Method and system for providing tracking services to locate an asset

ABSTRACT

The present invention is directed to a method of asset location. Location data is received from a cellular transmitter associated with a selected asset, which location data includes data representative of a cellular receiver with which direct communication with the cellular transmitter is made. The location data is then communicated to a tracking service system, which tracking service system includes a database representative of geographic locations associated with a plurality of cellular receivers. The database is then queried with received location data so as to generate geographic tracking data associated with a location of the cellular receiver, the geographic tracking data including display data adapted to generate a map image including a representative of a location of the selected asset. The geographic tracking data is then communicated to an associated security agency so as to allow for viewing of an image generated in accordance with the display data and at least one of tracking and interception of the selected asset.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 10/710,485, filed Jul. 14, 2004, entitled “METHOD FOR LOCATINGAN ASSEST”, which is related to PCT/US04/24632, filed Jul. 30, 2004,PCT/US04/24606, filed Jul. 30, 2004, U.S. patent application Ser. No.10/710,487, filed Jul. 14, 2004, entitled “SYSTEM FOR TRACKING ANDLOCATING AN OBJECT”, which are derived from U.S. Provisional ApplicationNo. 60/491,951, filed Aug. 1, 2003 and U.S. Provisional Application60/491,952 filed Aug. 1, 2003, the entirety of which are incorporatedherein by reference.

BACKGROUND OF THE INVENTION

The present invention relates generally to tracking systems for trackingthe location of valuable materials, persons, objects, and moreparticularly, but not limited, to the tracking of stolen articles,objects or missing persons through existing cellular networkinfrastructure, the global positioning system (GPS), WiFi networks,WiMax networks, and the like. The invention further relates to locationand tracking systems and algorithms using a combination of directionalvectors and signal strength estimates and location identifiers that arebased on radio frequency transmissions. The invention also teaches asystem for asset tracking that is less prone to render false positivesso as to eliminate or lessen concerns for asset movements withacceptable or limited risks.

There are earlier location systems which make use of the constellationof global positioning satellites orbiting the earth. Such systems rangefrom navigational aids to tracking devices. For example, there is avehicle tracking and security system that allows immediate response incase of vehicle theft, an accident, vehicle breakdown, or otheremergency. Guardian and tracking functions are provided through mobileunits installed in hidden locations in vehicles to be monitored. Themobile units communicate with a control center. Preferably, the mobileunit provides vehicle theft and intrusion protection using an in-vehiclealarm and security system linked to the control center by a transceiverin the mobile unit. Also, a keypad or other human interface device istypically provided, allowing a vehicle driver or occupant to signal thecontrol center that a particular type of assistance is needed. Thevehicle's location may be automatically transmitted to the controlcenter along with any automatic alarm signal or manually enteredrequest, the location being precisely determinable anywhere in the worldthrough use of Global Position System (GPS) information. The systemprovides continuous monitoring of a large number of vehicles for a broadrange of status and emergency conditions over a virtually unlimitedgeographic area, also allowing manual communication of requests forassistance to that specific location.

Another example of the use of GPS to track the location of an automobileis an automatic vehicle location system that includes a radiopositioning system receiver which receives GPS radio signals andincludes a two-gimbaled gyroscope, which is used by a dead-reckoningpositioning system. A controller determines position based upon theradio positioning system when the radio signals are available and upondead-reckoning when the radio signals are not available. Thedead-reckoning process is based upon a compensation factor, which isestablished in response to data received from the radio positioningsystem. The compensation factor acts as an adjustment to an inner gimbalangle to compensate for a minor drift away from level by the innergimbal.

A further example is a method for detecting the position of a movingbody in which the position of a moving body such as a vehicle can bedetected with a high degree of precision. It is possible to perform datacommunication using radio waves between radio base stations and avehicle capable of movement. Precise positions are stored in advance inthe radio base stations. The radio base stations also include radio waveclocks that keep a common time. The radio base stations transmit radiowaves containing this time information. The vehicle receives these radiowaves and determines the difference between the received timeinformation and the time provided by a clock in the vehicle, in order todetect the current position of the vehicle by calculating the distancesbetween the vehicle and each of the radio base stations. Furthermore, itis also possible for the position of the mobile station to be calculatedusing a combination of information from the fixed station andinformation from GPS satellites. By employing this type of structure, itis possible to calculate the position of the mobile station even when itis not possible to calculate the position of the mobile station usingthe fixed stations alone or GPS satellites alone. Therefore, it ispossible to find the position of the mobile station more accurately thanwhen a conventional method is used.

