to detect one or moregases such as carbon monoxide (CO), hydrogen sulfide (H₂S), oxygen (O₂)deficiency and combustible (LEL) gases, among others. Likewise, forapplications in the chemical process industries (CPI), mining or the oil& gas industries, such devices may be configured as other types ofportable gas monitors as understood by those skilled in the art.Furthermore, in manufacturing industries, such devices may be configuredto detect rotary or reciprocating motion of motors, pumps, fans,compressors or the like. Moreover, such devices may be configured assensors, detectors, transducers or the like for detecting a physicalpresence such as flame, metals, leaks, levels or gas and chemicals,among others while—as previously noted—some are configured to sensephysical properties such as temperature, pressure, radiation, humidity,sound or the like may be sensed and signally communicated, while stillothers can detect motion or proximity. In one example, the device is avideo camera with computer vision and edge processing capability suchthat upon detection of one or more events, it could then send thereceived (and optionally analyzed) signal out as another form, therebyacting as another sensor or signal-generating device. In such case, thecamera could detect an event thing with a high degree of confidence, andbecause it need not be connected to the internet, it can process thereceived data locally and then report it out. It will be furtherunderstood that these and other devices may operate in a variety ofmanners and upon various measurable quantities selected from variousfields such as electromagnetic fields, optics or others, and thatsensors so configured are within the scope of the present disclosure.

As previously noted, the communication network 4000 is a wearableelectronic device 100-centric network that includes one or more of thePAN P, the IP network IP and the LPWAN LP as sub-networks. In a mannersimilar to the relationship depicted in FIGS. 1 and 3 between thewearable electronic device 100 and the other devices within the PAN P,wireless signal communication takes place between the wearableelectronic device 100 as a source node and data-generating orinstruction-receiving peripheral nodes when these other devices areconfigured as part of a BLE, WiFi, RFID, NFC or related short-rangecommunication functionality protocol. Significantly, the LPWAN LPsub-network acts as the backbone of the communication network 4000 inthat it forms the intermediary between the IP network IP as onesub-network and the PAN P as another sub-network through at least onegateway 300 and the wearable electronic device 100 source node. In thisway, various forms of registration and credential information (includingpersonal and related identifying data of the wearer W as well as IDtoken or related UUID of the peripheral nodes or devices or comparableidentification of a particular one of the wearable electronic devices100) are exchanged between the corresponding devices within thecommunication network 4000 as well as with the facility administrationportal 5000. In this way, the combined wearable electronic device 100device registration and user credentialling process associates the userand the device such that for the purpose of servicing, installation,inspection or related activities that are commensurate with the user'sofficial duties, the user is qualified to work inside a particular HPE3000 while wearing the device.

It will be appreciated that the present depiction of some or all of theequipment associated with the backhaul (including one or more of theservers 400 and cloud 500) may be part of either a centralized ordistributed architecture the latter of which being where the variouscomponents may physically reside in disparate locations. Regardless ofthe physical situs of such equipment, it will be understood that theinclusion or exclusion of one or more pieces of such equipment as beinga part of the facility administration portal 5000 will be apparent fromthe context. Examples of such software include that used for systemadministration or management, as well as that used for a kiosk 3900 forcredentialling a person (for example, a service technician) andassociating or otherwise coordinating him or her to a particular one ofthe wearable electronic devices 100. Thus, in one form, at least some ofthe data generated at the edge, such as within the wearable electronicdevice 100 or the PAN P, may be operated without recourse to thefacility administration portal 5000. In such edge-related form, databeing generated and conveyed may achieved through either the PAN P aloneor the PAN P in conjunction with the LPWAN LP-based portion (that is tosay, sub-network) of the communication network 4000. It will further beappreciated that control of at least portions of the communicationnetwork 4000 or a system working in conjunction therewith may reside inthe backhaul. Such control may be effected by local or remoteapplication-based software (including that used to authenticate,authorize and grant access to a user), as well as that to control HMIs,identification and operation of the machines, devices or equipment thatmake up the HPE 3000 (including safety states or the like),facility-specific rules and procedures (including those specific tolockout/tagout), other guidelines, procedures or regulations (such asthose implemented by the United States Occupational Safety & HealthAdministration (OSHA)), National Fire Protection Association (NFPA,including its Standard NFPA 70E), SIL 3 per IEC 61508-1, the JointCommission on Accreditation of Healthcare Organizations (JCAHO), theMine Safety and Health Administration (MSHA) or the like, training,credentialling or related certification, operation of various energyisolating devices and control of parameters associated with operation ofthe LPWAN protocol (such as controlling one or more of the adaptivecharacteristics of the wearable electronic device 100), among others.

Referring with particularity in FIG. 13 , details of the HPE 3000 areshown presently as a confined space (also referred to as a permitdefined space, a permit-required confined space or the like) 3010, wherea continuous monitoring process of the wearer W who is inside takesplace. In one form, the continuous process takes place only after thepre-entry (PE) process (that will be discussed in conjunction with FIG.16C) has taken place. Within the present disclosure, the confined space(as defined by OSHA) may include tanks, vessels, silos, storage bins,hoppers, vaults, pits, manholes, tunnels, equipment housings, ductwork,pipelines or the like, as well as other situations such as cabinets inserver farms, valuable item storage, inventory control or the like whereaccess may be limited such as through cordoned-off or fenced-in areas,individual rooms within a larger space or the like. In addition tohaving potentially compromised atmospheres, confined spaces 3010 mayalso be dark, as well as located in out-of-the-way places where responsetimes (in the event of an emergency) could be lengthened. An accessportal 3100 that in one form may have a door or related cover 3200 thatwhen closed restricts the passage of the wearer W into or out of theconfined space 3010. Within the present disclosure, the door 3200 may bein the form of a door, flap, lid or related structure (including hingedvariants of each) as is known to those skilled in the art such that whenplaced relative to the access portal 3100 in order to block a paththerethrough, the latter becomes a covered access portal. A ventilationsub-system 3300 is shown where air or other gas exchange between theinside and outside of the confined space 3010 takes place. An extensibleprobe, wand or related data-gathering device 3400 may be inserted intothe confined space 3010 (such as through the door 3200 of access portal3100). In one form, the extensible probe 3400 functions as a multi-gasmeter such that airborne various toxins and gas levels may be detected.In one form, a so-called “buddy system” may be used such that aco-worker CW may be situated adjacent—but outside—the confined space3010. As shown, the co-worker CW may use the extensible probe 3400 withwhich to either continuously or frequently monitor the atmosphere of theconfined space without having to subject the co-worker CW to the samepotentially hazardous conditions as that of the wearer W. In fact, underOSHA guidelines, atmospheric testing (such as that which may beaccomplished by the extensible probe 3400) must be performed in thefollowing order: first for oxygen, second for combustible gases andthird for toxic gases and vapors. It is understood that the co-worker CWis monitoring the safety of the confined space 3010, as well as to helpif an emergency arises, in addition to calling for backup assistance ifnecessary. Although not shown, it will be appreciated that othersub-systems that perform supporting or ancillary functions for theconfined space 3010 in a manner generally similar to the confined spaceventilation sub-system 3300 may also be configured as a peripheraldevice or end node 200, as may other equipment associated therewith,such as motors, pumps, valves, linear actuators, rotatory actuators,switches or related equipment that would ordinarily be found within theindustrial setting. Although not shown, it is understood that suchequipment is deemed to be within the scope of the present disclosure.Relatedly, in one form (as shown) the co-worker CW is also equipped withhis or her own wearable electronic device 100; in this way, theco-worker CW not only may participate in the PAN P but may also use thewearable electronic device 100 to form a separate PAN P (not shown). Inone form, this could enable the co-worker CW to conduct variousprocessing and logic checks before a pre-entry test PE that is similarto that of FIG. 16C is passed.

As shown, the wearer W (who has been granted access) is further wearingappropriate personal protective equipment PPE that itself may includevarious sensors S₁, S₂, S₃ . . . S_(n) or other devices or end nodes 200such as atmospheric or gas sensors, physiological sensors (such as forheartrate, breathing rate, body temperature or the like) that can havetheir measured values sent by or to the wearable electronic device 100(as depicted in FIG. 1 ) to determine if the values are within anacceptable range. In this way, they are able to collect, measure, detector receive one or more of health and environmental data that could beprocessed to show potential health or exposure risks. Likewise, thesensors S₁, S₂, S₃ . . . S_(n) or other devices or end nodes 200 may beused to measure the concentration of a flammable gas, measuring anenvironmental characteristic (sch as temperature) of the surroundingatmosphere. As previously noted, the interior of the confined space 3010may be dark. In such case, one of the sensors S₁, S₂, S₃ . . . S_(n) orother devices or end nodes 200 may be used to detect such darkness suchthat the wearable electronic device 100 or backhaul may be prompted intoturning on a light that is situated on the wearable electronic device100 or on a signally-cooperative peripheral node within the PAN P) toenable the wearer W to see better. In addition, these or other sensorsS₁, S₂, S₃ . . . S_(n) or other devices or end nodes 200 in or aroundthe confined space 3010 may also monitor the operational state ofcertain equipment may be assessed by monitoring components or parameterssuch as motor, air flow, rotation rate, or other appropriate indica ofhow well facility-installed ventilation equipment is performing suchthat alerts, warnings or related notifications may be sent to the wearerW or an attendant designated to monitor the confined space. As with thewearable electronic device 100, the personal protective equipment PPEmay be provided by appropriate facility personnel upon completion of theauthentication process by the worker such that he or she becomes thewearer W as previously discussed. Upon having been authenticated (aswill be discussed in conjunction with the authentication process of FIG.15A), authorized (as will be discussed in conjunction with theauthorization process of FIG. 15B) and passed HPE 3000 logic andpre-entry requirements (as will be discussed in conjunction with thepre-entry test process of FIG. 15C), the wearer W (or his or herco-worker CW in situations where the buddy system is used) sets up andstarts the access-granting process (depicted in conjunction with FIGS.16A and 16B) in order to engage in the continuous monitoring process ofFIGS. 13 and 17 .

