Set-based object management system

ABSTRACT

A management system monitors a set of objects of a user by wirelessly communicating with one or more location components associated with the objects, and each object of the set has a respective location component. The monitoring includes ascertaining by the management system, based at least in part on data obtained via wireless communication with the location component(s), a spatial centroid of the set and a spatial separation of an object in the set from the spatial centroid, and correlating the ascertained spatial centroid to a context classification of multiple context classifications. The management system further determines whether a difference between the ascertained spatial separation and the average spatial separation of the location component(s) for the correlated context classification exceeds an acceptable spatial separation tolerance. Based on the difference exceeding the acceptable tolerance, the management system provides an electronic alert to the user.

BACKGROUND

The commercial market for monitoring personal objects has increasedsignificantly over the last decade, supported by advancements inwireless communications, wireless networking, cloud-based storage, andmobile applications. A number of commercial providers in this marketoffer a range of products and services to assist a user in monitoringand tracking objects. Available solutions are often deployed using anetwork of after-market electronic tags attached to the objects.Typically, once a user realizes that an object has been lost, then theuser invokes a mobile application which attempts to contact theelectronic tag attached to that object in an effort to locate theobject.

SUMMARY

Certain shortcomings of the prior art are overcome and additionaladvantages are provided through the provision, in one or more aspects,of a method of managing objects. The method includes monitoring, by amanagement system, a set of objects of a user. The management systemwirelessly communicates with one or more location components associatedwith the objects, where each object in the set of objects has arespective location component associated therewith. The monitoringincludes ascertaining, by the management system, based at least in parton data obtained via wireless communication with the one or morelocation components, a spatial centroid of the set, and a spatialseparation of an object in the set from the spatial centroid. Themonitoring includes correlating, by the management system, theascertained spatial centroid to a context classification of multiplecontext classifications, and determining, by the management system,whether a difference between the ascertained spatial separation of theobject and an average spatial separation of the object for thecorrelated context classification exceeds an acceptable spatialseparation tolerance for the correlated context classification. Based onthe difference exceeding the acceptable spatial separation tolerance,the management system provides an electronic alert to the user.

Additional features and advantages are realized through the techniquesof the present invention. Other embodiments and aspects of the inventionare described in detail herein and are considered a part of the claimedinvention.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more aspects of the present invention are particularly pointedout and distinctly claimed as examples in the claims at the conclusionof the specification. The foregoing and other objects, features, andadvantages of the invention are apparent from the following detaileddescription taken in conjunction with the accompanying drawings inwhich:

FIG. 1 is an illustration of one embodiment of a set-based objectmanagement system, in accordance with one or more aspects of the presentinvention;

FIG. 2 is a block diagram of data processing system into which variousaspects of an embodiment of a set-based object management systemprocessing can be implemented, in accordance with one or more aspects ofthe present invention;

FIG. 3A is an overview illustration of certain aspects of an embodimentof the present invention;

FIG. 3B depicts an exemplary timing diagram depicting certain aspects ofan embodiment of the present invention;

FIG. 4 is an illustration of one embodiment of initialization modeprocessing of a set-based object management system, in accordance withone or more aspects of the present invention;

FIG. 5A depicts one embodiment of calibration mode processing of aset-based object management system, in accordance with one or moreaspects of the present invention;

FIGS. 5B-5D depict examples of different context classifications of aset of objects of a user, in accordance with one or more aspects of thepresent invention;

FIG. 6 depicts one embodiment of monitoring mode processing of aset-based object management system, in accordance with one or moreaspects of the present invention;

FIG. 7 depicts one embodiment of hybrid or evolution mode processing ofa set-based object management system, in accordance with one or moreaspects of the present invention;

FIG. 8 depicts one embodiment of virtualization mode processing of aset-based object management system, in accordance with one or moreaspects of the present invention;

FIG. 9A-9C depict one embodiment of set-based object management systemprocessing, in accordance with one or more aspects of the presentinvention;

FIG. 10 depicts one embodiment of a computing system which can implementor facilitate implementing set-based object management systemprocessing, in accordance with one or more aspects of the presentinvention;

FIG. 11 depicts one embodiment of a cloud computing environment whichcan facilitate implementing, or be used in association with, one or moreaspects of the present invention; and

FIG. 12 depicts an example of abstraction model layers according to anembodiment of the present invention.

DETAILED DESCRIPTION

Aspects of the present invention and certain features, advantages anddetails thereof, are explained more fully below with reference to thenon-limiting example(s) illustrated in the accompanying drawings.Descriptions of well-known systems, devices, processing techniques,etc., are omitted so as to not unnecessarily obscure the invention indetail. It should be understood, however, that the detailed descriptionin this specific example(s), while indicating aspects of the invention,is given by way of illustration only, and not by way of limitation.Various substitutions, modifications, additions, and/or otherarrangements, within the spirit and/or scope of the underlying inventiveconcepts will be apparent to those skilled in the art from thisdisclosure. Note further that numerous inventive aspects and featuresare disclosed herein, and unless inconsistent, each disclosed aspect orfeature is combinable with any other disclosed aspect or feature asdesired for a particular application of a set-based object managementsystem and/or method such as described herein.

As understood by one skilled in the art, program code, as referred tothroughout this application, includes both software and hardware. Forexample, program code in certain embodiments of the present inventionincludes fixed function hardware, while other embodiments utilize asoftware-based implementation of the functionality described. Certainembodiments combine both types of program code. One example of programcode, also referred to as one or more programs, is depicted in FIG. 10as program/utility 1040, having a set (at least one) of program modules1042, which can be stored in memory 1023. As a further example, in FIG.2 program code implementing one or more aspects described herein couldbe stored or resident within main memory 208, read-only memory 224, diskstorage 226, CD-ROM 230, and/or in one or more other peripheral devicesof a computing environment 200.

There are a wide variety of location components, such as electronicsensors and electronic tags, commercially available today. These includeelectronic article surveillance tags, radio frequency identificationdevices, smart cards, intelligent tags, Internet of Thing devices, etc.These electronic devices, referred to herein generally as wirelesslocation components or location components, can, in one or more aspects,signal their presence and transmit data using one or more of a varietyof known wireless communication standards or protocols. Althoughlocation components can be very different products, they are generallycompact electronic devices, sensors, tags, etc., that have applicationin a management system and environment such as disclosed herein.

The commercial market for monitoring or tracking objects, such aspersonal items, has increased significantly, supported in part, byadvancements in electronic sensors and tags, as well as in wirelesscommunications, wireless networking, cloud-based storage, and mobileapplications. Many object tracking solutions available today focus onthe personal device tracking market, and can employ for instance anafter-market tag attached via adhesive to the object of interest. Suchsolutions allow multiple devices to be tracked, but these solutions notautonomous in the sense of providing spatially-relevant, real-timepreemptive alerts when an object is about to be misplaced or lost. Forinstance, using available approaches, a user must first realize that anobject has been lost, and once the user realizes that the object hasbeen lost, then the user might invoke a mobile application whichcontacts the associated location component or tag in an effort to trackthe misplaced object. Alternatively, a present-day system could alertthe user at the point of losing communication with an object. In thisscenario, a pre-defined threshold separation distance is used as atrigger. A drawback to this approach is that it is not predictive.Further, because the location components are typically all attachedafter-market, they can be susceptible to compromise by harsh chemicals,abrasion or mechanical damage.

Advantageously, disclosed herein are object management systems andmethods which facilitate real-time autonomous tracking of objectsthrough the utilization of embedded (or attached) wireless locationcomponents, such as radio frequency identification devices (RFIDs) orother electronic sensors or tags. In one or more implementations, thewireless location components are linked together in a decentralized andautonomous fashion to provide real-time, spatially-relevant andpredictive monitoring of a set of objects, such as a set including auser's wallet, keys, phone, backpack, jewelry, etc. In this manner,real-time and autonomous alerts can be provided to highlight to a userwhen an object is about to be lost or misplaced. Further, in one or moreimplementations, predictive analytics is employed to provide preemptivereminders for particular objects that are about to be misplaced or lost.In one or more embodiments, the wireless location components used totrack the user's objects can be embedded within the objects, andtherefore not be susceptible to tamper or damage. Additionally, theautonomous approaches described herein can be based on constant feedbackon the separation of a given object relative to a set or cluster ofobjects in a user's monitor network of objects. Further, the objectmanagement system and method disclosed herein provide a secure andprivate process for loaning an object in a user's monitor network, toanother user having a different monitor network.

