Device tracking systems and methods

ABSTRACT

A device tracking system of the present disclosure has a theft tracking device that permanently secures to an item that has the propensity to be stolen, the theft tracking device has a theft tracking processor and a Wireless Fidelity (Wi-Fi) module, and the theft tracking processor receives ping data and in response transmits response data via the Wi-Fi module. The system also has a remote locator device that has a case and that has a plug for securing the remote locator device to a power receptacle. The remote locator device also has a remote locator processor and a Wi-Fi module, and the remote locator processor periodically transmits a ping to the theft tracking device and receives the response data from the theft tracking device. The processor further transmits data indicating that the theft tracking device is not responding via a network when a response is not received from the tracking device. The system also has at least one server comprising a server processor that is communicatively coupled to the remote locator device, and the server processor receives the data indicating that the theft tracking device is not responding. Further, the server processor transmits location data periodically that shows a location of the item and displays the location to a user.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation-in-part of and claims priority toU.S. patent application Ser. No. 15/934,840, entitled Device TrackingSystems and Methods and filed on Mar. 23, 2018, which is incorporatedherein by reference, and which claims priority to U.S. ProvisionalPatent Application Ser. No. 62/477,660, entitled Device Tracking Systemsand Methods and filed on Mar. 28, 2017.

BACKGROUND

Property crime results in losses estimated in the billion-dollar rangewith a very small recovery rate. It is highly estimated that burglaryoccurs frequently in the United States with a high percentage ofburglaries occurring in home residences and businesses. Homes withoutsecurity systems are more likely to be broken into and a low percentageof homes in the United States even have security systems. It isestimated that burglars typically spend no more than one (1) minutebreaking into a home and fewer than ten (10) minutes inside.

Burglaries and theft continue to be a huge issue for law enforcement inthe United States. Burglars are likely to study and select theirtargets. They tend to look for perceived affluence, opportunity, and lowrisk of confrontation and detection. This is true of residential andbusiness properties.

The top six (6) items stolen during home burglaries include cash,jewelry, illegal drugs, electronics, prescription drugs, and clothingand shoes. Though some of the items on this list cannot be tracked, someof the higher-priced items on the list, e.g., electronics, can betracked. The additional items on the list, as well as firearms,antiques, artwork, household goods, and miscellaneous items could berecovered when the offenders are arrested in possession of the stolenproperty.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure can be better understood with reference to thefollowing drawings. The elements of the drawings are not necessarily toscale relative to each other, emphasis instead being placed upon clearlyillustrating the principles of the disclosure. Furthermore, likereference numerals designate corresponding parts throughout the severalviews.

FIG. 1 is an exemplary theft tracking system in accordance with anembodiment of the present disclosure.

FIG. 2A is an exemplary internal monitoring server such as is depictedin FIG. 1.

FIG. 2B is an exemplary external server such as is depicted in FIG. 1.

FIG. 2C is an exemplary data storage server such as is depicted in FIG.1.

FIG. 3A is an exemplary remote locator device as is depicted in FIG. 1.

FIG. 3B is an exemplary theft tracking device such as is depicted inFIG. 1.

FIG. 4A is a top view of an exemplary theft tracking device such as isdepicted in FIG. 1 showing an exemplary Personal Computer Memory CardInternational Association (PCMCIA) card being inserted into a case.

FIG. 4B is a side view of the theft tracking device such as is depictedin FIG. 4A.

FIG. 4C is an end view of the theft tracking device such as is depictedin FIG. 4A.

FIG. 5A a top view of the remote locator device such as is depicted inFIG. 1 showing an exemplary PCMCIA card being inserted into a case.

FIG. 5B is a side view of the remote locator device such as is depictedin FIG. 5A.

FIG. 5C is an end view of the remote locator device such as is depictedin FIG. 5A.

FIG. 6 is exemplary architecture and functionality of monitoring of thetheft tracking system of FIG. 1.

FIG. 7 is exemplary architecture and functionality of the theft trackingsystem such as is depicted in FIG. 1.

FIG. 8 is exemplary architecture and functionality of the power loss ofthe theft tracking device of the system such as is depicted in FIG. 1.

FIG. 9A is a top view of another exemplary theft tracking device such asis depicted in FIG. 1.

FIG. 9B is a bottom view of the theft tracking device such as isdepicted in FIG. 9A.

FIG. 10A is a top cut-away view of an exemplary theft tracking devicesuch as is depicted in FIG. 9A showing an exemplary Personal ComputerMemory Card International Association (PCMCIA) card being inserted intoa case.

FIG. 10B is a bottom cut-away view of the theft tracking device such asis depicted in FIG. 10A.

FIG. 10C is a cross-sectional side view of the theft tracking devicesuch as is depicted in FIG. 10A.

FIG. 10D is an end view of the theft tracking device such as is depictedin FIG. 10A.

FIG. 11 depicts an exemplary set up of a system using the theft trackingdevice such as is depicted in FIG. 9A.

DETAILED DESCRIPTION

A theft tracking system in accordance with an embodiment of the presentdisclosure is multifaceted. The system comprises a remote locator, alsoknown as a HUB, that is inserted into a wall receptacle, whichcommunicates with a theft tracking device that is securely coupled to anitem likely to be stolen. Further, the system comprises a server thatcommunicates over a network (e.g., the Internet) with the remotelocator. The system is configured such that when an item is removed froma predetermined known location, the remote locator communicates with theserver indicating that the item has been removed, and the server informsthe owner of the residence or business that the item is being moved fromits predetermined location.

FIG. 1 is an exemplary theft tracking system 100 in accordance with anembodiment of the present disclosure. The theft tracking system 100comprises an internal monitoring server 103, an external server 106, anda data storage server 107. Each server and its respective functionalityare described further herein.

The theft tracking system 100 also comprises a subnet 102 thatcommunicates with the external server 106 over a private network 109 viaa Wide Area Network (WAN), known as the World Wide Web (WWW). Note thatthe private network 109 may be any type of network known in the art orfuture-developed, for example a Local Area Network (IAN), a Wide AreaNetwork (WAN), a Wireless Local Area Network (WLAN), or a Small AreaNetwork (SAN). In one embodiment, communication between the internalmonitoring server 103 and the subnet 102 is effectuated via use of theWWW 101; however, communication may be effectuated by other means inother embodiments. The external server 106 communicates with theinternal monitoring server 103 via a web portal 108, whichcommunicatively couples the external server 106 with the internalmonitoring server 103.

The internal monitoring server 103 is a computing device that controlsvarious operations of the theft tracking system 100. As mere examples,the internal monitoring server 103 registers the remote locator 104 andthe theft tracking devices 105 contained in the theft tracking subnet102 (FIG. 1). In addition, the internal monitoring server 103 tracks,maintains, and reports the status of all the remote locators 104 and thetheft tracking devices 105 within its purview.