During operation of the communication network 4000, the wearableelectronic device 100 receives a message from the confined spaceventilation sub-system 3300 indicating that it is operational. Theoperational state may be assessed by one or more of the sensors S₁, S₂,S₃ . . . S_(n) or other devices or end nodes 200 in order to monitor themotor, air flow, rotation rate, current use or other appropriate indica.In this way, if the operational state becomes unacceptable (such as bycomparison of the sensed parameters to a database, lookup table or thelike), the wearer W (or the co-worker CW) is notified through one ormore of the wearable electronic devices 100, lighting (or other similarvisual indicia), acoustic alerts (such as a siren or the like) or otherforms of messaging. In one form, the extensible probe 3400 is configuredas a handheld atmospheric gas meter, while in another its sensingfeatures may be formed in the wearable electronic devices 100 that arebeing worn by the wearer W and co-worker CW. In one form, the valuesacquired by the handheld atmospheric gas meter are sent to the wearableelectronic device 100 to determine if the values are acceptable toeither permit entry (when first approaching the confined space 3010) orcontinued access within the confined space 3010 by the wearer W.Alternatively, the atmospheric gas meter makes the evaluation andtransmits to the wearable electronic device 100 that the atmospherewithin the confined space 3010 is either OK or not OK (also, bycomparison to known standards or acceptable levels, such as a database,lookup table or the like). If the door 3200 is open and it is furtherdetermined that the operational state of the confined space ventilationsub-system 3300 is within acceptable parameters and a gas analysiscorresponding to the atmospheric gas meter is OK, then the wearer Wreceives a message on the wearable electronic device 100 that he or shemay enter the confined space 3010. In either event, the wearableelectronic device 100 begins periodic monitoring of the various ones ofthe sensors S₁, S₂, S₃ . . . S_(n) that are worn by the wearer W, eitherdirectly or through their being embedded within the personal protectiveequipment PPE. The door 3200 can respond to a command in order toselectively lock or unlock, such as through an optional access controllocking mechanism 3210 that is secured to or otherwise associated withthe HPE 3000 in order to allow a user access to the inside of the HPE3000 once various state-based conditional inquiries (as will bediscussed in more detail as follows) are met. In addition, a door sensor3220 is secured to the door 3200 to provide an indication of whether thedoor 3200 is opened or closed.

If any of the values of sensors S₁, S₂, S₃ . . . S_(n) that are beingmonitored by the wearable electronic device 100 are found to beunacceptable, or alternatively are determined to be heading to anunacceptable state in pre-set time, then the wearable electronic device100 being worn by the wearer W notifies the backhaul of the situation(along with the specific sensor S₁, S₂, S₃ . . . S_(n) value that wasunacceptable) so that such value may be recorded, such as for laterevaluation or use. In this case, the backhaul notifies the wearableelectronic device 100 that is being worn by the co-worker CW whereuponthe co-worker CW takes quick action to ensure the safe removal of thewearer W from the confined space 3010. It is understood that in thepresent context, an unacceptable reading or related measurement includesthose that are unavailable after a pre-defined number of values. It isfurther understood that in the present context, the wearable electronicdevice 100 that is being worn by the co-worker CW may be configured aseither a peripheral node or a source node, depending on where control ofthe PAN P that is being set up between the source and peripheral nodesis desired. If all of the values of the sensors S₁, S₂, S₃ . . . S_(n)that are being monitored by the wearable electronic device 100 that isbeing worn by the wearer W are found to be acceptable, then suchwearable electronic device 100 may provide suitable visual indicia, aswell as transmit the information corresponding to the state or status tothe backhaul that in turn may transmit to the co-worker CW.

Within the context of the communication network 4000, the door 3200,locking mechanism 3210, door sensor 3220 and even the confined space3010 itself may be considered to be peripheral devices, while whencoupled to suitable communication functionality become peripheral nodesthat may participate in signal exchange within the communication network4000, as well as be in signal communication with one another within theconfined space 3010. Moreover within the context of the confined space3010, the various components such as the door 3200, locking mechanism3210 and door sensor 3220 are considered to be associated with theconfined space 3010 if they are physically, signally or otherwisecooperative with it, and may include the confined space 3010 itself inconfigurations where it particularly (rather than or in addition to oneof its components) is outfitted with the necessary communicationfunctionality. In this way, when the confined space 3010 has signalconnection to other devices such as the backhaul, the wearableelectronic device 100 or the like, it will be understood that suchconnectivity may be either direct or indirect, depending on whether theconfined space 3010 is relying upon one or more of the variouscomponents associated it and which possesses the necessary wirelesscommunication functionality. It will further be understood that suchconnectivity will be apparent from the context and that all suchvariants are deemed to be within the scope of the present disclosure.

Referring with particularity to FIG. 13 , an embodiment of a systemarchitecture for the communication network 4000 is shown interactingwith the confined space 3010. As with the computer-based features of thewearable electronic device 100 as depicted in FIG. 2 , one or moreportions of the backhaul (whether the servers 400, cloud 500, facilityadministration portal 5000 or other portions) include computer systemfunctionality for implementing the various processes described herein.Such a system includes one or more processors and correspondingnon-transitory computer readable medium (such as random access memory orread only memory) that are connected to one or more bus structures (suchas system bus, local bus or the like), communication throughinput/output devices, mass storage (such as hard disk drives orremovable media storage devices in the form of flash drives, DVD-ROMdrives, CD-ROM drives, floppy drives or the like) and a network adapteror related interface controller. In addition, executable instructions(which may be stored in the non-transitory computer readable medium inthe form of machine code that is predefined to perform a specific taskin that it is taken from a machine language instruction set known as thenative instruction set that may be part of a shared library or relatednon-volatile memory that is specific to the implementation of the one ormore processor and their particular Instruction Set Architecture (ISA)such that the ISA acts as an interface between the hardware of theprocessors and the system or application software through theimplementation of the machine code that is predefined within the ISA. Itwill be appreciated that the machine code configured to perform thevarious algorithmic and related computations of the communicationnetwork 4000 imparts structure to the successive architectures ofprocessors, as well as the computer system of the backhaul, specificallyin the form of a program structure that may be made up of a set of oneor more individual codes.

In addition, it can be seen that the wearable electronic device 100forms the basis of a communication network 4000 for use within theindustrial setting. In such a configuration, the communication network4000 may include numerous sub-networks. One such sub-network is theaforementioned PAN P that is controlled by the wearable electronicdevice 100 to communicate with various peripheral nodes through ashort-range wireless communication protocol (such as the aforementionedRFID, BLE or the like). As will be discussed in more detail as follows,the signals in such a sub-network contain at least one of beacon datacorresponding to identification of the devices throughout the PAN P,event data and personal data corresponding to the wearer W that isassociated with the wearable electronic device 100. At this juncture, itis noted that while the terms “user”, “worker”, “individual” and“wearer” are used interchangeably, some context-specific delineation ishelpful in understanding various states that are discussed in moredetail in conjunction with FIGS. 14 and 15 . In particular, a worker isthe person (for example, a service technician) who requires access to aparticular confined space 3010, the wearer W is what the worker becomesafter having been associated with a particular wearable electronicdevice 100 through an authentication process for registration andcredentialling (that is to say, at least one of entry and determinationof the worker's access level), and an authorized wearer is what thewearer W becomes when he or she are proximate to the confined space 3010and his or her access level is equal to or greater than that required towork within. Another sub-network is the aforementioned LPWAN LP that iscontrolled by the wearable electronic device 100 to wirelesslycommunicate signals between it and the backhaul through the gateway 300,while an internet protocol IP acts as a third sub-network between theLPWAN LP sub-network and the backhaul that is made up of one or more ofthe servers 400, internet I and cloud 500 and the facilityadministration portal 5000. As previously noted, the cloud 500 may existin both internet I and intranet form. It will be understood that bothforms may extend to the other parts of the backhaul as well. Within thepresent disclosure, the identification of the devices within not justthe PAN P sub-network but either of the other two sub-networks can be inany known manner, such as through the QUID, uniform resource identifier(URI), object identifier (OID) or even through a facility-specificdevice identifier information data such as that which has been assignedthrough the facility administration portal 5000.

As previously noted, the PAN P collects data from nearby sensors orother of the aforementioned peripheral devices and then—depending onwhere the processing and analysis of such data takes place—wirelesslysends a portion of the data to a remote location through the wearableelectronic device 100. Within the industrial context, such otherperipheral devices may include one or more of component-specificsensors, commanded actuators or the like that are used in the service ofa particular machine or process within an industrial setting. When suchperipheral device also includes a beacon or other communicationfunction, such as through BLE or other short-range wirelesscommunication protocols as discussed herein, it becomes a peripheralnode. In this way, it will be understood that in order for data to flowwirelessly from a peripheral device (such as a sensor, controller or thelike) to a source within the PAN P, as well as to another locationwithin the communication network 4000, such peripheral device musteither include its own wireless peripheral node communicationfunctionality or be in signal communication (such as through a wiredconnection) to a peripheral node that in turn may make its own wirelessconnectivity. By way of example, various forms of the sensors S₁, S₂, S₃. . . S_(n) or other devices that were collectively referred to asperipheral nodes or end nodes 200 in FIG. 1 may be attached, secured orotherwise made cooperative with the confined space 3010 or othercomponents such the resulting assembly or related structurebecomes—subject to also having the necessary communicationfunctionality—one or more additional peripheral devices or nodes,particularly industrial peripheral devices or nodes. Of course, insituations where these various components can function as peripheralnodes, their inherent communication functionality allows them to be partof a distributed architecture that physically reside in disparatelocations. In this way, attributes (such as identifications, accessrequirements or the like) of such a peripheral device may reside in theservers 400, cloud 500 or other parts of the backhaul. It will beunderstood that certain peripheral devices (such as various controllers)may also or alternatively exhibit wired connection functionality througha portion of its signal flowpath for messages being sent by it to thesource node within the PAN P. For example, in situations such as thatdepicted in FIGS. 16A and 16B (which will be discussed in more detail asfollows) where the HPE 3000 (in the general case) and the confined space3010 (in the particular case shown in FIG. 13 ) sends a message (eitherdirectly or through an optional controller 3500 as shown) to initiatevibration of the wearable electronic device 100, it may be doing sothrough the internet protocol IP sub-network as a wired ethernetconnection to the cloud 500 after which the cloud 500 forwards themessage (either wired or wirelessly) to the gateway 300 and then overthe LPWAN LP sub-network to the wearable electronic device 100. In oneform, the beacon-based signal communication of the peripheral nodes orend nodes 200 only advertise to the wearable electronic device 100 orthe controller 3500, although in another form (as shown), suchcommunication can be bidirectional.