There also exists a tracking device configured to resemble a stack ofcurrency and represents a system for use in catching thieves. The devicerelates to the electronic tracking of cash stolen from a bank or otherinstitution via an electronic signaling device placed within a stack ofcurrency that transmits location information to the authorities as thecash is moved from location to location. The tracking device allows lawenforcement officers to electronically monitor money stolen from a bank.The tracking device is sized to fit within a stack of currency in ateller's drawer or a bank's vault. When the tracking device isactivated, it transmits a beacon signal that continuously runs for theduration of the battery. Thus, the tracking device would automaticallysend a signal to either fixed monitoring stations, such as antennalocated on tall buildings, or to mobile monitoring stations, such ashelicopters and/ or police cars, allowing for continual tracking of thethief in possession of the stolen money. By knowing the location of themoney, the police can track and apprehend the perpetrators. It isdesigned to be a circuit card smaller than a dollar bill and thin enoughto be concealed between two sealed bills, thereby allowing it to beplaced into a stack of money undetected. Further, the device is flexibleand is able to be waterproofed, which will have no effect on its abilityto be continually tracked, but would prevent someone from shorting outthe device in liquid. Alternative embodiments allow variations of thetracking device to be placed within other objects of value. Analternative embodiment allows the tracking device to be automaticallyactivated when it is taken past a certain point, e.g., an electronicfence, from where it is stored.

Furthermore, there are tracking systems for tracking the location ofstolen articles, and more particularly, to disguised currency bundlesfor aiding law enforcement officials in apprehending thieves andrecovering stolen monies. Such tracking is tracked by a tracking agency,which agency may work in concert with a law enforcement agency. In othersituations, the functions of a tracking agency are undertaken by the lawenforcement agency itself. Such system may include a security pack forassisting in the recovery of stolen monies, which includes a housingdisguised as a bundle of currency bills, but containing a GPS receiverfor receiving GPS signals from overhead satellites combined with acellular phone transmitter (module), a microprocessor, antennae, and abattery. Following a bank robbery, the microprocessor activates thecellular phone transmitter to dial the telephone number of a centralmonitoring station. The microprocessor obtains location data from theGPS receiver and transmits the location data, along with identificationinformation, to the central monitoring station. The security pack mayalso include a separate, conventional RF beacon transmitter for allowingauthorities to home-in on the security pack within a large building orother structure, either after the GPS signals are lost, or after thelocation of the security pack is localized to a specific area orbuilding.

All of the devices described above are implemented, or require forimplementation, access to GPS or a custom radio network of receivers.This is an expensive requirement, increasing overall costs and the sizeof the devices. There is thus a need for a smaller, less expensivesolution to tracking and aiding law enforcement officials in therecovery of lost or stolen articles or missing children while utilizingexisting cellular telephone network infrastructure.

BRIEF SUMMARY OF THE INVENTION

In view of the aforementioned needs, there is contemplated a system,method, and device capable of being implemented using existingcommunications infrastructure to locate a missing, stolen, or lost itemor person.

In accordance with the present invention, there is provided a system andmethod of coordinated asset location. Location data is received from adevice, suitably a cellular, WiFi, WiMax, or other suitable transmitterassociated with a selected asset, which location data includes datarepresentative of a receiver with which direct communication with thetransmitter is made. The location data is then communicated to atracking service system, which tracking service system includes adatabase representative of geographic locations associated with aplurality of receivers. The database is then queried with receivedlocation data so as to generate geographic tracking data associated witha location of the receiver, the geographic tracking data includingdisplay data adapted to generate a map image including datarepresentative of a location of the selected asset. The geographictracking data is then communicated to an associated security agency orlaw enforcement agency so as to allow for viewing of an image generatedin accordance with the display data and at least one of tracking andinterception of the selected asset.

