Checkpoint-based location monitoring via a mobile device

ABSTRACT

Systems, devices, and methods for checkpoint-based location monitoring via a mobile device are described herein. One device includes instructions stored thereon executable by a processor to receive, via a mobile device associated with a user in a facility having a plurality of wireless beacons therein, an indication of a first checkpoint corresponding to a first location in the facility and a first time period in which the user is allowed to reach the first checkpoint, provide to the user, via the mobile device, the indication of the first checkpoint and the first time period allowed to reach the first checkpoint, determine that the mobile device reached the first checkpoint based on a communication between the mobile device and a wireless beacon associated with the first checkpoint, receive, via the mobile device subsequent to the determination, an indication of a second checkpoint corresponding to a second location in the facility and a second time period in which the user is allowed to reach the second checkpoint, and provide to the user, via the mobile device, the indication of the second checkpoint and the second time period in which the user is allowed to reach the second checkpoint.

PRIORITY INFORMATION

This application is a continuation of U.S. patent application Ser. No.15/356,357, filed Nov. 18, 2016, which is incorporated herein byreference in its entirety.

TECHNICAL FIELD

The present disclosure relates to systems, devices, and methods forcheckpoint-based location monitoring via a mobile device.

BACKGROUND

Security guards routinely patrol facilities. These patrols may be doneas both a surveillance and a general deterrence activity. A patrol mayinclude a “tour” around different locations of a facility.

Previous approaches to security touring may include a wand carried bythe guard tapped against some electronic device corresponding to a“checkpoint” in order to verify that the guard was there. The resultingdata can then later be downloaded from the wand by a supervisory entityto verify that the tour did in fact take place, that all the checkpointswere reached, and that they were reached at the correct time(s).

However, previous approaches do not maintain a dynamic communicationlink between the guard and the supervisory entity. In addition, suchapproaches may be predictable and/or easily spoofed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates a system for checkpoint-based location monitoringvia a mobile device in accordance with one or more embodiments of thepresent disclosure.

FIG. 1B illustrates the system for checkpoint-based location monitoringvia a mobile device wherein a mobile device is located at a firstcheckpoint in accordance with one or more embodiments of the presentdisclosure.

FIG. 1C illustrates the system for checkpoint-based location monitoringvia a mobile device wherein the mobile device is located at a secondcheckpoint in accordance with one or more embodiments of the presentdisclosure.

FIG. 1D illustrates the system for checkpoint-based location monitoringvia a mobile device wherein the mobile device is located at a thirdcheckpoint in accordance with one or more embodiments of the presentdisclosure.

FIG. 2 illustrates a mobile device in accordance with one or moreembodiments of the present disclosure.

DETAILED DESCRIPTION

Checkpoint-based location monitoring via a mobile device is describedherein. For example, one or more embodiments include a computer-readablemedium having instructions stored thereon executable by a processor toreceive, via a mobile device associated with a user in a facility havinga plurality of wireless beacons therein, an indication of a firstcheckpoint corresponding to a first location in the facility and a firsttime period in which the user is allowed to reach the first checkpoint,provide to the user, via the mobile device, the indication of the firstcheckpoint and the first time period allowed to reach the firstcheckpoint, determine that the mobile device reached the firstcheckpoint based on a communication between the mobile device and awireless beacon associated with the first checkpoint, receive, via themobile device subsequent to the determination, an indication of a secondcheckpoint corresponding to a second location in the facility and asecond time period in which the user is allowed to reach the secondcheckpoint, and provide to the user, via the mobile device, theindication of the second checkpoint and the second time period in whichthe user is allowed to reach the second checkpoint.

Embodiments of the present disclosure can effectively replace auser-carried guard wand with a mobile device (a mobile computingdevice). By using a mobile device—something most users typically alreadycarry—embodiments of the present disclosure can provide increasedsecurity compared to previous approaches.

Increased security can be provided through capabilities offered bymobile devices. In some embodiments, biometric validation (e.g.,fingerprint scanning, voice identification) can be carried out via themobile device. Accordingly, whereas in previous approaches an attackercould overpower a guard, steal his wand, and tap it on the nextcheckpoint, embodiments herein can prevent such attacks.