As shown, the controller 3500 can be mounted in or on the confined space3010 in a manner similar to the beacon 200 and the dashboard 700 ordisplay device 900. In one form, signal communication between theinterface controller 3500 and sensors S₁, S₂, S₃ . . . S_(n) or endnodes 200 other components within the confined space 3010 can be throughwired connectivity, while in another through wireless connectivity (suchas the aforementioned short-range protocol that is associated with thePAN P) and yet in another through a combination of both, such as whensignals that are generated either by the controller 3500 or passingthrough it are then conveyed (such as through the LPWAN LP sub-networkportion of the communication network 4000 or a wired (ethernet)connection under the internet protocol IP sub-network) to or from thebackhaul. In one form, the controller 3500 and sensors S₁, S₂, S₃ . . .S_(n) or end nodes 200 may be within the same vicinity, while in anotherremote from one another (although still within signal range). Moreover,in its capacity as either a mere device or a more comprehensive node(such as one of end nodes 200), the controller 3500 may in one form beembodied on any known system-on-a-chip (SoC) or other open single-boardcomputer architecture (such as those based on Raspberry Pi or the like),while in another as part of a larger controller or relatedcomputer-based system (such as in the backhaul).

Significantly, the configuration of the wearable electronic device 100and its interaction within the architectural framework of thecommunication network 4000 is such that it can perform variousedge-related functions as previously discussed. In this capacity, thewearable electronic device 100 may cooperate with one or more peripheralnodes or peripheral devices (depending on whether such devices aredirectly or indirectly inclusive of a suitable communicationfunctionality) in order to perform data acquisition, processing,cleansing, and analysis (including machine learning variants) eitherwith or without the need for facility or cloud-based servers, computersor related backhaul, depending on the level of computational needs (inwhat can colloquially be referred to as thick edge, thin edge and microedge capability). As previously mentioned, the wearable electronicdevice 100 may operate either in conjunction with or independent of thePAN P in order provide the communication network 4000 withaccess-control functionality for the confined space 3010 or theelectronic components situated therein. In configurations where thewearable electronic device 100 operates independently (that is to say,it does not rely upon the PAN P in order to communicate with theconfined space 3010 or its components), such environment or componentswould include their own, radio or other communication device along witha corresponding short-range communication protocol (BLE, WiFi, RFID,NFC, Zigbee, 6LoWPAN, IrDa or the like) to ensure compatible wirelesscommunication with that of the first wireless communication sub-module175A of the wearable electronic device 100 as a way to directlyparticipate in the communication network 4000.

In one particular example, the confined space 3010 may additionally besignal-constricting. In such case, the wearer W may be working in anelectromatic isolation space (such as a faraday cage or related metalbox where the transmission of RF signals that is needed to provide oneor more parameters of interest may be hindered. In a situation such asthis, it will be appreciated that a supplemental means (such as througha repeater (not shown)) to achieving signal communication between theregion within the cage and a region outside the cage may be used.

In addition to the confined space 3010, other assets (not shown) thatmay utilize the access control disclosed herein may form the HPE 3000,include—for example—those associated with a chemical production orprocess line (or portions thereof), an assembly line (or portionsthereof) and an electricity production facility (such as apower-generating station or the like). Regardless of the industry, oneasset that is frequently encountered when the energy being provided iselectrical in nature (that is to say, electric voltage is being providedin order to generate electrical current with which to power suchmachinery, equipment or assets) is an electrical cabinet. Within thepresent disclosure, an electrical cabinet is understood to include anyenclosure, box, control panel, or related housing for various electroniccomponents, while the industrial setting is understood to includefacilities or factories, as well as their related spaces; examples ofsuch settings are those found in industrial titles described by theNorth American Industry Classification System (NAICS) Code and itsrespective sub-titles. In addition to the aforementioned industrialapplications, other such enterprises may include commercial air, marineand ground transportation, mining and related mineral extraction, oil &gas or the like are understood to qualify as industrial settings. In oneform, the wearable electronic device 100 and the resulting communicationnetwork 4000 that are disclosed herein for selectively granting useraccess to the electrical cabinet may be used as part of a morecomprehensive industrial electrical safety regimen, such as that neededto comply with 29 CFR 1910.333 and related OSHA regulations whereorganizational measures and technical means are used to prevent harmfuland dangerous effects on workers from well-known electrical hazards suchas electric current, arcing, static electricity or the like. Theelectrical cabinet serves to—among other things—provide a centralizedaccess point for circuit breakers, fuses, contactors, control panels,switches, knobs, displays, wiring, controllers, lighting or relatedelectrical or electronic components, provide the ability of authorizedusers to selectively energize or de-energize connected components orsystems, prevent electrical shock to equipment users, as well as toprotect the contents from the ambient environment. As is furtherunderstood, the various electronic components contained within theelectrical cabinet may include both low-voltage and high-voltagedevices, and that further distinctions—such as based on whether theyoperate with or are exposed to low or high voltage will be apparent fromthe context.

Referring with particularity to FIG. 14 , by the cooperation of thethree sub-networks depicted in FIG. 12 , data collected or generated bythe various components may be conveyed through the communication system4000. The data includes an HPE access request, as well as a resultinggranting or denial of such request, whether authorization has beengranted, whether a proximate threshold has been met, as well asstate-based information including an authentication state AS, acommanded state (also referred to as a manipulated variable) CS, aproximate state PS, one or more sensor states SS and an authorized stateZS. As will be discussed in more detail in conjunction with FIGS. 15Athrough 15C, this data is used to provide answers to variousBoolean-based conditional inquiries that are generated through variousprocesses in order to allow the wearer W access to the HPE 3000. Thus,by algorithmically satisfying each of these inquiries and conveying thecorresponding data and instructions through the communication network4000 to the HPE 3000, one or more individuals may be apprised of whetherit is safe to work in such environment and any equipment inside, as wellas to gain access thereto. Each of the conditional inquiries leading tosuch data will be described in more detail after the followingdescription of how event data, device identifier data and personalinformation data is acquired.

In one form, advanced message queuing protocol (AMQP), message queuingtelemetry transport (MQTT), constrained application protocol (CoAP),hypertext markup language (HTML), web sockets or the like may be used asan application layer inter-machine protocol in order to aggregate thedata that is being collected from the HPE 3000 and subsequentlypresented to the facility administration portal 5000 or other interestedpersonnel through devices such as the dashboard 700 of FIG. 6 or on thedisplay device 900 of FIG. 3 where one or both of these devices mayoptionally be included in the system architecture of the communicationnetwork 4000 that is depicted in FIG. 13 .

Within the present disclosure, the sensor state SS and the proximatestate PS are ascertained through the collection or generation of data byone or more of the connected devices. For example, signals indicative ofthe sensor state SS may be those acquired by the door 3200, door sensor3220 or other sensors S₁, S₂, S₃ . . . S_(n) or end nodes 200, whilesignals indicative of the proximate state PS—which is used to verify theassociation between the wearer W and his or her physical locationrelative to the HPE 3000—is determined by the signal communicationbetween the wearable electronic device 100 and the HPE 3000 using knownmeans, such as an advertised beacon from one or more of theaforementioned short-range protocols, as well as from an image from acamera (not shown) or related computer vision device, radar orultra-wideband (UWB) in order to verify identity and distance. It willbe appreciated that determination of the proximate state PS relative toother pieces of equipment within the industrial setting is alsopossible, including that for valves, pumps, motors or related processequipment, even if outside of the realm dictated by the HPE 3000.Significantly, the proximate state PS may be determined once or numeroustimes, as needed. For example, it may first be determined once a wearerW first encounters the HPE 3000 and then re-assessed repeatably untilthe wearer W has completed his or her task or tasks. Such repeateddetermination may take place in numerous forms, such as at repeatedintervals (for example, every 5 seconds, 10 seconds, 30 seconds or thelike), randomly or dynamically the last of which may be based on localoperational or environmental changes in or around the HPE 3000 or othercomponent at issue. In another form, such determination may be based onanother element within the PAN P triggering such a scan. For example,the wearer W that is within the confined space 3000 gets an unknownreading from one of the sensors S₁, S₂, S₃ . . . S_(n) or end nodes 200such that an assessment of the state is triggered. Within the presentdisclosure, the distance that corresponds to the proximate state PS maybe thought of as that which is less than or equal to a specified maximumallowable distance (or alternatively, minimum acceptable distance) forthe particular component at issue, such as the HPE 3000. In one form,different components within the industrial facility may have their ownmaximum allowable distance, while in another all locations of a singletype (where groups and sub-groups or families of certain equipment typesor location types) may have the same maximum allowable distance. In thisway, if a wearer W is proximate the desired location, the correspondingBoolean-based logic for such proximate state PS is “yes” or “true”.Using the HPE 3000 as a specific example, the proximate state PS mayinitially be assessed by the wearable electronic device 100 in itscapacity as a source node, whereas ongoing proximate state PSdeterminations are verified by the HPE 3000 through its controllers,such as the controller 3500.

Contrarily, the authentication state AS, commanded state CS andauthorized state ZS are algorithmically derived based upon satisfyingcertain Boolean-like conditional inquiries associated with the processesidentified in FIGS. 15A through 15C. It will be appreciated that atleast some of these Boolean-like conditional inquiries may beimplemented through Boolean-based logic, logic flow charts or othermethods. The logical imperatives presently shown form the basis foractions by a controller to provide instructions to the locking mechanism3210. These imperatives include answers (mostly in the form of Boolean“1s” or “0s”, with a couple of exceptions as noted as follows) relatedto the sensor state SS (for example, of the door 3200), the proximatestate PS (such as that which is determined using the short-rangecommunication protocol of the PAN P) and the authorization state ZS, aswell as the signals that correspond to notification or related feedbackto the wearable electronic device 100. A brief discussion of each of thederived states is as follows.

The commanded state CS pertains to those components within thecommunication system 4000 and the HPE 3000 in particular that operate inresponse to an external set of instructions. While FIG. 14 shows withparticularity that the locking mechanism 3210 of FIG. 13 is onecomponent that responds to a commanded state CS, it will be appreciatedthat other components (not shown) similarly connected may includemotors, pumps, valves, linear actuators, rotatory actuators or relatedequipment that would ordinarily be found within the industrial settingin order to control or manipulate the operation of one or morecomponents operating at the behest of the HPE 3000.