The external server 106 is a computing device that controls othervarious operations of the system 100. In this regard, the externalserver 106 provides for a Web page where the customer registers itsproducts. Types of data that a customer inputs into a registrationGraphical User Interface (GUI) include: a name; an address; and theremote locator 104 serial number that the customer has purchased.Additionally, the customer enters theft tracker device serial numbers,descriptions, and known location of the theft tracking devices 105,e.g., data that describes in what room a tracked item resides. Thisinput data is transmitted to the data storage server 107, which storesthe data.

In addition, the external server 106 also provides for a Law EnforcementOfficer (LEO) GUI. A LEO enters data into the GUI. Types of data enteredinclude report numbers, badge numbers, names, and contact information.The contact information may be a cell number or an email address towhich tracking data and messages can be sent. This data allows for theLEO to track and receive information of stolen property being tracked.

Note that in one embodiment, the email address is specific to agovernment agency, e.g., local police. Thus, to ensure thatcommunication is with a valid government agency, the external server 106may validate the address provided. For example, the internal monitoringserver 103 through the external server 106 may transmit an email to theLEO that comprises a hypertext link. When the link is selected by theLEO, the external server 106 displays a GUI wherein the LEO can enterhis/her identifying information. The external server 106 compares thedata provided by the LEO to data stored corresponding to the email. Ifthe identifying information is correct, the LEO is validated.

Note that in one embodiment, the external server 106 communicates withthe data storage server 107. In such an embodiment, the external server106 queries the data storage server 107 with a serial number, e.g., aremote locator 104 serial number or a theft tracking device 105 serialnumber, provided by the customer at registration. The data storageserver 107 returns true or false to the external server 106 to indicatewhether the serial number provided is valid. Further note that theexternal server 106 may also be configured to query the remote locator104 to obtain serial numbers for the remote locator 104 and/or the thefttracking devices 105. Also, the external server 106 may also beconfigured to query the remote locator 104 of the cellular numbers andthe internet protocol addresses of the theft tracking devices 105communicatively coupled via Wireless Fidelity (Wi-Fi) to the remotelocator 104, which are also displayed to the customer GUI (not shown)via hidden characters to prevent individuals from documenting the numberallowing them to attempt to hack the system.

In addition, the external server 106 queries the data storage server 107for encryption public key information for the remote locator 104 and thetracking devices 105. Note that the public key information is created bythe remote locator 104 and the tracking devices 105 prior to sendingdata identifying the public key(s) to the external server 106. Thisinformation is also displayed in the GUI in hidden characters to preventindividuals from documenting the number allowing them to attempt to hackthe system.

The data storage server 107 is communicatively coupled to the internalmonitoring server 103 and the external server 106. The data storageserver 107 stores data related to the theft tracking system 100. In oneembodiment, the data storage server 107 communicates with the externalserver 106 for registration and communicates with the internalmonitoring server 103 for confirming valid device messaging andencryption and/or decryption.

In this regard, the data storage server 107 stores the registrationinformation described above regarding the customer. During registrationby a customer, the external server 106 transmits the received data tothe data storage server 107. The data storage server 107 verifies theremote locator 104 serial number to determine if it has been registeredpreviously or if this is a first-time registration. After the remotelocator 104 registration is completed, the external server 106 registerseach of the attached theft tracker devices 105 through communicationwith the remote locator 104, as described above with reference to theexternal server 106.

The subnet 102 comprises a remote locator 104 that communicates with theexternal server 106 via a transfer protocol, Hypertext Transfer ProtocolSecure (HTTPS). Further, the remote locator 104 communicates via the WWW101 using the HTTPS.

The subnet 102 further comprises a plurality of theft tracking devices105. Each theft tracking device 105 separately communicate with theremote locator 104. In this regard, each theft tracking device 105communicates separately via Wi-Fi, which is a facility that allows thetheft tracking devices 105 to communicate with the remote locator 104wirelessly within a subnet 102 area. Also, the plurality of thefttracking devices 105 are coupled to various items (not shown) throughoutthe residence or business that may have the propensity to be stolen,e.g., televisions, computers, and the like.

In operation, after registration is completed, the remote locator 104periodically transmits a signal to each of the tracking devices 105.During normal operation, each tracking device 105 sends a signal inresponse to the remote locator 104. This is oftentimes referred to aspinging a device. If the remote locator 104 does not receive a signal inreturn, it transmits a message to the external server 106 via the WWW101, which in turn transmits the message to the internal monitoringserver 103 via the Web portal 108.

In response to the message that the theft tracking device 105 is notresponding, the internal monitoring server 103 “pings” the unresponsivetheft tracking device 105. If the theft tracking device 105 responds tothe internal monitoring server 103, the theft tracking device 105performs a self-diagnostic test and transmits data indicative of theself-diagnostic test to the internal monitoring server 103 through theremote locator 104 and the external server 106.

If the theft tracking device 105 does not respond, the internalmonitoring server 103 notifies the customer by text, email, or any othermeans of messaging. In this regard, the internal monitoring server 103creates data indicative of a message to be sent to the customer.

Additionally, if the theft tracking device 105 does not receive a pingfrom the remote locator 104 it initiates its communications module. Inthis regard, the tracking device 105 turns on an on board cellularsystem. Additionally, the theft tracking device 105 initializes thefttracking logic and its Global Positioning System (GPS), which isdescribed further herein.

If the theft tracking device 105 is in communication proximity of theremote locator 104, the theft tracking device 105 continues to ping theremote locator 104 and checks its location periodically. If the remotelocator 104 does not receive a ping from the theft tracking device 105,the theft tracking device 105 contacts the internal monitoring server103. The theft tracking device 105 provides the internal monitoringserver 103 data indicative of the tracking device's status.

If the internal monitoring server 103 receives the status data from thetheft tracking device 105, the internal monitoring server 103 contactsthe customer and transmits a message via text, email, or any other typeof messaging means. The message may state “The television in the masterbedroom may have been stolen. Please select D to dismiss or T to trackthe item.” If the customer selects the tracking option in response, theinternal monitoring server 103 initiates tracking of the item that isout of range of the remote locator 104. If the customer responds todismiss, the internal monitoring server 103 sends data indicative ofdismissal to the theft tracking device 105. In response, the thefttracking device 105 shuts down its communications systems and returns toidle mode.

If the customer responds to track, the internal monitoring server 103transmits a message to the customer to file a LEO report. Through a LEOGUI, described above, on the external server 106, the LEO may enter dataindicative of a LEO report identification number assigned to thetracking order. Further, the LEO may provide, or data on the internalmonitoring server 103 may indicate, a contact number and name to provideupdates about the stolen property to LEOs only via Internet messaging,which is entered on the LEO GUI. LEOs may also use the GUI to transfertracking data to another LEO Department/Agency. For example, if thetracked items travel outside one jurisdiction and enter anotherjurisdiction. Note that the information is confirmed with the designatedLEOs. Customers do not receive tracking data.