Embodiments of the present invention include a computer-implementedmethod, computer program product, and a computing system, where programcode executing on one or more processors provides a management facilitywhich implements set-based object management such as described herein.Generally stated, a method of managing objects is disclosed whichincludes monitoring, by a management system, a set of objects of a user.The monitoring includes the management system wirelessly communicatingwith one or more location components associated with the objects. Eachobject of the set of objects has a respective location componentassociated therewith. The monitoring includes: ascertaining, by themanagement system, based at least in part on data obtained via wirelesscommunication with the one or more location components, a spatialcentroid of a set of objects and a spatial separation of an object inthe set from the spatial centroid; correlating, by the managementsystem, the ascertained spatial centroid to a temporally-correlatedcontext classification of multiple context classifications; anddetermining, by the management system, whether a difference between theascertained spatial separation of the object and an average spatialseparation of the object for the correlated context classificationexceeds an acceptable spatial separation tolerance for the correlatedcontext classification. Based on the difference exceeding the acceptablespatial separation tolerance, the management system provides anelectronic alert to the user. In this manner, the user is provided witha real-time and autonomous alert highlighting to the user that an objectis about to be lost or misplaced, without the user realizing that theobject has been lost or misplaced.

In one or more embodiments, at least two context classifications of themultiple context classifications have different average spatialseparations of the object from the spatial centroids of the at least twocontext classifications and different acceptable spatial separationtolerances. For instance, the average spatial separation of an objectbeing monitored may be different depending on the user's context. Notethat the context used herein refers to, for instance, a sub-collectionof objects, a location, an activity, a time of day, or any combinationthereof, etc., as established during a calibration mode of themanagement system.

In one or more implementations, the method further includes determining,by the management system, the multiple context classifications. Thedetermining includes ascertaining over a calibration time period, basedat least in part on wireless communications between the managementsystem and the one or more s associated with the objects, calibrationsets of spatial centroids of the objects in different user contexts, andsorting the calibration sets of spatial centroids into multiple contextclassifications, each context classification being associated with arespective context of the different user contexts.

In one or more embodiments, the determining further includesascertaining respective average spatial separations of objects in theset relative to a determined spatial centroid of each contextclassification, and ascertaining for the determined contextclassifications a respective acceptable spatial separation tolerance forthe object for each context classification. In one embodiment, therespective acceptable spatial separation tolerance for the object isdifferent between at least two determined context classifications of themultiple determined context classifications.

In one or more embodiments, the method further includes modifying, bythe user, the set of objects being monitored by the management system,and based on the modifying, re-determining, by the management system,the multiple context classifications, including ascertaining respectiveaverage spatial separations of objects in the modified set relative to adetermined spatial centroid of each context classification.

In one or more embodiments, the method further includes identifying useof a set of objects of the user in a new user context, and basedthereon, the method further includes re-determining, by the managementsystem, the multiple context classifications, where the re-determinedmultiple context classifications include, in part, a new contextclassification associated with the new user context.

In one or more implementations, the monitoring includes establishing, bythe management system, a monitor network including the locationcomponents associated with the set of objects, the monitor network beingone monitor network of multiple monitor networks, each monitor networkincluding location components associated with, at least in part, adifferent set of objects, and the method further includes instantiatinga digital twin location component within the monitor network based onthe user loaning an object of the set of objects to another user withanother monitor network of the multiple monitor networks. In one or moreembodiments, the method further includes establishing, by the managementsystem, a loaned object status link to the another monitor network ofthe another user to provide one or more status updates confirming thatthe loaned object remains within the another monitor network, absentidentifying to the user a geographic location of the loaned object.

In one or more implementations, at least two objects of the set ofobjects of the user have different types of location componentsassociated therewith. The different types of location components includean electronic sensor and an electronic tag. The electronic sensor isassociated with a first object of the set of objects, and the electronictag is associated with a second object of the set of objects. Theelectronic sensor, in part, wirelessly obtains location data for thesecond object from the electronic tag, and the management system obtainslocation data for the second object and the location data for the firstobject from the electronic sensor. In one embodiment, a mobile device ofthe user includes, at least in part, the management system, and theelectronic sensor wirelessly communicates with the electronic tag usinga first wireless communication standard, and the mobile devicecommunicates with the electronic sensor using a second wirelesscommunication standard, the first and second wireless communicationstandards being different wireless communication standards. Forinstance, in one embodiment, the second wireless communication standardhas a greater wireless communication range than the first wirelesscommunication standard.

In one or more implementations, a method, system, and computer programproduct are provided herein for managing multiple objects utilizingspatial monitoring of location components embedded in clustered objects.The method includes identifying two or more location componentsassociated with two or more objects, where each of the two or morelocation components is associated a respective object. The two or morelocation components are calibrated, where the calibrating includesdetermining an initial spatial centroid for the two or more locationcomponents, and determining an initial spatial separation between eachof the components. In a monitoring mode, the two or more components aremonitored, where the monitoring includes determining a current spatialcentroid for the two or more location components, and determining acurrent spatial separation of each object. Responsive to determiningthat the current spatial separation exceeds a threshold, then a lostobject is identified from the two or more objects with the exceededthreshold. The user is alerted of the lost or soon-to-be-displacedobject. Further, the two or more location components can accommodate arequest to locate a virtual copy of at least one object of a user at thespatial centroid when that object is to be borrowed by another user.

Note that, in one or more embodiments, the current spatial centroid inmonitoring mode is not compared to a threshold but is used, in concertwith the time of day and the set of objects being tracked, to establisha contextual classification. This contextual classification in turn candynamically set the threshold for the unique spatial separation of eachobject in the set, as explained herein.

Advantageously, the object management system and method disclosed hereincognitively learns the behaviors of the user, including frequentlyvisited locations, activities, traveling behaviors, etc., and correlatesthese contexts to personal objects of the user's private network ofobjects being monitored. As noted, each object being monitored has atleast one location component associated therewith to allow for theintelligent tracking of the object as part of a set or collection ofobjects. Further, the object management system is contextual in that thesystem applies, for instance, location-based rules for setting ofacceptance criterion for object separation, and for an electronic alertthat an object is about to be lost or misplaced. Further, the objectmanagement system can electronically communicate with a user'selectronic scheduling calendar to know, for instance, whether the useris traveling for business or on vacation, or is at an appointment, atwork, at home, etc. Further, the object management system disclosedherein is advantageously proactive and predictive. For instance, throughthe learning or calibration mode, the management system cognitivelyevolves to provide predictive or proactive alerts when a userdemonstrates a high probability of forgetting an object in the user'smonitor network. In this manner, the management system can provideearlier alerts; still be, for instance, within the communication rangeof the location component associated with the object. Still further, theobject management system disclosed herein can leverage “digital twin”technology to facilitate the sharing of objects among multiple monitornetworks, while simultaneously protecting privacy of the borrower. Withdigital twin technology, a virtual replica of an object remains withinthe lender's monitor network.

In one or more embodiments, once a loan request has been authenticatedand executed, then a digital twin is virtually instantiated at the samelocation as the spatial centroid of the real items under the control ofthe lender. There are several advantages to this approach. For instance,such an approach simplifies the lending process as multiple loanrequests to different borrowers will all result in digital twin virtualcopies of the loaned items being co-located at the spatial centroid ofthe remaining real items. In this way, the lender need not be concernedwith spatial separation of the loaned item(s) in the borrower(s)network. The only concern of the lender is whether or not the loaneditems(s) continues to be under the control of the borrower(s). Further,such an approach allows the spatial centroid in the lender's network toremain truly representative of the real items under the lenders control.Any consideration for the spatial location of the virtually instantiateddigital twin could impede the native cognitive based monitoring of thereal items under the lender's control. Also, as alluded to, since thedigital twin is virtually instantiated at the spatial centroid, then itnatively moves with the lender and lender's network.

By way of example, FIG. 1 depicts one embodiment of a system 100 intowhich various aspects of some embodiments of the present invention canbe implemented or integrated. System 100 includes computing devices,including one or more mobile devices 110 owned by or associated with auser. By way of example, in one or more embodiments, the user's mobiledevice 110 has a wireless communication capability, and can be, forinstance, a mobile phone, a personal digital assistant (PDA), a wirelesscomputer, a laptop computer, a tablet, etc. The wireless communicationcapability or system can, for instance, be one or more of a codedivision multiple access (CDMA) system, a global system for mobilecommunication (GSM), a wide-band CDMA (W-CDMA) system, a long-termevolution (LTE) system, a LTE advanced system, a WiFi-based system, acellular-based system, a Bluetooth® -based system, a ZigBee™-basedsystem, a radio frequency identification (RFID)-based system, a nearfield communication (NFC)-based system, etc.

The mobile device(s) 110 is capable of providing bi-directionalcommunication via a receive path and a transmit path. On the receivepath, signals transmitted by, for instance, one or more wirelesslocation components (e.g., electronic devices, sensors, tags, etc.) arereceived by an antenna, and provided to a receiver. The receiverconditions and digitizes the received signals, and provides theconditioned and digitized signals to a digital section of the mobiledevice for further processing. On a transmit path, a transmitterreceives data to be transmitted from the digital section, processes andconditions the data, and generates a modulated signal, which can betransmitted via the antenna to one or more wireless location components,and/or to one or more other mobile devices 110 or one or more computerresources 120. The receiver and the transmitter can be part of atransceiver, and support, for instance, one or more of the above-notedwireless communication standards, protocols or techniques.