The authentication state AS provides answers to conditional inquiries toensure that proper identity (that is to say, the worker is who he or shesays they are) and that such worker is permitted (such as through skilllevel or the like) to do certain tasks on a specific resource. In oneform, it may be subjected to an identity and access management (IAM)system in order to authenticate a worker. In one form, the IAM system,which establishes a framework for allowing the identity management ofindividuals within an organization in order to ensure secure access toresources for only certain individuals, resides within the facilityadministration portal 5000 or other parts of the backhaul. In operation,the IAM system assures that the credentials of the worker are eitherpresent in the system or (if not) enables the worker to enter suchcredentials, or have a facility representative enter the credentialsinto the system (either directly or indirectly the latter of whichthrough a representative within the facility administration portal 5000on behalf of the worker. In one form, authentication occurs when aworker that has entered the facility and provided the necessarycredentials is paired with a particular wearable electronic device 100.Details associated with the authentication state AS will be discussed inmore detail with FIG. 15A.

The authorized state ZS ensures that a worker who has been authenticatedthrough the authentication state AS process (and hence is now deemedwearer W) can then be subjected to a backhaul-based access controlprocess in order to request access to a particular HPE 3000 as aprecursor to performing a certain task within. Details associated withthe authorization state ZS will be discussed in more detail with FIG.15B.

Referring next to FIGS. 15A through 15C, flowcharts depicting processesused to ascertain the authentication state AS, the authorization stateZS, as well as whether the wearer W will be granted access to the HPE3000 as a result of these and other states, are shown. As previouslydiscussed, events give rise to various forms of data collection. Assuch, event data is—as previously mentioned—associated with (that is tosay, comes from) either the various peripheral nodes (directly) orperipheral devices (indirectly) to one or more components that make upthe communication network 4000. Accordingly, an event is understood toinclude an occurrence that triggers one more of system operation anddata logging functions. In one form, there are two types of events:component events and system events. A component event is a record thatindicates a change that has occurred on a particular component (such asthe initiation of an absence of voltage test, an opened or closed doorstate, that the wearable electronic device 100 (which in the interest ofbrevity is noted as being a Wearable in FIGS. 15A through 17 ) has beenremoved from wearer W, as well as others). Contrarily, a system event isa record that indicates a system state change or other operationalinformation of interest examples of which may correspond to theauthentication state AS and the authorization state ZS, as well asexecution of the commanded state CS. Likewise, an event log is thatwhich records occurrences of events and their type; in one form, thesemay be implemented in a database, such as in cloud 500 or elsewhere(such as those controlled by the facility). In one form, the event logand event details are shared on a web-based dashboard (such as dashboard700 of FIG. 6 or the display device 900 of FIG. 7 , as well as locallyon the confined space 3010 in FIG. 13 , such as by mounting in a visibleand accessible location) for the co-worker CW or other facilitypersonnel. In such configurations, the dashboard 700, the display device900 or a display screen associated with the wearable electronic device100 forms a human-machine interface (HMI) where the level of displayfunctionality can range from relatively simple (such as that associatedwith an e ink display) to comprehensive (such as that associated withlarger computer systems).

Referring with particularity to FIG. 15A, authentication processesleading up to the authenticated state AS are shown. In one form,activities of the authentication processes include creating a workerprofile with an access level, assigning a worker (such as servicetechnician) to a particular wearable electronic device 100 and havingthe worker return the wearable electronic device 100 such that theworker is no longer associated with it.

Regarding the first activity of the authentication processes, in orderto create a worker profile that will eventually determine a workeraccess level, the worker may in one form enter as a minimum his or hername along with other identifying information (for example, telephonenumber, employee status or other credentials, skill level, such as thatwhich may be based on experience, training-based qualification or thelike, as well as other data needed to perform the task to which he orshe is being assigned, such as proof of identity or prior visits to thefacility (if any). In one form, this entry of worker-specificidentifying information may take place upon the worker entering theindustrial, commercial or related enterprise or facility, such asthrough the kiosk 3900 of FIG. 12 . In another form, such identifyinginformation may be provided by the worker to a representative of thefacility for subsequent entry into an appropriate database. In yetanother form (such as where the industrial site is remotely located,such as a farm, mine, offshore oil platform or the like), the entry ofsuch identifying information may take place through an internet-enableddevice. In addition, the worker may provide answers in response to aquestionnaire or the like (such as the nature of the service beingcontemplated) as a way to provide enhanced security or other evidencethat proper facility procedures are being followed. Regardless of howthe worker information is obtained, it can be entered into the facilityadministration portal 5000. The facility administration portal 5000,along with its connection to the servers 400, cloud 500 and other partsof the backhaul, provides database and services to support the variousauthentication processes disclosed herein. In one form, the workeraccess level determines the types of locations (including, for example,which HPEs 3000 that are selected from numerous HPEs 3000 within thefacility) that a worker is permitted (that is to say, allowed) toaccess, where the guidelines for such determination of are made bypolicies and procedures (that is to say, the governance) established themanagement of the industrial setting or related facility. A facilityrepresentative adds the worker's access level into the facilityadministration portal 5000 where in one form such level may bedetermined via algorithm that uses some of the data provided by theworker and the facility's governance. As previously noted, storage ofsuch credentials and device registration may take place incomputer-readable media, including that situated within the facilityadministration portal 5000 or other parts of the backhaul, as well as atthe edge on the wearable electronic device 100. As previously noted, inone form the association of a particular worker to a particular wearabledevice 100 may be done through an authentication procedure upon entry ofthe corresponding user data, such as through the kiosk 3900 of FIG. 12 .By way of example, entry of the corresponding user data into thefacility administration portal 5000 may be configured as a menu-drivewebpage where the user may enter specific demographic or relatedpersonal identifying data that can be used to establish the necessarycredentials.

Regarding the second activity of the authentication processes, uponapproval of the worker for a particular access level, the worker isprovided with a particular one of the available wearable electronicdevices 100 each of which has been registered with a UUID, ID token orother device identifier information that is unique to that particularwearable electronic device 100 at which time this association betweenthe worker and the wearable electronic device 100 is entered into thefacility administration portal 5000. Depending on thepreviously-mentioned form factor of the wearable electronic device 100(which is presently shown in a watch-like banded configuration), theworker places the wearable electronic device 100 on his or her wrist,thereby becoming wearer W at which time the wearable electronic device100 senses the connectivity through one or more of its on-band sensors Sthat are depicted in FIG. 2 . At this time, the wearer W isauthenticated. This association is meant to last for the duration of theservice call or other activities that are related with the visit. In oneform, the ability of the wearable electronic device 100 to sense localforms of data directly from the wearer W may be used to provide anadditional measure of security against inadvertent or unauthorizedaccess to the HPE 3000. For example, if after the wearer W were toremove or lose the wearable electronic device 100, it can sense suchloss and send a warning through one or both of the LPWAN LP sub-networkand the internet protocol IP sub-network to the facility administrationportal 5000 for reporting and possible subsequent action. In one formunder such a circumstance, the wearable electronic device 100 may beconfigured to be proactive as well, such as by suspending any furtherability to secure access until such time as reattachment or relatedconnectivity is reestablished. In such case, the wearable electronicdevice 100 may also transmit a signal to be used as the access stateinstruction, particularly a control signal sent to the locking mechanism3210 for access-granting or access-denying purposes. In a variation onthis use case, additional security may be ensured in situations wherethe wearer W has an escort, such as that of a supervisor or the likethat is accompanying trainees, apprentices or the like. In another form,safe zones may be set up so that the communication network 4000 monitorsfor entry or exit from designated restricted areas. In this case, one ofthe previously-mentioned geofences G may be set up by the wearableelectronic device 100 and the PAN P in order to define such restrictedarea or areas. In still another form, security may be enhanced byincluding the ability to verify safe content delivery where thecommunication network 4000 delivers technical content or documentationto the wearer W. In addition, mobile SMS messages may be used to sendreports 800, such as to dashboards 700 or displays 900 either of whichmay be in the form of or mobile telephone or laptop webpages or theother HMI devices discussed herein to ensure data delivery to interestedpersonnel such as in the facility administration portal 5000. Likewise,augmented reality (AR) devices such as Google Glass or the like may beused by the wearer W or other interested individuals, such as to displayone or more of the sensor readings being acquired in the HPE 3000.

Regarding the third activity of the authentication processes, once thewearer W has completed his or her assigned task (or tasks) and hasremoved and returned the wearable electronic device 100 (such as to thefacility representative), a disassociation of the two may take placewithin the facility administration portal 5000 where identifyinginformation (including date and time of return) is entered, such as tothe same database where the identifying information was initiallyrecorded upon entry to the facility by the worker.

Referring with particularity to FIG. 15B, authorization processesleading up to the authorized state ZS are shown. In one form, activitiesof the authorization processes include wearable electronic device 100logic while the wearer W is in the facility and providing request-basedaccess control to the HPE 3000.

Regarding the first activity of the authorization processes, once theworker profile and access level from the first activity of theauthentication process has been established and the worker is nowwearing the wearable electronic device 100 (and is now categorized asthe wearer W), the wearable electronic device 100 commences scanning forbeacons or beacon-like data transmitters (such as from a controller 3500or other signally-compatible device within the HPE 3000) and HPEs 3000that are present within the facility. As noted elsewhere, such signalcompatibility may be in the form of BLE, WiFi, RFID, NFC or relatedshort-range functionality of the first wireless communication sub-module175A. Meanwhile, the wearer W is entering a request such as throughpushing a button or related activation switch on the wearable electronicdevice 100. Regarding the beacons, they broadcast their identity(including UUIDs, ID tokens or the like) and in so doing may behave as aperipheral node in a manner similar to the aforementioned peripheralnodes 200. Moreover, the broadcasting of beacon data may be used for thedetermination of distance such as through RSSI and RSSI-related data.Significantly, the devices that are configured to function as a beaconcan be physical or virtual where such distinction may be context- orconfiguration-dependent that in either form possesses node-basedcommunication functionality. Depending on the density of beacons withina particular location, the wearable electronic device 100 may receivemore than one beacon at which time it may filter for a particular beaconbased on uniquely identifying information or the like. In one form, uponobtaining multiple signals, the wearable electronic device 100 mayprocess the three most relevant, such as by proximity (which in one formmay vary based on numerous signal propagation factors within the localenvironment and which is indicative of the necessary proximity, such asthrough RSSI, triangulation, trilateration, multilateration or otherknown distance and location-determining approaches) and transmit suchbeacon data over the LPWAN LP sub-network to the gateway 300 and thenthrough the internet protocol IP (the latter over MQTT or other IoTmessaging transport protocol as part of a gateway-to-network-servercommunication) sub-network to the facility administration portal 5000,cloud 500 or other part of the backhaul. As previously noted, the UUIDor related ID tokens being broadcast may be through a short-rangeprotocol (using BLE, WiFi, RFID, NFC or the like). In a related way, itis noted that in one form, session protocols such as the MQTT, as wellas others such as AMQP, may be implemented to allow the wearableelectronic device 100 to publish and subscribe without having to keeptrack of each of the devices, such as through a wearable electronicdevice 100 SDK, including for both persistent and non-persistentconnectivity.