In one embodiment, updated location data is periodically received andcommunicated to the tracking service system, in order to generateupdated geographic location data. The geographic location data is thencommunicated to the security agency, allowing the updated imagesrepresenting the location of the asset to be viewed. In a preferredembodiment, a secondary tracking signal is received from aradio-frequency transmitter associated with the selected asset. Thesecondary tracking signal is then communicated to at least oneassociated tracking vehicle. This embodiment further includes thereceiving tracking vehicle data from each associated tracking vehicle,which vehicle tracking data represents tracking vehicle location,tracking vehicle direction, tracking vehicle speed, or signal strengthof a vehicle's received secondary tracking signal. The tracking data isthen communicated to the security or other monitoring agency to allowfor the viewing of updated images representing the location of eachtracking vehicle.

Still further, in accordance with the present invention, there isprovided an asset tracking management system and method. Device data isfirst received, representing properties of a plurality of asset trackingdevices. The device data, representing the properties of the assettracking devices is then displayed. Event data is then received,representing a tracking event associated with one of the asset trackingdevices. This event data, representing the tracking event, issubsequently displayed. Device service data representing the maintenancehistory of the asset tracking devices is received and then displayed.Tracking data is then received, representing a temporal propertycorresponding to the tracking event. The tracking data corresponding tothe temporal property is then displayed.

In a preferred embodiment, the device data includes identification datauniquely associated with each of the plurality of asset trackingdevices, and asset association data, linked to device identificationdata, representing a particular asset associated with each respectivedevice of the plurality. The event data associated with each eventincludes a unique event identifier associated with the event, andlocation data representing a location of an asset associated with theevent. The device service data suitably includes data representative ofan installation date of the device, and data representing a serviceperiod for the device.

Still further in accordance with the present invention, there isprovided an asset tracking system and method. Location data isperiodically received representing an updated location of a trackingdevice associated with an asset. Map data is then received and a maparea is displayed, which map area is inclusive of the location. The mapis periodically updated map in accordance with newly acquired locationdata. A user specifies a desired scale level for the displayed map andthe user's input is thereafter received, selectively scaling in andscaling out of the displayed map. In addition, input from the associateduser specifying a display of historic location data is received, as wellas means for displaying historic and updated location data in accordancewith received user input.

In a preferred embodiment, data representing at least one of speed andvelocity of the tracking device is received and an indicator isdisplayed, the indicator being of at least one of speed and velocity ofthe tracking device in accordance with received data. Furthermore, audiodata representing ambient sounds proximate to the tracking device isreceived, and selectively output via an associated speaker in accordancewith a user specified instruction. At least one of the location data,map area, velocity data and speed data is selectively communicated to anassociated law enforcement agency.

Further in accordance with the present invention, there is provided asystem and method for asset tracking. Notification data is received,representing the commencement of an asset tracking operation duringwhich a selected asset is tracked. A tracking elapsed time is thentracked and associated with the asset tracking operation. Event data isthen received, representing a triggering event associated with thetracking operation. Candidate data is then received representing anindividual associated with the selected asset being tracked. Next, thenotification data, the event data and the candidate data arecommunicated to an associated memory.

In a preferred embodiment, the event data includes data representing akidnapping, bank robbery, retail robbery, and/or vehicle theft. In thisembodiment, the notification data is generated from a wireless deviceassociated with the selected asset. In a preferred embodiment, thecandidate data includes data representing a number of candidates,vehicle identification, and data representing a risk level associatedwith at least one candidate. In one embodiment, law enforcement data isreceived representing an individual or an organization associated withtracking of the selected asset.

Still further in accordance with the present invention, there isprovided a system and method for asset tracking. An identifier,representing at least one tracking event, is received and subsequentlydisplayed. Date data, representing the at least one tracking event, isreceived. The date data, representing the tracking event, is thendisplayed. Data representing a temporal property associated with the atleast one tracking event is received and displayed. Event data,corresponding to the at least one tracking event, is received. The eventdata is then displayed, corresponding to the at least one trackingevent.

