Method and System for Remotely Monitoring a User

ABSTRACT

A system may include a user monitor device, a supervisory device, and a subscription sub-system. The subscription sub-system may be configured to: obtain a definition of a boundary that includes a radius from a particular location; monitor a location of the user monitor device; determine that the user monitor device has crossed the boundary; and in response to determining that the user monitor device has crossed the boundary, transmit an alert to the supervisory device.

CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation of U.S. patent applicationSer. No. 16/157,516, filed Oct. 11, 2018. U.S. patent application Ser.No. 16/157,516 is a continuation of U.S. patent application Ser. No.15/182,194, filed Jun. 14, 2016 (now U.S. Pat. No. 10,127,787). U.S.patent application Ser. No. 15/182,194 is a continuation of U.S. patentapplication Ser. No. 14/618,110, filed Feb. 10, 2015 (now U.S. Pat. No.9,368,013), which is a continuation of U.S. patent application Ser. No.14/022,612, filed Sep. 10, 2013 (now U.S. Pat. No. 8,952,806), which isa continuation of U.S. patent application Ser. No. 13/585,279, filedAug. 14, 2012 (now U.S. Pat. No. 8,531,302), which is a continuation ofU.S. patent application Ser. No. 13/313,398, filed Dec. 7, 2011 (nowabandoned), which is a continuation of U.S. patent application Ser. No.12/643,592, filed Dec. 21, 2009 (now abandoned), which is a continuationof U.S. patent application Ser. No. 11/976,647, filed Oct. 26, 2007 (nowU.S. Pat. No. 7,659,826); which is a continuation of U.S. patentapplication Ser. No. 10/992,003, filed Nov. 19, 2004 (now U.S. Pat. No.7,312,710); which is a continuation of U.S. patent application Ser. No.10/140,064, filed May 8, 2002 (now U.S. Pat. No. 6,825,767), the entiredisclosures of which are incorporated herein by reference.

TECHNICAL FIELD

The technical field includes systems and methods for monitoring userwell-being, and more specifically monitoring user status on a remotebasis.

BACKGROUND

It is often necessary to monitor the well-being of others. For example,because they lack the mature judgment and experience of adults, it isgenerally desirable to be able to monitor the well-being of children.Similarly, it may be desirable to monitor the well-being of adults whoare physically or mentally infirm and, therefore, lack the wherewithalto protect themselves from harm. However, it is often difficult orimpossible to monitor the well-being of others on a personal and directbasis for an extended period of time.

Monitoring on a remote basis allows a supervisor to monitor thewell-being of others while minimizing the time and effort required.Remote monitoring allows the supervisor to attend to other activities ortasks while maintaining awareness of those to be monitored.Additionally, remote monitoring provides a supplemental means formonitoring when monitoring is conducted primarily on a personal anddirect basis.

However, the current systems and methods for remote monitoring are notmultifunctional in application.

SUMMARY

What is disclosed is a method for monitoring user well-being. The methodincludes the steps of providing, at a user monitor module, a firstindicator for the user well-being; providing, at a receiving moduleoperably coupled to the user monitor module, a first threshold for thefirst indicator; receiving, at the receiving module, the firstindication; comparing the first indication and the first threshold;generating a secondary indication when the comparison indicates that thefirst indication equals or exceeds the first threshold; receiving, at asupervisory module coupled to the receiver module, the secondaryindication; and informing a supervisor that the first threshold has beenreached.

Also disclosed is method for providing a subscription system thatmonitors user well-being. The method includes the steps of receivingfrom a user; a request to implement the subscription service; receivingfrom the user, user profile information; creating a user profile basedon the user profile information; receiving a user-selected set ofmonitoring options; and activating user well-being monitoring based onthe user-selected monitoring options.

Further, what is disclosed is a subscription system that monitors userwell-being including a subscription module operably coupled to areceiver module and a supervisory module. The subscription moduleincludes means for allowing interactions with one or more customers;means for allowing the one or more customers to select subscriptionservices; means for creating, storing, and updating user profiles; andmeans for protecting privacy of data used in the user profiles.

DESCRIPTION OF THE DRAWINGS

The detailed description will refer to the following drawings, whereinlike numerals refer to like elements, and wherein:

FIG. 1 is a block diagram illustrating the components of a subscriptionsystem;

FIG. 2 is a schematic diagram of a first aspect of the subscriptionsystem of FIG. 1;

FIG. 3A is a schematic diagram of a second aspect of the subscriptionsystem of FIG. 1.

FIG. 3B is a schematic diagram of the second aspect of the subscriptionsystem of FIG. 1 using smart software;

FIG. 4 is a schematic diagram of a third aspect of the subscriptionsystem of FIG. 1;

FIG. 5 is a schematic diagram illustrating the use of the subscriptionsystem of FIG. 1 applied to an electronic boundary;

FIG. 6 is a schematic diagram of a fourth aspect of the subscriptionsystem of FIG. 1;

FIGS. 7A-7C and 8 show further aspects of the subscription service ofFIG. 1;

FIG. 9 is a block diagram illustrating a service level of a subscriptionmodule;

FIG. 10 illustrates a customer profile used by the subscription systemof FIG. 1;

FIG. 11 is a block diagram of one aspect of the subscription module ofFIG. 9; and

FIG. 12 is a flow chart illustrating an operation of the subscriptionsystem of Figure.

