Systems and methods for mobile tracking, communications and alerting

ABSTRACT

A mobile device that can optionally communicate with a server, the mobile device including latitude/longitude determining capabilities, a display, a data communication system and a power source. The mobile device can be used to communicate, provide location information, track an individual, as well as allow alerting, such in a case of an emergency. This location information could be accompanied with one or more of video information, audio information, multimedia information, and pictures taken by the mobile device. The mobile devices also allow inner-communicability among the devices such as text messaging, chat, voice communications, and the like. The capabilities of the mobile device can also be used to determine if the device has traversed a geo-fence, or defined electronic perimeter, with the crossing of the perimeter capable of triggering special functionality such as the turning on of the mobile device, or smart phone, sending an alert, altering functionality, or the like.

RELATED APPLICATION DATA

This application is a continuation of U.S. patent application Ser. No.16/800,136 filed Feb. 25, 2020, which is a continuation of U.S. patentapplication Ser. No. 16/533,693 filed Aug. 6, 2019, which is acontinuation of U.S. patent application Ser. No. 16/207,323 filed Dec.3, 2018, which is a continuation of U.S. patent application Ser. No.15/658,568 filed Jul. 25, 2017, which is a continuation of U.S. patentapplication Ser. No. 15/375,775 filed Dec. 12, 2016, which is acontinuation of U.S. patent application Ser. No. 15/097,752 filed Apr.13, 2016, which is a continuation of U.S. patent application Ser. No.13/254,898 filed Nov. 28, 2011, national stage application under 35U.S.C. 371 and claims the benefit of PCT Application No.PCT/US2010/026316 filed Mar. 5, 2010 which claims the benefit of andpriority under 35 U.S.C. § 119(e) to U.S. Patent Application No.61/263,446, filed Nov. 23, 2009, entitled “NIMS-IMPACT Mobile Man Down,”and U.S. Patent Application No. 61/158,130, filed Mar. 6, 2009, entitled“First Responder Access Command & Control,” the entire disclosures ofeach of which are incorporated herein by reference.

FIELD

An exemplary embodiment of this invention relates to an architecturesupporting one or more of tracking, communications, and alerting. Morespecifically, an exemplary embodiment of this invention is related toone or more of a client-server and client-client system that providesthe ability to one or more of track, communicate, alert, and loginformation.

BACKGROUND

First responders, public safety officials, military and others haveexperienced difficulties in communicating with each other, especiallyduring an emergency, for various reasons. For example, there have beenreported instances where firefighters and police officers in anemergency type situation having not been able to communicate with eachother, even though they are using equipment from the same vender. Mostof the types of communication devices available are simple devices thatallow, for example, walky-talky type communicability among one or moreindividuals.

SUMMARY

While many previously separate devices are being collapsed intomulti-function devices versus separate or partially converged devices,there are a tremendous amount of drawbacks associated with thesedevices. First, they do not allow for richer multimedia-typecommunicability. Additionally, they lack the ability to capitalize onsuch technologies as GPS, cell tower triangulation, as well as therichness and dynamism that can be provided by a graphical interface,such as a touch-screen device. Third, they are unable to providelocation information.

An exemplary embodiment of this invention is directed toward a mobiledevice that can optionally communicate with a server, the mobile deviceincluding latitude/longitude determining capabilities, a display, a datacommunication system, and a power source. In operation, and inaccordance with one exemplary embodiment, the mobile device can be usedto communicate, track an individual, as well as allow alerting, such ina case of an emergency.

For example, assume there is an emergency on the 100 block of MainStreet. As first responders begin responding to the emergency, aperimeter, such as a geo-fence, can be established that defines the cityblock around 100 Main Street. As each first responder arrives, and uponentry into the perimeter, their mobile device can enter a special modeof operation that allows one or more specific types of functionality.For example, upon entry into the perimeter, the mobile device can begintracking the first responder and optionally forwarding latitude andlongitude information regarding the position of the first responder to,for example, a centralized system or one or more other team members.

In accordance with one exemplary embodiment, this location informationis sent to a centralized command and control server that facilitatesorganization of the first responders' activities at the scene of theemergency. As first responders traverse through the scene of theemergency, the mobile device can one or more of automatically,semi-automatically, or upon a user requests, take pictures, video, audiorecordings, or in general any capability associated with the mobiledevice and have this information again sent to the centralized commandand control unit (or another team member(s)).

Additionally, provided on the display of the mobile device can beinformation regarding fellow first responders such that, for example,when responding to a fire emergency, each first responder knows theposition of the other first responders in the area. As will beappreciated, this information could be color coded based on the variousteams, type of first responder, experience level, capabilities, and thelike. For example, individuals associated with ladder team 51 could beshown on the display of the mobile device with red icons, where policeare shown with blue icons, and civilians that need rescuing shown withflashing red icons. With this new enhanced type of communicability,additional information can also be sent to the first responders such as,maps, blueprints, and in general any information that can assist thefirst responders with responding to the emergency. To facilitatecommunications, each mobile device can be equipped with walky-talky likecommunications functions, as well as cellular phone functionality, textmessaging, SMS, multimedia messaging, and in general any type ofcommunicability that is supported by the mobile device.

Since each mobile device can have a unique identifier, this also allowstargeted communications between, for example, the mobile commander andthe one or more devices. In accordance with an exemplary embodiment, themobile commander can send information, messages, video information,multimedia information, pictures, schematics, blue prints, or the like,to one or more groups of people at the emergency. For example, if themobile commander desires to alert the firefighters of hazardousmaterials in a particular commercial building on the 100 block of MainStreet, this information could be forwarded to all the firefightersmobile devices with, for example, instructions as to precautionarymeasures that need to be taken because of the hazardous materials.

This could be facilitated by a multiple team view that could be providedto the mobile commander in, for example, a mobile command interface.This mobile command interface could include information about one ormore groups, individuals, and mobile devices within, for example, apredefined area. As discussed, this mobile command view could be of theentire block of 100 Main Street that includes, for example, one or moreof satellite imagery, topographical information, street map information,radar information, aerial view information, street-view information,schematics or blueprints of one or more facilities within the area,weather information, and in general any information as selected by themobile commander.

In accordance with another exemplary embodiment, the various viewsprovided to, for example, an incident manager can be scaled, forexample, proportional to the incident. For example, in the instance of anational emergency, an entire view of the country can be seen, with eachregion drillable into to get more specific information about the variousteams, first responders, incidents, and activities that are going onwithin that region. Thus, the system architecture can be scaled to anylevel, with, for example, a granular level being a single team member ata single incident, all the way up to national or international events.In general, a “management view” of the system can be based on one ormore of location information of one or more mobile devices, trackinginformation associated with the mobile devices, status of the mobiledevices, client information about the mobile devices, such aspermissions, description of the individual(s) associated with the mobiledevice, and the like. In addition, the system can be provided withmapping information, access control information, the capability to logone or more aspects of a “mission” as well as the ability to inject oneor more applications, as discussed in greater detail hereinafter.

Another exemplary embodiment is directed toward use of the technologyherein for facilitating communications, and tracking of, for example,friends and family. This can be illustrated with reference to a simpleworking example. Say a family decides to go on vacation to a specifictheme park. This family has three children and is intending to spendseveral days at this particular theme park. Upon arrival of the themepark, one of the parents can define the perimeter of the theme park, (ordownload the perimeter provided by the theme park) and through amanagement interface, have this perimeter information pushed to each ofthe children's' mobile devices. Thus, as the family enjoys themselves atthe theme park, the parent(s) can be provided real-time, ornear-real-time information about the location of each of their childrenwithin the theme park.

As will appreciated, and depending on the capabilities of the mobiledevice, this location information could be accompanied with one or moreof video information, audio information, multimedia information, andpictures taken by the mobile device. As discussed, these mobile devicesalso allow inner-communicability among the family such as textmessaging, chat, voice communications, and the like.