Note that in one embodiment, the internal monitoring server 103transmits a message to the LEO computing device, e.g., cell phone orcomputer, which was provided in LEO registration. This message maycontain a hypertext link. When this hypertext link is selected, theexternal server 106 displays information to the LEO regarding thetracked item. In one embodiment, when the LEO selects the hypertextlink, the external server 106 provides to the LEO an electronic map,e.g., Google Maps, and the location of the item is shown. Further, asthe internal monitoring server 103 continues to receive new locationinformation from the theft tracking device 105, the external server 106continues to update the map as the item is moved.

While the internal monitoring server 103 is waiting for the LEO reportor case number, the internal monitoring server 103 continues to monitorthe location of the item to which the theft tracking device 105 isattached. In this regard, the theft tracking device 105 turns on its GPSsystem, extrapolates the latitude and longitude, date and time stampsthe results, and transmits a message to the internal monitoring server103 using encryption software. This message is sent through the WWW 101to the internal monitoring server 103. The internal monitoring server103 transmits a message to the theft tracking device 105 that themessage is received, and it is logged into the message database on thedata storage server 107.

At a set time interval, the theft tracking device 105 sends its locationand additional data through the WWW 101 to the internal monitoringserver 103. Note that this data may be sent via the Internet to theinternal monitoring server 103. Once the theft tracking device 105 hasnot moved for a set duration of time, the theft tracking device 105reports its location as a destination.

Upon identifying the location, the internal monitoring server 103 willsend the LEO cell number or email address, a Web page for tracking data,or an Internet message for the LEO to respond with pre-selected options,e.g., sound an alarm, disable the tracked item through the thefttracking device 105, or verify its location. Thereafter, the LEO mayrespond by request alarm, report as found, continuing tracking, or closecase file. If the LEOs respond report as found, or close case file, thetheft tracking device 105 will terminate tracking and return to idlemode. If the LEO responds request alarm, the theft tracking device 105will initiate a high-decibel alarm to notify the LEOs of its location.Additionally, the LEO may continue to track.

FIG. 2A depicts an exemplary embodiment of the internal monitoringserver 103 depicted in FIG. 1. As shown by FIG. 1, the internalmonitoring server 103 comprises a processor 260, a network interface263, encryption/decryption logic 268, public key and Subscriber IdentityModule (SIM) data 269, and memory 261. Stored in memory 261 is Webservice logic 266 for receiving messages and sending message. Furtherthe internal monitoring server 103 comprises a message portal logic 267that allows the internal monitoring server 103 to communicate with theremote locator 104. The Network interface 263 allows the internalmonitoring server 103 to communicate with the data storage server 107.

The exemplary embodiment of the internal monitoring server 103 depictedby FIG. 2A comprises at least one conventional processing element 260,such as a Digital Signal Processor (DSP) or a Central Processing Unit(CPU), that communicates to and drives the other elements within theinternal monitoring server 103 via a local interface 262, which caninclude at least one bus. Further, the processing element 260 isconfigured to execute instructions of software, such as the Web servicelogic 266, the message portal logic 267, or the encryption/decryptionlogic 268.

The Web service logic 266 and the message portal logic 267 generallycontrol the functionality of the internal monitoring server 103, as willbe described in more detail hereafter. It should be noted that the Webservice logic 266 and the message portal logic 267 can be implemented insoftware, hardware, firmware or any combination thereof. In an exemplaryembodiment illustrated in FIG. 2A, the Web service logic 266 and themessage portal logic 267 are implemented in software and stored inmemory 300.

Note that the Web service logic 266 and the message portal logic 267,when implemented in software, can be stored and transported on anycomputer-readable medium for use by or in connection with an instructionexecution apparatus that can fetch and execute instructions. In thecontext of this document, a “computer-readable medium” can be any meansthat can contain or store a computer program for use by or in connectionwith an instruction execution apparatus.

An input interface 264, for example, a keyboard, keypad, or mouse, canbe used to input data from a support/maintenance user of the internalmonitoring server 103, and an output interface 265, for example, aprinter or display screen (e.g., a Liquid Crystal Display (LCD)), can beused to output data to the user. In addition, a network interface 263,such as a Network Interface Card (NIC), enables the internal monitoringserver 103 to communicate via the WWW 101 (FIG. 1) with the remotelocator 104 and the data storage server 107.

In operation, as stated above, the internal monitoring server 103communicates with the data storage server 107 and the remote locator104. To effectuate secure communication, upon initialization, the remotelocator 104 transmits a SIM identifier and a public key. Using thepublic key and SIM, the encryption/decryption logic 268 decrypts themessage. Thereafter, when the remote locator 104 sends a SIM and amessage, the message portal logic 267 can look up the public key basedupon the SIM provided in the message and decrypt the message. Theinternal monitoring server 103 can then perform actions based upon themessage received.

Further, to effectuate communication with the data storage server 107,the internal monitoring server 103 initially transmits identificationinformation and a public key to the data storage server 107. The datastorage server 107 stores the identification and the public key.Thereafter, when the internal monitoring server 103 receives a message,the data storage server 107 uses the identification to retrieve thepublic key and sends the key to the internal monitoring server 103. Theinternal monitoring server 103 can then use the stored public key todecrypt the message and perform actions based upon the message.

FIG. 2B depicts an exemplary embodiment of the external server 106. Asshown by FIG. 1, the external server 106 comprises a processor 250, aNIC 252, and memory 255. Stored in memory 255 is Web application logic257.

The exemplary embodiment of the external server 106 depicted by FIG. 2Bcomprises at least one conventional processing element 250, such as aDSP or a CPU, that communicates to and drives the other elements withinthe external server 106 via a local interface 254, which can include atleast one bus. Further, the processing element 250 is configured toexecute instructions of software, such as the Web application logic 257.

As indicated hereinabove regarding the external server 106, the externalserver 106 is responsible for receiving information related toregistration and LEO information. In this regard, the Web applicationlogic 257 displays respective GUIs and receives the information asdescribed above. Further, the Web application logic 257 performs theserial number look-up implementation to the data storage server 107 todetermine if the serial number provided by the customer corresponds tovalid remote locators 104 (FIG. 1) and theft tracking devices 105 (FIG.1).

An input interface 255, for example, a keyboard, keypad, or mouse, canbe used to input data from a user of the external server 106, and anoutput interface 256, for example, a printer or display screen (e.g., anLCD), can be used to output data to the user. In addition, a networkinterface 252, such as a NIC, enables the external server 106 tocommunicate via the WWW 101 (FIG. 1) with the remote locator 104.

FIG. 2C depicts an exemplary embodiment of the data storage server 107.As shown by FIG. 2C, the data storage server 107 comprises a processor280, a network interface 283, and memory 281. Stored in memory 281 aredata storage logic 286, public key and SIM data 287, customer data 289,message data 288, and serial number data 291.

The data storage logic 286 generally controls the functionality of thedata storage server 107, as will be described in more detail hereafter.It should be noted that the data storage logic 286 can be implemented insoftware, hardware, firmware or any combination thereof. In an exemplaryembodiment illustrated in FIG. 2C, the data storage logic 286 isimplemented in software and stored in memory 300.