DETAILED DESCRIPTION

FIG. 1 is a schematic diagram of the components of a subscription system10 that may be used to monitor the well-being of a user. As used herein,well-being refers to any parameter associated with the user that may bemeasured and/or detected, and which provides an indication as to astatus of the user The subscription system 10 includes a user monitormodule 20 that is operably coupled to a receiver module 30. The receivermodule 30 is operably coupled to a supervisory module 40. The usermonitor module 20 may also be operably coupled to the supervisory module40 alone, or in tandem with the receiver module 30. Coupling may beachieved using wireless means, including for example, a satellite systemand/or cellular telephone networks. Additionally, coupling may beachieved by using Blue Tooth technology, which provides short range,wireless connectivity between common devices. Blue Tooth systems operateat a frequency of 2.4 GHz. Blue Tooth systems are described in detail inHaartsen, “Bluetooth—The Universal Radio Interface for Ad Hoc, WirelessConnectivity”, Ericcson Review No. 3, 1998, pp. 110-117, which is herebyincorporated by reference. The subscription system 10 allows asupervisor to monitor the well-being of a user from a remote location.The user may be, for example, a child, an adult, an animal or otherliving entity. The supervisory module 40 may be operated by, or in thepossession of the supervisor of the user. For example, the supervisormay be a child's parent, the child may have affixes the user module 20,and the parent may be carrying the supervisory module 40. In the case ofadult users, the subscription system 10 may be used, for example, forthe mentally or physically infirm.

The user monitor module 20 is a portable device that may include atransmitter capable of emitting one or more kinds of signals and areceiver capable of receiving an external signal. The user monitormodule 20 may be capable of being incorporated into common articles ofclothing or other personal items, including for example, wrist watches,jewelry, collars and toys, or other devices used by the user (e.g.stroller, bicycle, wheelchair). Alternately, the user monitor module 20may be a stand-alone device that is designed to be worn or attached tothe user. The user monitor module 20 may also be a small device that isdesigned to be implanted in the body of the user. Additionally, the usermonitor module 20 may comprise a radio frequency identification device(RFID) 18 that may comprise a passive transponder in the focus of amicro-thin, wearable electronic chip. The RFID 18 is capable of drawingpower from radio frequency waves and using that power to transmit asignal carrying an identification of the RFID 18. Radio frequencyidentification devices and corresponding systems and methods aredescribed in U.S. Pat. No. 5,528,222, entitled RADIO FREQUENCY CIRCUITAND MEMORY IN THIN FLEXIBLE PACKAGE, which is hereby incorporated byreference.

The user monitor module 20 may provide a first indication of the user'swell-being, where the first indication may have a threshold value. Theuser monitor module 20 may comprise an alert module 21 and a detectionmodule 22. The alert module 21 is capable of generating and sending analarm when the user monitor module 20 is subjected to tampering. Thealarm from the alert module 21 may be generated at the location of theuser monitor module 20, the receiver module 30 or the supervisory module40. The alarm may be an audible, visual or sensory alarm. The detectionmodule 22 detects the occurrence of one or more events related to thewell-being of the user and comprises a location detector 23, a user skintemperature detector 24, a user pulse detector 25, an accelerationdetector 26, a water detector 27 and a blood glucose detector 28. Otherdetectors may also be incorporated into the user module 20 to detect,monitor, measure and report parameters associated with a status of theuser.

The receiver module 30 is a remote device that may include a transmittercapable of emitting one or more kinds of signals and a receiver capableof receiving an external signal. The receiver module 30 may also becapable of emitting radio frequency waves, thereby setting up a magneticfield around the receiver module 30. The receiver module 30 may belocated at a site remote from the user monitor module 20 and thesupervisory module 40. The receiver module 30 may receive the firstindication of the user's well-being and generate a second indicationwhen a threshold value of the first indication is reached. The receivermodule 30 may include a threshold adjustment module 32 that provides foradjustment of the threshold value of the first indication, a tamper codemodule 34 adapted to provide a code that arms and disarms the alertmodule 21 and a display module 36 that provides a display related to thereceived first indication. The receiver module 30 may displayinformation related to the received first indication on the displaymodule 36 in addition to generating the second indication to betransmitted to the supervisory module 40. The display module 36 may be,for example, a monitor adapted for use in the receiver module 30.

FIG. 1 shows a single receiver module 30. However, the system 10 mayinclude more than one receiver module 30. For example, one receivermodule 30 may be located at a location of the supervisor and anotherreceiver module may be located at a site remote from the supervisor.When the receiver module 30 and the supervisory module 40 are at a samelocation as the supervisor, the receiver module 30 and the supervisorymodule 40 may be incorporated into a single platform. Alternatively, thereceiver module 30 and the supervisory module 40 may be separate,stand-alone devices.