One unique aspect of this invention is what happens should one of thechildren leave the predefined perimeter. As will be appreciated, thedeparture from the predefined area could be voluntary or, for example,in the case of an abduction not at the choice of the child. Crossing ofthe perimeter can trigger one or more of special actions, and a specialmode of operation of the mobile device to help assist with managing thesituation. For example, in an emergency-type situation, assuming therehas been an abduction, the mobile device can go into a special emergencymode and not only provide location information to the parent, but alsocontact the local authorities with location information. This could becoupled with the phone automatically taking certain actions, such astaking photographs, videos, audio information of the surroundings, andhaving one or more of these types of information forwarded to the parentand/or local authorities. In conjunction with one exemplary embodiment,this special emergency mode type operation can be performed in thebackground such that neither the user, nor the abductor, would be awarethat the mobile device is transmitting this information. Coupled withmaintaining current location information, the phone can operatedynamically based on, for example, remaining battery power. This couldhelp ensure the safe recovery of the abducted child. For example, thephone can monitor the battery life remaining and adjust the updatefrequency of the location-determining processes. In a similar manner,the frequency with which the phone communicates information, such as thelocation information, audio, video, or multimedia information, can bereduced, to help ensure that the appropriate parties are receivinginformation from the mobile device for as long as possible, to helpensure safe recovery of the abducted child.

In another example, say where a child voluntary leaves the perimeter,perhaps the child is a teenager simply wanting to cross the street tovisit a local fast food chain. Upon the child exiting the perimeter, analert could be triggered at one or more of the parents' mobile devices,with the immediate communication session established between theparents' device and the child's device. The parent could then query thechild and determine the child was simply going to the fast food chain,and would be returning to within the perimeter within 20 minutes. Inthis instance, there may be no need to contact the local authoritiessince the child's activity is merely routine.

In another exemplary embodiment, and in a similar manner, thefunctionality of the mobile device could be used amongst a group offriends who are going hiking. The mobile device could be populated withvarious maps, such as satellite and/or topographic maps, and can includegraphically the position of the other friends on each of the friends'mobile devices. If the mobile device is equipped with a touch-screeninterface, by selecting an icon associated with another friend, a usercan communicate with that other friend, send information to the otherfriend, such as a picture, video, text message, or the like. Moreover,the message can be sent to the entire group of friends and informationexchanged between any one or more of the group. In the event one memberof the group is hurt, the interface can be provided with an “emergency”icon that triggers special functionality of the mobile device. Forexample, upon selecting the emergency icon, current longitude andlatitude information, as well as an automatic picture can be forwardedto one or more of the remaining members of the group. If currentlatitude and longitude information is not available, the last know goodposition could be forwarded in a similar way to one or more of the othermembers of the group. As will be appreciated, this current locationinformation can be determined in accordance with one or more of GPScoordinates, and/or triangulation based on the use of one or more cellphone towers.

To further facilitate communication between one or more mobile devices,another exemplary embodiment is directed toward a peer-to-peer mode thatuses Wi-Fi communication, such as 802.11, to establish an add-hocnetwork between one or more mobile devices. This ad-hoc network cancarry information, such as voice information, pictures, videos,multimedia information, or in general, any information between themobile devices, without requiring the use of a cellular provider.

Another exemplary embodiment is directed toward the ability for one ormore devices to control functionality of one or more other devices. Forexample, over-the-air programming (OTA) that includes, for example,over-the-air service provisioning (OTASP), over-the-air provisioning(OTAP), or over-the-air parameter administration (OTAPA) allow a user amethod to distribute software, applications, or parameters, to, forexample, a cell phone, smart phone, or a provisioned handset. Thisprovisioning can include one or more of software applications, devicefunctionality settings, service updates, as well as software updates.This type of remote provisioning allows several exemplary features ofthis invention to be enabled. First, a mode of operation of the smartdevice can be manipulated. For example, and using an example of apredefined perimeter, devices within that perimeter, or upon enteringthat perimeter, can be forced into a special mode of operation. Say theperimeter is defined as a movie theatre, and upon entry into the movietheatre perimeter, all devices are provisioned with the appropriatesettings to be in a silent-only mode. Similarly, and as discussed abovein relation to the child abduction scenario, upon the authoritiesverifying that the child abduction has occurred, OTA can be utilized toplace the mobile device in a special mode of operation that facilitatesrecovery of the abducted child.

Utilizing OTA, there are tremendous numbers of opportunities availablefor disseminating information, monitoring devices functionality, andchanging the mobile devices operation as will be appreciated from thedescription of the detail embodiments discussed hereinafter.

Another exemplary embodiment takes advantage of the trackingfunctionality to facilitate first responder effectiveness. For example,in the event of an evacuation, there are undoubtedly individuals who forwhatever reason do not desire to leave their premises. Instead ofrequiring one or more first responders to ensure the safety of theindividual who does not desire to leave, the individual's mobile devicecan be “tagged” and placed in a special operation mode, thereby allowingthe first responders to track the location of that individual. Forexample, in a first exemplary embodiment, the individual that does notdesire to leave can be asked for their phone number, and the firstresponders forward this phone number to an incident manager that entersit into a centralized command interface (thereby “tagging” the device)that allows the ability to track that mobile device. Furthermore, and asdiscussed above in relation to the ability to use over-the-airprogramming, one or more software applications can be injected on themobile device that provides, for example the individual with one or moreicons, such as an emergency icon, and the like that the user can selectif they find themselves in trouble.

In accordance with a second exemplary embodiment, a perimeter can bedefined and all mobile devices within that perimeter can be “tagged” toallow tracking. Furthermore, the one or more mobile devices within theperimeter can also be injected using, for example, OTA, and populatedwith, for example, a client application that facilitates theirwellbeing. As will be appreciated, this client can also receiveemergency information, alert information, directions for local lawenforcement officers or in general any information from, for example, anincident commander and/or public service official.

In accordance with yet another exemplary embodiment, one or more mobiledevices, within, for example, a predefined area, based on a list ofdevice identifiers, or the like, could surreptitiously be injected withone or more of software applications, information, or the like, tofacilitate, for example, incident management. Once injected, the mobiledevices could be tracked, and, as discussed above, could receiveindividual or group instructions or information, evacuationinstructions, maps to the closest safe location, or in general anyinformation as will be appreciated from the following detaileddescription.

Other exemplary embodiments are directed toward one or more ofEnterprise-Trac™, Team-Trac™ and Family-Trac™. With each of thesedifferent tacking operational modes, various functions can be performedon the mobile device to facilitate the tracking and intercommunicationscapability between one or more team members, family members, andenterprise members.

In accordance with another exemplary embodiment, the traversing of ageo-fence, or defined electronic perimeter, can also trigger specialfunctionality such as the turning on of the mobile device, or smartphone. For example, most smart phones typically operate in apower-saving mode, even though they are turned “off.” In accordance withone exemplary embodiment, even though the phone is turned off from auser's perspective, the location functionality according to thisinvention could be running in the background, and that locationinformation compared to an electronic perimeter. Upon the traversing ofthat perimeter, the operation of the mobile device or smart phone couldbe altered as discussed. This could be used, for example, when a firstresponder is responding to an incident, and is clearly distracted withthe emergency situation. By using this technology, the first responderwould not need to remember to turn on their device, but the device couldautomatically be turned on once they are found to have crossed theperimeter, or entered into the perimeter that was defined as a result ofthe incident.

In addition to the above functionality, one or more of the server andmobile client can be equipped with logging functionality, this capableof logging any aspect of the server's and/or mobile device's activity.This can include one or more of location information, communicationsinformation, multimedia information, video or picture information,software injection information, mode of operation of the deviceinformation, and in general any information.

Accordingly, an exemplary embodiment is directed toward enhancedcommunications.

An additional exemplary aspect is directed toward facilitatingcommunications between one or more mobile devices, such as smart phones,handheld radios, and/or communications devices.

Additional aspects are also directed toward a client-server architecturethat facilitates incident management.

Even further aspects are directed toward equipping a mobile device withtracking capability, the tracking information capable of being used forone or more of incident management, search and rescue, family safety,outdoor activities, and the like.