Embodiments of the present disclosure can dynamically determine where tosend a guard next once he reaches a checkpoint. Because thisdetermination is made on the fly, embodiments herein are lesspredictable than previous approaches. A guard's habits are much moredifficult to study and use against him when his route throughout afacility changes dynamically.

While the specific example of a security guard performing a securitypatrol and/or tour of a facility is described herein, embodiments of thepresent disclosure are not so limited. Checkpoints, as described herein,are not limited to security checkpoints. Similarly, users of embodimentsof the present disclosure are not limited to security guards.

In the following detailed description, reference is made to theaccompanying drawings that form a part hereof. The drawings show by wayof illustration how one or more embodiments of the disclosure may bepracticed.

These embodiments are described in sufficient detail to enable those ofordinary skill in the art to practice one or more embodiments of thisdisclosure. It is to be understood that other embodiments may beutilized and that process, electrical, and/or structural changes may bemade without departing from the scope of the present disclosure.

As will be appreciated, elements shown in the various embodiments hereincan be added, exchanged, combined, and/or eliminated so as to provide anumber of additional embodiments of the present disclosure. Theproportion and the relative scale of the elements provided in thefigures are intended to illustrate the embodiments of the presentdisclosure, and should not be taken in a limiting sense.

The figures herein follow a numbering convention in which the firstdigit or digits correspond to the drawing figure number and theremaining digits identify an element or component in the drawing. Asused herein, “a” or “a number of” something can refer to one or moresuch things. For example, “a number of areas” can refer to one or moreareas.

FIG. 1A illustrates a system 100 for checkpoint-based locationmonitoring via a mobile device in accordance with one or moreembodiments of the present disclosure. As shown in FIG. 1, system 100includes a plurality of beacons in a facility 102. Eight beacons areillustrated in FIG. 1A, though it is noted embodiments of the presentdisclosure are not limited to a particular number of beacons. Thebeacons include a beacon 104-1, a beacon 104-2, a beacon 104-3, a beacon104-4, a beacon 104-5, a beacon 104-6, a beacon 104-7, and a beacon104-8, and are cumulatively referred to herein as “beacons 104.”

The beacons 104 can be devices capable of wireless communication with amobile device. The beacons 106 can allow the determination of a locationof a mobile device in the facility 102. For example, the beacons 104 canallow the determination of whether a mobile device is within aparticular (e.g., threshold) distance of a checkpoint (discussed furtherbelow). The beacons 104 can communicate with a mobile device viaBluetooth Low Energy (BLE) technology (e.g., as an iBeacon), WiFi, etc.In some embodiments, the beacons 104 can include one or more readabletags (e.g., near field communication (NFC)) tags.

A facility, as used herein, can refer to one or more buildings,businesses, homes, plants, hospitals, refineries, etc. The facility 102can include indoor and/or outdoor areas. Areas of the facility 102 caninclude a room, a plurality of rooms, a wing, a building, a plurality ofbuildings, an installation, etc. In some embodiments, areas of thefacility 102 can be defined by physical boundaries (e.g., walls, doors,etc.). In some embodiments, areas can be defined by logical and/orgeographic boundaries. Areas of the facility 102 can be defined by auser and/or by a Building Information Model (BIM) associated with thefacility 102, for instance.

The facility can include a plurality of checkpoints. As shown in FIG. 1,the facility 102 includes three checkpoints: a checkpoint 106-1, acheckpoint 106-2, and a checkpoint 106-3 (cumulatively referred to as“checkpoints 106”). It is noted that embodiments of the presentdisclosure are not limited to a particular number of checkpoints. Thecheckpoints 106 can correspond to locations in the facility 102 that asecurity guard (hereinafter “guard”) is to reach during a tour (e.g.,security patrol) of the facility 102. The checkpoints can correspond todoors, windows, areas, rooms, etc. of the facility 102.

Each of the checkpoints 106 can have one or more of the beacons 104associated with it. For instance, the checkpoint 106-1 is associatedwith the beacon 104-1, the checkpoint 106-2 is associated with thebeacon 104-2, and the checkpoint 106-3 is associated with the beacon104-3. The associated beacons can be located proximal to the checkpoints(e.g., within a particular distance of the checkpoints).