The supervisory module 40 may receive the second indication and mayinform the supervisor that the threshold value of the first indicationhas been reached. Alternately, the supervisory module 40 may receive thefirst indication transmitted by the user monitor module 20 directly,either alone or in tandem with the receiver module 30. The supervisorymodule 40 may be operably coupled to or incorporated into variousdevices, including for example, land based or cellular telephones,pagers, personal computers and televisions. The supervisory module 40may send an alert in the form of a call to a land based or cellulartelephone, a page to a pager, an email to a personal computer or amessage for display on a television to inform the supervisor that thethreshold value of the first indication has been reached. Alternately,the supervisory module 40 may comprise a stand-alone device that iscapable of generating an audible, visual or sensory alarm to inform thesupervisor that the threshold value has been reached. The supervisor mayutilize one or more of these devices to monitor the user. Thesupervisory module 40 may employ a round-robin alert scheme to sendalerts to all or some subset of the devices, as designated by thesupervisor, until an acknowledgement is received from at least one ofthe devices, to inform the supervisor that the threshold value of thefirst indication has been reached. The supervisory module 40 may also becapable of emitting radio frequency waves, thereby setting up a magneticfield around the supervisory module 40.

A subscription module 50 may be incorporated into the system tocalculate a subscription fee to charge the supervisor for operation ofthe system 10 in monitoring the status or well-being of one or moreusers under the care or supervision of the supervisor. The architectureand operation of the subscription module 50 will be described in detaillater.

FIG. 2 is a schematic diagram of a first aspect of the subscriptionsystem 10. In FIG. 2, the subscription system 10 is used to track thelocation of the user monitor module 20, which may be worn or attached toa user or may be incorporated into a device used by the user (e.g.,stroller, bicycle, wheelchair). Optionally, the supervisor transmits arequest from the supervisory module 40 to the receiver module 30 for thelocation of the user monitor module 20. Through the use of varioussatellite systems, such as a Global Positioning System (GPS), includingGPS satellite 61, the receiver module 30 receives a tertiary indicationof the geographical location of the user monitor module 20. Othertracking means may employ low earth orbit satellites and cellularnetworks. The receiver module 30 is capable of keeping track of thelocation of the user monitor module 20 at all times. The receiver module30 receives and processes the request from the supervisory module 40 andtransmits the geographical location information for the user monitormodule 20 to the supervisory module 40. The receiver module 30 maydisplay the geographical location information on the display module 36alternately or in addition to transmitting the geographical locationinformation to the supervisory module 40. Such display may includelatitude and longitude, distance, reference to map coordinates, or anyother means for referencing the user's geographical location.

FIG. 3A is a schematic diagram of a second aspect of the subscriptionsystem 10. In FIG. 3A, the subscription system 10 may be used as apersonal security alarm system, a drowning alarm system, a personalhealth warning system and a tampering alarm system.

For a personal security alarm system, the user may activate the alertmodule 21 of the user monitor module 20 in situations where the user ismade aware of personal risk from harm, or becomes ill or injured. Uponactivation of the alert module 21, a first indication is transmitted tothe receiver module 30. The receiver module 30 receives the firstindication and transmits a second indication in the form of an alarm tothe supervisory module 40. The supervisory module 40 may inform thesupervisor of the alarm through various means, including for example, aland based or cellular telephone, a pager, a personal computer, atelevision or a stand-alone device that is capable of generating anaudible, visual or sensory alarm to inform the supervisor. Alternately,the user monitor module 20 may transmit the first indication directly tothe supervisory module 40 alone or in tandem with the receiver module30. Alternately, the user monitor module 20 may transmit the firstindication directly to emergency personnel, including for example, apolice department, a fire department, search and rescue workers, andemergency medical technicians, alone or in tandem with the receivermodule 30 and the supervisory module 40. The emergency personnel may beable to track the location of the user as described above with respectto the first aspect of the subscription system 10. In an embodiment, theemergency personnel may be equipped with a receiver module 30.

In the case of a drowning alarm system, the user monitor module 20transmits a first indication of the user's well-being when the usermonitor module 20 is immersed in water. The water detector 27 (seeFIG. 1) of the detection module 22 detects when the immersion in waterreaches a threshold value. The water detector 27 may include a pressuregage, which measures the ambient pressure immediately surrounding theuser monitor module 20. Alternately or additionally, the water detector27 may include a moisture gage capable of measuring the moisture levelimmediately surrounding the user monitor module 20. The receiver module30 receives the first indication and transmits a second indication tothe supervisory module 40 when the pressure or moisture levelimmediately surrounding the user monitor module 20 reaches the thresholdvalue. The supervisory module 40 informs the supervisor that thethreshold value has been reached. Alternately, the user monitor module20 may transmit the first indication directly to the supervisory module40 alone or in tandem with the receiver module 30.