Even further aspects are directed toward a scalable incident managementarchitecture that can be used on one or more of international, national,state, local, or incident-level.

Even further aspects are directed toward a server equipped with one ormore of a database having location data, a tracking capability, a statusdetermination capability, access control capabilities, mappingcapabilities, logging capabilities, and a software injection capability.

Additional aspects are directed toward a mobile device, such as a smartphone, PDA, cellular phone, dedicated mobile device, handheld radio, orthe like, with the ability to maintain one or more client lists, theability to determine a last known good location, location determiningmeans, perimeter management means, an alerting capability, a loggingcapability, a communications capability that includes one or more ofvoice, text, pictures, video, and multimedia information, a mappingcapability, a preference capability, as well as peer-to-peercommunications capabilities. A mobile device could also be equipped withone or more special operational mode capabilities, such as an emergencymode, a forced wake-up based on one or more of a predefined eventoccurring, or at the request of one or more other users.

Even further aspects of the invention are directed toward an interface,such as a touch-screen interface, provided on the mobile device. Thetouch-screen interface can include selectable icons, such as one or moreof a map icon, a user icon, a voice chat icon, a send help icon, asnapshot icon, a video icon, a silent icon, a private network icon, aconnect icon, an inject icon, a command messages icon, a map layersicon, an e-mail icon, a message icon, a settings icon, an about icon,and an exist icon, each with a corresponding functionality.

Even further aspects are directed toward a mobile device with aperimeter management function, that can facilitate one or more ofdefining a perimeter(s), defining actions that are to occur upon entryinto and/or exist from the perimeter, and an operation within theperimeter.

Even further aspects are directed toward a server that is capable ofmanaging one or more other servers, and/or mobile devices within aparticular environment.

Even furthers aspects of the invention are directed toward apeer-to-peer communications architecture that allows communicationsbetween one or more mobile devices without the need for cellularservice.

Even further aspects of the invention are directed toward an injectionmode, that is capable of injecting one or more of a softwareapplication(s), parameters, and an instruction to one or more mobiledevices.

A further aspect of the invention is directed toward dynamicallyupdating a mode of operation based on a sensed battery level.

Additional aspects are directed toward a mobile device having “man down”capabilities that facilitate management of one or more first responders.

Even further aspects are directed toward a mobile device operating witha Man Down client.

Additional aspects are directed toward providing location informationfor one or more other team members using the man down architecture.

Even further aspects are directed toward providing one or more of anational incident command view, a regional command view, and an incidentcommand view with each view being drillable into for more detailedinformation.

Additional aspects relate to utilizing detected remaining battery powerin a mobile device to affect one or more of update times, operation ofand display of maps, and general operation of device.

These and other features and advantages of this invention are describedin, or are apparent from, the following detail description of theexemplary embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The exemplary embodiments of the invention will be described in detail,with reference to the following figures, wherein:

FIG. 1 illustrates an exemplary communications environment according tothis invention;

FIG. 2 illustrates an exemplary interface on a Man Down client accordingto this invention;

FIG. 3 illustrates an exemplary settings menu according to thisinvention;

FIG. 4 illustrates another exemplary settings menu according to thisinvention;

FIG. 5 illustrates another exemplary settings menu according to thisinvention;

FIG. 6 illustrates another exemplary settings menu according to thisinvention;

FIG. 7 illustrates another exemplary settings menu according to thisinvention;

FIG. 8 illustrates exemplary map settings according to this invention;

FIG. 9 illustrates an exemplary national view of team managementaccording to this invention;

FIG. 10 illustrates an exemplary view of regional team managementaccording to this invention;

FIG. 11 illustrates an exemplary team map according to this invention;

FIG. 12 illustrates an exemplary connection request according to thisinvention;

FIG. 13 illustrates an exemplary mapped team according to thisinvention;

FIG. 14 illustrates an exemplary help request according to thisinvention;

FIG. 15 illustrates an exemplary map associated with a help requestaccording this invention;

FIG. 16 illustrates an exemplary communicated image according to thisinvention;

FIG. 17 illustrates an exemplary perimeter according to this invention;

FIG. 18 illustrates an exemplary team management interface according tothis invention;

FIG. 19 is a flow chart outlining an exemplary method for trackingindividuals according to this invention;

FIG. 20 is a flow chart outlining an exemplary method of the operationof the Man Down client according to this invention;

FIG. 21 is a flow chart outlining an exemplary method for perimetermanagement according to this invention;

FIG. 22 is a flow chart outlining an exemplary alert method according tothis invention;

FIG. 23 is a flow chart outlining an exemplary method for peer-to-peercommunication according to this invention;

FIG. 24 is a flow chart outlining an exemplary method of operation foran emergency mode according to this invention;

FIG. 25 is flow chart outlining an exemplary method for softwareinjection according to this invention; and

FIG. 26 is a flow chart outlining an exemplary method for operationsmanagement based on the detected battery level according to thisinvention.

DETAILED DESCRIPTION

The exemplary embodiments of this invention will be described inrelation to communications systems and security systems. However, itshould be appreciated, that in general, the systems and methods of thisinvention will work equally well in other types of communicationsenvironments, networks and/or protocols.

The exemplary systems and methods of this invention will also bedescribed in relation to wired and/or wireless communications devices,such as mobile devices, PDA's, cellular phones, radios, Blackberry®,iPhone®, iPad®, mobile computers, laptops, tablet PC's, smart phones,netbooks, and the like. However, to avoid unnecessarily obscuring thepresent invention, the following description omits well-known structuresand devices that may be shown in block diagram form or are otherwisesummarized or known.

For purposes of explanation, numerous details are set forth in order toprovide a thorough understanding of the present invention. It should beappreciated however that the present invention may be practiced in avariety of ways beyond the specific details set forth herein.

Furthermore, while the exemplary embodiments illustrated herein show thevarious components of the system collocated, it is to be appreciatedthat the various components of the system can be located at distantportions of a distributed network, such as a communications networkand/or the Internet, or within a dedicated secure, unsecured, and/orencrypted system. One or more of the various components/modules couldalso be converged into one or more of the other illustratedcomponents/modules.

Thus, it should be appreciated that the components/modules of the systemcan be combined into one or more devices, such as a mobile device,radio, incident management and tracking system, and the like. As will beappreciated from the following description, and for reasons ofcomputations efficiency, the components of the systems can be arrangedat any location within a distributed network without affecting theoperation thereof. One or more functional portions of this system couldalso, for example, be distributed between a mobile device and anassociated server.

Furthermore, it should be appreciated that the various links, includingthe communications channels connecting the elements can be wired orwireless links or any combination thereof, or any other known or laterdeveloped element(s) capable of supplying and/or communicating data toand from the connected elements. The term module as used herein canrefer to any known or later developed hardware, software, firmware, orcombination thereof, that is capable of performing the functionalityassociated with that element. The terms determine, calculate, andcompute, and variations thereof, as used herein are used interchangeablyand include any type of methodology, process, technique, mathematicaloperation or protocol.

FIG. 1 illustrates an exemplary communications environment according toan exemplary embodiment of this invention. In particular, thecommunications environment 1 includes one or more servers, such as mandown (MD) server 100, and one or more clients, such as man down client200. The various servers and clients are interconnected via one or morelinks 5 and networks 10 in cooperation with one or more cellularcommunications towers and/or access point 7. Each server 100 includes adatabase 105, tracking module 110, status module 115, client list module120, mapping module 125, access control module 130, injection module135, logging module 140, emergency/special mode module 145, commandhandler/API 150, processor 155 and storage 160.

Each client 200 is an electronic mobile device, such as a PDA, smartphone, radio, cellular phone, or in general any communications devicecapable of performing any one or more of the functions described herein.An exemplary client 200 includes a client list module 205, a last knowngood module 210, a location module 215, perimeter module 220, alertingmodule 225, logging module 230, communications module 235, mappingmodule 240, interface management module 245, peer-to-peer module 250,perimeter action module 255, emergency/special mode module 260, powermanagement module 265, a display 270, a command handler/API 275, acontroller 280, memory 285, and other well known conventionalcomponentry.