Note that the data storage logic 286, when implemented in software, canbe stored and transported on any computer-readable medium for use by orin connection with an instruction execution apparatus that can fetch andexecute instructions. In the context of this document, a“computer-readable medium” can be any means that can contain or store acomputer program for use by or in connection with an instructionexecution apparatus.

The exemplary embodiment of the data storage server 107 depicted by FIG.2C comprises at least one conventional processing element 280, such as aDSP or a CPU, that communicates to and drives the other elements withinthe data storage server 107 via a local interface 282, which can includeat least one bus. Further, the processing element 280 is configured toexecute instructions of software, such as the data storage logic 286.

The customer data 289 is any data related to a customer that has beeninput on the GUI described above with reference to the discussionrelated to FIG. 2B. This customer data 289 consists of a customer'sname, address, remote locator serial number, and other personal data.Additionally, the customer data 289 consists of theft tracking device105 serial number, cell number, IP address, and other data as necessary.

The data storage server 107 communicates with the internal monitoringserver 103 when queried. To effectuate secure communication, uponinitialization, the remote locator 104 transmits a SIM identifier and apublic key to the internal monitoring server 103. The data storage logic286 stores the SIM correlated with the public key in the public/privatekey and SIM data 287. Thereafter, when the remote locator 104 sends itsSIM ID and a message, the internal monitoring server 103 queries thedata storage server 107 for the public key. The internal monitoringserver 103 sends the original message received to the data storageserver 107 and stores the original message as message data 288.

The data storage server 107 communicates with the external server 106when queried. In this regard, upon registration, the remote locator 104transmits a SIM and public key for the remote locator 104 and any thefttracking devices 105 coupled to the remote locator 104. The externalserver 106 sends the data to the data storage server 107 which storesthis data relationally in the public key and SIM data. Thus, if amessage is sent from the remote locator 104, the external server 106queries the data storage server 107 for the public key. The externalserver 106 sends the original message received from the remote locator104 and acts on the message, if necessary. Also, as described above, theoriginal message will be stored as message data 288.

The serial number data 290 consists, which may be relationallycross-referenced with the SIM and public key data 287, of a list ofevery serial number of every remote locator 104 and theft trackingdevice 105 manufactured. During registration, the data storage logic 286may look up a serial number provided by a customer in a GUI on externalserver 106 to determine that it is a valid serial number. In response,the data storage logic 286 may transmit a message back to the externalserver 106 to let the external server 106 determine that it is a validor invalid registration.

An input interface 284, for example, a keyboard, keypad, or mouse, canbe used to input data from a user of the external server 106, and anoutput interface 285, for example, a printer or display screen (e.g., anLCD), can be used to output data to the user. In addition, a networkinterface 283, such as a modem, enables the external server 106 tocommunicate via the WWW 101 (FIG. 1) with the remote locator 104 and theinternal monitoring server 103.

FIG. 3A is a block diagram of an exemplary remote locator 104. Theremote locator 104 comprises a power module 213 and a communicationmodule 214.

The power module 213 comprises a charger 202, a battery 203, and anAlternating Current to Direct Current (AC/DC) converter 201. Inoperation, the AC/DC converter 201 is coupled to an alternating currentsource, which receives power. The power received charges the charger 202and the charger charges the battery 203. The power module 213 providespower to the communication module 214.

If power is lost to the remote locator 104, the remote locator 104immediately switches to battery backup 203. The remote locator 104 pingsthe theft tracking devices 105 to determine if the theft trackingdevices 105 are on battery backup power as well. Note that the mostcommon cause would be power loss to the building.

When on battery backup, the remote locator 104 reports the status to theinternal monitoring server 103, and the internal monitoring server 103may notify the customer via text, or the like, that power has been lostto the remote locator 104 and the theft tracking devices 105. While onbattery backup, the remote locator runs self-diagnostics to determinethe source of the power loss. This information may be reported to theinternal monitoring server 103.

The remote locator 104 then checks its location via the GPS 207. If theremote locator 104 is moving from its designated location, tracking modeis initiated and the communication module 214 begins to operate byobtaining location information and reporting the location information tothe internal monitoring server 103, which tracks the remote locator 104as described herein above. If the remote locator 104 is not moving, theremote locator 104 rechecks its position periodically. Details regardingthe communication are provided herein.

The communication module 214 comprises a microcontroller 204 thatcontrols the other elements on the communication module 214. Themicrocontroller is at least one conventional processing element, such asa DSP or a CPU that communicates to and drives the other elements withinthe communication module 214 via various buses. Further, themicrocontroller 204 is configured to execute instructions of software,such as the remote locator control logic 211 and the key creation logic215.

The communication module 214 further comprises remote locator controllogic 211 and key creation logic 215. Note that the remote locator logic211 and the key creation logic 215 are executed by the microcontroller204.

Communication module 214 further comprises a Wi-Fi module 206, a GlobalSystem for Mobile Communication (GSM) 210, a SIM 209, an audible alarm205, a GPS antenna 208, a cell/GPS 207, and memory 215.

The SIM card 209 is the access control card for the GSM 210. Note thatthe remote locator logic 211 creates messages and directs the messagesto the appropriate receiver through the SIM card 209 when the messagesare sent through the GSM. Otherwise, the remote locator logic 211directs messages through the Internet.

The Wi-Fi module 206 is a self-contained system that comprises its owntransmission control protocol/internet protocol that may be activatedand controlled by the microcontroller 204. The Wi-Fi allows the remotelocator 104 to wirelessly connect with other devices also equipped withWi-Fi. In the present disclosure, the Wi-Fi module 206 enables theremote locator 104 to wirelessly communicate and send messages to thetheft tracking device 105. As an example, the Wi-Fi module 206 transmitsa ping to the theft tracking device 105 to determine whether the item towhich the theft tracking device 105 has been moved from its originallocation. As described above, if the theft tracking device 105 followswith a ping, then there appears to be no problem. Note that duringoperation, the remote locator logic 211 via the microcontrolleractivates the Wi-Fi module.

The SIM 209 contains unique information that identifies the remotelocator 104. This allows the remote locator 104 to use communicationfeatures on the communication module 214. Types of information stored onthe SIM 209 may include a mobile phone number. As indicated above, thecommunication module 214 comprises a GSM 210. Thus, the GSM 210 may usethe information on the SIM 209 to communicate to, or text a mobile phonenumber identified in the GSM.

Additionally, the communication module 214 comprises a cell/GPS 207. TheGPS 207 transmits data to the GSM 210 with location information obtainedfrom a GPS antenna 207. Thereafter, the remote locator 104 communicatesdata indicative of the exact location of the remote locator 104 to theinternal monitoring server 103, as described with reference to FIG. 1.The internal monitoring server 103 communicates with a customer bytransmitting a message via text or email, wherein the message sentcontains the data described herein with reference to FIG. 1. Note thatthe data indicative of any message received is stored on the datastorage server 107. Further, the remote locator logic 211 may generate amessage containing this information and transmit the information to theWi-Fi module 206. The Wi-Fi module 206 may then send this information tothe remote locator 104, which can transmit this information over the WWW101 to the internal monitoring server 103 as a message.