The system 100 includes a computing device 110, which can include aprocessor and a memory as described below in connection with FIG. 2. Thecomputing device 110 can control (e.g., manage) checkpoint-basedlocation monitoring in accordance with one or more embodiments herein.Though in the example illustrated in FIG. 1 the computing device 110 isshown external to the facility 102 (e.g., remote with respect to thefacility 102), embodiments of the present disclosure are not so limited.In some embodiments, the computing device 110 is internal to thefacility 102 (e.g., local with respect to the facility 102). In someembodiments, the computing device 110 can be cloud-based.

FIG. 1B illustrates the system 100 for checkpoint-based locationmonitoring via a mobile device wherein a mobile device 108 is located ata first checkpoint in accordance with one or more embodiments of thepresent disclosure. The mobile device 108 can be associated with aguard. In some embodiments, the mobile device 108 can be assigned and/orotherwise provided to the guard.

The mobile device 108 can be a client device carried or worn by a user.For example, the mobile device 108 can be a phone (e.g., smart phone),personal digital assistant (PDA), tablet, and/or wearable device (e.g.,wristband, watch, necklace, etc.).

The mobile device 108 can include one or more software applications(e.g., apps) which can define and/or control communications between themobile device 108, the computing device 110, and/or other devices. Appsmay be received by the mobile device 108 from the computing device 110,for instance. Apps may be launched by a user and/or responsive to someother condition (e.g., the interaction between the mobile device 108 anda beacon (discussed below)). In some embodiments, apps can be executingas background apps.

The mobile device 102 can communicate with (e.g., exchange data with)the computing device 110 via a wired and/or wireless connection, forinstance. In some embodiments, the mobile device 108 can communicateusing one or more communications modules (e.g., cellular, WiFi, etc.).Communication between various devices herein can be carried out over awireless network. A wireless network, as used herein, can include WiFi,Bluetooth, or any other suitable means to wirelessly transmit and/orreceive information.

The mobile device 108 can include a location functionality configured todetermine a location of the mobile device. In some embodiments, thelocation functionality includes a GPS and/or WiFi functionality of themobile device 108, though embodiments of the present disclosure are notso limited. For example, the mobile device 108 can include an imagingfunctionality (e.g., a camera) which can be used to read a code at aparticular (e.g., known) location in the facility 102. In someembodiments, the mobile device 108 can utilize visual lightcommunication (VLC) techniques to determine its position in the facility102.

Embodiments of the present disclosure can track a location of the mobiledevice 108 in the facility 102. As discussed further below, the mobiledevice 108 can be associated with a guard. In some embodiments, trackingthe location can include receiving location information by the computingdevice 110. The location information can be provided as a particulargeographic location (e.g., latitude/longitude) and/or a location withrespect to another location, such as an area of a facility 102 or one ormore of the beacons 104 of the facility 102. In some embodiments,location information can be communicated from the mobile device 108, andthus received by the computing device 110, responsive to a communicationbeing established between the mobile device 108 and one or more of thebeacons 104.

In some embodiments, an indication that the mobile device 108 is withina particular distance of one of the checkpoints 106 can be receivedresponsive to a communication between the mobile device 108 and one ofthe beacons 104 associated with that checkpoint. For instance, anindication that the mobile device 108 is within a particular distance ofthe first checkpoint 106-1 can be received responsive to a communicationbetween the mobile device 108 and the beacon 104-1.

The mobile device 108 can receive an indication (e.g., from thecomputing device 110) associated with the first checkpoint 106-1 and afirst time period allowed to reach the first checkpoint 106-1. Themobile device 108 can provide to the guard (e.g., via a display of themobile device) the indication of the first checkpoint 106-1 and thefirst time period allowed to reach the first checkpoint 106-1. Once theguard reaches the first checkpoint 106-1, a communication between thefirst beacon 106-1 can inform the computing device 110 of his arrival.That is, a determination can be made that the mobile device 108 reachedthe first checkpoint 106-1 based on a communication between the mobiledevice 108 and the beacon 104-1 associated with the first checkpoint106-1.

Responsive to the determination that the guard reached the firstcheckpoint 106-1, the mobile device 108 can be configured to receive averification that the mobile device 108 is possessed by the guard. Sucha verification can include a biometric input, for instance, and/or theentry of a password. Verifications including biometric inputs inaccordance with embodiments herein can include fingerprint verificationsand/or voice identification verifications, though the present disclosureis not so limited.