In the case of a personal health warning system, the user monitor module20 transmits a first indication of the user's well-being to the receivermodule 30 when the detection module 22 of the user monitor module 20detects one or more changes in the physical condition of the user.Referring to FIG. 1, the skin temperature detector 24 detects when achange in skin temperature of the user reaches a threshold value. Thepulse detector 25 detects when a change in pulse of the user reaches athreshold value. The acceleration detector 26 detects when a change inacceleration of the user's body reaches a threshold value. Additionally,the acceleration detector 26 detects when a lack of change inacceleration of the user's body reaches a threshold value. The glucosedetector 28 detects when a change in the blood glucose level of the userreaches a threshold value. When one of the detectors in the detectionmodule 22 detects a change in physical condition of the user thatreaches a respective threshold value, the receiver module 30 transmits asecond indication to the supervisory module 40. The supervisory module40 informs the supervisor that the respective threshold value has beenreached. Alternately, the user monitor module 20 may transmit the firstindication directly to the supervisory module 40 alone or in tandem withthe receiver module 30.

Returning to FIG. 3A, in the case of a tampering alarm system, the usermonitor module 20 transmits a first indication to the receiver module 30when the user monitor module 20 experiences tampering. The supervisormay arm and disarm the alert module 21 of the user monitor module 20 byinputting a code into the tamper code module 34 of the receiver module30. Tampering may include attempts to remove the user monitor module 20after the alert module 21 is armed without inputting the appropriatecode into the tamper code module 34. Upon tampering, the alert module 21may generate an alarm at the location of the user monitor module 20and/or transmit the first indication to the receiver module 30. Thereceiver module 30 generates and transmits a second indication to thesupervisory module 40 upon receiving the first indication. Thesupervisory module 40 informs the supervisor that the user monitormodule 20 has experienced tampering. Alternately, the user monitormodule 20 may transmit the first indication directly to the supervisorymodule 40 alone or in tandem with the receiver module 30.

As noted above, some or all of the features of the receiver module 30may be incorporated into the supervisory module 40. In particular, thethreshold adjustment module 32 and the tamper code module 34 may beincorporated into the supervisory module 40, and interactions betweenthe supervisor and the tamper code module 34 and threshold adjustmentmodule 32 may be made directly by the supervisor.

As shown in the schematic diagram of FIG. 3B, smart software 36 may beinstalled in the user monitor module 20, the receiver module 30 and/orthe supervisory module 40 to determine whether to alert the supervisorwhen several events related to the well-being of the user occur at thesame time. For example, if the acceleration detector 26 detects thatthere has been a lack of acceleration (or motion) of the user's bodythat reaches a threshold value and the pulse detector 25 detects adecrease in pulse that also reaches a threshold value, the software 36may determine that the combination of the two events indicates that theuser is asleep. In that situation, the receiver module 30 may defertransmitting the second indication to the supervisory module 40 unlessboth events continue for a prolonged period of time.

FIG. 4 is a schematic diagram of a third aspect of the subscriptionsystem 10. In FIG. 4, the subscription system 10 may be used as anelectronic leash or electronic boundary system for keeping track of thedistance between the user monitor module 20, which may be worn orattached to the user, and the supervisory module 40 or an electronicboundary. As discussed above, the user may be, for example, a child, amentally or physically infirm adult, an animal or any other live entity.

In using an electronic leash, the supervisor wants to ensure that theuser does not stray beyond a predetermined distance from the supervisor.The user monitor module 20 transmits a first indication when thelocation detector 23 of the user monitor module 20 detects that thedistance between the user monitor module 20 and supervisory module 40reaches a threshold value. The location detector 23 may detect thedistance using various methods. For example, the supervisory module 40may transmit a signal on a periodic basis that is received by thelocation detector 23 in the user monitor module 20. The locationdetector 23 compares the strength of the signal received from thesupervisory module 40 at different times, t₁ and t₂, and correlates thedifference in signal strength to a distance between the user monitormodule 20 and supervisory module 40. When the location detector 23detects that the distance between the user monitor module 20 and thesupervisory module 40 reaches the threshold value, the user monitormodule 20 transmits a first indication to the receiver module 30, whichthen generates and transmits a second indication to the supervisorymodule 40. Alternately, the user monitor module 20 may transmit thefirst indication directly to the supervisory module 40 alone or intandem with the receiver module 30. The supervisory module 40 informsthe supervisor that the threshold value has been reached.

FIG. 5 is a diagram illustrating the use of the subscription system 10applied to an electronic boundary. The subscription system 10 may beadapted for use in a theme park, a shopping mall, a stadium, a masstransit station and other large locales that typically attract manypeople, and that may have a large, transitory population, or may have apopulation that is constantly moving from one place to another withinthe large locale. For example, in a popular theme park, the populationmay be large, transitory in the sense that the number of people in thepopulation, and their specific identity varies over time, and mobile, inthe sense that individuals move from one venue in the theme park toanother venue, typically staying at each venue only for a short time.The user monitor module 20 transmits a first indication to the receivermodule 30 when the location detector 23 detects that that the usermonitor module 20 is beyond the designated boundary of the large locale.The boundary may be defined using electronic boundary markers physicallyplaced along the perimeter of the boundary. Alternately, the boundarymay be defined using a satellite system, such as, for example, theGlobal Positioning System, in order to avoid using physical boundarymarkers. By using a satellite system, the boundary may be dynamicallyconfigurable and altered in a convenient manner. For example, the GPSmay be used to define the overall theme park boundary, or a boundary ofa sub-section of the theme park. More specifically, should a supervisorwant to monitor a status of a user, with the user expected to remain ina first sub-section of the theme park, the supervisor may specify thedynamically-configurable boundary to be the boundary of the firstsub-section. The GPS responds by designating the first sub-section ofthe theme park as the desired boundary for the specified user. Otherusers and supervisors using the subscription system 10 may have otherboundaries defined for monitoring the status of the user.