In a similar way, the wearable electronic device 100 is scanning for anHPE 3000 to see which one or ones are deemed to be within a proximitythreshold. A threshold corresponding to such state may becontext-dependent based on numerous factors such as how crowded thelocal electromagnetic environment is, relative closeness of the HPE 3000to other similar or different equipment, relative number of otherservice technicians in the vicinity, the local signal propagationproperties within the facility or the like. If no such detection wasmade, the wearable electronic device 100 repeats the request, such as ata pre-set time interval. Contrarily, upon detecting an HPE 3000 that iswithin the threshold, the wearable electronic device 100 conveys theaccess request to the backhaul. In one form, when the wearableelectronic device 100 is requesting access, security or trust may beenhanced through access control of using tokens, certification orencryption such a Diffe-Helman key exchange or other symmetric orasymmetric encryption approaches. Once the access request has beeninitiated by the wearer W, the wearable electronic device 100 starts toscan for any HPE 3000 in a manner similar to that previously discussedrelated to when the wearable electronic device 100 is scanning forbeacons. In one form, both the scanning and the access request may havea temporal component such that if the wearer W and the wearableelectronic device 100 were to move away from the HPE 3000 (for example,if the wearer W is merely passing by the HPE 3000 on the way to anotherdestination), such request may be rescinded, such as by building in asuitable time delay into the logic.

Regarding the second activity of the authorization processes, now thatthe access request for a particular HPE 3000 and identificationinformation (now in one form including date and time stamps) for aparticular wearable electronic device 100 has been conveyed by thecommunication network 4000 to the backhaul, the worker identificationinformation that was previously entered during the authenticationprocess may be checked by the facility administration portal 5000 inorder to compare the access level of the worker (now wearer W) againstthe access level of the particular HPE 3000. It will be appreciated thatdifferent access levels or classes of each HPE 3000 within thefacility's inventory may be stored in a database and depend on thecomplexity, hazard level or perceived skill level required such thatmore restrictive classes are only available to those with sufficientlyhigh skill levels, experience or other related metric all of which maybe determined and coordinated as part of the aforementionedauthentication process. In one form, the database may exist eitheralgorithmically or as a lookup table that correlates the complexity,voltage level, potential hazards or other metric related to the HPE 3000or the various components or pieces of equipment therein. If the accesslevel of the wearer W is equal to or greater than that required by theparticular HPE 3000, then access is granted. This in turn means that thewearer W is now authorized for that particular HPE. Contrarily, if theaccess level of the wearer W is less than that required by the HPE 3000,then access is denied. Regardless of the outcome of the access request,at this stage, the facility administration portal 5000 or other part ofthe backhaul sends a corresponding notification to both the wearableelectronic device 100 and the HPE 3000 the latter of which will be usedfor logic in the HPE 3000 and the pre-entry test process as discussed inconjunction with FIG. 15C. In the situation where access has beengranted and the notification has been sent to and received by thewearable electronic device 100 for display or other reporting, thewearable electronic device 100 may then commence advertising its ownbeacon for receipt by one or more nearby HPEs 3000. In the situationwhere access has been denied and the notification has been sent to andreceived by the wearable electronic device 100 for display or otherreporting, except now the wearable electronic device 100 does notadvertise its own beacon.

In one particular-example, the confined space 3010 of FIG. 13 may be aroom, such as a boiler or reactor room with a naval vessel. In onescenario, work therein may be permitted to do so only if the temperatureof the room is under a certain temperature (for example, 80 degreesFahrenheit). Temperature sensors in the boiler room could use theshort-range connectivity between the sensor and the wearable electronicdevice 100 within the PAN P to perform a temperature check beforeengaging in the authorization processes of FIG. 15B. In another example,the PAN P could also be used when some combination of workers (includingthose where the various workers may have different access levels) mayneed to be in a particular place in order for the access control of thesecond of the authorization processes to occur. Such a situation mayexist where multiple types of workers are needed to perform a particularrepair within the HPEs 3000. In such a case, the source node wearableelectronic device 100 of the PAN P may search for other wearableelectronic devices 100 act to determine if an access request may takeplace.

Referring with particularity to FIG. 15C, various test-based processesleading up to the sensor state SS are shown. In one form, activities ofthe sensing processes include HPE 3000 logic related (such as related tothe status of the door 3200) and the pre-entry tests. Regarding thefirst activity of the sensing processes, the HPE 3000 is (among otherthings) advertising its own beacon, sensing the door state (through doorsensor 3220) and waiting for pre-entry test results, in addition toreceiving the granting or denying of the access request from the accesscontrol portion of the authorization processes of FIG. 15B. In the eventthat access has been granted, the HPE 3000 stops sending its advertisingbeacon and instead starts scanning for the wearer W. In one form, thisuse of a conditional beacon as a part of the conditional unlocking orlocking of the HPE 3000 may be used as part of an enhanced securityprotocol. Regarding the second activity, the pre-entry test is conductedwhere various activities related to wearer W preparation (such asdonning the PPE) and the habitability of the HPE 3000. As discussedelsewhere, such habitability may be related to sensed values ofatmospheric conditions, temperature conditions, lighting conditions, thepresence of operating machinery or the like. Outputs related to varioussensor sensors S₁, S₂, S₃ . . . S_(n) or end nodes 200 readings may betransmitted to various places, such as to the wearable electronic device100 being worn by the wearer W, to the backhaul or elsewhere. Thesevalues may be compared against required or known standards (such as theatmospheric safety standards shown, but applicable to other location,environmental, activity, physiological or other parameters of interestas well). As can be seen, in situations where the sensed data fallsoutside an acceptable range for the one or more parameters of interest,the pre-entry test will fail. This in turn will be provided as input tothe process depicted in FIG. 16B.

Relatedly, at least some of the software, firmware and otherinstructions that form the basis for interfacing and communicatingbetween any one of the wearable electronic device 100, PAN P orcontroller 3500 and remote locations such as in the servers 400, cloud500, or kiosk 3900 of FIG. 12 or portal may be stored or executed atsuch remote locations or on the wearable electronic device 100. Asshown, the facility administration portal 5000 represents a specificexample of such a remote location, particularly for the purpose ofperforming administrative, managerial or related oversight functions forthe warehousing of acquired data as well as the various back-and-forthcommunication with the wearable electronic device 100 within thecommunication network 4000.

Referring next to FIGS. 16A and 16B, a program structure is shown in theform of a flow diagram of a sequence of events of how a user may bepermitted to gain access to the HPE 3000. It will be appreciated that inthe implementation shown in FIGS. 16A and 16B, as well as that depictedin FIGS. 15A through 15C that lead up to these figures, answering theconditional inquiries is not necessarily a set of serial decisions, butrather a series of concurrent processes, where the states and theactions taken based on the states may be grouped into various sets oroperational scenarios that represent situation-specific interactionsbetween the wearer W and the HPE 3000. It will be understood thatwhether they are semantically described as having concurrent oroverlapping attributes or not is not meant to place limitations on theclaims, but rather to describe the various situation-specificinteractions of the worker and the HPE 3000 through the communicationnetwork 4000 at a detailed level in order to make the present disclosuremore readily understood. As will be discussed throughout the presentdisclosure, such processes may include registration of the wearableelectronic device 100, entry of worker data, assignment of a workeraccess level, assignment of access level for the HPE 3000, associationof the wearable electronic device 100 and worker such that the workerbecomes the wearer W, determining if the wearer W is within a proximitythreshold, determining if the wearer W gained access to the HPE 3000,conducting a series of tests related to pre-entry access criteria anddetermining if the tests passed, determining if the door 3200 beencommanded to be opened, sensing whether the door 3200 is or is notopened, and ongoing determinations of whether the wearer W still withinthe proximity threshold, among others. It will be understood that theterm “program structure” is meant to indicate that tangible structuremay be made up of codes that in turn may be depicted visually as a flowdiagram or related sequence that operates on a given data structure thatitself may be in one form an organized list, array, tree or graph ofcollected data. This in turn is not meant to imply that any suchflow-based activity as shown in the figures should be construed tocorrelate one-to-one with lines or related segments of program code, butrather that the use of machine code 173E imparts particular structure tothe architectures of the processor 173A, logic device 173, PCB assembly170 (all as shown in FIG. 2 ) and the wearable electronic device 100.

Although not shown, if after the access had been granted and the door3200 opened by the unlocking command sent to the locking mechanism 3210and further after work has already been initiated or completed, certainof the Boolean-based conditional inquiries are not met (such as door3200 remaining open as reported by the door sensor 3220 after the wearerW were to move away such that the proximate state PS is in a conditionincompatible with such continued access), such data may be logged as away to allow actionable commands (such as an alert, warning or the like)to be issued to the wearer W or other interested personnel. In a relatedmanner, other incoming signals being introduced into the communicationnetwork 4000 related to equipment malfunctions may be logged as a way toallow similar actionable commands.

As shown, different operational scenarios may be present. Thesescenarios are based on various situation-specific interactions betweenthe wearer W and the HPE 3000 as a way to present correspondingconditional inquiries the answers of which, depending on the variousstates, form the basis for instructions to be used by the HPE 3000 or acontroller associated therewith. These scenarios are shown in moredetail FIGS. 15A through 17 , as previously discussed.