In accordance with one exemplary embodiment, the client 200 includes adisplay 270, such as a touch-screen display and can optionally includeone or more of a microphone, camera, video camera, web browser, andmultiple communications capabilities, such as cellular, Wi-Fi,Bluetooth®, and in general any communications protocol that allows oneor more of transfer of data and/or voice information.

As discussed, one or more of the server 100 and client 200 are capableof intercommunication to facilitate one or more of tracking, firstresponder communication, information sharing, location identification,team management, and logging, just to name a few.

The client 200 is typically associated with a single individual,however, could also be associated with a team including a plurality ofindividuals, which may also include equipment and/or additionalresources, such as search and rescue dogs, and the like. Additionally,while the exemplary embodiments discussed herein will be directed towarda client being associated with an individual, it should be appreciatedthat a client could be associated with any one or more human, animal, ortangible assets, such as equipment, supplies, or the like. Furthermore,it should be appreciated that the various clients 200 and server 100 arecapable of intercommunication via one or more wired or wirelessnetworks, satellite communications, and in general any communicationsprotocol that is capable of communicating one or more of data and/orvoice information.

In general, the server 100 assists with maintaining and managinginformation regarding one or more clients 200, and also cooperates withone or more clients 200 for certain functionality.

In general, database 105 maintains information about one or more clients200, such as location data (both current and historical), settingsinformation, user information, device information, and in general anyinformation specific to one or more of the client itself and theassociated user, team, equipment, or supplies. The tracking module 110obtains location information from one or more clients 200, with thislocation information being stored in the database 105, and the trackinginformation capable of being displayed on one or more display devices(not shown) that indicate the current location of the client 200. Aswill be discussed in greater detail hereinafter, the tracking module 110can coordinate with the mapping module 125 such that one or more mapscan be combined and shown with current location information of one ormore clients 200. In addition, historical information can be provided onthe map, such as the path over which a client 200 has traversed over aparticular period of time.

The status module 115 maintains status information such as last knowngood location, user status, current connectivity status to server 100and/or one or more other clients 200, and can in general store anyinformation about the status of one or more clients 200.

The mapping module 125 assists with providing maps that may be populatedwith one or more user's locations, with the mapping module 125 capableof supporting one or more of a street view, topographic view, radarview, aerial view, schematic view, weather-based view, a custom view, aswell as one or more of chemical and/or biological information.

The access control module 130 cooperates with the database 105 that ingeneral manages access to the server 100 as well as optionally controlsthe various types of communications that can be exchanged, user rightsand permissions, and in general any functionality associated with usermanagement and administration.

As will be discussed in greater detail hereinafter, the injection module135 can be used to inject one or more of software, applications,parameters, perimeters, settings, or the like, into one or more clients200. In addition, the injection module can be used as a remote SMS (TextMessaging) control tool. More specifically, by using a specially craftedSMS message(s) (or comparable message or instruction), the injectionmodule is able to start up one or more applications on the mobilecommunications remotely and, for example, have the mobile communicationsdevice connect to the server and/or another client. The application(s)can be started in a standard mode or a hidden mode (where the user isunaware the application has started/is running).

The logging module 140, again cooperating with the database 105, iscapable of logging any one or more aspects of the operation of theserver 100 and one or more clients 200.

The emergency/special mode module 145 is in general used to facilitate aspecial mode of operation and/or special actions that are to occur inthe event of an emergency. It should be appreciated however, that thespecial modes associated with this module are not necessarily emergencydependent, but could be for any type of occasion where a specialoperational mode is desired.

As discussed, the server 100 will typically be used by an incidentcommander, manager, parent, supervisor, or other entity in charge ofmanaging, tracking, and directing, one or more clients. As will beappreciated, the server 100 and functionality therein could be accessedvia, for example, a mobile device, such as a tablet PC, laptop, or othersimilar interface that provides visibility into the functionalitycontained therein. For example, in a first responder type environment,an incident commander could be located in close proximity to an incidentand may have a laptop with wireless connectivity that is capable of oneor more of controlling, accessing, and displaying information managed bythe server 100.

Furthermore, as alluded to earlier, there may be a hierarchy of servers100, with, for example, a first server managing a local incident, asecond server managing a plurality of local incidents, and a third severmanaging all incidents on, for example, a national or internationalbasis. As is to be appreciated, the architecture disclosed herein can bescaled as necessary to accommodate the type of environment in which itis deployed. Furthermore and in cooperation with the access controlmodule 130, access and information sharing between one or more serverscan be controlled as necessary. For example, in the event of classifiedinformation, the dissemination of this information can be restricted inaccordance with an access control module rule set as well as rulesestablished that control the flow of information either up the serverchain, or down the server chain, including whether or not theinformation can be disseminated to one or more clients 200. The server100 may also include similar functionality to that discussed in relationto the client 200, such as communications module 235, which allows forvarious types of communications to be exchanged therebetween.

Similar high level functionalities associated with the various modulesin the client 200 will be highlighted below, with more detaildiscussions provided hereinafter. More specifically, the client listmodule 205 maintains one or more client lists, the information containedtherein capable of being used with the access control module 130 tomanage the interconnectivity of the client 200 with one or more otherclients and servers, as well as such information as an “address” thatcan include information such as phone numbers, IP addresses, device IDs,and the like, to facilitate intercommunicability amongst one or moreclients.

The last known good module 210 cooperates with the location module 215to track and maintain information regarding the last known good locationof the client. The last known good module 210 can cooperate with atracking module 110 and status module 115 to ensure the most up-to-datelast known good location is known such that in the event of lostcommunication between the client and the server (or a GPS satellite),the server, and in particular the status module 115 knows the last knowngood location of the client. The last known good module 210 also allowsfor location sensing failover across various triangulation techniqueswith a ‘most accurate’ capable of being selected.

The location module 215 is capable of at least determining a currentlatitude and longitude of the client 200. This can be based on one ormore of GPS information, satellite triangulation, cell towertriangulation, or in general any technique that is capable of providinglongitude and latitude information. This can also be coupled withaltitude information and/or floor information, with the cooperation of,for example, access points within a building. For example, the distanceto one or more access points, optionally using triangulationtherebetween, can help determine what floor the client is on in, forexample, a high rise structure.

The perimeter module 220 allows the creation, maintenance, and editing,of one or more perimeters that are defined by a geographic boundary andcan include one or more of latitude, longitude, and altitudeinformation.

The alerting module 225 allows one or more alerts to be received andsent to one or more other clients and servers.

Similar to the logging module 140, the logging module 230 is capable oflogging any aspect of the operation of, location of, and userinteraction with the client.

The communications module 235 at least enables communications betweenone or more of other clients, and the server, the communicationsincluding one or more of voice information, text information, imageinformation, video information, multimedia information, and in generalcan include any type of communication with any type of data.

The mapping module 240 is capable of displaying on display 270, inaddition to current location information, one or more maps in a similarmanner to the mapping module 125. As is to be appreciated, the mappingmodule can also store maps for one or more areas, or could alsocoordinate with the mapping module 125 to receive maps in a real-time,or near-real-time manner from any location, such as a location on theinternet.

The interface management module 245, is optionally capable ofcooperating with the display 270, to allow one or more of userconfiguration of the client 200, as well as allow the various inputs,settings, and parameters of the client 200 to be manipulated.

The peer-to-peer module 250 allows peer-to-peer connectivity with one ormore of other clients, and the server, via one or more of 802.11, Wi-Fi,or in general any data communication protocol that may not be dependenton the availability of a cellular network infrastructure.

The perimeter action module 255 controls one or more actions that can beassociated with one or more of entry into a perimeter, exit from aperimeter, or activity within a perimeter.

The emergency/special mode 260 provides one or more emergency or specialmodes of operation of the client 200, optionally in cooperation with theemergency/special mode 145 module as will be discussed in greater detailhereinafter. Similarly, and as discussed in greater detail hereinafter,the power management module 265 is capable of managing the operation ofthe client based on one or more of current battery level, missioninformation, mode of operation, or in general any aspect of the client200.