As noted above, communication throughout the theft tracking system 100is encrypted. Thus, the key creation logic 216 creates a public key anda private key. Upon initialization, the remote locator control logic 211transmits the created public key and a SIM to the internal monitoringserver 103. The SIM identifier will be used by the internal monitoringserver 103 to verify the remote locator 104 that transmitted the data,which is described hereinabove.

Note that the alarm is configured to make a sound. This sound may beinitiated by LEOs through the LEO GUI. This will aid in the location ofthe item being tracked.

FIG. 3B is a block diagram of an exemplary theft tracking device 105.The theft tracking device 105 is a separate device than the remotelocator 104 and communicates over the subnet 102 (FIG. 2) with theremote locator 104. The theft tracking device 105 comprises a powermodule 232 and a communication module 233.

The power module 232 comprises a charger 221, a battery 222, and anAC/DC converter 220. In operation, the AC/DC converter 220 is coupled toan alternating current source, which receives power. The power receivedcharges the charger 221 and the charger charges the battery 222. Thepower module 232 provides power to the communication module 233.

If power is lost to the theft tracking device 105, the theft trackingdevice 105 immediately switches to battery backup 222. The thefttracking device 105 pings the remote locator 104 to determine if theremote locator 104 is on battery backup power as well and is in thepredetermined range of the theft tracking device 105.

If the remote locator 104 is in range of the theft tracking device 105,the theft tracking device 105 continues to contact the remote locator104 periodically. If the remote locator 104 is not within range of thetheft tracking device 105, the theft tracking device 105 initiates itscell system and contacts the internal monitoring server 103 via Internetmessaging with the theft tracking device's 105 status and location.

Further, the theft tracking device 105 performs self-diagnostics todetermine the source of a problem on the theft tracking device 105. Thetheft tracking device 105 contacts the internal monitoring server 103with its status via its cell system using internet messaging protocols.

Additionally, the internal monitoring server 103 contacts the customerto request to track or disregard theft tracking device 105. If thecustomer chooses to disregard, the internal monitoring server 103 sendsa message to the theft tracking device 105 to go into idle mode. Also,the message directs the theft tracking device 105 to recharge thebattery once power is re-established.

If the customer chooses to track the theft tracking device 105, theinternal server 103 initiates messaging with the theft tracking device105 to initiate tracking mode. The internal server 103 contacts thecustomer requesting that the customer contact LEOs and file a theft/LEOreport. Once the report is filed, a case number and a contactpoint/phone number for LEOs is obtained so that the theft trackingsystem 100 can communicate with LEOs on the location of the items thatmay have been stolen.

When on battery backup, the theft tracking device 105 reports the statusto the internal monitoring server 103 and the internal monitoring server103 may notify the customer via text, or the like, that power has beenlost to the remote locator 104 and the theft tracking devices 105. Whileon battery backup, the theft tracking device 105 runs self-diagnosticsto determine the source of the power loss. This information may bereported to the internal monitoring server 103.

The theft tracking device 105 then checks its location via the GPS 207.If the theft tracking device 105 is moving from its designated location,tracking mode is initiated and the communication module 233 begins tooperate by obtaining location information and reporting the locationinformation to the internal monitoring server 103, which tracks theremote locator 104 as described hereinabove. If the theft trackingdevice 105 is not moving, the remote locator 104 rechecks its positionperiodically. Details regarding the communication are provided herein.

The communication module 233 comprises a microcontroller 223 thatcontrols the other elements on the communication module 233. Themicrocontroller 223 is at least one conventional processing element,such as a DSP or a CPU that communicates to and drives the otherelements within the communication module 233 via various buses. Further,the microcontroller 223 is configured to execute instructions ofsoftware, such as the theft tracking device control logic 228 and thekey creation logic 231.

The communication module 233 further comprises theft tracking devicecontrol logic 228 and key creation logic 231. Note that the thefttracking device control logic 228 and the key creation logic 231comprise instructions that are executed by the microcontroller 204.

Communication module 233 further comprises a Wi-Fi module 224, a GSM230, a SIM 226, an audible alarm 227, a GPS antenna 229, a cell/GPS 225,and memory 231.

The SIM card 226 is the access control card for the GSM 230. Note thatthe theft tracking control logic 228 creates messages and directs themessages to the appropriate receiver through the SIM card 226 when themessages are sent through the GSM. Otherwise, the theft tracking controllogic 228 directs messages through the Wi-Fi module 224.

The Wi-Fi module 224 is a self-contained system that comprises its owntransmission control protocol/internet protocol that may be activatedand controlled by the microcontroller 223. The Wi-Fi allows the thefttracking device 105 to wirelessly connect with other devices alsoequipped with Wi-Fi. In the present disclosure, the Wi-Fi module 224enables the theft tracking device 105 to wirelessly communicate and sendmessages to remote locator 104. As an example, the Wi-Fi module 224transmit a ping to the theft tracking device 105 to determine whetherthe item to which the theft tracking device 105 has been moved outsidethe range of its original location. As described above, if the thefttracking device 105 follows with a ping, then there appears to be noproblem. Note that during operation, the theft tracking device controllogic 228 via the microcontroller 223 activates the Wi-Fi module.

The SIM 226 contains unique information that identifies the thefttracking device 105. This allows the theft tracking device 105 to usecommunication features on the communication module 233. Types ofinformation stored on the SIM 226 may include a mobile phone number. Asindicated above, the communication module 233 comprises a GSM 230. Thus,the GSM 230 may use the information on the SIM 226 to communicate to ortext a mobile phone number identified in the GSM.

Additionally, the communication module 233 comprises a cell/GPS 229. TheGPS 229 transmits data to the GSM 230 with location information obtainedfrom a GPS antenna 225. Thereafter, the theft tracking device 105transmits data indicative of the exact location of the theft trackingdevice 105 to the internal server 103. In this regard, the thefttracking device control logic 228 generates a message containing thisinformation and transmits the message to the Wi-Fi module 224. Inresponse, the Wi-Fi module 224 then sends this message to the remotelocator 104, which can transmit this information over the WWW 101 to theinternal monitoring server 103 as a message.

As noted above, communication throughout the theft tracking system 100is encrypted. Thus, the key creation logic 231 creates a public key anda private key. Upon initialization, the theft tracking device controllogic 228 transmits the created public key and a SIM to the internalmonitoring server 103 via the remote locator 104. The public key may beused by the internal monitoring server 103 to verify the theft trackingdevice 105 that transmitted the data, which is described herein above.

Note that the alarm is configured to make a sound. This sound may beinitiated by LEOs through the LEO GUI. This will aid in the location ofthe item being tracked.

Note that as will be described further herein, the theft tracking device105 is permanently affixed to the item that is to be tracked. In thisregard, it will be difficult for the thief to remove from the item thatis being tracked.

FIG. 4A is a top cut-away view of an exemplary theft tracking device 105in accordance with an embodiment of the present disclosure. The thefttracking device 105 is configured into substantially square torectangular shaped case 401. However, note that the case may be othershapes in other embodiments of the system 100. Within the case is asubstantially square to rectangular shaped cavity 407.