As set forth in the detailed description, a tracking system of thepresent invention comprises a tracking device (hereinafter, “device” or“unit”), the existing cellular-telephone network infrastructure orwireless network infrastructure, database, analysis and display softwareand/or equipment (hereinafter, “device controller”), and vehicle-mobiledirection-finding transceivers and man-portable (hereinafter, “hand-heldtrackers”) direction-finding receivers (collectively hereinafter,“trackers”).

The device comprises a wireless cellular-data modem or wirelessnetworking device, and is suitably supplemented with a GPS receiver, abeacon transmitter, supervisory control logic means, antennae, aportable power-supply, a user interface, and an application specificenclosure.

In a preferred embodiment, the device controller comprises a carriernetwork server, a system server having computer readable medium ofinstruction for receiving status data from a fielded device, sendingcommand data to the fielded device, providing databaseregistration/deregistration for the device entering or leaving service,providing event logging for the device in service, providing a graphicaltactical display that locates all active devices and trackers andhand-held trackers, and communicating tracking and location informationto a hosted web-site via the Internet. The device controller suitablyshares the tracking data it has collected from all trackers andhand-held trackers, thereby providing each fielded tracker and hand-heldtracker with full access to view the tactical display of a developingtrack. Furthermore, the device controller is capable of acting as acentral repository for tracking event data, as well as for systemadministrative functions. In addition, the device controller suitablydisplays, on a website, tracking and location information.

In another aspect of the subject invention, a tracker comprises avehicle-portable direction-finding (“DF”) receiver capable of homing inon a beacon signal generated by a device. The tracker is equipped sothat it is network aware, as well as position aware. The tracker iscapable of relaying its own position and the absolute bearing angleand/or proximity to the beacon transmitter, i.e., the device, back tothe device controller using the existing cellular-telephone network. Thetracker is further equipped with means adapted to receive, from thedevice controller, tracking data the device controller receives fromother trackers and hand-held trackers, wherein the user of the trackeris provided with access to the full tactical view of a developing track.In essence, the tracker is capable of working in concert with otherfielded trackers and hand-held trackers, thereby coordinating activitiesin a “wolf-pack” fashion. In an alternate embodiment, the tracker isalso suitably equipped with a global positioning system to providefine-position resolution.

In another embodiment, the tracker is a hand-held module, i.e., ahand-held tracking receiver, to be used in environments that do notpermit vehicle access; i.e., within buildings, shopping centers, etc.These devices are also suitably network- and position-aware, andoptionally include fine-position resolution capability using the globalpositioning system (GPS). Each tracking receiver is capable of relayingits own position and the absolute bearing angle and/or proximity to thebeacon transmitter back to the device controller via the existingcellular-telephone or wireless area network. The hand-held tracker isfurther equipped with a display and user interface, a cellular modem orother suitable network interface, a microcontroller, and a directionfinding receiver. In an alternate embodiment of the hand-held tracker,there is provided a heading sensor compass and a GPS receiver.

Still other aspects of the present invention will become readilyapparent to those skilled in this art from the following descriptionwherein there is shown and described a preferred embodiment of thisinvention, simply by way of illustration of one of the best modes suitedfor to carry out the invention. As it will be realized, the invention iscapable of other different embodiments and its several details arecapable of modifications in various obvious aspects all withoutdeparting from the invention. Accordingly, the drawing and descriptionswill be regarded as illustrative in nature and not as restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, incorporated in and forming a part of thespecification, illustrate several aspects of the present invention, andtogether with the description serve to explain the principles of theinvention. In the drawings:

FIG. 1 is an illustration of a flowchart showing a method for locatingan asset in accordance with the present invention;

FIG. 2 is an illustrative example of asset threat determinationaccording to the present invention;

FIG. 3 is an illustrative example of client and security agencyprocurement in accordance with the present invention;

FIG. 4 is an illustrative example of tracking system needs determinationand design in accordance with the present invention;

FIG. 5 is an example of a block diagram of a device;

FIG. 6 is an example of a block diagram of a tracking receiver;

FIG. 7 is an example of a system implementing the present invention;

FIG. 8A is an illustrative example of an installation of a trackingsystem at the client in accordance with the present invention;