The digital section of the mobile device can include various processing,interfaces, and memory units, such as, for example, a modem processor, areduced instruction set computer/digital signal processor (RISC/DSP), acontroller/processor, an internal memory, a graphic/display processor,and/or an external bus interface (EBI). The modem processor can performprocessing for data transmission and reception, for example, encoding,modulation, demodulation, and decoding. The RISC/DSP can perform generaland specialized processing for the wireless device. Thecontroller/processor can control the operation of the various processingand interface units within the digital section. The internal memorystores data and/or instructions for various units within the digitalsection.

In general, a mobile device such as referenced herein, is indicative ofvarious types of devices, such as a wireless smartphone, cellular phone,laptop computer, tablet, wireless communication personal computer (PC),a PDA, etc. Any such mobile device can have memory for storinginstructions and data, as well as hardware, software, and/or firmware,and combinations thereof, configured or programmed to perform processessuch as disclosed herein.

As shown, the one or more mobile devices 110 can include program code,such as a mobile application code, which implements one or more aspectsof a management system facility 111, such as described herein, as wellas a calibration knowledge base 112, which can include multiple contextclassifications for the user's private monitor network(s) 113 of objectsbeing monitored. Further, the user's mobile device 110 can include arespective wireless location component 114, with, for instance, GlobalPositioning System (GPS)-based capabilities, to ascertain a geographiclocation of the user's mobile device at, for instance, calibration timeintervals and/or monitor time intervals, such as discussed herein.Further, the wireless location component 114 can incorporate a sensor toobtain spatial location data from other wireless location components 130associated with the user's set of objects 131 being monitored. As noted,in one or more embodiments, one or more aspects of management systemfacility 111, calibration knowledge base 112 and/or monitor network(s)113 can reside remotely, for instance, on one or more computer resources120.

Mobile device(s) 110 can operatively couple with one or more computerresources 120 across one or more networks 105. In addition to couplingmobile device(s) 110 and computer resource(s) 120, one or more networks105 can couple mobile device(s) 110 with wireless location components130 associated with the respective objects 131 of the set of objects ofthe user to be monitored. By way of example, network(s) 105 can be orinclude a telecommunications network, a local area network (LAN) a widearea network (WAN), such as the Internet, or a combination thereof, andcan include wired, wireless, fiber optic connections, etc. Thenetwork(s) 105 can include one or more wired and/or wireless networksthat are capable of receiving and transmitting data, such as dataassociated with monitoring a user's objects, as described herein.

The one or more computer resources 120 can provide storage 124 and/oranalytics for one or more aspects of a management system, such asdescribed herein. As illustrated, in one embodiment, storage 124 ofremote computer resource(s) 120 can include a calibration knowledge base125, and one or more private monitor networks 126, each representing aset of location-component-enabled objects being monitored for a user, inaccordance with the processes disclosed herein. In one or moreembodiments, the mobile device(s) 110 and/or computer resource(s) 120execute program code to implement aspects of management systemprocessing disclosed herein. By way of example only, computerresource(s) 120 can include program code 121 implementing, in part, acognitive agent 122 to assist with one or more aspects disclosed herein.Alternatively, one or more aspects of the program code 121 and/orcognitive agent 122 can be implemented on mobile device(s) 110.

In some embodiments of the present invention, the program code executingon computer resource(s) 120 and/or user mobile device(s) 110 can utilizeexisting cognitive analysis tools or agents, to determine, for instance,spatial centroid context classifications during a calibration mode ofobject management system processing, such as disclosed herein.

More particularly, embodiments of the present invention can utilize avariety of existing cognitive agents, as well as existing APIs to, forinstance, group spatial centroids into context classifications during acalibration mode of the object management system, and/or providepredictive alerts when an object within a user monitor network ofobjects is about to be lost or misplaced. By way of example, someembodiments of the present invention can utilize IBM Watson® as thecognitive agent. IBM Watson® is a product of International BusinessMachines Corporation, and is a registered trademark of InternationalBusiness Machines Corporation, Armonk, New York, USA. Note that this isa non-limiting example of a cognitive agent that can be utilized inembodiments of the present invention, and is discussed for illustrativepurposes only, and not to imply, implicitly or explicitly, anylimitations regarding cognitive agents that can implement aspects ofembodiments of the present invention.

In some embodiments of the present invention that utilize IBM Watson® asa cognitive agent, the program code can interface with IBM Watson® APIsto perform a cognitive analysis of, for instance, spatial centroids togroup the centroids into context classifications during a calibrationmode, such as discussed herein, and/or to provide a predictive alertwhen an object of a user's monitor network of objects is about to belost or misplaced, as well as one or more other aspects of theprocessing disclosed herein. In some embodiments of the presentinvention, the program code interfaces with the Application ProgramInterfaces (APIs) that are part of a known cognitive agent, such as IBMWatson® application program interface (API), a product of InternationalBusiness Machines Corporation, to determine, for instance, the contextclassifications, one or more aspects of the monitoring, and/orpredictive alerts. Further, embodiments of the present invention thatutilize IBM Watson® can utilize APIs that are not part of IBM Watson® toaccomplish these aspects. Note that various other APIs and third-partysolutions can also provide the above-noted functionality in embodimentsof the present invention.

As shown in FIG. 1, the cluster of user objects being monitored can begrouped into different tiers of wireless communication standards. Forinstance, in one or more implementations, the user's mobile device(s)110 can possess a tier-0 wireless communication standard(s) capability,which allows the mobile device(s) to communicate using a variety ofwireless standards, including, for instance, WiFi, satellite,Bluetooth®, ZigBee™, etc. In one embodiment, the mobile device(s) 110could be a laptop computer, a mobile phone, a tablet, etc.

In the example of FIG. 1, one or more objects 131 having associatedwireless location components 130 are grouped into a tier-1 wirelesscommunication grouping. In this grouping, the user's objects, such as awallet, luggage, specialty objects, sporting equipment, etc., caninclude intermediate-range wireless communication standard capabilities,including, for instance, Bluetooth®-based communication capability,ZigBee™-based communication capability, RFID communication capability,and NFC-based communication capability. In a tier-2 wirelesscommunication standard grouping, wireless location components 130associated with the respective objects 131 can be, for instance,electronic tags which utilize a close-range wireless communicationstandard, such as NFC-based communication or RFID-based communication.By way of example, the close proximity objects could be credit cards,keys, etc., which are typically in close proximity to a respectivetier-1 object. As such, the tier-1 wireless location components couldbe, in one or more embodiments, electronic devices or sensors capable ofreceiving location-related data from close proximity objects in thetier-2 grouping, and to provide that information, along with thelocation data for the associated tier-1 object(s) in the managementsystem back to the user's mobile device(s) 110, either directly or viaone or more other wireless location components, that is, in animplementation where a further hierarchy of wireless communicationcomponents within the user monitor network is desired.

In one or more implementations, the monitor networks disclosed hereincan be configured as a hybrid of a mesh, peer-to-peer, or cluster treenetwork. The location components can be tiered hierarchically into 2, 3,or more, tiers By way of example, in tier-0, location components can beembedded into high-functioning, highly integrated, and power intensivedevices, such as smartphones, laptops, tablets, etc. These locationcomponents are capable of multiple different long- and medium-rangecommunication protocols, such 4G, cellular, WiFi Wi-Max, Bluetooth®,ZigBee™, etc. The location components at the tier-0 level can also allowthe user to reconfigure the monitor network as desired, and can serve asa gateway to the remote computer resource(s) 120 in the example of FIG.1, which in one or more embodiments, can be cloud-based computerresources.

Further, in the example of FIG. 1, the tier-1 location components can belocation components attached to medium-function objects, such as a bag,luggage, wallet, etc. These location components can be capable oflimited medium- and short-range communication protocols, such asBluetooth®, ZigBee™, NFC, RFID, etc. In one or more embodiments, thetier-1 location components underpin the proximity approach to learningand proactive alerts disclosed herein. Further, the tier-1 locationcomponents serve as a pipeline between the tier-2 and tier-0 locationcomponents. The tier-2 location components can be, in one or moreembodiments, electronic tags associated with or attached tolower-function objects, such as a credit card. A low-function object istypically wirelessly coupled to a medium-function object, and in one ormore implementations, should always be close to that object, such as acredit card being close to a wallet.

The above, and further aspects of one or more embodiments of managementsystem processing are described in additional detail below withreference to FIGS. 3A-9C.

Before discussing these figures, FIG. 2 depicts a block diagram of dataprocessing system in which illustrative aspects of the present inventioncan be implemented. Data processing system 200 can be one example of acomputer, such as mobile device(s) 110 and/or computer resource(s) 120in the system of FIG. 1, and can include computer usable program code orinstructions implementing processes such as disclosed herein.

In the depicted example, data processing system 200 includes a hubarchitecture including a north bridge and memory controller hub (NB/MCH)202 and a south bridge and input/output (I/O) controller hub (SB/ICH)204. Processing unit 206, main memory 208, and graphics processor 210are coupled to north bridge and memory controller hub 202. Processingunit 206 can contain one or more processors and even can be implementedusing one or more heterogeneous processor systems. Graphics processor210 can be coupled to the NB/MCH through an accelerated graphics port(AGP), for example.