The user monitor module 20 transmits the first indication to thereceiver module 30 when the location detector 23 detects that theboundary has been crossed by the user. The receiver module 30 generatesand transmits a second indication to the supervisory module 40, whichinforms the supervisor that the user has crossed the boundary.Alternately, the user monitor module 20 may transmit the firstindication directly to the supervisory module 40 alone or in tandem withthe receiver module 30.

FIG. 6 is a schematic diagram of a fourth aspect of the subscriptionsystem 10. In FIG. 6, the subscription system is used to identify theuser monitor module 20 in order to identify the user. The receivermodule 30 emits radio frequency waves so that a magnetic field is formedaround the receiver module 30. Alternately, the supervisory module 40may emit radio frequency waves so that a magnetic field is formed aroundthe supervisory module 40. The user monitor module 20 may comprise aRFID 18, which may include a passive transponder in the form of amicro-thin wearable, or implantable, electronic chip. The RFID 18 iscapable of drawing power from the emitted radio frequency waves andusing that power to transmit a signal carrying an identification of theRFID 18. The signal may be transmitted to the receiver module 30 and/orthe supervisory module 40 to inform the supervisor of the identity ofthe RFID 18, which may be correlated to the identity of the user wearingor carrying the user monitor module 20.

A potential application for using multiple user monitor modules 20includes tracking the location of a number of children or ensuring thatnone of the children stray too far from the supervisor in order toprevent the children from becoming lost. FIG. 7A illustrates the system10 used to track the well-being or status of more than one user by asingle supervisor. In FIG. 7A, a supervisor S desires to track thelocation of user U_(A) and user U_(B). Each of the users U_(A) and U_(B)are equipped with a user monitor module 20. The user monitor modules 20worn by the users U_(A) and U_(B) may have unique identification numbersto identify the user monitor module 20. Transmissions from the usermonitor module 20 may include the unique identification numbers. As analternative to user monitor module identification numbers, each usermonitor 20 module may transmit and receive at a unique frequency. Asupervisor S is equipped with a supervisory module 40 to receive alertsand to otherwise communicate, either directly or indirectly, with thesubscription system 10. As shown in FIG. 7A, the supervisory module 40receives tracking or location information for the users U_(A) and U_(B)as the users U_(A) and U_(B) move within boundary B. Note that theboundary B may be established by the supervisory designating a maximumradius from the supervisory module 40 to the user monitor modules 20,and that the specified maximum radius may differ as between the usersU_(A) and U_(B).

FIG. 7B illustrates the effect of movement by the supervisory module 40on the tracking function performed by the subscription system 10. InFIG. 7B, supervisory module 40 is moved by supervisor S from firstposition S₁ to second position S₂ along path S₁-S₂. User U moves fromposition U₁ to position U₂. Boundary B₁ denotes the boundary fortracking the location of the user U while the supervisor is at the firstposition S₁. As the supervisor (and the supervisory module 40) moves tothe second position S₂, the boundary moves to new boundary B₂ as shown.

FIG. 7C illustrates yet another application of the subscription system10. In FIG. 7C, the supervisor S want to monitor a location of the userU. However, the supervisor S wants to confine the user U to an area Ahaving an irregular boundary B as shown. The subscription system 10 canaccommodate such a scenario by using the satellite system (e.g., theGPS) to dynamically establish the boundary B. The subscription system 10components can then be used to track the location of the user U withinthe boundary B of the area A, and to issue an alert should the user U gooutside or beyond the boundary B.

FIG. 8 illustrates still another application of the subscription system10. In FIG. 8, an area 100, defined by the points A, C, D, F, includessub-areas 110, defined by A, B, E, F and 120, defined by B, C, D, E. Thesub-area 110 includes an exclusion area 112. A first user 111 occupiesthe sub-area 110. A second user 121 occupies the sub-area 120. The firstuser 111 and the second user 121 each may be equipped with, or beoperably coupled to, or in the vicinity of a user monitor module 20. Asupervisor 130, equipped with a supervisory module 40 may be anywhere inthe area 100, or may be outside the area 100. An overlap area 140,designated by the vertices E, G, H, I may be provided in which both thefirst user 111 and the second user 121 may exist simultaneously withoutprecipitating an alert.

The supervisor 130 may desire to monitor well-being of each of the firstuser 111 and the second user 121. The supervisor 130 may further desireto ensure the first user 111 remains in the first sub-area 110 and thatthe second user 121 remain in the second sub-area 120. Finally, thesupervisory 130 may desire that the first user not enter the exclusionarea 112.