The theft tracking device 105 comprises a PCMCIA card 402. On the card402 reside the components and elements described with reference to FIG.3A.

The card 402 is of the same shape as the case and comprises a slot 403.The slot 403 is on the insertion end of the card 402. The card 402 isinserted into the substantially square to rectangular shaped slot in adirection shown by reference arrows 590 and 591.

When the PCMCIA card 402 is fully inserted into the cavity 406, the slot403 makes physical and electrical contacts with the plug 404. Note thatthe plug 404 comprises inward mechanical protrusions that indicateelectrical connections when manipulated and designate whether the deviceis a remote locator 104 or a theft tracking device 105. When the PCMCIAcard 402 is inserted, it sits flush with the case when fully inserted.

Further, traversing along each side of the case 401 is a battery backup410. The battery backup 410 provides power to the components andelements on the PCMCIA card 402.

FIG. 4B is a side view of the theft tracking device 105 showing thePCMCIA card 402 fully inserted into the cavity 407 (FIG. 4B). The case401 surrounds the PCMCIA card. Further, plug 404 is inserted in slot403.

Note that there is a power in plug 405 and a power out plug 406. Thepower in plug 405 is configured to interface with a power source, e.g.,a receptacle that provides power to the tracked item through thetracking device 105. An adapter (not shown) is coupled to the power inplug 405, which allows the electrical connection from the tracked itemswall receptacle power cord to the theft tracking device 105. The powerprovided through the plug 405 traverses the theft tracking device 105and power is output at the plug 406. There is a second adapter (notshown) that couples the power out plug 406 to the power system of thetracked item. Thus, if a thief attempts to remove the theft trackingdevice 105 from the item being tracked, the electrical connectionpass-through of the item being tracked is permanently disable and theitem is unusable by the thief.

FIG. 4C is an end view of the theft tracking device 105 showing thePCMCIA card 402 fully inserted into the cavity 407 (FIG. 4B). The case401 holds the PCMCIA card and its associated components and elements.

Further shown is the input power plug 405 and the output power plug 406.As discussed, an adapter (not shown) electrically couples the power inplug 405 to a wall receptacle (not shown). Further the power output plug406 is electrically coupled to the item via another adapter (not shown).The power provided through plug 405 charges the battery backup 410 (FIG.4A) while also providing power through the theft tracking device 105 tothe item being tracked.

FIG. 5A is a top cut-away view of an exemplary remote locator 104 inaccordance with an embodiment of the present disclosure. The remotelocator 104 is configured into substantially square to rectangularshaped case 500. Within the case is a substantially square torectangular shaped cavity 501.

The remote locator 104 comprises a PCMCIA card 502. On the card 502resides the components and elements described with reference to FIG. 3B.

The card 502 is square to rectangular shaped and comprises a slot 504.The slot 504 is on the insertion end of the card 502. The card 502 isinserted into the substantially square to rectangular shaped slot in adirection shown by reference arrows 408 and 409.

When the PCMCIA card 502 is fully inserted into the cavity 501, the slot504 makes physical and electrical contacts with the plug 503. Note thatthe plug 503 comprises inward mechanical protrusions that indicateelectrical connections when manipulated that designate whether thedevice is a remote locator 104 or a theft tracking device 105. When thePCMCIA card 502 is inserted, it sits flush with the case when fullyinserted.

Further, traversing along each side of the case 500 is a battery backup508. The battery backup 508 provides power to the components andelements on the PCMCIA card 502.

FIG. 5B is a side view of the remote locator 104 showing the PCMCIA card502 fully inserted into the cavity 501 (FIG. 5B). The case 500 surroundsthe PCMCIA card 502. Further, plug 503 is coupled to slot 504 when thePCMCIA card 502 is fully inserted into the cavity 501.

Note that there are electrical plugs 507. These plugs are configured tofit and insert into a standard electrical receptacle during operation.

FIG. 5C is an end view of the remote locator 104 showing the PCMCIA card502 fully inserted into the cavity 501 (FIG. 5C). The case 500 holds thePCMCIA card and its associated components and elements. Further, FIG. 5Cshows the electrical plugs 507 that are inserted into a standardreceptacle during operation.

FIG. 6 is exemplary architecture and functionality of the theft trackingsystem 100 in accordance with an embodiment of the present disclosure.

In step 500, the theft tracker device 105 (FIG. 3B) is initialized. Auser enters identifying information on the external server 106, which isstored in the data storage server 107 (FIG. 1). The data storage server107 looks up a serial number of the theft tracking device 105 todetermine if the serial number is valid. Further, initialization occurswhen the theft tracking device 105 transmits a SIM identifier and apublic key to the remote locator 104 (FIG. 3A). The public key and SIMis provided to the internal monitoring server 103 (FIG. 1). The publickeys are used by the internal monitoring server 103 to decrypt messagessent from the theft tracking device 105.

In step 501, the remote locator 104 pings each of the theft trackingdevices 105 within the subnet 102 (FIG. 1). As noted, a ping is simply amessage sent to the theft tracking device 105 requesting a response.When the theft tracking device 105 returns a message in response to theping in step 502, the remote locator 104 continues to ping the thefttracking devices 105 at set time intervals.

If the theft tracking device 105 does not respond, the remote locator104 pings the theft tracking devices again in step 503. If there isstill no response from the theft tracking device 105, the remote locator104 contacts the internal monitoring server 103. The internal monitoringserver 103 pings the theft tracking device 105 in step 504.

If the theft tracking device 105 does not respond to the internalmonitoring server 103, the internal monitoring server 103 performscertain business rules in step 506. As examples, the internal monitoringserver 103 contacts the customer of the unresponsiveness and providespotential causes. The theft tracking device 105 determines its locationand reports to the internal monitoring server 103. The theft trackingdevice 105 reports status of the theft tracking device 105, i.e., if thetheft tracking device 105 is moving. If the theft tracking device 105 ismoving, tracking of the theft tracking device 105 initiates and thetheft tracking system 100 begins monitoring the movement. In step 507,the internal monitoring server 103 reports status to the customer. Thisstatus information does not include tracking data.

If the theft tracking device 105 responds in step 505 to the messagefrom the internal monitoring server 103, the location of the thefttracking device 105 is determined in step 508. Notably, the thefttracking device 105 uses its GPS 225 to determine its location andtransmits its location data through its Wi-Fi module 224 or via cellcommunications through the GSM 230.

In step 509, if it is determined that the theft tracking device 105 isnear the remote locator 104, the theft tracking device 105 determinesits location and reports this location back to the remote locator 104,which can then communicate the status with the internal monitoringserver 103.

In step 509, if it is determined that the theft tracking device 105 isnot near the remote locator 104, the tracking begins in step 511, whichis shown in FIG. 6.

In step 600, the theft tracking device 105 turns on its cellulardevices. In step 601 tracking is initialized, and the theft trackingdevice 105 pings the remote locator 104. If the remote locator 104 is inrange in step 603, the theft tracking device 105 continues to ping theremote locator 104.