In the depicted example, a local area network (LAN) adapter 212 iscoupled to south bridge and I/O controller hub 204 and audio adapter216, keyboard and mouse adapter 220, modem 222, read only memory (ROM)224, universal serial bus (USB) and other ports 232, and PCI/PCIedevices 234 are coupled to south bridge and I/O controller hub 204through bus 238, and hard disk drive (HDD) 226 and CD-ROM 230 arecoupled to south bridge and I/O controller hub 204 through bus 240.PCI/PCIe devices can include, for example, Ethernet adapters, add-incards, and PC cards for notebook computers. PCI uses a card buscontroller, while PCIe does not. ROM 224 can be, for example, a flashbinary input/output system (BIOS). Hard disk drive 226 and CD-ROM 230can use, for example, an integrated drive electronics (IDE) or serialadvanced technology attachment (SATA) interface. A super I/O (SIO)device 236 can be coupled to south bridge and I/O controller hub 204.

An operating system runs on processing unit 206 and coordinates andprovides control of various components within data processing system 200in FIG. 2. The operating system can be a commercially availableoperating system. An object oriented programming system can run inconjunction with the operating system and provide calls to the operatingsystem from programs or applications executing on data processing system200.

Instructions for the operating system, the object-oriented programmingsystem, and applications or programs can be located on storage devices,such as hard disk drive 226, and can be loaded into main memory 208 forexecution by processing unit 206. The processes of the illustrativeaspects discussed herein can be performed by processing unit 206 usingcomputer implemented instructions, which can be located in a memory suchas, for example, main memory 208, read only memory 224, or in one ormore peripheral devices.

Note that the hardware embodiment depicted in FIG. 2 can vary dependingon the desired implementation. Other internal hardware or peripheraldevices, such as flash memory, equivalent non-volatile memory, oroptical disk drives and the like, can be used in addition to or in placeof certain hardware depicted. Also, the processes of the illustrativeaspects described herein can be applied to other hardware environments,such as to a multiprocessor data processing system.

In one or more implementations, data processing system 200 can be anelectronic device or a server computer resource, and can be generallyconfigured with flash memory to provide non-volatile memory for storingoperating system files and/or user-generated data. A bus system caninclude one or more buses, such as a system bus, an I/O bus and a PCIbus. Of course the bus system can be implemented using any type ofcommunications fabric or architecture that provides for a transfer ofdata between different components or devices attached to the fabric orarchitecture. A communications unit can include one or more devices usedto transmit and receive data, such as a modem or a network adapter. Amemory can be, for example, main memory 208 or a cache such as found innorth bridge and memory controller hub 202. A processing unit caninclude one or more processors or CPUs. Those skilled in the art shouldnote that the depicted system example of FIG. 2, as well as otherexamples referenced herein, are not meant to imply architecturallimitations. For example, as briefly noted, data processing system 200can be implemented as part of a smartphone, a tablet computer, a laptopcomputer, a desktop computer, a server, a personal digital assistant(PDA), a wireless computer, etc.

One or more embodiments of a set-based object management system, such asdisclosed herein, incorporate multiple operational modes. FIG. 3Adepicts one embodiment of operational modes for an object managementsystem, in accordance with one or more aspects of the present invention.As explained below, set-based object management system processing can besegregated into multiple modes or phases, including an initializationmode 300, a calibration (or learning) and classification mode 310, amonitoring mode 320, a hybrid (or evolution) mode 330, and an objectvirtualization mode 340.

In operation, a new location-component-enabled object 301 is initializedin an initialization mode 300 into a user's private monitor network,which includes a set or cluster of objects to be monitored by themanagement system. As explained herein, the object being added to theuser's monitor network has an associated location component, such as anelectronic device, electronic sensor, electronic tag, etc.Initialization mode 300 includes communications between the locationcomponent of the object and, for instance, the user's mobile device(s)and/or the computer resource(s) with management system program code.

During calibration and classification mode 310, the object managementsystem learns, for instance, the location and temporal-based behavior ofthe user with reference to the set of objects being monitored. Thislearning can include, for instance, obtaining or generating data by themanagement system representative of location of the user objects in theset relative to each other to obtain a spatial centroid, as well asdistance between the individual objects in the set and the obtainedspatial centroid. Note in this context that obtaining the spatialcentroid of the objects and the individual spatial separation of eachobject from the spatial centroid refers to the spatial centroid of thelocation components embedded in, attached to, or associated with thoseobjects, as well as the spatial separation of the respective locationcomponents from the determined spatial centroid.

The obtaining of information can include ascertaining over a calibrationtime period calibration sets of spatial centroids of the objects of theuser in different contexts, such as in different locations, differenttimes of day, different activities, different travel means, etc. Thecalibration sets of obtained data are then sorted by the system (such asthe cognitive agent) into multiple context classifications, with eachcontext classification being associated with a respective context ofmultiple different contexts, such as different locations, sub-set ofobjects, activities, travel means, etc., that occur during thecalibration time interval. For instance, where the user has N objects tobe monitored, the management system can monitor via the associatedlocation components of the objects, places (and time of day) that a userfrequently visits, the user's travel habits, the user's activities,etc., and with this data, learns the mobility of each object and canclassify the obtained calibration data accordingly.

For instance, the objects being monitored can be classified, in oneaspect, based on frequency of use. Frequently used objects, such as asmartphone, wallet, watch, etc., can be one classification, while mobileobjects such as a laptop, that are more moderately used objects, may beanother classification, and infrequently used objects, such as luggage,may be a third classification, etc. In such an implementation, themoderately and infrequently used objects can be left in familiar places,such as the user's home. Depending on the current location, the objectsbeing monitored can be in close contact or proximity. For example, wherethe user is traveling, all the objects that are being monitored can becarried (or should be carried) meaning that they should be in closerange of each other, otherwise an alert can be generated to the user. Inone or more implementations, during the calibration (or learning) andclassification mode, the management system learns the habits of theuser, such as travel times and means of transportation, and learns theobjects in the cluster of objects that are typically present for a giventype of travel. For instance, from Monday to Thursday, the user takesthe train, with both their smartphone and laptop.

During monitoring (or mission) mode 320, an alert is generated if one ormore objects in the set of objects of the user's monitor network hasbeen left behind that is usually taken with the other objects. Forinstance, if it is Monday, and the user is heading to the train station,but the user's laptop is home, an alert can be predictively generated bythe management system as described further herein. Further, if a userdivides the objects into sub-networks, an alert can be predictivelygenerated. For example, where luggage and a laptop are left in a hotelroom, and the user is carrying a smartphone and smartwatch, an alert canbe generated that the luggage and laptop have become separated from theother objects. Further, an alert can be predictively generated duringthe monitoring mode if an object loaned to another user is about to belost or separated from the other user's monitor network of objects beingmonitored, as explained further herein.

In hybrid or evolution mode 330, a new location-component-enabled objectcan be added to the user's monitor network, and/or a new context orlocation can be identified and added. As explained herein, each objectbeing added has an associated location component, such as an electronicsensor or electronic tag, for wireless communication with one or moreother location components and/or the management system. The presence ofa new context or location allows the management system to dynamicallychange or update the multiple context classifications and add respectivespatial data for the set of objects for the new context, as explainedfurther herein.

In object virtualization mode 340, a facility is provided for allowingsecure sharing of an object from one user's monitor network to anotheruser's monitor network using, for instance, digital twin technology, asexplained further herein.

By way of example, FIG. 3B depicts an exemplary timing diagramillustrating certain aspects of operational mode timing of a set-basedobject management system, in accordance with one or more aspectsdisclosed herein. As depicted in FIG. 3B, operation of the managementsystem includes an initialization mode time interval, a calibrationcycle time interval, and a monitor time interval. During the calibrationcycle interval, multiple calibration period intervals are identifiedduring which spatial data of the objects in the set of objects beingcalibrated is obtained. For instance, the management system obtains,based on wireless communication with one or more location componentsassociated with one or more objects of the set, spatial data on therelative location of each object relative to the other, and from thisinformation, ascertains a spatial centroid of the set of objects, and inone or more embodiments, a spatial separation of one or more objects inthe set from the spatial centroid. Collecting this information in thecalibration period intervals results in the calibration sets of spatialcentroids of the objects of the user in different contexts, as well asthe associated spatial data for the objects. During the monitor mode, atdefined time intervals, e.g., at set monitor period intervals, therelative spatial data is again obtained from the one or more locationcomponents in order for the management system to monitor the set ofobjects, as described herein.

Further details of one embodiment of the above-noted operational modesof FIG. 3A for a set-based object management system embodiment such asdisclosed herein are described below with reference to FIGS. 4-8.