Subsequent to that determination, a second checkpoint to which to sendthe guard can be determined by the computing device 110. In addition, asecond time period allowed to reach the second checkpoint can bedetermined. For example, the second checkpoint can be the checkpoint106-2. An indication of the second checkpoint 106-2 and a second timeperiod allowed to reach the second checkpoint 106-2 can be communicatedto the mobile device 108. The second checkpoint 106-2 and/or the timeperiod allowed to reach the second checkpoint 106-2 can be displayed,for instance, on the mobile device 108.

The computing device 110 can determine the second checkpoint 106-2 basedon a random selection of a particular checkpoint from a subset of theplurality of checkpoints 106 in some embodiments. Such a subset caninclude checkpoints having a determined risk of intrusion into thefacility 102 that exceeds a threshold at the time the determination ismade.

As the guard makes his way from the first checkpoint 106-1 to the secondcheckpoint 106-2, his path can be tracked in real time using one or moreof the beacons 104. As shown in FIG. 1, the path can be tracked usingthe beacons 104-5 and or 104-2, for instance. A notification can beprovided via the mobile device 108 responsive to a determination thatthe second time period allowed to reach the second checkpoint 106-2 hasfallen below a threshold. In some embodiments, such a notification canbe provided via a particular sound played by the mobile device 108. Insome embodiments, such a notification can be provided via a particularvibration pattern caused by the mobile device.

If the mobile device 108 is not determined to have reached the secondcheckpoint 106-2 within the second time period allowed, a notificationcan be provided. In some embodiments, a notification can be provided viathe mobile device (e.g., to the guard). In some embodiments, anotification can be provided via the computing device 110.

A duration of the second time period allowed can be determined based ona distance between the first checkpoint 106-1 and the second checkpoint106-2, for instance. In some embodiments, a duration of the second timeperiod allowed can be determined based on a time period associated witha previous path taken by the guard from the first checkpoint 106-1 tothe second checkpoint 106-2. In some embodiments, a duration of thesecond time period allowed can be different than a previous determinedtime period allowed for the guard to reach the second checkpoint 106-2from the first checkpoint 106-1. In some embodiments, those time periodscan be the same.

FIG. 10 illustrates the system 100 for checkpoint-based locationmonitoring via a mobile device wherein the mobile device 108 is locatedat a second checkpoint in accordance with one or more embodiments of thepresent disclosure. As indicated by the dotted line shown in FIG. 10,the guard carrying the mobile device 108 has made his way to the secondcheckpoint 106-2. The guard's arrival at the second checkpoint 106-2 canbe determined based on a communication between the mobile device 108 andthe beacon 104-2 associated with the second checkpoint 106-2.

The computing device 110 can then determine a third checkpoint (e.g.,checkpoint 106-3) to send the guard and a time allowed for the guard toreach the third checkpoint 106-3 in a manner analogous to determiningthe second checkpoint 106-2 and second time allowed, discussed above.Accordingly, the mobile device 108 can receive and provide the thirdcheckpoint 106-3 and the third time period allowed to reach the thirdcheckpoint responsive to the determination that the mobile device 108reached the second checkpoint 106-2 based on the communication betweenthe mobile device 108 and the beacon 104-2 associated with the secondcheckpoint 106-2.

FIG. 1D illustrates the system 100 for checkpoint-based locationmonitoring via a mobile device wherein the mobile device 108 is locatedat a third checkpoint 106-3 in accordance with one or more embodimentsof the present disclosure. As indicated by the dotted line shown in FIG.1D, the guard carrying the mobile device 108 has made his way to thethird checkpoint 106-3. The guard's arrival at the third checkpoint106-3 can be determined based on a communication between the mobiledevice 108 and the beacon 104-3 associated with the third checkpoint106-3. The guard's path from the second checkpoint 106-2 to the thirdcheckpoint 106-3 can be tracked in real time based on communicationsbetween the mobile device 108 and the beacons 104-6, 104-7, and 104-3,for instance.

The computing device 110 can then determine a fourth checkpoint to sendthe guard and a time allowed for the guard to reach the fourthcheckpoint in a manner analogous that discussed above, for instance. Thefourth checkpoint can be the checkpoint 106-1, the checkpoint 106-2, orsome other checkpoint in the facility (not shown in FIGS. 1A-1D).