FIG. 8B is an illustrative example of an installation of a trackingsystem at the security agency in accordance with the present invention;

FIG. 9 is an illustrative example of the initiation of a track of adevice in accordance with the present invention;

FIG. 10 is an illustration of a flow chart of a method in accordancewith one aspect of the present invention;

FIG. 11 is an illustrative example of the status update in accordancewith the present invention;

FIG. 12 is a template illustrative of an activation alert screen inaccordance with the present invention;

FIG. 13 is a template illustrative of a tracking event screen inaccordance with the present invention;

FIG. 14 is a template illustrative of a device database screen inaccordance with the present invention;

FIG. 15 is a template illustrative of an event history screen inaccordance with the present invention;

FIG. 16 is a template illustrative of a service log screen in accordancewith the present invention;

FIG. 17 is a template illustrative of a tracking log screen inaccordance with the present invention; and

FIG. 18 illustrates an embodiment in which a wireless network, such as aWiFi or WiMax network provides cell based asset tracking.

DETAILED DESCRIPTION OF THE INVENTION

Throughout this description, the preferred embodiment and examples shownshould be considered as exemplars, rather than limitations, of thepresent invention.

The present invention relates generally to tracking systems for trackingthe location of valuable materials, persons, objects, and moreparticularly, but not limited, to the tracking of stolen articles,object or persons through existing cellular network infrastructure,global positioning system (GPS), and location algorithms using acombination of directional vectors and signal strength estimates basedon Radio Frequency transmissions. As will be appreciated from thesubject description, the subject invention teaches a tracking system andmethod that is accurate, is of lower cost and which allows for improvedtracking and interception of tracked assets.

Referring now to FIG. 1, there is shown a flowchart 100 in FIG. 1illustrating a method for providing an asset tracking and locationservice in accordance with the present invention. Beginning at step 102,an asset threat determination or recognition is made by the serviceprovider. The asset threat determination is based upon a plurality ofindicators, including criminal activities in a particular area,potential client security concerns, historical indicators, and the like.For example, FIG. 2 illustrates an example 200 of client and securityagency involvement in determining threats to client assets 210. Theservice provider first determines those clients and/or security agenciesthat are potential subscribers at 202. The client's security department,personnel and the like are prompted to assess the threats to clientassets at 204. In addition, the security agency, or law enforcement,evaluates crime trends and statistics at 206, while the service provideridentifies the need for asset tracking solutions to both the potentialclients and the potentially active security agencies at 208. It will beappreciated by those skilled in the art that various components of theservice provider, such as a marketing department, advantageouslycoordinate the recognition of threats to assets by the client and thesecurity agency.

At step 104, active subscription of the client and the security agencyare procured by the service provider. As will be appreciated by thoseskilled in the art, the subscription by the client is suitably capableof differing from that of the security agency. For example, the clientsubscription requires payment of a monthly, quarterly or yearly fee,while the subscription to the security or law enforcement agency mayrequire no fees. FIG. 3 illustrates an example of the procurement ofclient and security agency involvement 300. The service providerorganizes the potential clients into groups having the same or similarthreats at 302. As these groups are organized along common assetthreats, the service provider executes sale, lease, and/or serviceagreements with the clients at 310. It will be appreciated by thoseskilled in the art that the sale, lease, and/or service agreementssuitably include provisions regarding monitoring, payments and otherprovisions as is known in the art.

Concurrently with procuring clients for the asset tracking servicesoffered by the service provider, the service provider also procurescommitment from the security agency to participate in the asset trackingand location system at 304. In the preferred embodiment, the securityagency suitably designates a liaison officer at 306 to overseecommunications between the service provider and the client. The securityagency is then prompted to execute a suitable agreement regarding use ofequipment and participation in the tracking system at 312. It will beunderstood by those skilled in the art that the procurement of securityagency participation and client participation need not occur in anyparticular order and that for ease of explanation, concurrentprocurement is used. The present invention is not limited to concurrentprocurement of participation by the clients and the security agency.