The supervisor may designate the boundaries of the area 100, thesub-areas 110 and 120, the exclusion area 112, and the overlap area 140.Such designation may be by way of a drafting protocol available at a Website associated with the subscription system 10. Other means fordesignating the allowable boundaries include by reference to latitudeand longitude, by submission of a hand-drawn figure, and by reference tospecific, fixed landmarks, for example.

The subscription system 10 may be designated to issue an alert to thesupervisor 130 when both the first user 111 and the second user 121 arein the same sub-area, except for the overlap area 140. For example,should the second user 121 enter the sub-area 110 while the first user111 is in the sub-area 110, the subscription system 10 may be designatedto issue the alert. The subscription system 10 may include the necessarylogic and processing to determine when the first user 111 and the seconduser 121 are in a same sub-area, and the subscription system 10 willthen issue the required alerts. The subscription system 10 may also bedesignated to issue an alert should either the first user 111 or thesecond user 121 enter the exclusion area 112.

As an example of an application of the subscription system 10 shown inFIG. 8, the first user 111 may be a dog, the second user 121 a child,the first sub-area a back yard of a residence, the exclusion area 112 aswimming pool, the supervisor 130 the child's parent, the sub-area 120some or all of a residence, and the overlap area 140 a kitchen andfamily room of the residence. The supervisor 130 desires to keep thechild 121 and the dog 111 out of the pool 112, and keep the child 121and the dog 111 separated unless both are in the kitchen and/or familyroom 140.

FIG. 9 is a block diagram illustrating a level of service operation ofthe subscription module 50. The subscription module 50 may be operablycoupled to the Internet 51 and may use a Web site 52 to interact withcustomers. The subscription module 50 may offer various subscriptionservices 54 displayed on the Web site 52 and may allow customers toselect from among the subscription services 54. For example, thesubscription services 54 offered may be tiered in levels of service frombasic to gold to platinum, with each level of service described on theWeb site 52. Levels of service may relate, for example, to geographicalcoverage, types of monitoring (e.g., location tracking, personal healthwarning system, electronic leash) and alert options. Customers mayselect the level of service that suits their needs. The customers may ormay not be supervisors.

Subscription fees may be calculated by the subscription module 50 basedon the level of service selected and based on a flat rate or a pro ratarate or some combination of a flat and pro rata rate. For a pro ratarate, the subscription module 50 may record each instance when thesupervisory module 40 alerts the supervisor, calculate the subscriptionfee based on a number of the instances recorded and send a request forpayment to the customer. For full-time, continuous monitoring, the costof any hardware may be fully underwritten by the subscription fees.Additionally, reduced rates may be offered if monitoring is not requiredon a continuous basis. For example, customers may desire monitoring onlyon weekends or desire to participate in a subscription service 54 on anad hoc basis for temporary, finite periods of time.

After a customer signs up for a level of service, any required hardwaremay be shipped to the customer and any required software may bedownloaded from the Web site 52 or shipped to the customer along withthe hardware. Instructions for using subscription services may beprovided on the Web site 52 in a graphical user interface (GUI) formatand/or shipped to the customer. Billing may be automated and requestsfor payment may be deducted directly from the customer's bank account ormailed to the customer. After selecting a level of service, customersmay be given a grace period to test the service for satisfactoryperformance and suitability.

Customers may select alert options on the Web site 52. Customers mayregister land based telephones, cellular telephones, pagers, televisionsand personal computers to receive alerts. Alternately, these devices maybe used to signal receipt of an alert, at which time the customer maycheck the supervisory module 40 or the receiver module 30 for furtherinformation. Customers may also use a dedicated, stand-alone device toreceive the alert. As discussed above, the supervisory module 40 mayemploy a round-robin alert scheme to send alerts to all or some subsetof the devices, as designated by the supervisor, until anacknowledgement is received from at least one of the devices. If noacknowledgement is received, the supervisory module 40 may alertemergency personnel or perhaps a back-up individual (e.g., a relative ofthe customer). Alerts may be encrypted so that only a customer's devicesmay receive alerts intended for the customer. Additionally, customersmay allow access to monitoring alerts to third parties, including forexample, emergency personnel and back-up individuals.

Customers may change their level of service or any aspect of theircurrent level of service at any time by accessing the Web site 52.Changes may be made by accessing a customer profile saved on the Website 52 and password protected for privacy. Additionally, thesubscription module 50 may perform upgrades as new features ortechnology become available. For example, a customer's devices may havesoftware upgrades loaded automatically over an appropriate transmissionmedium.

FIG. 10 illustrates an embodiment of a customer profile, or datastructure, 200 that may be used with the subscription system 10 ofFIG. 1. The profile 200 may exist as a data structure maintained at aremote location such as the subscription module 50 (see FIG. 1).Portions of the customer profile 200 may be replicated in the usermodule 20, the receiver module 30 and the supervisory module 40 (seeFIG. 1). The customer profile 200 may be completed based on informationprovided by the customer using the Web site 52 (see FIG. 9) using, forexample, an on-screen menu, or by other means, including orally with arepresentative of the subscription system 10, and by written input fromthe customer, for example.