FIG. 2 illustrates a mobile device 208 in accordance with one or moreembodiments of the present disclosure. The mobile device 208 can be acomputing device. The mobile device 208 can include a memory 214 and aprocessor 212 configured to execute executable instructions stored inthe memory 214 to perform various examples of the present disclosure,for example. That is, the memory 214 can be any type of non-transitorystorage medium that can be accessed by the processor 212 to performvarious examples of the present disclosure. For example, the memory 214can be a non-transitory computer readable medium having computerreadable instructions (e.g., computer program instructions) storedthereon that are executable by the processor 212.

The memory 214 can be volatile or nonvolatile memory. The memory 214 canalso be removable (e.g., portable) memory, or non-removable (e.g.,internal) memory. For example, the memory 214 can be random accessmemory (RAM) (e.g., dynamic random access memory (DRAM) and/or phasechange random access memory (PCRAM)), read-only memory (ROM) (e.g.,electrically erasable programmable read-only memory (EEPROM) and/orcompact-disc read-only memory (CD-ROM)), flash memory, a laser disc, adigital versatile disc (DVD) or other optical storage, and/or a magneticmedium such as magnetic cassettes, tapes, or disks, among other types ofmemory.

Further, although memory 214 is illustrated as being located within themobile device 102, embodiments of the present disclosure are not solimited. For example, memory 214 can also be located internal to anothercomputing resource (e.g., enabling computer readable instructions to bedownloaded over the Internet or another wired or wireless connection).In some embodiments, the memory 214 and/or the processor 212 can belocated in the computing device 110, previously described in connectionwith FIG. 1.

In addition to, or in place of, the execution of executableinstructions, various examples of the present disclosure can beperformed via one or more devices (e.g., one or more controllers) havinglogic. As used herein, “logic” is an alternative or additionalprocessing resource to execute the actions and/or functions, etc.,described herein, which includes hardware (e.g., various forms oftransistor logic, application specific integrated circuits (ASICs),etc.), as opposed to computer executable instructions (e.g., software,firmware, etc.) stored in memory and executable by a processor. It ispresumed that logic similarly executes instructions for purposes of theembodiments of the present disclosure.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art will appreciate that anyarrangement calculated to achieve the same techniques can be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments of thedisclosure.

It is to be understood that the above description has been made in anillustrative fashion, and not a restrictive one. Combination of theabove embodiments, and other embodiments not specifically describedherein will be apparent to those of skill in the art upon reviewing theabove description.

The scope of the various embodiments of the disclosure includes anyother applications in which the above structures and methods are used.Therefore, the scope of various embodiments of the disclosure should bedetermined with reference to the appended claims, along with the fullrange of equivalents to which such claims are entitled.

In the foregoing Detailed Description, various features are groupedtogether in example embodiments illustrated in the figures for thepurpose of streamlining the disclosure. This method of disclosure is notto be interpreted as reflecting an intention that the embodiments of thedisclosure require more features than are expressly recited in eachclaim.

Rather, as the following claims reflect, inventive subject matter liesin less than all features of a single disclosed embodiment. Thus, thefollowing claims are hereby incorporated into the Detailed Description,with each claim standing on its own as a separate embodiment.