In step 603, if the remote locator 104 is not in range in step 603, thetheft tracking device 105 contacts the internal monitoring server 103,via internet messaging to contact the customer. The customer determineswhether to dismiss the message or track the item to which the thefttracking device 105 is attached.

If the customer elects to track in step 605, the internal monitoringserver 103 directs the customer to contact LEOs and file a theft/LEOreport in step 606. A LEO fills out the information requested on the LEOGUI of the external server 106. From the information entered, in step607 the internal monitoring server 103 obtains the text cellular numberor email address, and in step 608 obtains a LEO report/case number.

If the customer decides not to track (dismiss), the tracking method endsat terminator 616.

If the customer decides he/she desires to track the item to which thetheft tracking device 105 is attached, the theft tracking device 105obtains and transmits its GPS coordinates in step 609 to the internalmonitoring server 103.

In step 610, the remote locator 104 creates a data pack containing theinformation for tracking the theft tracking device 105, and in step 611sends the data pack to the internal monitoring server 103. In step 612,the remote locator 104 sends a message to the theft tracking device's105 cell system to go into idle mode.

During communication between the remote locator 104 and the thefttracking device 105 if the theft tracking device 105 is moving steps609-612 are re-executed. If the theft tracking device 105 stops moving,the internal monitoring server 103 sends a mobile Web page link to LEOsin step 614. This contains information about the whereabouts of thetheft tracking device 105. In step 615 the internal monitoring server103 processes the LEO Web page response. The tracking method ends atterminator 616.

FIG. 8 depicts architecture and functionality of a loss of power processto be executed when power is lost to the theft tracking device 105and/or the remote locator 104.

In step 701, there is a loss of power and the remote locator 104 and thetheft tracking device 105 go to backup power. If there is no movement,the loss of power could be a result of a loss of power to the residenceor business where the remote locator 104 and the theft tracking device105 reside.

In step 702, the theft tracking device 105 transmits a message to theremote locator 104. If the remote locator 104 is not running on batteryin step 703, the remote locator 104 determines if the theft trackingdevice 105 is moving by pinging the theft tracking device 105. If thetheft tracking device does not respond, it is out of its designatedlocation.

If the theft tracking device 105 is moving, tracking mode begins asindicated in FIG. 7 in step 704.

If the theft tracking device 105 is not moving, the theft trackingdevice 105 performs self-diagnostics in step 706. In step 707, theremote locator 104 contacts the internal monitoring server 103 andtransmits data indicative of the self-diagnostics and status informationto the internal monitoring server 103. Note that the data transmittedtravels through the subnet 102, the private network 109, the WWW 101 tothe external server 106. The external server 106 transmits the data tothe internal monitoring server 103.

In step 708, the remote locator 104 contacts each theft tracking device105 for confirmation. In step 709, the remote locator 104 sends a statusto the internal monitoring server 103. In step 708, the internalmonitoring server 103 contacts each theft tracking device 105 forconfirmation. In step 711, the internal monitoring server 103 creates astatus report for customers. This status information does not includetracking data.

If in step 703 the remote locator 104 battery is on, the remote locator104 pings all the theft tracking devices 105 and checks power status. Instep 709, the remote locator 104 transmits a report of status to theinternal monitoring server 103.

In step 708, the internal monitoring server 103 contacts each thefttracking device 105 for confirmation. In step 711, the internalmonitoring server 103 creates a status report for customers. This statusinformation does not include tracking data.

FIG. 9A depicts a top perspective view of an exemplary theft trackingdevice 900 that may be used in the theft tracking system 100 depicted inFIG. 1. The theft tracking device 900 is substantially like the thefttracking device 105 (FIG. 3B). However, the theft tracking device 900comprises a Universal Serial Bus (USB) port 1001 as opposed to powerbeing provided by alternating current, as is depicted in FIG. 3B.

The USB port 1001 receives a USB cable (not shown). The USB cableprovides one-way power into the theft tracking device 900. In oneembodiment, the power provided is a 5 Volt USB power source. As will bedescribed further, the power provided by the USB cable through the USBport 1001 provides power to the theft tracking device 900 and chargesbatteries on the theft tracking device 900.

Note that the theft tracking device 900 does not allow power to run toan attached item, e.g., a television, stereo, digital versatile disc(DVD), digital video recorder (DVR), computer, etc. In this regard, thetheft tracking device 900 is configured to be attached to items that donot require power, e.g., paintings, which will be described furtherherein.

The exemplary theft tracking device 900 further comprises points 901-904that extend from the corners of the theft tracking device 900. Thepoints 901-904 may be rigid and comprised of a hard plastic or the like.Note that often communication devices are covered in a conductivematerial, e.g., foil, to prohibit communication. This is referred to asa Faraday cage. The points 901-904 are configured to penetrate anymaterial that may be placed around the theft tracking device 900 toprohibit communication. Even the slightest tear in the material becauseof the one or more points 901-904 will allow communication.

FIG. 9B is a perspective view of the bottom of the theft tracking device900. Note that the points 901, 903, and 904 are shown, which areconfigured to defeat a Faraday cage and allow communication. Also, theUSB port 1001 is shown on the theft tracking device 900 for receivingpower from a USB cable (not shown).

Additionally, on a bottom face of the theft tracking device is achemical welding surface 905. Note that the chemical welding surface 905may be partially liquified via a solvent. Once liquified, the chemicalwelding surface 905 may be adhered to an item that is to be tracked.This permanently adheres the theft tracking device 900 to the item thatis to be tracked.

FIG. 10A is a top cut-away view of an exemplary theft tracking device900 in accordance with an embodiment of the present disclosure. Notethat the theft tracking device 900 functions substantially like thetheft tracking device 105 described with reference to FIG. 4A-4C, andlike numerals are used to describe those components of the thefttracking device 900 that are like those of the theft tracking device105.

In this regard, the theft tracking device 900 is a substantially squareto rectangular-shaped case 401. However, note that the case may be othershapes in other embodiments of the theft tracking system 100. Within thecase 401 is a substantially square to rectangular shaped cavity 407.

The theft tracking device 900 comprises a carriage 593. The carriage isshown in FIG. 10A as it is being inserted into the cavity 407. ThePCMCIA card 402 is removeably coupled to the carriage 593. On the PCMCIAcard 402 reside the components and elements described with reference toFIG. 3A. Note that the PCMCIA card 402 is removeably coupled to thecarriage 593 so that the PCMCIA card 402 may be easily replaced if thePCMCIA card 402 malfunctions.

The PCMCIA card 402 is of the same general shape as the carriage 593 andcomprises a slot 403. The slot 403 is on the insertion end of the card402. The carriage 593 is inserted into the substantially square torectangular-shaped cavity 407 in a direction shown by reference arrows590 and 591.

When the carriage 593 is fully inserted into the cavity 407, the slot403 makes physical and electrical contact with the plug 404. Note thatin one embodiment the plug 404 comprises male mechanical protrusionsthat indicate electrical connections that when manipulated may designatewhether the device is a remote locator 104 or a theft tracking device105.