The profile 200 includes a user identification (ID) section 201 where auser may be identified and assigned a means for tracking the user, suchas an alpha-numeric identification. A subscriber ID section 203similarly identifies a subscriber and links the subscriber to the user.Next, a communications options section 205 allows the customer tospecify which communications options the customer desires for issuingalerts. A monitoring options section 207 allows the customer to specifymonitoring options. Examples of monitoring options include standard,where the user is monitored continually, or at a set time and day (forexample, 2-4 p.m., Monday through Friday); and ad hoc, where thesubscriber requests monitoring on an as-needed basis. A notificationoption section 209 allows the customer to select notification of thesubscriber, and notification of one or more third parties. Differentthird parties may be designated for receipt of different alerts. Anequipment options section 211 specifies the equipment used in monitoringthe user identified in the profile. The equipment includes thesupervisory module 40 and the user module 20 (see FIG. 1), which may bespecified by name, serial number, and model information, for example. Analert options section 213 allows the customer to designate specificalerts for the user. For example, the customer may designate that analert be issued should the user module 20 pass a designated boundary, ormove beyond a designated distance from the supervisory module 40. Thedata contained in the data structures of the alert options section 213,the equipment options section 211, and the notification options section209 must be consistent. For example, should the customer specifydistance monitoring, the equipment options section would storeinformation related to the types of devices needed for distancemonitoring.

Also included in the profile 200 may be a last software update section215, which contains data related to software used by the customer'sdesignated equipment configuration. An alert history section 217 maystore data related to alerts issued for the user designated in theprofile 200. Such information may include alert type, time and date,response time to answer the alert, and other information. Finally, abilling options section 219 may be used to specify how the customer isto be billed for the subscription system service. For example, thebilling options section 219 may indicate monthly billing usingelectronic funds transfer from the customer's bank account, and mayprovide the necessary bank routing code.

FIG. 11 is a block diagram of one embodiment of the subscription module50. Although FIG. 11 shows various modules incorporated into thesubscription module 50, some or all these modules may be incorporatedinto other components or modules of the subscription system 10,including, for example, the receive module 30. The subscription module50 may include an input module 220, a storage module 230, a processingmodule 240, a display module 260, a transmit module 270, an updatemodule 280, and a billing module 290. The input module 220 may be usedby the customer to interact with the subscription system 10. Suchinteractions may include initial sign up for the subscription systemservice, creation of the profile 200, profile updates, and otherinteractions. The input module 220 may also be used to receiveoperational information such as alerts and other monitoring informationneeded to formulate alerts and to otherwise operate the subscriptionsystem 10. Possible input paths, as shown, include web-based inputs,satellite, wireless, telephone, and other inputs. The storage module 230stores the profiles 200, operating programs, and other data needed tooperate the subscription system 10. The processing module 240 may beused to process subscription system information, such as profileinformation, and to integrate operation of the subscription system 10.The processing module 240 may also be used to process monitoringinformation and issue alerts. The processing module 240 may include aprofiler 241 that is used to generate the profiles 200, a comparator 243that is used to generate alerts, an interface 245 that is used totranslate information received from external sources such as satellitesand wireless systems, a transmission determinant 247 that is used todetermine how alerts should be sent, and to which parties and whichsubscriber communications devices, a formatter 249 that is used toformat alerts and informational messages to be sent to the components ofthe subscription system 10; a display driver 251 that generatesdisplays; and a billing interface 253 that cooperates with the billingmodule 290 to generate bills for the customer.

The display module 260 generates displays that may be used at thelocation of the subscription module 50. The transmit module 270 is usedto transmit information, alerts, and other data to other components ofthe subscription system, or to other parties. The update module 280 isused to update various services, including providing updated software tothe user module 20 and the supervisory module 40, for example. Finally,the billing module calculates the customer's bill based on designateduse, issued alerts, and other information.

FIG. 12 is a flow chart representing one possible monitoring set upoperation 300 of the subscriptions system 10. The illustrated operation300 may be an ad hoc monitoring set up operation of a single user. Theoperation 300 begins in block 302. In block 304, the subscriber notifiesthe subscription module 50 that the subscriber desires to monitor theuser. In block 306, the processing module 240 determines if thesubscriber/customer is an active member of the subscription system 10(e.g., the customer's billing account is up-to-date). If the account isnot active, the operation moves to block 308 and the subscription moduleprovides a notification to the subscriber/customer, and waits for theaccount to be updated. If the service is active, the operation 300 movesto block 310 and the user profile is retrieved. In block 312, thesubscription module 50 determines if ad hoc monitoring is in the profile200. If the ad hoc is selected in the profile 200, the subscriptionmodule 50 generates a display for the supervisor to designate theparameters of the ad hoc monitoring, block 314. In block 316, thesubscription module 50 receives the parameters, and performs necessarycomputations to set up the monitoring. The computations may include atest of the system, including the user module 20, the receiver module 30and the supervisory module 40 to ensure that triggering events will bedetected, alerts issued and received b the correct supervisorcommunications equipment, and alert response received and processed. Ifin block 312, ad hoc monitoring is not designated, the subscriptionmodule 50 will issue a prompt to the subscriber asking if set up of adhoc monitoring is required, block 318. If such set up is not desired,the operation 300 moves to block 322 and ends. If set up is desired, thesubscription module generates a set up display and returns the displayto the supervisor/customer, block 321. The operation then returns toblock 314.