The display 270 is capable of being, for example, the black and white orcolor display, and can optionally be a touch-screen display that isoptionally capable of displaying one or more maps in cooperation withthe mapping module 240 and the location of one or more of the positionof the client, as well as one or more other clients.

FIG. 2 illustrates an exemplary user interface, the icons thereincapable of being displayed on one or more of the client 200, such as ondisplay 270, and the server 100 on an associated display (not shown). Inparticular, the interface includes a plurality of icons such as map icon202, user icon 204, voice chat icon 206, send help icon 208, snapshoticon 210, video icon 212, silence icon 214, private network icon 216,connect icon 218, inject icon 220, command messages icon 222, map layericon 224, e-mail icon 226, message icon 228, settings icon 230, abouticon 232, exit icon 234, menu icon 236, and option icon 238, that allhave a corresponding function when selected. In addition, other iconsthat are commonly found on smart phone devices or radios can also beshown such as a signal strength icon, battery icon, volume indicatoricon, close application icon, and the like.

Upon selection of the map icon 202, and in cooperation with the locationmodule 215 and mapping module 240, map and location information, such asthat illustrated in FIG. 13, can be displayed to a user. In addition tothe current location of the client 200, the map can also be populatedwith one or more other user's locations, those other user's locationsidentified by corresponding icon/emoticon and/or textual information,such as GPS coordinates, longitude/latitude information, and/or distanceand/or direction from the client.

Upon selection of the user's icon 220, information about one or moreusers can be displayed. This information can include one or more ofdevice identification information, current location information, nameinformation, nickname information, or in general any information aboutthe associated user or device. Furthermore, and as previously discussed,since the client 200 can be associated with more than just anindividual, such as supplies, equipment, or the like, upon selection ofthe user icon 220, information about what the client is associated withcould also be displayed. Optionally, another icon such as “supplies” or“equipment” could be provided to help a user more easily distinguishother clients.

Upon selection of the voice chat icon 206, and with the cooperation ofthe communications module 235, a voice chat session can be initiatedbetween the client 200 and one or more other clients and/or one or moreservers 100. As will be appreciated, based on the various functionalmodes of operation that are discussed hereinafter, this voice chatcommunications session can occur over one or more of a wireless network,such as a cellular phone network, via Wi-Fi, and/or via directconnection, such as through a private network. The voice chatfunctionality can operate in a similar manner to a walky-talky featurethat could optionally be enriched with one or more of pictureinformation, video information, and multimedia information.

The send help icon 208, when selected sends an alert, with cooperationof the communications module 235 and alerting module 225 to one or moreof additional clients and one or more servers. In addition to a textual,picture-based, video-based, and/or multimedia based alert messages,information about the current location of the client can be provided, aswell as, if no current location information is available, the last knowngood position as recorded by the last known good module 210. In additionto the sending of an alert message, upon selection of the send help icon208, one or more additional functions can also optionally occur, such asthe automatic taking of one or more of pictures and video informationthat can optionally be sent with the alert message. This picture and/orvideo information could then be reviewed by the recipient(s) of thealert to, for example, assist with locating the client and/or derivingadditional information about the reason of the alert. In addition, uponselection of the send help icon 208, an interface can be provided thatallows for the user to enter additional information about the reason forthe help request.

The snapshot icon 210, upon selection, cooperates with a camera module(not shown) that allows the user to take one or more images that can bestored on the client 200, in memory 285, that can also optionally beforwarded, in cooperation with communications module 235 to anotherdestination, such as another client 200 or server 100. (See, forexample, FIG. 16)

The video icon 212, upon selection, operates in a similar manner to thesnapshot functionality, with the user being able to record video fromtheir device. In a similar manner, this video can be stored in a memory285 and/or distributed to one or more other destinations.

Upon selection of the silence icon 214, and in cooperation with thespecial mode module 260, a silent mode of operation can be selected forthe client 200. Additionally, and based on settings within one or moreof the client 200 and server 100, upon selection of this silent mode aninstruction can be sent to one or more other devices that forces theminto a silent mode with the cooperation of their respective special mode260.

The private network icon 216, upon selection, allows communicationbetween one or more clients and servers when, for example, a cellularnetwork connection is not available, or when, for example, users opt tocommunicate sensitive information. Thus, upon selection, the client 200,cooperating with the communications module 235, and peer-to-peer module250, establishes a wireless connection, such as via Bluetooth®, Wi-Fi,802.11, or the like to one or more other devices. Once the connectionhas been completed, any of the functions described herein such as voicechat, sending help, snapshot, video, e-mail, messages, and the like, canbe exchanged via the private network in a similar manner, that messagesthat would be communicated via, for example, a wireless cellularnetwork.

Upon selection of the connect icon 218, and in cooperation with theclient list 205, communications module 235, and optionally thepeer-to-peer module 250, the client 200 is able to connect to one ormore other clients and/or servers. For example, upon selection of theconnect icon 218, and in cooperation with interface management module245, a user interface is provided that allows a user to select one ormore users that they would like to connect to. For example, this listcan be populated dynamically based on the sensed users within apredefined area, can be pre-configured with an “address book” of users,or the like. Upon connecting to one or more other users, a user can dosuch things such as send images, video, text messages, e-mails, or ingeneral communicate in any manner with other user(s). In addition, anddepending on, for example, one or more permissions and/or the specialoperational mode of another device, upon connecting, a user may be ableto “remote in” to another device and control functionality of thatdevice. For example, a user, having received an alert from another user,may want to requests the other user's device to take a snapshot andforward that snapshot to the individual that received the help request.This could, for example, assist with determining the severity of thesituation, or the like.

The inject icon 220, upon selection, allows the injection of one or moreof software, an application(s), and/or parameters in the client 200.This can optionally be in cooperation with the injection module 135, aswell as the emergency module 260. As discussed, upon selection of theinject icon 220, and optionally based on one or more permissions,information can be downloaded to one or more other devices. Thisinformation can be, for example, new software, a software update,command instructions, parameters, or in general any informationpertinent to the client 200. Even more particularly, and in accordancewith an exemplary embodiment, this can be accomplished via OTA or OTAPand can be used during any operational mode of the device including, forexample, when the client 200 is in a power saving or “asleep” mode.

Upon selection of the command messages icon 222, one or more of commandmessages can be sent from the device to any other device and/or one moreservers. These command messages can include, for example, one or moreinstructions, and similar to the other communications modalitiesdiscussed herein, be accompanied with one or more of image information,video information, multimedia information, textual information, or thelike.

The map layer icon 224 allows a user to control the layers shown uponselection of the map icon 202. For example, and as discussed in greaterdetail hereinafter, layers such as topographical, radar, aerial, and thelike can be controlled, and well as specifics related thereto governedsuch as opacity, brightness, color, and in general any characteristicabout the map.

The e-mail icon 226, upon selection, and in cooperation with thecommunications module 235 and interface management module 245, allows auser to send an e-mail. This e-mail could be, for example, textualbased, multimedia, or the like, and can be sent to any one or more ofthe users stored within the device, or in general to any valid e-mailaddress.

The messages icon 228, upon selection, operates in a similar manner tothe voice chat functionality, with the messages being textual ormultimedia-based. More specifically, and in cooperation with thecommunications module 235, interface management module 245, and clientlist 205, a user can select one or more recipients to receive a message,with an interface then be provided that allows a user to enter messagecontent which can then be sent to the one or more selected recipients.

The settings icon 230, upon selection, allows various settings of theclient 200 to be manipulated. Some of the various settings will bediscussed hereinafter in relation to FIGS. 3-8.

Upon selection of the about icon 232, information such as deviceinformation, power level information, software version information, andthe like can be shown about the client 200.

The selection of the exit icon 234 exits the user from the application.

As discussed, additional exemplary selectable icons could also beprovided, such as menu icon 236 and options icon 238 that providesstandard functionality such as that well known in the smart phone and/oremergency radio environments.