As previously noted with regard to FIG. 12 , the backhaul may beconfigured as a computer system to work either as a part of or inconjunction with the communication network 4000 as a way to selectivelygrant a user access to the HPE 3000. In so doing, data (such as thatdepicted in FIG. 14 ) that is collected through the various sensors maybe stored in a database such that processor-based operations applied tosuch data may convert the data into message-based states representativeof door and voltage conditions present within the HPE 3000 (as depictedin FIG. 15 ) and then transmitted over the communication network 4000for automated action through various authentication, authorization andsensing processes (as depicted in FIGS. 16A through 16C) that are usedto instruct the HPE 3000 to either grant or deny access to a requestingworker in response to various algorithmic conditional inquiries thatpresent themselves as the worker interacts with the HPE 3000. Thecommunication network 4000 is further configured to provide automatednotification of such granting or denial to the backhaul, as well to theworker. Moreover, the communication network 4000 is configured toprovide human-decipherable indicia of the access state of the HPE 3000(as depicted in FIGS. 16A and 16B). In one form, the automated actionthrough various authentication, authorization and sensing processes thatare used to instruct various components associated with the hazard-proneenvironment to either grant or deny access to a requesting worker inresponse to various algorithmic conditional inquiries uses amathematical model (such as a series of Boolean-based decision trees orthe like) to convert the stored data into numerical values that uponaggregation in response to a particular (that is to say,situation-specific) interaction between the worker and the HPE 3000 maybe correlated to one or more instructions being provided to the HPE3000.

Referring next to FIG. 18 , as previously noted, the communicationnetwork 4000 disclosed herein may be used to help provide workers withthe ability to isolate themselves from exposure to hazardous energysources. By way of an example (not shown, whether with or independent ofthe confined spaces example), the communication network 4000 formed bythe wearable electronic device 100 is particularly advantageous insituations involving other components, such as locking out or taggingout components in what is referred to herein as a lockout/tagoutprocedure an example of which is shown in the form of a fluid-handlingenvironment 6000. In this and other examples, the ability to inspect orwork on the tagged components may proceed in a manner analogous to thatof the access to the confined space 3010. In such case, the OSHAstandard for the control of hazardous energy (lockout/tagout, as notedin 29 CFR 1910.147), covers the servicing and maintenance of machinesand establishes minimum performance requirements for equipment in whichtheir unexpected energization or startup, as well as the release ofstored energy from hazardous energy sources (whether electrical,mechanical, hydraulic, pneumatic, chemical, thermal, gravitational andother the like), could cause injury to employees. Regarding some ofthese industries, in general, OSHA requires that all employers have alockout/tagout program to protect workers from injuries caused by theunexpected startup or release of energy. More particularly, in theconstruction industry, the Construction Safety Association of Ontario(CSAO) requires that all employers have a lockout/tagout program toprotect workers from injuries caused by the unexpected startup orrelease of energy. Likewise, in the manufacturing industry, the NationalFire Protection Association (NFPA) requires that all employers have alockout/tagout program to protect workers from injuries caused by theunexpected startup or release of energy. Furthermore, in the healthcareindustry, JCAHO requires that all employers have a lockout/tagoutprogram to protect workers from injuries caused by the unexpectedstartup or release of energy. Moreover, in the mining industry, MSHArequires that all employers have a lockout/tagout program to protectworkers from injuries caused by the unexpected startup or release ofenergy. In the particular case of electrical hazards, the applicableregulations are different and may be found in the OSHA standard pursuantto 29 CFR 1910.333, including those for lockout/tagout.

It is understood that lockout includes the placement of a lockout deviceon an energy isolating device, in accordance with an establishedprocedure, ensuring that the energy isolating device and the equipmentbeing controlled cannot be operated until the lockout device is removed.In one form, the lockout device utilizes a positive means such as a lock(for example, either a key or combination type) to hold an energyisolating device in a safe position and prevent the energizing of anassociated machine or related piece of equipment. Examples include blankflanges and bolted slip blinds. In other forms, the lockout device canbe a wireless lock, a padlock with a hasp or related mechanism, and belockable through known means such as key, combination, cypher or thelike that can be commanded to open or close through a controller-basedwireless communication instruction. In addition, these devices maycontain sensors or may use independent sensors to wirelessly communicatethe open or closed state of the lock.

Tagging out (also referred to herein as tagout) includes the placementof a tagout device on an energy isolating device, in accordance with anestablished procedure, to indicate that the energy isolating device andthe equipment being controlled may not be operated until the tagoutdevice is removed. In one form, the tagout device is a prominent warningdevice, such as a tag and a means of attachment, which can be securelyfastened to an energy isolating device in accordance with an establishedprocedure, to indicate that the energy isolating device and theequipment being controlled may not be operated until the tagout deviceis removed.

Safety states associated with lockout/tagout procedures may be reportedwirelessly from various sensors that are associated with the variousassets being monitored. For example, for electrical assets, current orvoltage sensors may be used, while for mechanical assets, rotationsensors, vibration sensors, air flow sensors, light curtains, laserscanners, vision systems or the like may be used. Relatedly, assetsemploying hydraulics may use pressure sensors, while those withpneumatics may use pressure sensors, valve state sensors or the like.Furthermore, chemical-based assets may use gas sensors, fluid-flowsensors or other detectors that can sense the presence of liquid orvapor (one example of which is discussed in the confined space of FIG.13 ), while thermal-based assets and processes may include temperaturesensors. It will be appreciated that the foregoing list isrepresentative rather than exhaustive, and that other assets and theirassociated use of sensors within industrial and related settings aredeemed to be within the scope of the present disclosure.

As previously discussed, various industries (such as the CPI or variousothers) use lockout/tagout procedures the help ensure worker safety. Forexample, in a manufacturing setting, lockout/tagout procedures may beused when maintenance or repairs are being performed on machinery. Forexample, if a worker needs to replace a broken part on a machine, he orshe would first lock out the machine to ensure that it cannot be startedwhile the work is being performed. Tagging the machine provides anindication that it is not to be used until the repair is complete, afterwhich the tag may be removed. Likewise, in a construction setting,lockout/tagout procedures may be used when work is being performed onelectrical equipment. For example, if an electrician is working on acircuit breaker, he or she would first lock out the breaker to ensurethat it cannot be turned on while the work is being performed. Taggingthe breaker provides an indication that it is not to be used until therepair is complete, after which the tag may be removed. Furthermore, ina mining setting, lockout/tagout procedures may be used when work isbeing performed on equipment such as conveyor belts or crushers. Forexample, if a worker needs to perform maintenance on a conveyor belt, heor she would first lock out the power source to the conveyor belt, andthen tag the conveyor belt to indicate that it is not to be used untilthe repair is complete, after which the worker would remove the lock andtag from the conveyor belt. Moreover, in an oil and gas setting,lockout/tagout procedures may be used when work is being performed onequipment such as pumps or valves. For example, if a worker needs toperform maintenance on a pump, he or she would first shut off the powersupply to the pump and then tag the pump to indicate that it is not tobe used until the repair is complete, after which the worker wouldremove the lock and tag from the pump. In the healthcare industry,lockout/tagout procedures are typically used when working with medicalequipment. For example, if a worker is going to be servicing a piece ofmedical equipment, he or she will first lockout the equipment, whichprevents it from being turned on while the worker is working on it. Theequipment is then tagged to warn others that the equipment is locked outand should not be turned on. Relatedly, in the food service industry,lockout/tagout procedures are typically used when working with foodpreparation equipment. For example, if a worker is going to be cleaninga food preparation machine, the worker will first lockout the machine,which prevents it from being turned on while the worker is working onit. The worker will then tag the machine to warn others that the machineis locked out and should not be turned on.

Within the context of the present disclosure, the authorization state ZSthat has been determined by the processes of FIG. 15B may be used toidentify workers and related individuals who are authorized to lockout aparticular machine or piece of equipment using the communication network4000. In one form, a lockout/tagout procedure (which may be adapted fromthe aforementioned OSHA 1910.147) may be used as part of an HPE 3000energy control system. This procedure may take place through a series ofsteps.

In a first step, the authorized individual identifies the one or moreenergy sources that corresponds to the HPE 3000, understands the hazardsof such energy source or sources and the method or methods used tocontrol the energy before using a given procedure. In one form,software-based products may be lockout/tagout-specific such that it isused to provide structured approaches to the collection, organizing anddisplaying or printing of the application specific procedures and thebeing acquired. The communication network 4000 may be made to interfacewith such systems in order to share the relevant information. In oneform, the lockout/tagout software may be part of that used for systemadministration or management and as such stored in the backhaul.

In a second step, all workers or related individuals that could beaffected (including employees, contractors or the like) must be notifiedthat the machine or equipment associated with the HPE 3000 is to be shutdown and locked out for service or maintenance. Notification will bemade to all workers or related individuals who may enter or be workingin the area where the lockout is to be initiated. The communicationnetwork 4000 may be the means for notification of all the affectedparties, as well as optionally include the requirement that all suchaffected individuals need to confirm receipt of such notification, suchas through the inclusion of their own wearable electronic device 100. Inone form, the confirmation may be sent through the wearable electronicdevice 100 directly, while in another to have the potentially affectedindividuals through the kiosk 3900 of FIG. 12 , or yet in anotherthrough a test message sent from the backhaul to their mobile devices(such as a mobile phone) such that they then send an acknowledgment textprior to the announcement of an “all clear” message (such as through atext) goes out.

In a third step, the machinery or equipment associated with the HPE 3000must be shut down using the normal stopping procedure as identified bysuitable instructions, such as those provided by the equipmentmanufacturer.

In a fourth step, the machinery or equipment must be completely isolatedfrom its energy source or sources. In particular, isolation items withinthe HPE 3000 (such as valves, process piping blinds, circuit breakers orpower switchgears) may be locked out, such as through the short-rangeprotocol associated with the PAN P and its cooperation with a lockingmechanism such as that shown in conjunction with FIG. 13 .

In a fifth step, each individual (such as wearer W) who will beperforming work on the machine or equipment must use an individual lockon an energy isolating device. In one form, the communication network4000 may use a data base and analysis means for verifying that all lockshave been removed before informing affected parties that the processitem has been returned to a survive mode. In one form, the lock may beplaced manually by the individual doing the work, while in another, itcan be implemented automatically through the communication network 4000in a manner similar to controlling the locking mechanism 3210 of FIG. 13.

In a sixth step, if any residual or stored energy is present, it must bereleased or controlled. The sensors S₁, S₂, S₃ . . . S_(n) or end nodes200 within the communication network 4000 may be used to verify that thecorresponding environment is safe. In one form, running state indicatorsof various parameters of interest (such as rotation of motors, localamperage values associated with motor- or actuator-driven machinery,pressures, temperatures, liquid-containing tanks liquids have beendrained (such as through level sensors)) may be monitored for suitableindicia, such as whether the corresponding parameter is within anacceptable range or value. As noted elsewhere, this information can comefrom these local sensors with the PAN P, as well as from a traditionalindustrial automation operation such as supervisory control and dataacquisition (SCADA) system that can be made to report information to thebackhaul that in turn may report the information to a controller (suchas the controller 3500 of FIG. 13 ) or to the wearable electronic device100 that is associated with the co-worker CW.