In FIG. 4, computer resource(s) 120 includes, for instance, storageand/or analytics processing for an object management system such asdisclosed herein, and can be operatively coupled to the managementsystem processing, for instance, running on the user's mobile device viaone or more networks 105. Initialization mode processing can begin witha user purchasing an object through a retail point-of-sale, e-commerce,or other channel. The user decides whether an embedded locationcomponent solution is required. If so, the user might send the object toa specialized foundry that is able to embed the location component intothe object using, for instance, industrial processes. Following this,the foundry provides the location-component-enabled object back to theuser. At this point, the location component is unauthenticated.Alternatively, if the user decides not to embed the location component,then the user can affix an after-market location component to theobject. The new object and all objects in the set of objects, are addedto the user's private monitor network which, in one or more embodiments,houses a private key database, and also facilitates secure communicationto, for instance, a public network, allowing for sharing of spatial andtemporal information. Using the characteristics of the set of objects inthe user's monitor network, a unique authentication key 400 can begenerated from the existing database. Each new object can then beappended to the user's private monitor network using the self-generatedauthentication key, which in one or more embodiments, can be similar toa block chain authentication process. As will be understood by thoseskilled in the art, an object fingerprint can be generated from theexisting database(s) and any user preference(s) 410. Thelocation-component-enabled object fingerprint 415 can then be appendedas a new object to the existing storage database using theauthentication key 420. In one or more embodiments, further instances ofobjects being added to the set of objects being monitored, that is, tothe user's monitor network, can thus have keys that are impacted by theaddition of the object.

FIG. 5A depicts one embodiment of calibration or learning andclassification mode processing of a set-based object management system,in accordance with one or more aspects of the present invention. Duringcalibration mode, new objects can be on-boarded to the database used bythe system via autonomous self-learning techniques. The process canbegin with a user selecting a total calibration time, and acalibration-interval period of the system 500. The calibration cycleinterval defines the time or period over which the calibration mode isexecuted. For instance, the user can elect to calibrate the system overone day, one week, one month, etc. Over this time period, the processallows the system to characterize the behavior of the user by samplingthe spatial and temporal signatures of the location components activatedfor each object in the set of objects. The calibration period intervalrefers to the periodic time between which “snapshots” of the state ofthe user's monitor network are captured. A key metric of these snapshotsis the spatial location of each location component associated with eachobject being monitored.

Once the calibration cycle interval and period interval have been set,the calibration clock is initialized to be begin the calibration modeprocessing 505. In the calibration mode, the management systemcontinually checks the calibration clock 515, and after each periodinterval, a snapshot of the monitor network is taken, and the spatialcentroid of all the location components associated with the objects inthe set is determined 520. This spatial centroid is, in one embodiment,the geometric mean of the location component locations. In addition, foreach location component, the spatial separation of that component fromthe spatial centroid is determined 530. This metric represents thegeometric distance between the location of that location component,e.g., electronic sensor, electronic tag, etc., and the geometric mean.Note that the determination of the spatial centroid and the spatialseparation are facilitated (in one embodiment) via secure access to apublic network with Global Positioning Satellite (GPS), or otherlocation-sensing technology. These two metrics, the spatial centroid andthe spatial separation, are then logged into a private calibrationdatabase of the user's monitor network in the management system. Alsologged are the calibration periodic interval, and the date and time fromthe system clock. As noted, this data is housed in a database as arestricted, private network. Processing then determines whether thetotal calibration cycle time has elapsed 540. If the calibration cycletime has elapsed, then calibration mode processing is complete 542. Ifthe calibration cycle time has not elapsed, then the system clock isincremented 541, and processing checks the calibration clock and awaitsthe passing of another calibration period interval.

Note in this regard, that both the calibration period intervals and themonitor period intervals are, in one or more embodiments, dynamic in thesense that they can be in a feedback loop based on how often themonitored spatial centroid and spatial separation changes. The advantageof such an approach is the ability of the system to save power. If thesystem detects that the least frequently moved item is moving morefrequently, then the period interval can be reduced. Conversely, if thesystem detects that the most frequently moved item is moving lessfrequently, then the period interval can be dynamically increased.

Along with completing calibration mode processing, the management systemfurther classifies the spatial centroids by grouping the centroidstogether into a set of context classifications, 550. This can beaccomplished using a correlation of the statistics of the spatialcentroids and the calibration period intervals. For instance, if overseveral hundred period intervals, the spatial centroid distributionevolves to one of a very low standard deviation, it may suggest that allthe location components are essentially fixed such as when the user isat a location, such as at the user's home or office. By way of example,in FIG. 5B, a spatial centroid 550 is determined for a set of objects551 at a first location, resulting in a first context classification. InFIG. 5C, the spatial centroid distribution evolves at a differentlocation in a different configuration, where a spatial centroid 550again is determined for objects 551 in the set of objects beingmonitored. For instance, the object distribution of FIG. 5B might betypical for the objects being at the user's home, while theconfiguration of FIG. 5C might be typical for the user's office.Alternatively, if the spatial centroid distribution is a uniformdistribution, it may represent a situation where all of the locationcomponents are moving with the same velocity, which is the case when theuser is in transit, as depicted in FIG. 5D. The statistics of thespatial separation can be brought to bear on the classification task.For instance, at a fixed location, such as the user's home or theoffice, the spatial separation of each location component is likely tobe larger than when the user is in transit, such as in a vehicle. In thelatter case, all objects in the set are likely to be on the person orwithin one vehicle length of the person. Once the classification hasbeen completed by the system, second order metrics can be generated suchthat the average spatial separation for each location component (or eachobject) for a given context classification is ascertained by the system.This metric can then be used to automatically trigger in a predictivemanner a lost or misplaced object alert, as described herein inconnection with the monitor mode of the management system.

FIG. 6 depicts one embodiment of monitor mode processing of a managementsystem, in accordance with one or more aspects of the present invention.Monitor or tracking mode is a main operational state of the system thatnaturally follows a successful calibration and classification, which canbe defined as a complete set of spatial centroids and spatialseparations for the location components at each calibration periodinterval spanning the entire calibration cycle time. In a manneranalogous to calibration mode processing, in monitor mode processing,the monitor period interval is set, for instance, by the user 600. (Asnoted, both the calibration period intervals and the monitor periodintervals can be dynamic in the sense that they are in a feedback loopbased on how often the monitored spatial centroid and spatial separationchanges. The advantage of this feature is the ability of the system tosave power. If the system detects that the least frequently moved itemis moving more frequently, then the period interval is reduced.Conversely, if the system detects that the most frequently moved item ismoving less frequently, then the period interval can be increased.)There is an additional variable referred to as a spatial separationtolerance, which can also be set by a user for each location componentin the user's private monitor network. The spatial separation toleranceis, in one or more embodiments, a measure of the excess spatialseparation any location component, and thus, the associated object, isallowed to have over an average spatial separation of the component fora given context classification. In an alternate implementation, thecognitive agent of the management system can predictively determine theacceptable spatial separation tolerance for each location component (orobject) in each context classification based, for instance, on thecalibration data, as well as prior monitor data. In this way, thecognitive agent can learn over time when the user is about to lose ormisplace an object in the user's monitored network, and based thereon,can provide a predictive electronic alert to the user.

Once the monitor period interval and the location component separationtolerances are set, then the monitor clock is activated 605, andprocessing continually checks the monitor clock for a monitor periodinterval having elapsed 610. Once a monitor period interval has elapsed615, then the management system determines a new spatial centroid andspatial separation for, in one embodiment, all of the locationcomponents in the user's monitor network, again leveraging a GPS-enabledpublic network, if needed 625. The management system processing accessesthe user's private calibration database and retrieves the averagespatial separation during calibration for each location component at thecurrent centroid location 630. If the difference between the currentspatial separation and the average spatial separation during calibrationexceeds the acceptable spatial separation tolerance, then a lost objectalert is automatically triggered 640. If the difference between thecurrent spatial separation and the average spatial separation duringcalibration does not exceed the acceptable spatial separation tolerance,then system processing proceeds to check the monitor clock, and wait foranother monitor period interval to elapse. The result is that monitormode processing provides for continuous monitoring of the objectlocations, and automatically triggers alerts should a locationcomponent, and the associated object, move out of an acceptabletolerance limit for that object in the correlated contextclassification.

FIG. 7 depicts one embodiment of hybrid or evolution mode processing ofa set-based object management system, in accordance with one or moreaspects of the present invention. In evolution mode processing, thesystem has performed, for N original location components 701,calibration mode execution 700, such as described above in connectionwith FIG. 5A. Further, the monitor mode has been run or is currentlyrunning for the N location components 705, such as described above inconnection with FIG. 6. The evolution mode processing allows for thedynamic evolution of the user's monitor network by the management systemas new location-component-enabled objects 711 are added to the networkto also include monitoring of new objects as part of the set. In such acase, calibration mode execution is performed on the N+1 locationcomponent 712 to update the calibration database, and the monitor modeis run on the new set of N+1 location components 710. Note in thisregard, that one or more items can be added at a time to the networkwhile in hybrid/evolution mode. Therefore, the new set can have N+1, N+2etc., with N+1 being one example only.