Returning to the flowchart 100 of FIG. 1, following procurement ofclient and security agency participation at step 104, the methodproceeds to step 106, wherein the tracking system needs and design aredetermined. The process for determining the design of the trackingsystem to be used by the subscribing client is best illustrated withreference to FIG. 4. As shown in FIG. 4, the service provider, withinput from the client and the security agency, selects an availablelocation tracking type at 402. As discussed above, location trackingtypes include, but are not limited to combined radio-frequencytriangulation and global positioning system tracking, radio-frequencytriangulation tracking, and combined radio-frequency triangulation andcellular sector tracking.

At 404, the service provider, based upon the available carriers, selectsa signal carrier. For example, the service provider selects a pagingservice carrier, a proprietary wide area network carrier or a cellularcarrier. Following the determination of the tracking system needs atstep 106, the tracking system components are assembled at step 108.Referring to FIG. 4, the service provider then assembles the device inaccordance with the selected tracking type and the selected carrier at106. It will be understood by those skilled in the art that the devicesuitably comprises the transmitters corresponding to the selectedtracking location type. The device controller and the trackers are thenassembled at 108 with components suitably adapted to receive the signalsgenerated by the components of the device. Once the various trackingcomponents have been manufactured at step 108, the service providerbegins the installation of the system and associated infrastructure atstep 110.

Referring first to FIG. 5 there is illustrated a block diagram of atracking device 500. The Tracking device 500 comprises a trigger switch502 operatively coupled to a microcontroller 504. It will be appreciatedby one of skill in the art that the trigger switch is suitablyconstituted by a plurality of different mechanisms and electromechanicalmeans. For example, the trigger switch 502 is advantageously an activeor passive Radio Frequency Identification integrated circuit, a reedswitch, an active or passive Radio Frequency Identification (RFID)integrated circuit, a motion detector, a clock, and a counter,internally or externally activated. An energy source 510 is suitablyconstituted by internal or external means, e.g., rechargeable batteries,alkaline batteries, photovoltaic cells, fuel cells, lithium-ion,nickel-cadmium, or nickel-metal hydride, and provides electric power tothe various other components of the tracking device 500.

The tracking device 500 further incorporates a beacon transmitter 506,and a cellular data modem 508, which is capable of including a globalpositioning system transceiver. In the preferred embodiment, the GPSreceiver is that available on position-aware cellular phones or modems,which GPS receivers are enabled to provide to the correspondingcommunication network information relative to their geographic position.The beacon transmitter and its attached antenna 512, is communicativelycoupled to the microcontroller 504 and receives power from the energysource 510. Similarly, the cellular data modem/global positioning systemtransceiver 508, and its respective antennae 514 and 516, also arecommunicatively coupled to the microcontroller 504 and draw power fromthe energy source 510. One of appreciable skill in the art will takenotice that the type of power source is dependent upon the applicationfor which the tracking device 500 is being utilized. Thus, the capacityof the energy source 510 is of a size determined by compatibility withthe tracking device's specific application, deployment environment, andoperational endurance requirements. For example, in the case ofapplication to persons or in applications where covertness or size is ofless relevance, the endurance of the tracking device 500 will benoticeably longer than with covert application of the tracking device500 to a valuable article, e.g., a ream of bank notes.

The microcontroller 504 functions to provide supervisory logic controlover the tracking device 500. The microcontroller 504 is responsible forcontrolling and operating the beacon transmitter 506, controlling thecellular data modem 508, receiving input from the trigger switch 502 andregulating the energy source 510. The microcontroller-logic section,exemplified in FIG. 5 as the microcontroller 504, is responsible forcoordinating communications over the Existing cellular-telephonenetwork, monitoring the device's 500 user-interface (if any), andmanaging resources used by the tracking device 500. Firmware residing onthe microcontroller 504 provides for transfer of small data payloads toand from the tracking device 500. One of ordinary skill in the art willappreciate that such a transfer is suitably implemented using standardtext-messaging protocols currently in widespread use. A call therebyplaced includes intrinsic information associated with a call, which iseither available from the message itself, contemporaneously transmittedcall information, or information available from the cellular network.The firmware residing on the microcontroller 504 is equipped to acceptoperating- mode commands including adjustment parameters. This allowsthe operations of the tracking device 500 to be dynamically and finelytailored to a given tracking situation by making transmission rates,cell-modem 508 reporting intervals, message recipients, etc., remotelyadjustable. It will also be understood by those skilled in the art thatthe microcontroller 504 suitably comprises ports (not shown) for avariety of sensors, microphones, lIP cameras, and the like. The additionof various ports to the microcontroller 504 enables a broader range ofdata to be collected by the tracking device 500. Such additionalinformation is suitably digitized and communicated over the cellularcall. It is to be appreciated that such devices are also suitablyengaged, or disengaged, by data communicated to the device 500 via acellular call as noted in more detail below in conjunction with thebeacon transmitter 506 and the cellular data modem 508, so as to alsoadvantageously realize power saving and selective utilization thereof.