In a seventh step, it must be verified that all energy sources areisolated in advance of attempting to start the machine or piece ofequipment that is locked out. In addition, it must be ensured all startcontrols are returned to their “off” or “neutral” position.

In an eighth step (for electrically energized equipment), a qualifiedperson must use electrical testing equipment on the load side of theequipment being locked out to verify there is no electrical energypresent. In one form, an absence of voltage tester (such as thatprovided by either the I-Gard Corporation of Mississauga, Ontario orPanduit Corporation of Tinley Park, Ill.) can provide this information,while in another a suitably-qualified technician can affirm that no suchelectrical energy is present and that the corresponding assessment hasbeen completed. Details associated with such absence of voltage testersand related processes, such as that which is delineated in the NationalFire Protection Association's (NFPA's) Standard NFPA70E and in SIL 3 perIEC 61508-1, is described U.S. Pat. Nos. 11,215,646 and 11,162,983, aswell as Published US Application 2022/0299547.

Likewise, when releasing the HPE 3000 from a lockout/tagout condition,numerous reverse steps are implemented in order to return the machineryor equipment to its normal operating condition. For example, in a firststep, the machine or equipment and the immediate area are checked tomake certain that all nonessential items (such as tools, materials orthe like) have been removed and that the machine or equipment is readyto be energized. This further includes ensuring that all guards havebeen replaced, including interlocks if so equipped. In a second step,all individuals must be safely positioned away from the machine orequipment. In addition, in the third step, it must be verified that thecontrols are in their “neutral” or “off” position. In the fourth step,the lockout devices are removed, and the machine or equipment isre-energized. In the fifth step, all affected individuals are alertedthat the servicing or maintenance has been completed and the machine orequipment is ready for use.

In one form, the use of both proximate state PS sensors (such as thoseassociated with the aforementioned short-range wireless connectivityprotocols) and the aforementioned authorization procedure may becombined to establish a safe environment free from energy releasehazardous or related unsafe state. It will be understood that there maybe combinations of states that result in an unresolved overall safetystate, and that in such situations an authorized representative of thefacility (such as the facility representative, safety engineering team,third-party subject matter expert consultant or the like) may help todefine appropriate warning or caution levels or thresholds that can beconveyed through the means disclosed herein. As previously discussed,threshold-exceeding events are those with corresponding measurable datathe quantities of which can trigger a system response. Parameters ofinterest are those measurable quantities associated with thehazard-prone environment and contained within the acquired data thatexceed these thresholds and as such are outside of a permissible range.Within the present context, threshold-exceeding measurements are thosethat are either too high or too low, depending on the parameter beingmeasured. In addition, means for comparing the measured quantity may bedone either algorithmically or by comparison to known quantities orstandards, such as those stored in a lookup table, memory or likestructure. The parameters of interest may include directly acquiredsensor data (such as time, temperature, pressure, electrical current orvoltage, gas readings or the like) as well as derived data (such asunderstanding the health of the wearer W based on the direct readings orother indicia, the condition of the atmosphere inside the confined space3010, projected remaining permissible time in or around the HPE 3000 orthe like). By the operation of the communication network 4000, suchinformation may be conveyed to interested personnel in remote locations,such as a safety manager, emergency response teams or the like. Suchremote personnel may be located adjacent (but outside) of the confinedspace 3010 or related HPE 3000, elsewhere within the facility, or evenat another (off-site) location.

In the particular example shown in FIG. 18 in conjunction with FIG. 12 ,the communication network 4000 may be configured to monitor and controlthe fluid-handling that is presently shown as a compressed air-handlingenvironment 6000. The compressed air-handling environment 6000 has acompressor 6100 that receives electrical power from an electricalcircuit L (shown presently as an alternating current (AC) circuit withthree-phase wiring in the form of individual lines L1, L2 and L3)through a safety switch 6200. Typically, the compressor 6100 alsoincludes its own on/off buttons which activate relays in an electricalcircuit to start or stop the compressor 6100 during general operationaluse. In the event that maintenance is required and a lock out tagoutprocess is initiated, compressor 6100 operation would first be halted bypressing the “off” button. Upon operation, the compressor 6100pressurizes air, where a fluidly-coupled receiver may act as acompressed gas storage device. One or more sensors S1, S2, S3 . . . Sn(shown presently as a pressure sensor) may be used to monitor thepressure in the compressed air circuit that through a series of valves6300, 6600 may further route the pressurized air or to other equipmentvia the facility piping or to a pipe circuit for venting to atmospherein the event the compressed air piping circuit needs to be depressurizedprior to performing maintenance, equipment replacement or the like.While it is understood that compressor 6100 is used in this instance tocompress air, a suitably-designed variant may be used with myriaddifferent gases within an industrial setting (where all such uses andvariants are deemed to be within the scope of the present disclosure).Alternatively, a pump (not shown) may replace the compressor 6100 topressurize and pump liquids, and in this instance the receiver may beeliminated or replaced with a more complex pressurized liquid storagevessel. In one form, such a liquid-handling environment based on theembodiment of FIG. 18 or a variant thereof may be used in an automatedcar wash system where high-pressure water, detergent, wax or othermaterials are being dispensed. Although not shown, it will be understoodthat other equipment, such as additional pumps, or air compressors maybe included in such a system. Similar fluid-handling equipment andrelated fluid handling systems used in other industries (such as thoseassociated with oil & gas, CPI, distillation, food processing, powerproduction or the like) may be similarly outfitted with thecommunication network 4000. Likewise, equipment used for controlling notjust the electrical, but also the mechanical, hydraulic, pneumatic,chemical, thermal, and other hazardous energy sources within an HPE 3000may be similarly implemented, and that all such industrial settingssimilarly situated are within the scope of the present disclosure.

In the system shown, the various pieces of equipment, by virtue of beingpressurized, electrified or the like, is in need of lockout/tagoutdevices 6400, 6700 and associated locks 6500, 6800. As with the sensorsS1, S2, S3 . . . Sn disclosed herein, in one form the lockout/tagoutdevices 6400, 6700 and associated locks 6500, 6800 may be outfitted withwireless signal functionality in order to communicate with the wearableelectronic device 100, the PAN P or other parts of the communicationnetwork 4000. In such a configuration, the wearer W or other workercannot approach the gaseous or liquid fluid-handling, environment 6000(which is a form of HPE 3000) until all sources of hazardous energy havebeen locked out and reported to be in their safe state. In suchscenario, the worker must be authenticated (such as through theprocesses delineated in FIG. 15A) and authorized (such as through theprocesses delineated in FIG. 15B) to conduct the requested maintenanceduties. Although not shown, other devices such as motors (such as thoseused to drive rotating brushes, car conveyor lines, heaters, driers orthe like) may make up a portion of the HPE 3000 that also can bedisabled via lockout of their electrical or other energy supply.

In one particular example, the compressor 6100 may employ thecommunication network 4000 or portions thereof in order to ensure thatpressurized fluid (for example, air or water) stored in the pipingcircuit, or in the case of compressed air, a receiver and portion of thefluid conduit has been isolated from the facility compressed air pipingnetwork and the receiver, as well as portions that may be vented to theatmosphere (such as through valve 6300). As shown, the valve 6600 thatisolates the compressor 6100 discharge from the facility compressed airpiping network is secured with its lockout/tagout device 6400 in theclosed state, while the valve 6300 that vents the receiver vessel andcompressor 6100 piping to atmosphere is secured with its lockout/tagoutdevice 6700 in the in the open state. Prior to venting the receiver andsystem piping to atmosphere, the compressor 6100 is placed in the “off”state by its local switch. The electrical energy supply for thecompressor 6100 is then isolated from it using the safety switch 6200disconnect, including a feature that enables the use of a padlock (keyedor combination, not shown but in one form similar to locks 6500, 6800),to ensure that the safety switch 6200 remains in the “off” position. Theone or more pressure sensors S1, S2, S3 . . . Sn is then monitored toassure that no high pressure fluid (such as air) is present and all ofthe sensors corresponding to the valves 6300, 6600 and the electricalpower must be able to confirm that their corresponding devices are inthe locked position prior to the wearer W commencing maintenance. Aswith the other HPE 3000 situations disclosed herein, the datacorresponding to all of these states and actions may be stored in andacted upon by the wearable electronic device 100 or the backhaul.

In summary, the wearable electronic device 100 that forms the PAN Pprovides wireless signal connectivity and the ensuing communicationnetwork 4000 between a hazard-prone environment and administrative,managerial or related authority in the form of the facilityadministration portal 5000 within an industrial, commercial or relatedfacility. In so doing, it participates in numerous data-informeddetermination processes as a way to satisfy a series of conditionalinquiries that in turn enables a service technician or related user togain access to such environment with an increased degree of confidencethat the hazards attendant to normal operating conditions of theenvironment are not present at the time of access.

Although the present disclosure discusses the use of the LPWAN LPprotocol with which to effect communication between the wearableelectronic device 100 and the backhaul, it will be appreciated that inanother form, an embodiment using instead either a narrowband internetof things (NB-IoT) or long term evolution machine type communication(LTE-M) is compatible with the communication network 4000 disclosedherein. Details associated such an embodiment may be found in USPublished Application 2021/0319894 entitled WEARABLE ELECTRONIC DEVICEAND SYSTEM USING LOW POWER CELLULAR TELECOMMUNICATION PROTOCOLS thatcorresponds to pending U.S. patent application Ser. No. 17/223,231 thatwas filed on Apr. 6, 2021, is owned by the Assignee of the presentdisclosure and the entirety of which is incorporated herein byreference.

Within the present disclosure, the term “conditional inquiries” is usedfor semantic purposes only. As such, it will be appreciated that otherinquiries or determinations, such as one or more determinations made bythe wearable electronic device 100 or other suitably-configuredequipment, may either form additional inquiries that are in addition tothe ones listed or be subsumed into one or more of the same, and thatall such variants of these inquiries are deemed to be within the scopeof the present disclosure.

Within the present disclosure, while the precise term “Boolean” isunderstood as applying to variables with only two states, its extensionthrough the use of the terms “Boolean-like”, “Boolean-based” or the likeis used to imply that there may (although not necessarily) existvariables that exist in more states. As such, in situations where avariable may have more than two states, such states may exist as part ofa Boolean-based logic schema that may be indicated throughdecision-based flow charts or the like.