FIGS. 3-8 illustrate exemplary interfaces that can be provided uponselection of the settings icon 230. For example, some of the exemplarysettings relate to general settings, application settings, perimetersettings, alert settings, log settings, map settings, and the like. Morespecifically, FIG. 3 allows the entry of general settings, such as afirst name 310, last name 320, and team/unit information 330,capabilities, etc. However, if the client 200 is not associated with auser, and instead is associated with, for example, equipment, supplies,or the like, this interface is amendable so that the appropriateinformation regarding whatever the client 200 is associated with can beentered.

FIG. 4 shows another exemplary settings user interface upon selection ofthe application tab 410. This interface provides, for example, theability for the user to select the showing of the soft keyboard viacheck box 420, the auto-standby functionality via checkbox 430, and thecash storage location via interface portion 440. In addition, the usercan select the frequency with which the GPS and/or location informationis updated to their peers, via interface 450. As will be discussed ingreater detail hereinafter, this update period could be automaticallyset, based on power management module 265.

FIG. 5 shows an exemplary interface that can be provided upon selectionof the perimeter tab 510. This interface, cooperating with the perimetermodule 220, allows on or more perimeters to be defined, such as viatheir latitude/longitude information 520. This information can bemanually entered by a user, or, for example, pushed or downloaded to theclient from, for example, server 100.

Interface in FIG. 6 can be displayed upon selection of the alert tabs610. More specifically, this interface can control what are the actionsthat are taken, if any, upon the exit (620) or entry (630) from adefined perimeter. In addition to be able to select whether an alertoccurs, an additional menu can be optionally provided that allows a userto enter the type of action(s) that could also be automaticallytriggered upon entry or exit from a perimeter.

FIG. 7 illustrates an exemplary interface that can be displayed uponselection of the device list tab 710. The device list 710 shows inportion 720, a list of one or more devices that are allowed to connectautomatically to the client 200. Using the “add” or “remove” buttons,the user can amend this list as necessary, and optionally, incooperation with the client list module 205 and associated client listinterface.

FIG. 8 illustrates an exemplary interface that allows selection of theone or more map characteristics the user would like to use. For example,and in accordance with one exemplary embodiment, the provided mapcharacteristics are street, topographic, radar, aerial, schematics,chemical, biological, weather, and custom. Upon selection of the OKbutton 820, and in cooperation with the mapping module 240 and display270, the displayed map is updated to according to the user selectedpreferences.

FIGS. 9-11 illustrate exemplary views that can be provided, for example,to a user associated with a client, or the server. Typically these viewswould be used by, for example, an incident commander, team lead, or thelike. In FIG. 9, a national incident command view is shown, in which acountry is divided into regions with optional team information withinspecific regions being shown. One or more teams can be color coded, suchas illustrated in interface portion 910, and upon selection of aparticular team, the details thereof provided in interface portion 920.In interface portion 920, various types of information such as nameinformation, current location information, and the like can be provided.The interface in FIG. 9 can be dynamic, and selectable such that a useris able to drill down and, upon selection of region, view interface 1010as illustrated in FIG. 10. In the interface 1010, an expanded view ofregion 9 is shown, which specific team information populated thereonagain with the team information optionally being shown in portion 1020with detailed information, upon selection of a specific team,illustrated in display portion 1030.

The interface in FIG. 11 shows another exemplary embodiment where evenmore detailed information is available upon drilling down into theinterface shown in FIG. 10. In this exemplary embodiment, the mapinformation has been updated to also include street and town names, withmore specific locations of the teams being provided in display 1110. Aswith the other embodiments, team information, and specific informationabout the team can also be optionally displayed upon selection of team.

FIG. 12 illustrates an exemplary interface that can be displayed to auser, with the cooperation of the interface management module 245 andcommunications module 235 upon a request from another user to connect tothe device. For example, interface 1210 can be provided that allows auser to select whether or not they would like to accept a connectionfrom another user. Upon selection of the yes icon 1220, the other useris allowed to connect. In contrast, upon selection of the no icon 1230,the other user, in this instance “John Smith” would not be allowed toconnect. In the event of allowing John Smith to connect, this connectioncan allow another user to share information. The interface 1210 canshow, for example, the user's name as well as, for example, a unique IDthat is being used, such as a device ID, global universal ID (GUID),universal unique identifier (UUID), certificate, digital certificate, orthe like, one or more of (or combinations thereof) are associated withthe team/device/user. The device ID could also be a composite of variousinformation such as a GUID and Subscriber Identity Module informationand/or device information.

In accordance with one exemplary embodiment that may be particularlyuseful for first responders, or the like, upon being issued a credentialwith a GUID, a cardholder's identity, skills and certifications can beauthenticated with a very high degree of assurance at, for example, anemergency site. Administrative officials are able to manage identityinformation for one or more jurisdictions and the system is capable oflifecycle management and high-availability replication of identityrepositories. The GUID allows a more efficient replication of identityinformation than prior techniques, such as PKI certificate exchange. TheGUID can also be used as a public key or an encrypting key where thereis a need to secure data. The encryption process can be weak or strongusing either the stand-alone GUID that represents an identity or byusing a combination of the NGUID (NetworkGUID), IGUID (ImpactGUID),device ID or GUID, and/or the DGUID (DataGUID). Each user can have oneunique GUID that is generated when, for example, a new account iscreated within the system that follows that user. Network related dataand other data that can be related to physical access, certifications,medical or other data can be tied to the user by creating tablerelationships that correlate the one or more of the various GUIDS beingused. In this manner, additional data entries or fields can be createdthat apply to any GUID being used.

To assist with the management of identifiers, as mentioned above, and toprovide better replication capabilities and bridging (e.g., a FirstResponder Access Command and Control Bridge-FRACC-Bridge) between one ormore entities, such as the regions identified herein, a composite GUIDcan be used with the systems and techniques disclosed herein. Forexample, this composite GUID can facilitate forensic trackability, rapidtransferability among regions, entities, groups, teams, of the like.This composite GUID can, for example, be generated in the field,recognized, exchanged, and utilized by multiple entities, such asgovernment agencies, to facilitate a multi-agency response.

For example, and in cooperation with the access control module 130, anew record can be created that governs access to one or more of theserver 100 and other clients 200. With the adding of the new record tothe access control module 130, a first server can replicate the recordin a transactional manner, can replicate the record via a snapshot aspart of an automated maintenance process, or the like, thus allowing fornew records to be synchronized as they are added, modified, or deleted,amongst multiple servers that may, for example, be located in differentregions. These data replications can be based on one or moreidentifiers, such as a GUID. For example, data can be correlated througha GUID look-up table. When a new user is added, a new GUID is created ata first location. This look-up table can be a joining table which joinsthe other data structures using GUIDs as a primary key for othercomplementary sets of data. Each user's GUID can stay with them whereverthey go even though they may be going to different networks, anddifferent locations, at different periods of time.

The basis of this bridging ability is the use of the GUID forcorrelating data. In addition, the GUID can be used as a public key oran encrypting key as discussed above. Furthermore, and as discussedabove, each user can have a unique GUID that is generated when a newaccount is created within the system, which can be used wherever theygo. In more detail, multiple types of GUIDs, such as a network GUID,data GUID, user GUID, and the like, can be utilized to generate acomposite GUID that allows the derivation of such information such as onwhich network the GUID was created, in which region the GUID wascreated, at which site the GUID was created, and in general anyinformation about the historical properties of the GUID. For example,the network GUID can include information about a user's account within aspecific network structure. Since there can be a master to the networkGUID, users can be part of multiple networks and still be referenced toone unique identity. A network GUID can be, for example, correlated tothe active directory GUID, or a security identifier that can be uniqueto each network. The table structures that maintain various types ofinformation can be relational in nature and can be pushed to marts orwarehouses for further analysis and optionally used to tie in all otherrelevant data that applies to an entity. This can be, for example,physical access data which can be pushed to readers or access carddatabases and any other data to include, but not limited to,certifications, medical data, such as blood type, and the like,scheduling data, or in general, any data that is a subset of an entity.The general data depiction described above can optionally be a series ofrelated tables that tie to a master record by means of the data GUID.This master record can then be related amongst one or more data tables.