In block 320, the ad hoc monitoring session is initiated. In block 322,the ad hoc monitoring session ends, either through expiration of thetime designated for the ad hoc monitoring, or through some other action,such as issuance of a terminating alert, or at the request of thesubscriber/customer.

While the present invention has been described in connection with anexemplary embodiment, it will be understood that many modifications willbe readily apparent to those skilled in the art, and this application isintended to cover any variations thereof

What is claimed:
 1. A system comprising: a supervisory device; a usermonitor device including a tamper alert module that is configured tocause, when the user monitor device is subject to tampering,transmission of an alarm to the supervisory device, wherein the tamperalert module can be armed or disarmed by a code obtained from thesupervisory device; and a subscription sub-system configured to:receive, by way of the supervisory device, user information andmonitoring options; create a user profile related to the user monitordevice based on the user information; obtain a definition of aparticular location from the monitoring options; monitor a location ofthe user monitor device; determine that the user monitor device is inthe particular location; and in response to determining that the usermonitor device is in the particular location, transmit an alert to thesupervisory device.
 2. The system of claim 1, wherein transmitting thealert to the supervisory device comprises transmitting geographicalinformation specifying the location.
 3. The system of claim 1, whereinthe alert indicates that the particular location has been entered by theuser monitor device.
 4. The system of claim 1, wherein the subscriptionsub-system supports multiple selectable levels of subscription services,and wherein location monitoring of the user monitor device is one of themultiple selectable levels of subscription services, and wherein themultiple selectable levels of subscription services are each associatedwith types of monitoring and alert options.
 5. The system of claim 1,wherein the alert comprises an email message.
 6. The system of claim 1,further comprising: a second user monitor device, wherein the definitionof the particular location applies to both the user monitor device andthe second user monitor device, and wherein the subscription sub-systemis further configured to: monitor a second location of the second usermonitor device; determine that the second user monitor device is in theparticular location; and in response to determining that the second usermonitor device is in the particular location, transmit a further alertto the supervisory device.
 7. The system of claim 1, further comprising:a web site through which the supervisory device can be configured as arecipient of the alert.
 8. The system of claim 7, wherein the web siteallows a plurality of devices, including the supervisory device, to beconfigured as recipients of the alert, and wherein the subscriptionsub-system is further configured to: in response to determining that theuser monitor device is in the particular location, transmit the alert tothe plurality of devices.
 9. The system of claim 1, wherein the usermonitor device is assigned a unique identifier.
 10. The system of claim1, wherein the subscription sub-system stores the alert in an alerthistory that includes an alert type and time and date of the alert. 11.The system of claim 1, wherein the supervisory device incurs a flat ratesubscription fee.
 12. The system of claim 1, wherein the definition ofthe particular location is received from the supervisory device.
 13. Thesystem of claim 1, wherein the subscription sub-system is furtherconfigured to: determine that the user monitor device has left theparticular location; and in response to determining that the usermonitor device has left the particular location, transmit a furtheralert to the supervisory device.
 14. The system of claim 1, wherein thetampering involves an attempt to remove user monitoring from the usermonitor device while the tamper alert module is armed.
 15. A methodcomprising: receiving, by way of a supervisory device, user informationand monitoring options; creating a user profile related to a usermonitor device based on the user information; obtaining a definition ofa particular location from the monitoring options; monitoring a locationof the user monitor device, wherein the user monitor device includes atamper alert module that is configured to cause, when the user monitordevice is subject to tampering, transmission of an alarm to thesupervisory device, and wherein the tamper alert module can be armed ordisarmed by a code obtained from the supervisory device; determiningthat the user monitor device is in the particular location; and inresponse to determining that the user monitor device is in theparticular location, transmitting an alert to the supervisory device.16. The method of claim 15, wherein transmitting the alert to thesupervisory device comprises transmitting geographical informationspecifying the location.
 17. The method of claim 15, wherein the alertindicates that the particular location has been entered by the usermonitor device.
 18. The method of claim 15, wherein location monitoringof the user monitor device is one of multiple selectable levels ofsubscription services, and wherein the multiple selectable levels ofsubscription services are each associated with types of monitoring andalert options.
 19. The method of claim 15, wherein the tamperinginvolves an attempt to remove user monitoring from the user monitordevice while the tamper alert module is armed.
 20. The method of claim15, wherein the definition of the particular location applies to boththe user monitor device and a second user monitor device, the methodfurther comprising: monitoring a second location of the second usermonitor device; determining that the second user monitor device is inthe particular location; and in response to determining that the seconduser monitor device is in the particular location, transmitting afurther alert to the supervisory device.