What is claimed is:
 1. A non-transitory computer-readable medium havinginstructions stored thereon executable by a processor to: receive, via amobile device associated with a user in a facility having a plurality ofwireless beacons therein, an indication of a first checkpointcorresponding to a first location in the facility and a first timeperiod in which the user is allowed to reach the first checkpoint;provide to the user, via the mobile device, the indication of the firstcheckpoint and the first time period allowed to reach the firstcheckpoint; determine that the mobile device reached the firstcheckpoint based on a communication between the mobile device and awireless beacon associated with the first checkpoint; responsive to thedetermination that the mobile device reached the first checkpoint,receive, via the mobile device, an indication of a second checkpointcorresponding to a second location in the facility and a second timeperiod in which the user is allowed to reach the second checkpoint; andprovide to the user, via the mobile device, the indication of the secondcheckpoint and the second time period in which the user is allowed toreach the second checkpoint.
 2. The medium of claim 1, wherein theinstructions include instructions to track a path taken by the mobiledevice between the first checkpoint and the second checkpoint based oncommunications between the mobile device and each of a subset of theplurality of beacons.
 3. The medium of claim 1, wherein the instructionsto provide the first time period in which the user is allowed to reachthe first checkpoint include instructions to display the first timeperiod on a display of the mobile device.
 4. The medium of claim 1,wherein the instructions include instructions to provide a notificationvia the mobile device responsive to a determination that the mobiledevice did not reach the second checkpoint within the second timeperiod.
 5. The medium of claim 1, wherein the instructions includeinstructions to provide a notification to a computing device responsiveto a determination that the mobile device did not reach the secondcheckpoint within the second time period.
 6. The medium of claim 1,wherein the instructions include instructions to determine the secondtime period based on a distance between the first checkpoint and thesecond checkpoint.
 7. The medium of claim 1, wherein the instructionsinclude instructions to determine the second time period based on a timeperiod associated with a previous path taken by the user from the firstcheckpoint to the second checkpoint.
 8. The medium of claim 1, whereinthe instructions include instructions to receive and provide, via themobile device, a third checkpoint corresponding to a third location inthe facility and a third time period in which the user is allowed toreach the third checkpoint responsive to a determination that the mobiledevice reached the second checkpoint based on a communication betweenthe mobile device and a wireless beacon associated with the secondcheckpoint.
 9. The medium of claim 1, wherein the instructions includeinstructions to receive a verification that the mobile device ispossessed by the user responsive to the determination that the mobiledevice reached the first checkpoint.
 10. The medium of claim 9, whereinthe verification is a biometric input.
 11. A system for checkpoint-basedlocation monitoring via a mobile device, comprising: a plurality ofbeacons in a facility, wherein each of the plurality of beaconscorresponds to a respective security checkpoint of a plurality ofsecurity checkpoints of the facility; a mobile device associated with auser of the facility, wherein the mobile device is configured tocommunicate with each of the plurality of beacons; and a computingdevice, configured to: determine that the mobile device has reached afirst checkpoint of the plurality of checkpoints of the facility basedon a communication with a beacon of the plurality of beaconscorresponding to the first checkpoint; determine, responsive to thedetermination that the mobile device has reached the first checkpoint, asecond checkpoint of the plurality of checkpoints of the facility tosend the user; and communicate an indication of the second checkpoint tothe mobile device and an indication of a time period allowed for theuser to reach the second checkpoint from the first checkpoint.
 12. Thesystem of claim 11, wherein the computing device is configured todetermine the second checkpoint of the plurality of checkpoints of thefacility to send the user based on a random selection of a particularcheckpoint from the subset of the plurality of checkpoints.
 13. Thesystem of claim 11, wherein the computing device is configured todetermine the second checkpoint of the plurality of checkpoints of thefacility to send the user based on a determined risk of intrusion intothe facility proximal to the second checkpoint.
 14. A method forcheckpoint-based location monitoring via a mobile device, comprising:determining a checkpoint for a user of a facility to reach and a timeperiod allowed for the user to reach the checkpoint; communicating thedetermined checkpoint and the determined time period allowed to a mobiledevice associated with the user; receiving an indication that the userreached the checkpoint within the time period based on a communicationbetween the mobile device and a wireless beacon associated with thecheckpoint; responsive to receiving the indication, determining anadditional checkpoint for the user to reach from the checkpoint and anadditional time period allowed for the user to reach the additionalcheckpoint from the checkpoint receiving a verification from the mobiledevice that the mobile device is possessed by the user; andcommunicating to the mobile device, upon receiving the verification, anidentification of the additional checkpoint and the additionaldetermined time period allowed for the user to reach the additionalcheckpoint from the checkpoint.
 15. The method of claim 14, wherein themobile device is a wearable device.
 16. The method of claim 14, whereinthe method includes providing a notification via the mobile deviceresponsive to a determination that the determined time period allowedhas fallen below a threshold.
 17. The method of claim 16, wherein thenotification is provided via a sound played by the mobile device. 18.The method of claim 16, wherein the notification is provided via avibration pattern associated with the mobile device.
 19. The method ofclaim 14, wherein the verification is at least one of: a fingerprintverification; a voice identification verification; and a password. 20.The method of claim 14, wherein the additional determined time period isdifferent than a previous determined time period allowed for the user toreach the additional checkpoint from the checkpoint.