FIG. 13 illustrates an exemplary map interface that can be shown on thedevice 200 in cooperation with the client module 205, location module215, and mapping module 240. For example, once one or more users haveconnected, the users can appear on the map for a visual representationof their location. Upon selection of any one or more of the users withinthe interface 1310, additional information about that user can be shown,as well as direction and distance information provided to that user. Ina similar manner, two users could be selected, with distance anddirection information between the users provided in the display 1310.

FIGS. 14 and 15 illustrate exemplary interfaces that can be providedwhen a user requests help. For example, upon selection of the help icon,and in cooperation with the alerting module 225 and communicationsmodule 235, location information, in cooperation with the locationmodule 215 is sent to one or more destinations. A result of this alertcan be, for example, the pop-up 1410 that indicates that John Smith hasrequested help and is prompting the user as to whether or they wouldlike to re-draw the map based on the location information associatedwith John Smith. Upon selection of the yes icon, interface 1510 can beprovided where the map has been centered on the user that has requestedhelp, and optionally an animation provided that illustrativelyhighlights where the user who requested help is located. For example,this could be a blinking icon, a change in color, a beacon-movement ofan icon associated with the user, or in general a method which helps therecipient of the alert message to identify the location of the helprequestor.

FIG. 16 illustrates an exemplary interface 1610 as a result of a userselecting a snapshot or video icon. As discussed, this functionality canbe used to assist with capturing a picture or video of an incident thatcould, for example, be forwarded to one or more other users and/orservers.

FIG. 17 illustrates an exemplary interface 1710 that includes aperimeter 1720. As discussed, upon entry or exit from this perimeter, analert can be generated in cooperation with the alerting module 225 andthe perimeter module 220. As illustrated in FIG. 17, a plurality ofusers 1730 are shown within the perimeter, as well as the currentlocation of the user 1760. In addition, optional zoom icons 1740 and1750 can be provide that allow manipulation of the interface 1710.

FIG. 18 illustrates another exemplary interface 1810 that shows some ofthe capabilities of the server 100. Here, individual users 1820, maps1830, team information 1840, and user 1850 are all displayed with eachbeing selectable to provide, for example, additional information aboutthe selection. This interface 1810 can be, for example, a managementinterface that is displayed for a user associated with the server incooperation with the corresponding modules.

FIG. 19 illustrates an exemplary method of operation of a server. Inparticular, control begins in step S1905 and continues to step S1910. Instep S1910, location information for one or more users is received. Thisinformation can optionally be filtered, such that only locationinformation for a specific team, specific region, or the like, isreceived. This filtering can be selectable based on, for example, adesired area of interest, a set of clients, and/or a set of users. Next,in step S1915, the location information can optionally be correlated toone or more associated teams, and further optionally color coordinated.For example, as illustrated in FIGS. 9 and 10, the teams are indicatedby a certain color of a dot placed on the map. Then, in step S1920, thelocation information is used to place an indication thereof of thelocation of the client on a map. As discussed, this map could also bepopulated with additional information, such as street information,topographical information, weather information, or the like, asdiscussed. Control then continues to step S1925.

In step S1925, a determination is made whether a drill down request hasbeen received. If a drill down request has been received, controlcontinues to step S1930 where additional information can be providedabout the drilled down area. Control then jumps back to step S1920 wherethe map is re-rendered with the additional information. Otherwise,control continues to step S1935.

In step S1935, messaging, such as text messaging, video messaging, chat,images, multimedia, and the like, can be sent from the server to one ormore clients. Next, and optionally in step S1940, the server can beconfigured to track one or more teams and/or individuals associated withthe client. For example, by selecting a specific team in a managementinterface, information about that team can be displayed with thetracking of that team shown on a corresponding map. Then, in step S1945,and as discussed herein, logging can optionally occur with the loggingrecording any aspect of the operation of one or more of the server andclient(s). Control then continues to step S1950.

In step S1950, a determination is made whether an emergency or specialmode requests has been detected. If so, control continues to step S1955with control otherwise jumping to step S1960.

In step S1955, an emergency and/or special mode routine can be run. Asdiscussed, this emergency or special mode can force a client to operatein a particular manner, and perform certain automated or semi-automatedfunctions, and can be done with or without the permission and/orknowledge of the user associated with the client. As will beappreciated, since the server can force this special or emergency mode,the server can also be used to have the client exit from this mode, forexample when the emergency situation has ended.

In step S1960, a determination is made whether the inject mode is to beentered. If the inject mode is to be entered, control continues to stepS1965 with control otherwise jumping to step S1970 where the controlsequence ends.

In step S1965, control jumps to the inject mode routine which will bediscussed in greater detail in relation to FIG. 25.

FIG. 20 illustrates and exemplary mode of operation of a client. Inparticular, control begins in step S2005 and continues to step S2010. Instep S2010, the client is initialized. Next, in step S2015,communication with a server can optionally be initiated. Then, in stepS2020, current position information is determined and optionally sent toone or more other clients and the server. Control then continues to stepS2025.

In step S2025, and as discussed, logging can optionally commence. Next,in step S2030, map information can also optionally be obtained and/orretrieved such that the map can be displayed in step S2035. Asdiscussed, the various characteristics and/or layers of the map can alsobe customized and/or selected by a user via a corresponding interface.Then, in step S2040, a determination is made whether one or more otherclients are to be populated on the map. If so, control continues to stepS2045 where one or more of the location and/or identification of theother clients that are to be included are obtained, and populated on themap in step S2050. Control then continues to step S2055.

In step S2055, and upon the selection of one or more other users and/ora server, the sending and receiving of messages can be enabled such thatcommunications can be exchanged between any one or more members. Controlthen continues to step S2060.

In step S2060, one or more inputs are received that govern the operationof the device. For example, these inputs can correspond to selectableicon shown in FIG. 2 and allow a user to control the various operationalcharacteristics of the client. Upon selection of any one or more ofthese icons, in step S2065, a determination is made as to whether arefresh is required, with a refresh being required having control jumpback to step S2030. Otherwise, control continues to step S2070 where thecontrol sequence ends.

FIG. 21 outlines an exemplary method for perimeter management accordingto this invention. In particular, control begins in step S2105 andcontinues to step S2110. In step S2110, perimeter information isreceived. As discussed, this can be based on one or more oflatitude/longitude information, GPS information, or the like, and ingeneral can be based on any information that defines a geographicperimeter. Next, in step S2115, a current location is determined. Then,in step S2120, a determination is made whether the current location isinside or outside of the perimeter. If it is determined that the currentlocation is inside the perimeter, control continues to step S2125, withcontrol otherwise jumping to step S2130.

In step S2125, the client can optionally operate in an inside of theperimeter mode. Control then continues to step S2135.

In step S2130, and if the current location is outside the perimeter, theclient can optionally operate in an outside of the perimeter mode.Control then continues to step S2135.

In step S2135, a determination is made whether the perimeter has beencrossed. If the perimeter has been crossed, control continues to stepsS2140, where one or more actions can optionally be performed.

The above step(s) can continue to be performed until control continuesto step S2145 where the control sequence ends.

In step S2140, one or more actions can automatically,semi-automatically, and/or surreptitiously be performed based on thecrossing of a perimeter. As discussed, these actions can include, butare not limited to, one or more of alerts, triggering a special mode ofoperation of the client, or the like. Control then continues back tostep S2115 to determine the new current location of the client.

FIG. 22 outlines an exemplary method of alerting according to thisinvention. In particular, control begins in step S2200 and continues tostep S2205. In step S2205, a determination is made whether an alert hasbeen detected, or an alert should be triggered. If an alert has beendetected, control continues to step S2215. Otherwise, if an alert istriggered, control jumps to step S2210.

In step S2210, current location information can optionally be sent toone or more destinations. Next, in step S2220, one or more of pictures,videos, and multimedia information can optionally be sent from thecurrent location to one or more destinations. Control then continues tostep S2230 where the control sequence ends.