The cellular-data modem 508 advantageously integrates areadily-available, modular sub-assembly, or for volume applications, issuitably based upon a fully integrated chip-level design. Operativelycoupled to the cellular modem 508 is the cellular modem antenna 514. Itwill be appreciated that antenna 514 and 516, or a single dual useantenna, are capable of being mounted either internally or externally,dependent upon the application for which the tracking device 500 iscorrespondingly implemented. That is, the dual use antenna 514 combinedinto 516 is able to be visible externally, for instance in the case of achild's shoe, belt-buckle or the like, or operatively integrated withthe enclosure of the tracking device 500, for use with bank notes, worksof art, or other valuable articles. As one of skill in the art willnotice, protocols used by the cellular modem 508 will depend upon theapplication of the tracking device 500, the location of the device, andthe actual modem implemented. Protocols used by the cellular-data modem508 include, but are not be limited to TDMA, CDMA, GSM, IP, TCIP,802.11x, 802.16x, 802.20x, or the like. The choice of cellular-telephoneor cell-based networking protocol will be dictated by the device's 500specific application and deployment environment.

The beacon transmitter 506 may be any radio-frequency (RF) transmitterknown in the art or becoming available in the art. For purposes ofexample only, a suitable variable frequency transmitter of 160 MHz to460 MHz is used. An example of such a transmitter is the ETS productmanufactured and distributed by Spectrum Management, LLC. One systememploys a proprietary array of antennas distributed around an area ofinterest. This array allows for coarse tracking of a transmitterdisposed within an area covered by the proprietary array. Informationobtained from this coarse tracking allowed for positioning of secondarytracking devices so as to more precisely track a location of thetransmitter. Such system, while fully functional, requires the addedexpense of installing and maintaining the proprietary transceivernetwork. As such, certain areas, such as rural locations, would oftenlack the necessary commercial activity or infrastructure to allow foroperation. In addition, a growing number of locations, particularlyurban locations, and corporate or college campuses, comprise largecoverage of cellular, wireless networking coverage.

The beacon transmitter 506 envisioned in the preferred model of thetracking device 500 is an amplitude-shift-keyed (ASK)very-high-frequency (VHF) RF transmitter circuit that outputs 100 mW ofRF energy into a 50 Ohms load. The beacon transmitter 506 is controlledand operated by supervisory logic control means implemented in themicrocontroller 504. The beacon transmitter 506 is operatively andcommunicatively coupled to the beacon transmitter antenna 512. In oneembodiment, the antenna 512 is integrated into the tracking device 500enclosure. The skilled artisan will appreciate that the antenna 512 iscapable of being externally mounted, depending upon the application forwhich the tracking device 500 is currently being implemented. It will benoted that each beacon transmitter 506 used in implementing the subjectinvention uses a unique identification code. Such code is suitablydifferentiated by software integral to the beacon transmitter 506 or bycode residing in the microcontroller 504.