In another application of the evolution mode, processing can account fora new user context 716. For instance, during the monitoring, a newspatial centroid location of the location components can be identifiedthat is not represented in the user's private database of contextclassifications. This evolution mode aspect could cover, by way ofexample only, an instance where the user moves to a new location,changing the user's home location. As with the addition of a newlocation-component-enabled object, the management system automaticallytriggers a calibration mode sequence to on-board the new user context byperforming calibration mode execution on the N+1 location components715, after which monitor mode execution continues on the N+1 locationcomponent 720. Note that in one or more embodiments, one or more newlocation components can be added to the user's monitor network, one ormore location components can be removed from the network, and/or one ormore new user contexts can be identified, each of which can result intriggering of a calibration mode sequence to on-board the change.

FIG. 8 depicts one embodiment of object virtualization mode processingin a set-based object management system, such as disclosed herein. Thismode is to support borrowing or loaning of an object from one user'sprivate monitor network to another user's private monitor network. Asillustrated in FIG. 8, the lender management system processing includesfor a lender user M original objects 800 that have been processed incalibration mode 805, such as described above, and are being monitoredin monitor mode 810, as described herein.

Separately, the borrower management system processing includes for aborrower P original objects 801 that have been processed in acalibration mode 802, and are being monitored in monitor mode 803. Eachobject has associated therewith a wireless location component, such asan electronic sensor, an electronic tag, etc., as described above.During monitor mode execution on the P objects 803, the borrower'smanagement system receives a request to borrow an object 804 from thelender's user management system. The request is forwarded to the lendermanagement system, which determines whether to accept the request 815.If the request is accepted, a request granted alert or notice isreturned 816 to the borrower management system, otherwise, a requestdenied alert 817 is returned. With approval of the request to borrow anobject from the lender's private monitor network, the lender managementsystem can generate a digital twin or virtualization of the requestedobject 820. This virtualization of the requested object allows theloaned object to be physically transferred to the borrower, after whichthe borrower's management system can perform a calibration modeexecution, including the P+1 object that has been borrowed 830. Monitormode execution is then performed on the P+1 object(s) 835 by theborrower's management system.

Additionally, for instance, concurrently, the lender management systemcontinues or enters monitor mode execution on the M−1 object(s) (i.e.,the location components associated therewith), plus the digital twin845. A virtual shared object status link 840 is established between thelender management system and the borrower management system to allow thelender management system to receive updates that the loaned objectremains within the borrower's private monitor network, that is, has notbeen misplaced or lost, without providing the lender with a particulargeographic location of the loaned object. Note that a feature of thedigital twin that is relevant to the present system is the fact thatdata relevant to the physical object can be seamlessly transmitted tothe virtual object (and vice-versa). This allows the virtual object toexist simultaneously with the physical object. In one or more aspects ofthe present invention, the data is transmitted from the physical objectin the borrower's network to the virtual object in the lenders network.In any representation of the spatial distribution of the objects in thelenders network, one or more digital twins are depicted as beingvirtually located at the spatial centroid of the lender's network,provided that the physical twin of that object is under the control ofthe borrower's network. In the event that the physical object becomeslost or otherwise compromised in the borrower's network that informationis wirelessly transmitted to the digital twin in the lenders network,prompting the lender to enquire of the borrower regarding the status ofthe object. In the present invention, a feature of the digital twin isthat it allows for the protection of the privacy of the borrower sincethe geographical location of the physical object is not among the datathat is transferred from the physical object in the borrower's networkto the virtual object in the lender's network. However, the transfer ofother relevant data from the physical object to the virtual object isprovided allowing the lender to know that the physical object is withinthe borrower's network. The type of data that can be transferred candepend on the tier level of the device and its associated locationcomponent (e.g., electronic tag), and can also include environmentaldata, such as temperature and humidity, or data indicative of damagesustained to the physical object. Furthermore, the digital twinmethodology allows for the orchestration of the second- and third-orderobject transfers from a first borrower to a second borrower with theexplicit approval of the lender, but without the lender being physicallyinvolved in the transaction. For example, the lender can begeographically far away from a first borrower and authorize the firstborrower to physically transfer the object to a second approvedborrower. The virtual object continues to be present in the lender'snetwork and is updated based on the characteristics of the physicalobject in the second-borrowers network. The digital twin or virtualobject is always virtually represented at the spatial centroid of thephysical objects under the custody of the lender. If there are multiplephysical objects loaned out, then each digital twin or virtual object issimultaneously co-located at the spatial centroid of the remainingphysical objects.

Note that an object virtualization mode such as disclosed herein allowstwo comparatively equipped object management systems to facilitate thesharing of location-component-enabled objects, while providing thelender with security that the loaned item remains under control of theborrower, and also simultaneously respecting the privacy of the borrowerconcerning the location of the object. This is facilitated through thegeneration of the digital twin which effectively clones the loanedobject in the lender's network, while it is physically located in theborrower's monitor network. Once calibration is complete, the loanedobject is part of the borrower's monitor network, which is now runningin monitor mode. The virtualization mode, through a virtual sharedobject status link established between the lender's and borrower'smanagement systems, can provide updates on the status of the loanedobject between the lender's and the borrower's management systems, forinstance, until the request to borrow the object has been closed.

Further details on one embodiment of set-based object managementprocessing, in accordance with one or more aspects of the presentinvention, are described below with reference to FIGS. 9A-9C.

Referring to FIG. 9A, in one embodiment, the process includesmonitoring, by a management system, a set of objects of a user, wherethe monitoring includes the management system wirelessly communicatingwith one or more location components associated with the objects, witheach object of the set of objects having a respective location componentassociated therewith (900). The monitoring includes: ascertaining, bythe management system, based at least in part on data obtained viawireless communication with the one or more location components, aspatial centroid of the set of objects and a spatial separation of anobject in the set from the spatial centroid (902); correlating, by themanagement system, the ascertained spatial centroid to a contextclassification of multiple context classifications (904); anddetermining, by the management system, whether a difference between theascertained spatial separation of the object and average spatialseparation of the object for the correlated context classificationexceeds an acceptable spatial separation tolerance for the correlatedcontext classification (906). Further, the management system processingincludes, based on the difference exceeding the acceptable spatialseparation tolerance, providing an electronic alert to the user (910).

In one or more embodiments, at least two context classifications of themultiple context classifications have different average spatialseparations of the object from respective spatial centroids of the atleast two context classifications, and different acceptable spatialseparation tolerances (912).

In one or more implementations, the management system processingincludes determining, by the management system, the multiple contextclassifications (914). The determining includes ascertaining over acalibration time period, based at least in part on wirelesscommunications between the management system and the one or morelocation components associated with the objects, calibration sets ofspatial centroids of the objects in different user contexts (916); andsorting the calibration sets of spatial centroids into the multiplecontext classifications, each context classification being associatedwith a respective context of the different user contexts (918).

Referring to FIG. 9B, in one or more implementations, the managementsystem processing further includes ascertaining respective averagespatial separations of objects in the set relative to a determinedspatial centroid of each context classification (920), and ascertainingfor the determined context classifications a respective acceptablespatial separation tolerance for the object for each contextclassification (922).

In one or more implementations, the respective acceptable spatialseparation tolerances for the object are different between at least twodetermined context classifications of the multiple determined contextclassifications (924). Further, in one or more embodiments, themanagement system processing allows for the user to modify the set ofobjects being monitored by the management system, and based on themodifying, to re-determine, by the management system, the multiplecontext classifications, including ascertaining respective averagespatial separations of objects in the modified set relative to adetermined spatial centroid of each context classification (926).

In one or more embodiments, management system processing furtherincludes identifying use of the set of objects of the user in a new usercontext, and based thereon, re-determining, by the management system,the multiple context classifications, where the re-determined multiplecontext classifications include, in part, a new context classificationassociated with the new user context (928).

In one or more embodiments, the monitoring by the management system canfurther include establishing, by the management system, a monitornetwork with the location components associated with the set of objects,the monitor network being one monitor network of multiple monitornetworks, each monitor network including location components associatedwith, at least in part, a different set of objects (930), and the methodcan further include instantiating a digital twin location component (andobject) within the monitor network based on the user loaning the objectof the set of objects to another user with another monitor network ofthe multiple monitor networks (932). In addition, as illustrated in FIG.9C, system processing can include establishing, by the managementsystem, a loaned object status link to the another monitor network ofthe another user to provide the user with a status update on whether theloaned object remains within the another monitor network, absentidentifying to the user a geographic location of the loaned object(934). As discussed herein, the link is established from one system toanother system. In the case of a system that monitors multiple networks,the objects are all presumed to be physical. For example, if a parentestablishes a network for objects owned by a child, and the parent hasthe ability to monitor the child's network it allows for the parent tobe able to see the geographical location of the physical objects in thechild's network. Furthermore, if there is a loan of a physical objectfrom the parent to the child this is not a digital twin since the parenthas the ability to monitor the child's network. In the digital twinningmethodology, the link is made between two independent systems that areunable to monitor each other's network but are simply able to track therelevant data of a physical object in the borrower's network using avirtual object in the lender's network. The geographical location of thephysical object is, by construction, not included in the set of relevantdata.