Alternatively, if an alert is detected, in step S2215, alert informationis received at one or more other clients and/or servers (or otherpredefined destinations). Next, in step S2225, maps on the devices thatreceive the alert can optionally be refocused and/or zoomed in to show,for example, the current location of the client that sent the alert.Then, in step S2235, one or more of a distance and direction to thealert can optionally be determined on one or more of the alert receivingdevices. Control then continues to step S2245.

In step S2245, directions to the device sent the alert can optionally beprovided to the one or more alert receiving clients. Next, in stepS2255, any one or more of step S2215-S2245 can be updated as necessary,appreciating that the source of the alert may be moving. Control thencontinues to step S2265 where the control sequence ends.

FIG. 23 outlines an exemplary method of a peer-to-peer network accordingto this invention. In particular, control begins in step S2300 andcontinues to step S2310. In step S2310, the peer-to-peer mode isinitiated. As discussed, this can be based on one or more of Wi-Fi®,Bluetooth, 802.11, or in general, any wireless communication protocolthat can be established between one or more devices. Next, in stepS2320, one or more users are selected to connect to. Then, in stepS2330, a connection is established between the one or more selectedusers that allow, in step S2340, communications therebetween. Controlthen continues to step S2350 where the control sequence ends.

FIG. 24 outlines an exemplary method for an emergency or special mode ofoperation according to this invention. In particular, control begins instep S2400 and continues to step S2410. In step S2410, a request toenter an emergency mode can be detected, or a forced emergency mode canbe initiated, for example, with the cooperation of the injectiontechniques disclosed herein. Then, in step S2420, the emergency mode isentered. As discussed, and in accordance with one exemplary embodiment,the emergency mode allows for emergency tracking of a client(s). Forexample, in a child abduction type scenario, the device cansurreptitiously enter this mode, such that the abductor is unaware thatthe client is operating in a special emergency mode of operation.Control then continues to step S2430.

In step S2430, the last known good position can optionally betransmitted. For example, in the event of the battery almost being fullydepleted, limited connectivity, or the like, a last known good positioncan be transmitted to a server. Next, in step S2440, the injectfunctionality as discussed herein can optionally be performed withcontrol continuing to step S2450 where the control sequence ends.

FIG. 25 outlines an exemplary operation of the inject functionality.More particularly, control begins in step S2500 and continues S2510. Instep S2510, the presence of one or more devices in a specific area canoptionally be detected. For example, this can occur when thecommunication device(s) establishes communications with, for example,one or more local cell towers, Wi-Fi hotspots, or in general anycommunications mode or tower. Next, in step S2520, one or more ofapplications, commands, parameters, and the like, can be pushed to oneor more of the detected devices within the predefined area using one ormore of, for example, OTA and/or OTAP or comparable technologies. Then,in step S2530, the operation of the device can optionally be updated,based on, for example, one or more of the pushed applications, software,parameters, or the like. Control then continues to step 2540 where thecontrol sequence ends.

FIG. 26 outlines an exemplary mode of operation where detected batterylevel can be used to govern client functionality. In particular, controlbegins in step S2600 and continues to step S2610. In step S2610, thebattery level is detected. Next, in step S2620, mission information canoptionally be assessed. For example, if it is known that the client hasbeen deployed on a mission that is to last 14 days, this can be factoredin to assist with determining how much battery will be required to lastthe duration of the mission. This can be feed into an equation thatassists with managing how frequently, for example, the transmitter inthe mobile device should be powered on. Similarly, this can control suchoperations, as back light display, display on time, or in general anyfunction of the client. Then in step S2630, and based on one or more ofthe detected battery level, and mission information, one or more of mapupdating frequency, communication frequency, communicationscapabilities, or in general any device action or capability is modifiedand/or managed. Control then continues to step S2640 where the controlsequence ends.

The above-described methods and systems and can be implemented in asoftware module, a software and/or hardware module, a management deviceor interface, a wired and/or wireless wide/local area network system, asatellite communication system, network-based communication systems,such as an IP, Ethernet or ATM system, ROM, or the like, or on aseparate programmed general purpose computer having a communicationsdevice or in conjunction with a wired or wireless communicationsprotocol.

Additionally, the systems, methods and protocols of this invention canbe implemented on a special purpose computer, a programmedmicroprocessor or microcontroller and peripheral integrated circuitelement(s), an ASIC or other integrated circuit, a digital signalprocessor, a flashable device, a ROM, secure ROM, a hard-wiredelectronic or logic circuit such as discrete element circuit, aprogrammable logic device such as PLD, PLA, FPGA, PAL, any comparablemeans, or the like. In general, any device capable of implementing astate machine that is in turn capable of implementing the methodologyillustrated herein can be used to implement the various methods,protocols and techniques according to this invention. While the systemsand means disclosed herein are described in relation to variousfunctions that are performed, it is to be appreciated that the systemsand means may not always perform all of the various functions, but arecapable of performing one or more of the disclosed functions.

Furthermore, the disclosed methods may be readily implemented insoftware using object or object-oriented software developmentenvironments that provide portable source code that can be used on avariety of computer or workstation platforms. Alternatively, thedisclosed system may be implemented partially or fully in hardware usingstandard logic circuits or a VLSI design. Whether software or hardwareis used to implement the systems in accordance with this invention isdependent on the speed and/or efficiency requirements of the system, theparticular function, and the particular software or hardware systems ormicroprocessor or microcomputer systems being utilized. The systems,methods and protocols illustrated herein can be readily implemented inhardware and/or software using any known or later developed systems orstructures, devices and/or software by those of ordinary skill in theapplicable art from the functional description provided herein and witha general basic knowledge of the computer and security arts.

Moreover, the disclosed methods may be readily implemented in softwarethat can be stored on a non-transitory computer-readable storage mediumand/or ROM, executed on programmed general-purpose computer with thecooperation of a controller and memory, a special purpose computer, amicroprocessor, or the like. In these instances, the systems and methodsof this invention can be implemented as program embedded on personalcomputer such as an applet, API, JAVA® or CGI script, as a resourceresiding on a server or computer workstation, as a routine embedded in adedicated communication system or system component, or the like. Thesystem can also be implemented by physically incorporating one or moreportions of the system and/or method into a software and/or hardwaresystem, such as the hardware and software systems of mobile device.

While the invention is described in terms of exemplary embodiments, itshould be appreciated that individual aspects of the invention could beseparately claimed and one or more of the features of the variousembodiments can be combined.

While the systems and means disclosed herein are described in relationto various functions that are performed, it is to be appreciated thatthe systems and means may not always perform all of the variousfunctions, but are capable of performing one or more of the disclosedfunctions.

While the exemplary embodiments illustrated herein disclose the variouscomponents as collocated, it is to be appreciated that the variouscomponents of the system can be located at distant portions of adistributed network, such as a telecommunications network and/or theInternet or within a dedicated communications network. Thus, it shouldbe appreciated that the components of the system can be combined intoone or more devices or collocated on a particular node of a distributednetwork, such as a communications network. As will be appreciated fromthe following description, and for reasons of computational efficiency,the components of the communications network can be arranged at anylocation within the distributed network without affecting the operationof the system.

It is therefore apparent that there has been provided, in accordancewith the present invention, systems and methods for tracking andmanaging one or more mobile devices. While this invention has beendescribed in conjunction with a number of embodiments, it is evidentthat many alternatives, modifications and variations would be or areapparent to those of ordinary skill in the applicable arts. Accordingly,this disclosure is intended to embrace all such alternatives,modifications, equivalents and variations that are within the spirit andscope of this invention.

1. A method of operating a mobile communications device comprising:determining a location of the mobile communications device andmaintaining a record of one or more of the location and a last knowngood position in one or more of a server and another communicationsdevice; providing a map on a display of the communications deviceincluding the location of the mobile communications device; providingone or more of text-based, multimedia-based, image-based, voice-basedand video-based communications with the communications device; andmonitoring for an alert from the communications device.