Within the first eleven figures of the present disclosure, the term“wearer” is meant to include a person, whether infected with acontagious disease or other known medical condition or not. In addition,the term may be applied to a person who is in need of health or locationmonitoring through the wearable electronic device 100, regardless ofwhether such person is or is not infected or at risk of becominginfected. Such other people may include those that are under the presentcare of a family member, doctor, nurse or other professional caregiver.In yet another form, the wearer may be a dog, cat, other pet, livestockor the like that may benefit from the geofencing capability discussedherein. Accordingly, the various terms used herein to identify thewearer of the wearable electronic device 100 as a “wearer”, “person”,“user”, “individual”, “worker” or “patient” are deemed to be equivalentswithin the present disclosure, and that any greater degree ofspecificity of such terms will be apparent from the context. Aspreviously noted in conjunction with FIG. 12 , such wearer W will beunderstood to refer to the service technician or related worker thatintends on engaging with the hazard-prone environment as part of his orher inspection, repair, diagnostics or related official duties and hasattained a suitable authentication state AS.

Within the present disclosure, it will be understood that theoperations, functions, logical blocks, modules, circuits, and algorithmor model steps or events described may be implemented in hardware,software, firmware or any combination thereof. Moreover, if implementedin software, such operations may be stored on or transmitted over as oneor more instructions or code on a computer-readable medium. The steps orevents of a method, algorithm or ensuing model disclosed herein may beembodied in a processor-executable software module, which may reside ona tangible, non-transitory version of such computer-readable storagemedium such that the medium be in any available form that permits accessto the events or steps by a processor or related part of a computer. Byway of example, and not limitation, such non-transitorycomputer-readable medium may comprise RAM, ROM, EEPROM, CD-ROM or otheroptical disk storage, magnetic disk storage or other magnetic storagedevices, flash memory or any other form that may be used to storedesired program code in the form of instructions or data structures andthat may be accessed by a processor or related part of a computer.Combinations of these examples and their equivalents are also includedwithin the scope of non-transitory computer-readable media discussedherein. Additionally, the operations of a method, algorithm or model mayreside as one or any combination or set of codes or instructions on suchtangible, non-transitory machine readable medium or computer-readablemedium, which may be incorporated into a computer program product.

Within the present disclosure, terms such as “preferably”, “generally”and “typically” are not utilized to limit the scope of the claims or toimply that certain features are critical, essential, or even importantto the disclosed structures or functions. Rather, these terms are merelyintended to highlight alternative or additional features that may or maynot be utilized in a particular embodiment of the disclosed subjectmatter. Likewise, it is noted that the terms “substantially” and“approximately” and their variants are utilized to represent theinherent degree of uncertainty that may be attributed to anyquantitative comparison, value, measurement or other representation. Assuch, use of these terms represents the degree by which a quantitativerepresentation may vary from a stated reference without resulting in achange in the basic function of the subject matter at issue.

Within the present disclosure, the use of the prepositional phrase “atleast one of” is deemed to be an open-ended expression that has bothconjunctive and disjunctive attributes. For example, a claim that states“at least one of A, B and C” (where A, B and C are definite orindefinite articles that are the referents of the prepositional phrase)means A alone, B alone, C alone, A and B together, A and C together, Band C together, or A, B and C together. By way of example within thepresent disclosure, if a claim recites that data is being acquired fromat least one of a first sensor, a second sensor and a third sensor, andif such data is being acquired from the first sensor alone, the secondsensor alone, the third sensor alone or any combination of the first,second and third sensors, then such data acquisition satisfies theclaim.

Within the present disclosure, certain terms are used to establish adegree of connectivity or related structural, physical, electrical,signal or other cooperation between various components, as well asbetween such components and users or wearers of the wearable electronicdevice. Such terms, such as “associated with” or the like, areunderstood to form an exclusive or non-exclusive relationship betweenthe components or wearers to which they refer, and will be understood asone or the other, depending on the context.

Having described the subject matter of the present disclosure in detailand by reference to specific embodiments, it is noted that the variousdetails disclosed herein should not be taken to imply that these detailsrelate to elements that are essential components of the variousdescribed embodiments, even in cases where a particular element isillustrated in each of the drawings that accompany the presentdescription. Further, it will be apparent that modifications andvariations are possible without departing from the scope of the presentdisclosure, including, but not limited to, embodiments defined in theappended claims. More specifically, although some aspects of the presentdisclosure may be identified as preferred or particularly advantageous,it is contemplated that the present disclosure is not necessarilylimited to these aspects.

It will be apparent to those skilled in the art that variousmodifications and variations can be made to the described embodimentswithout departing from the spirit and scope of the claimed subjectmatter. Thus it is intended that the specification cover themodifications and variations of the various described embodimentsprovided such modification and variations come within the scope of theappended claims and their equivalents.

What is claimed is:
 1. A method of selectively granting a user to accessto a hazard-prone environment, the method comprising: arranging acommunication network to comprise a wearable electronic device such thatupon use the wearable electronic device signally connects thehazard-prone environment to a backhaul over the communication networkusing: a short-range communication protocol between the hazard-proneenvironment and the wearable electronic device; a low power wide areanetwork protocol between the wearable electronic device and a gateway;and an internet protocol between the gateway and the backhaul; andconfiguring the communication network to participate in a plurality ofaccess-granting processes comprising: an authentication process wherethe user becomes associated with the wearable electronic device; anauthorization process where the wearable electronic device sends anaccess request for the hazard-prone environment to the backhaul; and asensing process that receives results from the authentication andauthorization processes such that messages that are generated by thesensing process are combined in response to a series ofsituation-specific conditional inquiries to form an instruction that isused by the hazard-prone environment to selectively grant or deny theuser access thereto.
 2. The method of claim 1, wherein theauthentication process comprises a plurality of activities comprising atleast one of creating a profile with an access level for the user andassigning the wearable electronic device to the user.
 3. The method ofclaim 1, wherein the authorization process comprises a plurality ofactivities comprising using the wearable electronic device to convey anaccess request signal to the backhaul and providing a determination tothe hazard-prone environment of whether or not the user is authorized togain access thereto.
 4. The method of claim 1, wherein the sensingprocess comprises acquiring state data related to one or more componentsthat make up the hazard-prone environment.
 5. The method of claim 1,wherein the hazard-prone environment comprises a confined space with atleast one covered access portal through which the user may pass, thecovered access portal cooperative with a locking mechanism toselectively keep the covered access portal in either an open or closedstate.
 6. The method of claim 5, wherein the communication networkinstructs the locking mechanism to selectively lock or unlock thecovered access port.
 7. The method of claim 1, wherein the instructionthat is used by the hazard-prone environment is further used to generateindicia of the access state to the user through the wearable electronicdevice.
 8. The method of claim 1, wherein during operation theshort-range communication protocol forms a dynamic geofence between thewearable electronic device and the hazard-prone environment.
 9. Themethod of claim 1, wherein the backhaul comprises at least one of afacility administration portal, server and the cloud.
 10. The method ofclaim 1, wherein the series of situation-specific conditional inquiriescomprise Boolean-based conditional inquiries.
 11. A communicationnetwork to selectively grant a user access to a hazard-prone environmentwithin an industrial setting, the communication network comprising: asource node configured to exchange data over a plurality of wirelesscommunication protocols; and a peripheral node situated within theindustrial setting, wherein the source node and the peripheral node aresignally cooperative with one another to create a plurality ofsub-networks within the communication network, the plurality ofsub-networks comprising: a personal area network to communicate signalsbetween the source node and the peripheral node using a short-rangecommunication protocol; and a low power wide area network to communicatesignals between the source node and at least one gateway such that asignal received by the gateway from the peripheral node through thesource node is conveyed to a backhaul by the gateway over an internetprotocol network, whereupon the communication network participates in aplurality of access-granting processes comprising: an authenticationprocess where the user becomes associated with the source node; anauthorization process where the source node sends an access request forthe hazard-prone environment to the backhaul; and a sensing process thatreceives results from the authentication and authorization processessuch that messages that are generated by the sensing process arecombined in response to a series of situation-specific conditionalinquiries to form an instruction that is used by the source node toselectively grant or deny the user access to the hazard-proneenvironment.
 12. The communication network of claim 11, wherein thesource node comprises a wearable electronic device.
 13. Thecommunication network of claim 12, wherein the instruction is formed ona computer system that is formed as a part of at least one of thewearable electronic device and the backhaul.
 14. The communicationnetwork of claim 13, wherein the computer system is configured toaggregate the series of situation-specific conditional inquiries into aBoolean-based access state.
 15. The communication network of claim 11,wherein the personal area sub-network comprises a Bluetooth Low Energycommunication protocol.
 16. The communication network of claim 11,wherein a dynamic geofence is formed between the source node and theperipheral node.
 17. A communication network to selectively grant a useraccess to a confined space within an industrial setting, thecommunication network comprising: a source node configured to exchangedata over a plurality of wireless communication protocols; and at leastone peripheral node situated within the industrial setting, wherein thesource node and the at least one peripheral node are signallycooperative with one another to create a plurality of sub-networkswithin the communication network, the plurality of sub-networkscomprising: a personal area network to communicate signals between thesource node and the at least one peripheral node using a short-rangecommunication protocol; and a low power wide area network to communicatesignals between the source node and at least one gateway such that asignal received by the gateway from the at least one peripheral nodethrough the source node is conveyed to a backhaul by the gateway over aninternet protocol network, whereupon the communication networkparticipates in a plurality of access-granting processes comprising: anauthentication process where the user becomes associated with the sourcenode; an authorization process where the source node sends an accessrequest for the confined space to the backhaul; and a sensing processthat receives results from the authentication and authorizationprocesses such that messages that are generated by the sensing processare combined in response to a series of situation-specific conditionalinquiries to form an instruction that is used by the source node toselectively grant or deny the user access to the confined space.
 18. Thecommunication network of claim 17, wherein the source node comprises afirst wearable electronic device and the at least one peripheral nodecomprises at least one of an access portal, a hinged cover, a confinedspace ventilation sub-system, a handheld atmospheric gas meter and asecond wearable electronic device.
 19. The communication network ofclaim 18, wherein the wearable electronic device is configured as anedge-based platform.
 20. (canceled)
 21. (canceled)
 22. (canceled) 23.(canceled)
 24. (canceled)
 25. (canceled)
 26. (canceled)
 27. (canceled)28. (canceled)
 29. (canceled)
 30. (canceled)
 31. (canceled)