In one or more embodiments, at least two objects of the set of objectsof the user have different types of location components associatedtherewith, the different types of location components including anelectronic sensor and an electronic tag, the electronic sensor beingassociated with a first object of the set of objects, and the electronictag being associated with a second object of the set of objects, withthe electronic sensor, in part, wirelessly obtaining location data forthe second object from the electronic tag, and the management systemobtaining location data for the second object and location data for thefirst object from the electronic sensor (936).

In one or more embodiments, a mobile device of the user includes, atleast in part, the management system, and the electronic sensorwirelessly communicates with the electronic tag using a first wirelesscommunication standard, and the mobile device communicates with theelectronic sensor using a second wireless communication standard, thefirst and second wireless communication standards being differentwireless communication standards, and the second wireless communicationstandard having a greater wireless communication range than the firstwireless communication standard (938).

In one or more embodiments, the acceptable spatial separation tolerancefor the correlated context classification is predictively determined bya cognitive agent of the management system (940).

Further exemplary embodiments of a computing environment to implementone or more aspects of the present invention are described below withreference to FIGS. 10-12.

By way of further example, FIG. 10 depicts one embodiment of a computingenvironment 1000, which includes a computing system 1012. Examples ofwell-known computing systems, environments, and/or configurations thatmay be suitable for use with computer system 1012 include, but are notlimited to, a server, a desktop computer, a work station, a wirelesscomputer, a handheld or laptop computer or device, a mobile phone, aprogrammable consumer electronic device, a tablet, a personal digitalassistant (PDA), and the like.

Computing system 1012 can be described in the general context ofcomputer system-executable instructions, such as program modules, beingexecuted by a computer system. Generally, program modules includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes.

As depicted in FIG. 10, computing system 1012, is shown in the form of ageneral-purpose computing device. The components of computing system1012 can include, but are not limited to, one or more processors orprocessing units 1016, a system memory 1023, and a bus 1018 that couplesvarious system components including system memory 1023 to processor1016.

In one embodiment, processor 1016 may be based on the z/Architecture®offered by International Business Machines Corporation, or otherarchitectures offered by International Business Machines Corporation orother companies.

Bus 1018 represents one or more of any of several types of busstructures, including a memory bus or memory controller, a peripheralbus, an accelerated graphics port, and a processor or local bus usingany of a variety of bus architectures. By way of example, and notlimitation, such architectures include Industry Standard Architecture(ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA)bus, Video Electronics Standards Association (VESA) local bus, andPeripheral Component Interconnect (PCI) bus.

Computing system 1012 can include a variety of computer system readablemedia. Such media may be any available media that is accessible bycomputing system 1012, and it includes both volatile and non-volatilemedia, removable and non-removable media.

System memory 1023 can include computer system readable media in theform of volatile memory, such as random access memory (RAM) 1030 and/orcache memory 1032. Computing system 1012 can further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 1034 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM or other optical media could be provided.In such instances, each can be connected to bus 1018 by one or more datamedia interfaces. As described below, memory 1023 can include at leastone program product having a set (e.g., at least one) of program modulesor code that are configured to carry out the functions of embodiments ofthe invention.

Program/utility 1040, having a set (at least one) of program modules1042, can be stored in memory 1032 by way of example, and notlimitation, as well as an operating system, one or more applicationprograms, other program modules, and program data. Each of the operatingsystem, one or more application programs, other program modules, andprogram data or some combination thereof, can include an implementationof a networking environment. Program modules 1042 generally carry outthe functions and/or methodologies of embodiments of the invention asdescribed herein. Alternatively, a set-based object management systemfacility, module, logic, etc., 1001 can be provided within computingenvironment 1012 implementing one or more aspects of management systemprocessing, such as disclosed herein.

Computing system 1012 can also communicate with one or more externaldevices 1014 such as a keyboard, a pointing device, a display 1024,etc.; one or more devices that enable a user to interact with computingsystem 1012; and/or any devices (e.g., network card, modem, etc.) thatenable computing system 1012 to communicate with one or more othercomputing devices. Such communication can occur via Input/Output (I/O)interfaces 1022. Still yet, computing system 1012 can communicate withone or more networks such as a local area network (LAN), a general widearea network (WAN), and/or a public network (e.g., the Internet) vianetwork adapter 1020. As depicted, network adapter 1020 communicateswith the other components of computing system, 1012, via bus 1018. Itshould be understood that although not shown, other hardware and/orsoftware components could be used in conjunction with computing system1012. Examples, include, but are not limited to: microcode, devicedrivers, redundant processing units, external disk drive arrays, RAIDsystems, tape drives, and data archival storage systems, etc.

One or more aspects may relate to or use cloud computing.

It is understood in advance that although this disclosure includes adetailed description on cloud computing, implementation of certainteachings recited herein are not limited to a cloud computingenvironment. Rather, embodiments of the present invention are capable ofbeing implemented in conjunction with any other type of computingenvironment now known or later developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based email). Theconsumer does not manage or control the underlying cloud infrastructureincluding network, servers, operating systems, storage, or evenindividual application capabilities, with the possible exception oflimited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

A cloud computing node can include a computer system/server, such as theone depicted in FIG. 10. Computer system/server 1012 of FIG. 10 can bepracticed in distributed cloud computing environments where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed cloud computing environment,program modules may be located in both local and remote computer systemstorage media including memory storage devices. Computer system/server1012 is capable of being implemented and/or performing any of thefunctionality set forth hereinabove.

Referring now to FIG. 11, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 can comprise one ormore cloud computing nodes 10 with which local computing devices used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Nodes 10 maycommunicate with one another. They may be grouped (not shown) physicallyor virtually, in one or more networks, such as Private, Community,Public, or Hybrid clouds as described hereinabove, or a combinationthereof. This allows cloud computing environment 50 to offerinfrastructure, platforms and/or software as services for which a cloudconsumer does not need to maintain resources on a local computingdevice. It is understood that the types of computing devices 54A-N shownin FIG. 6 are intended to be illustrative only and that computing nodes10 and cloud computing environment 50 can communicate with any type ofcomputerized device over any type of network and/or network addressableconnection (e.g., using a web browser).

Referring to FIG. 12, a set of functional abstraction layers provided bycloud computing environment 50 (FIG. 11) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 12 are intended to be illustrative only and embodiments of theinvention are not limited thereto. As depicted, the following layers andcorresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage devices 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and set-based object management systemprocessing 96.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinaryskills in the art without departing from the scope and spirit of thedescribed embodiments. The terminology used herein was chosen to bestexplain the principles of the embodiments, the practical application ortechnical improvement over technologies found in the marketplace, or toenable others of ordinary skills in the art to understand theembodiments disclosed herein.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product can include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

In addition to the above, one or more aspects may be provided, offered,deployed, managed, serviced, etc. by a service provider who offersmanagement of customer environments. For instance, the service providercan create, maintain, support, etc. computer code and/or a computerinfrastructure that performs one or more aspects for one or morecustomers. In return, the service provider may receive payment from thecustomer under a subscription and/or fee agreement, as examples.Additionally or alternatively, the service provider may receive paymentfrom the sale of advertising content to one or more third parties.

In one aspect, an application may be deployed for performing one or moreembodiments. As one example, the deploying of an application comprisesproviding computer infrastructure operable to perform one or moreembodiments.

As a further aspect, a computing infrastructure may be deployedcomprising integrating computer readable code into a computing system,in which the code in combination with the computing system is capable ofperforming one or more embodiments.

As yet a further aspect, a process for integrating computinginfrastructure comprising integrating computer readable code into acomputer system may be provided. The computer system comprises acomputer readable medium, in which the computer medium comprises one ormore embodiments. The code in combination with the computer system iscapable of performing one or more embodiments.

Although various embodiments are described above, these are onlyexamples. For example, computing environments of other architectures canbe used to incorporate and use one or more embodiments. Further,different instructions, instruction formats, instruction fields and/orinstruction values may be used. Many variations are possible.

Further, other types of computing environments can benefit and be used.As an example, a data processing system suitable for storing and/orexecuting program code is usable that includes at least two processorscoupled directly or indirectly to memory elements through a system bus.The memory elements include, for instance, local memory employed duringactual execution of the program code, bulk storage, and cache memorywhich provide temporary storage of at least some program code in orderto reduce the number of times code must be retrieved from bulk storageduring execution.

Input/Output or I/O devices (including, but not limited to, keyboards,displays, pointing devices, DASD, tape, CDs, DVDs, thumb drives andother memory media, etc.) can be coupled to the system either directlyor through intervening I/O controllers. Network adapters may also becoupled to the system to enable the data processing system to becomecoupled to other data processing systems or remote printers or storagedevices through intervening private or public networks. Modems, cablemodems, and Ethernet cards are just a few of the available types ofnetwork adapters.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprise” (andany form of comprise, such as “comprises” and “comprising”), “have” (andany form of have, such as “has” and “having”), “include” (and any formof include, such as “includes” and “including”), and “contain” (and anyform contain, such as “contains” and “containing”) are open-endedlinking verbs. As a result, a method or device that “comprises”, “has”,“includes” or “contains” one or more steps or elements possesses thoseone or more steps or elements, but is not limited to possessing onlythose one or more steps or elements. Likewise, a step of a method or anelement of a device that “comprises”, “has”, “includes” or “contains”one or more features possesses those one or more features, but is notlimited to possessing only those one or more features. Furthermore, adevice or structure that is configured in a certain way is configured inat least that way, but may also be configured in ways that are notlisted.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below, if any, areintended to include any structure, material, or act for performing thefunction in combination with other claimed elements as specificallyclaimed. The description of the present invention has been presented forpurposes of illustration and description, but is not intended to beexhaustive or limited to the invention in the form disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the invention.The embodiment was chosen and described in order to best explain theprinciples of one or more aspects of the invention and the practicalapplication, and to enable others of ordinary skill in the art tounderstand one or more aspects of the invention for various embodimentswith various modifications as are suited to the particular usecontemplated.