When the carriage 593 is fully inserted, it sits flush with the case401. In this regard, the carriage 593 comprises a beveled face 594 thatcomprises bevels 593 and 596. When the carriage 593 is fully inserted,bevel 593 mates with a bevel 597 of the case 401, and bevel 596 mateswith bevel 598 to create a tight enclosure holding the carriage 593 inplace.

Furthermore, the theft tracking device 900 comprises one or moreactuators 566, 565. Once the carriage 593 is fully inserted into thecavity 407, a user may release the carriage 593 from the theft trackingdevice 900.

Additionally, the theft tracking device 900 comprises a USB port 1001. AUSB cable (not shown) connects to the USB port 1001. The USB cableprovides power to the theft tracking device 900. Further, the powerprovided by the USB cable charges the batteries (shown in FIG. 10B) sothat the theft tracking device 900 will still operate if power is lostthrough the USB cable.

FIG. 10B is a bottom cut-away view of the exemplary theft trackingdevice 900. FIG. 10B shows the carriage 593 being inserted into therectangular-shaped cavity 407 as indicated by reference arrows 590 and591. When fully inserted, the slot 403 couples with the plug 404.

The carriage 593 further comprises a plurality of openings 599-561. Inthis regard, a plurality of batteries 470-472 attach to the bottom face562 of the carriage 593 and are easily accessible for replacementthrough the openings 599-561. Note that the PCMCIA card 402 can be seenthrough a window 598 on the bottom face 562 of the carriage 593. Whilethree batteries 470-472 are shown in three openings 599-561,respectively, any number of batteries and openings may be used in otherembodiments.

FIG. 10C is a side view of the carriage 593. As shown, the PCMCIA card402 couples to a top side of the carriage 593. Further, the batteries470-472 couple to an underside of the carriage 593. The side viewfurther shows one of the actuators 565 for releasing the carriage toreplace a PCMCIA card 402 or the batteries 470-474.

FIG. 10D is front view of the theft tracking device 900. The thefttracking device 900 comprises the USB port 1001 for receiving a USBcable as described hereinabove. As discussed, an adapter (not shown)electrically couples the USB cable to a wall receptacle (not shown). Thepower provided through USB cable charges the batteries 470-472 (FIG.10B) while also providing power to the theft tracking device 900.

FIG. 11 depicts an exemplary theft tracking system 1400 for tracking anitem 1401. Note that in one embodiment, the tracked item 1401 mayrequire power, e.g., a television, a computer, or the like. If so, powermay be provided via a power cable (not shown) that plugs into a powerreceptacle 1405. In another embodiment, the tracked item 1401 may notrequire power, e.g., a painting, or the like.

A theft tracking device 900 is permanently affixed to the tracked item1401 via a chemical weld, as described hereinabove. Note that using achemical weld is merely exemplary. Other methods for permanentlyaffixing the theft tracking device 900 to the tracked item 1401 may beused in other embodiments.

The USB port 1001 of the theft tracking device 900 receives a plug 1410of a USB cable 1402. The other end of the USB cable 1402 comprises aplug 1411 that is inserted into a USB port 1406. The USB cable 1402provides power to the theft tracking device 900 that is used to operatethe theft tracking device 900 and to charge the batteries 470-472 (FIG.10B) of the theft tracking device 900.

Note that the theft tracking device 900 operates substantially like thetheft tracking device 105 (FIG. 3B). In this regard, the theft trackingdevice is communicatively coupled to the remote locator 104 (FIG. 3A).

If power is lost to the theft tracking device 900, the theft trackingdevice 900 immediately switches to battery backup 410. The thefttracking device 900 pings the remote locator 104 to determine if theremote locator 104 is on battery backup power as well and is in thepredetermined range of the theft tracking device 900.

If the remote locator 104 is in range of the theft tracking device 900,the theft tracking device 900 continues to contact the remote locator104 periodically. If the remote locator 104 is not within range of thetheft tracking device 900, the theft tracking device 105 initiates itscell system and contacts the internal monitoring server 103 via Internetmessaging with the theft tracking device's 900 status and location.

Further, the theft tracking device 900 performs self-diagnostics todetermine the source of a problem on the theft tracking device 900. Thetheft tracking device 900 contacts the internal monitoring server 103with its status via its cell system using internet messaging protocols.

Additionally, the internal monitoring server 103 contacts the customerto request to track or disregard theft tracking device 900. If thecustomer chooses to disregard, the internal monitoring server 103 sendsa message to the theft tracking device 900 to go into idle mode. Also,the message directs the theft tracking device 900 to recharge thebattery once power is re-established.

If the customer chooses to track the theft tracking device 900, theinternal server 103 initiates messaging with the theft tracking device900 to initiate tracking mode. The internal server 103 contacts thecustomer requesting that the customer contact LEOs and file a theft/LEOreport. Once the report is filed, a case number and a contactpoint/phone number for LEOs is obtained so that the theft trackingsystem 100 can communicate with LEOs on the location of the items thatmay have been stolen.

What we claim is:
 1. A device tracking system, comprising: a thefttracking device configured for permanently securing to an item that hasthe propensity to be stolen, the theft tracking device comprising atheft tracking processor and a Wireless Fidelity (Wi-Fi) module, thetheft tracking processor configured for receiving ping data and inresponse transmitting response data via the Wi-Fi module; a remotelocator device comprising a case, the case comprising a plug forsecuring the remote locator device to a power receptacle, the remotelocator device comprising a remote locator processor and a Wi-Fi module,the remote locator processor configured for periodically transmitting aping to the theft tracking device and receiving the response data fromthe theft tracking device, the processor further configured fortransmitting data indicating that the theft tracking device is notresponding via a network when a response is not received from thetracking device; and at least one server comprising a server processor,the at least one server communicatively coupled to the remote locatordevice, the server processor configured for receiving the dataindicating that the theft tracking device is not responding, the serverprocessor further configured to transmit location data periodically thatshows a location of the item and displays the location to a user.
 2. Thedevice tracking system of claim 1, wherein the theft tracking device ispowered by an alternating current source.
 3. The device tracking systemof claim 1, the theft tracking device is powered by a universal serialbus (USB) cord electrically coupled to a power adapter.
 4. The devicetracking system of claim 1, wherein the theft tracking device comprisesat least one rigid point extending from a corner of a housing of thetheft tracking device.
 5. The device tracking system of claim 1, whereinthe item requires power.
 6. The device tracking system of claim 1,wherein the item does not require power.
 7. The device tracking systemof claim 1, wherein the theft tracking device comprises a carriageslidably coupled to a case of the theft tracking device.
 8. The devicetracking system of claim 7, wherein a personal computer memory cardinternational association (PCMCIA) is removeably coupled to a top sideof the carriage.
 9. The device tracking system of claim 7, wherein oneor more batteries is removeably coupled to an underside of the carriage.10. The device tracking system of claim 7, wherein the theft trackingdevice comprises at least one actuator for removing the carriage fromthe case.