1. A method of managing user objects, the method comprising: monitoring,by a management system, a set of objects of a user, the monitoringincluding the management system wirelessly communicating with one ormore location components associated with the objects, each object of theset of objects having a respective location component associatedtherewith, the monitoring being for a monitoring interval andcomprising: ascertaining, by the management system, based at least inpart on data obtained via wireless communication with the one or morelocation components, a spatial centroid of the set of objects and aspatial separation of an object in the set from the spatial centroid;correlating, by the management system, the ascertained spatial centroidto a context classification of multiple pre-determined contextclassifications; and determining, by the management system, whether adifference between the ascertained spatial separation of the object anda saved average spatial separation of the object for the correlatedcontext classification exceeds an acceptable spatial separationtolerance for the object for the correlated context classification,wherein different objects of the set of objects have differentrespective, saved average spatial separations from the spatial centroidfor the particular correlated context classification; and based on thedifference exceeding the acceptable spatial separation tolerance,providing, by the management system, an electronic alert to the user. 2.The method of claim 1, wherein at least two context classifications ofthe multiple context classifications have different average spatialseparations of the object from respective spatial centroids of the atleast two context classifications, and different acceptable spatialseparation tolerances.
 3. The method of claim 1, further comprising:determining, by the management system, the multiple contextclassifications, the determining comprising: ascertaining over acalibration time period, based at least in part on wirelesscommunications between the management system and the one or morelocation components associated with the objects, calibration sets ofspatial centroids of the objects in different user contexts; and sortingthe calibration sets of spatial centroids into the multiple contextclassifications, each context classification being associated with arespective context of the different user contexts.
 4. The method ofclaim 3, wherein the determining further comprises: ascertainingrespective average spatial separations of objects in the set relative toa determined spatial centroid of each context classification; andascertaining for the determined context classifications a respectiveacceptable spatial separation tolerance for the object for each contextclassification.
 5. The method of claim 4, wherein the respectiveacceptable spatial separation tolerance for the object is differentbetween at least two determined context classifications of the multipledetermined context classifications.
 6. The method of claim 4, furthercomprising modifying by the user the set of objects being monitored bythe management system, and based on the modifying, re-determining, bythe management system, the multiple context classifications, includingascertaining respective average spatial separations of objects in themodified set relative to a determined spatial centroid of each contextclassification.
 7. The method of claim 4, further comprising identifyinguse of the set of objects of the user in a new user context, and basedthereon, the method further includes re-determining, by the managementsystem, the multiple context classifications, wherein the re-determinedmultiple context classifications include, in part, a new contextclassification associated with the new user context.
 8. The method ofclaim 1, wherein the monitoring comprises establishing, by themanagement system, a monitor network including the location componentsassociated with the set of objects, the monitor network being onemonitor network of multiple monitor networks, each monitor networkcomprising location components associated with, at least in part, adifferent set of objects, and the method further comprises:instantiating a digital twin within the monitor network based on theuser loaning an object of the set of objects to another user withanother monitor network of the multiple monitor networks.
 9. The methodof claim 8, further comprising establishing, by the management system, aloaned object status link to the another monitor network of the anotheruser to provide the user with a status update on whether the loanedobject remains within the another monitor network, absent identifying tothe user a geographic location of the loaned object.
 10. The method ofclaim 1, wherein at least two objects of the set of objects of the userhave different types of location components associated therewith, thedifferent types of location components comprising an electronic sensorand an electronic tag, the electronic sensor being associated with afirst object of the set of objects, and the electronic tag beingassociated with a second object of the set of objects, wherein theelectronic sensor, in part, wirelessly obtains location data for thesecond object from the electronic tag, and the management system obtainsthe location data for the second object and location data for the firstobject from the electronic sensor.
 11. The method of claim 10, wherein amobile device of the user comprises, at least in part, the managementsystem, and wherein the electronic sensor wirelessly communicates withthe electronic tag using a first wireless communication standard, andthe mobile device communicates with the electronic sensor using a secondwireless communication standard, the first and second wirelesscommunication standards being different wireless communicationstandards, and the second wireless communication standard having agreater wireless communication range than the first wirelesscommunication standard.
 12. The method of claim 1, wherein theacceptable spatial separation tolerance for the object for thecorrelated context classification is predictively determined by acognitive agent of the management system.
 13. A computer systemcomprising: a memory; and one or more processors in communication withthe memory, wherein the computer system is configured to perform amethod comprising: monitoring, by a management system, a set of objectsof a user, the monitoring including the management system wirelesslycommunicating with one or more location components associated with theobjects, each object of the set of objects having a respective locationcomponent associated therewith, the monitoring being for a monitoringinterval and comprising: ascertaining, by the management system, basedat least in part on data obtained via wireless communication with theone or more location components, a spatial centroid of the set ofobjects and a spatial separation of an object in the set from thespatial centroid; correlating, by the management system, the ascertainedspatial centroid to a context classification of multiple pre-determinedcontext classifications; and determining, by the management system,whether a difference between the ascertained spatial separation of theobject and a saved average spatial separation of the object for thecorrelated context classification exceeds an acceptable spatialseparation tolerance for the object for the correlated contextclassification, wherein different objects of the set of objects havedifferent respective, saved average spatial separations from the spatialcentroid for the particular correlated context classification; and basedon the difference exceeding the acceptable spatial separation tolerance,providing, by the management system, an electronic alert to the user.14. The computer system of claim 13, further comprising: determining, bythe management system, the multiple context classifications, thedetermining comprising: ascertaining over a calibration time period,based at least in part on wireless communications between the managementsystem and the one or more location components associated with theobjects, calibration sets of spatial centroids of the objects indifferent user contexts; and sorting the calibration sets of spatialcentroids into the multiple context classifications, each contextclassification being associated with a respective context of thedifferent user contexts.
 15. The computer system of claim 14, whereinthe determining further comprises: ascertaining respective averagespatial separations of objects in the set relative to a determinedspatial centroid of each context classification; and ascertaining forthe determined context classifications a respective acceptable spatialseparation tolerance for the object for each context classification. 16.The computer system of claim 15, further comprising modifying by theuser the set of objects being monitored by the management system, andbased on the modifying, re-determining, by the management system, themultiple context classifications, including ascertaining respectiveaverage spatial separations of objects in the modified set relative to adetermined spatial centroid of each context classification.
 17. Thecomputer system of claim 15, further comprising identifying use of theset of objects of the user in a new user context, and based thereon, themethod further includes re-determining, by the management system, themultiple context classifications, wherein the re-determined multiplecontext classifications include, in part, a new context classificationassociated with the new user context.
 18. The computer system of claim13, wherein the monitoring comprises establishing, by the managementsystem, a monitor network including the location components associatedwith the set of objects, the monitor network being one monitor networkof multiple monitor networks, each monitor network comprising locationcomponents associated with, at least in part, a different set ofobjects, and the method further comprises: instantiating a digital twinwithin the monitor network based on the user loaning an object of theset of objects to another user with another monitor network of themultiple monitor networks.
 19. The computer system of claim 18, furthercomprising establishing, by the management system, a loaned objectstatus link to the another monitor network of the another user toprovide the user with a status update on whether the loaned objectremains within the another monitor network, absent identifying to theuser a geographic location of the loaned object.
 20. A computer programproduct comprising: a computer-readable storage medium readable by aprocessing circuit and storing instructions for execution by theprocessing circuit for performing a method comprising: monitoring, by amanagement system, a set of objects of a user, the monitoring includingthe management system wirelessly communicating with one or more locationcomponents associated with the objects, each object of the set ofobjects having a respective location component associated therewith, themonitoring being for a monitoring interval and comprising: ascertaining,by the management system, based at least in part on data obtained viawireless communication with the one or more location components, aspatial centroid of the set of objects and a spatial separation of anobject in the set from the spatial centroid; correlating, by themanagement system, the ascertained spatial centroid to a contextclassification of multiple pre-determined context classifications; anddetermining, by the management system, whether a difference between theascertained spatial separation of the object and a saved average spatialseparation of the object for the correlated context classificationexceeds an acceptable spatial separation tolerance for the object forthe correlated context classification, wherein different objects of theset of objects have different respective, saved average spatialseparations from the spatial centroid for the particular correlatedcontext classification; and based on the difference exceeding theacceptable spatial separation tolerance, providing, by the managementsystem, an electronic alert to the user.