A particular adaptation of the tracking device 500 allows for powersavings to be realized when the beacon transmitter 506 is not yetrequired insofar as a fine level tracking via antenna 512 is not yetcommenced. In this embodiment, microcontroller 504 is advantageouslymade responsive to a selected input received into cellular modem 508.That input includes coded data that selectively enables or disablesoperation of the beacon transmitter 506. Thus, battery power isconserved by only enabling the beacon transmitter 506 at such point asis desired by a monitoring agency or associated law enforcement agency.In addition, the absence of any signal, other than that of aconventional cellular or mobile phone call may render a signal moredifficult to detect by external signal detection means. Additionally,the microcontroller 504 is advantageously supplied with a suitabletiming algorithm to periodically enable and disable the cellular datamodem 508 for a selected duration. A particular duty cycle is chosen soas to allow for sufficient tracking intervals to be maintained for aparticular situation or application. This cycle is suitably fixed insoftware, or communicated to the microcontroller from a monitoringagency via a cellular link to address the needs of a particular trackingevent. This functionality advantageously allows for minimizinginterference associated with cellular data transmissions. By way ofexample, cellular transmissions, particularly some GSM transmissions,may be detectable by RF static that might be noticed in a conventionalradio receiver. Minimizing the duty cycle will minimize an opportunityfor one to notice that cellular broadcasts are being made.

It is to be appreciated that in embodiments employing wirelessnetworking protocols, such as 802.11x protocols, many power savinghardware and software systems are additionally available, as will beappreciated by one of ordinary skill in the art, that advantageouslyprovide further power conservation ability.

The tracking device 500 is capable of implementation in a variety offorms, depending upon the application for which the tracking device 500is utilized. For example, and not intending to limit the protection forwhich the subject invention is legally and equitable entitled, there areplanar embodiments, formed cavity embodiments, modular or integratedembodiments, embodiments utilizing camouflaged means, etc. Onerepresentative embodiment is that of a flat, planar form capable ofinsertion, without noticeable deformation, between two (2) bank notessealed together. There is also insertion into the sole of a shoe or beltenabling location of a missing person. Further enclosure embodiments areadvantageously customized to represent the desired object for affixationof the tracking device 500.

Turning now to FIG. 6 there is provided a block diagram exemplifying thesubject invention's tracking receiver 600 receiving components, or theinternal components of the tracker and hand-held tracker. As will beappreciated by one of skill in the art, the enclosures for the trackerand the hand-held tracker are capable of taking any number of formats,from a laptop computer, a Personal Data Assistant (PDA), a cellulartelephone, a desktop computer, or the like. Of importance, as observableto the skilled artisan, is the inclusion of the components outlined inFIG. 6. For purposes of explanation of FIG. 6, the term “trackingreceiver 600” is used to reference the tracker and the hand-heldtracker.

The tracking receiver 600 of FIG. 6, includes a microcontroller 604suitably adapted to control a variety of integrated components andexternal devices. It will be appreciated by those skilled in the artthat microcontroller 604 is suitably implemented by the microprocessorof a typical laptop, desktop or PDA. Operatively coupled to themicrocontroller 604 of the tracking receiver 600 is a direction-finding(DF) receiver 602, with three attached antennae 618, 620 and 622. Ascontemplated by the present invention, the three antennae 618, 620 and622 apportioned to the DF receiver 602, as will be apparent to oneskilled in the art, enables the DF receiver 602 to triangulate thesignal broadcast by the beacon transmitter 506 of the tracking device500. The DF receiver 602 is communicatively coupled to themicrocontroller 604. The microcontroller 604 then implements supervisorylogic means stored thereon to facilitate the translation of inputsreceived via the DF receiver 602 onto an integrated user interface anddisplay 606. The microcontroller 604 is suitably realized from amicroprocessor residing on a laptop computer, PDA or other mobilecomputing device.

The microcontroller 604 is operatively coupled to an optional GPSreceiver 612 and an optional heading sensor/compass 608. The optionalequipment provides greater range and mobility to the tracking receiver600 than the DF receiver 602 alone. The tracking receiver 600 furtherincludes a cellular data modem 610 and a cellular modem antenna 616 inoperative connection with the microcontroller 604. The GPS receiver 612and the heading sensor (compass) 608 are optionally depicted in FIG. 6and do not form part of the preferred embodiment.

The display and user interface 606 are any display and/or user interfaceknown in the art, ranging from any suitable video display, such as aCRT, LCD, TFT, plasma, or other visual means for displaying the outputfrom the microcontroller 604 enabling an operator to view a location ofthe tracking device 500. A standard QWERTY keyboard, touchpad, mouse,light pen, directional pad, stylus or other input means are used toimplement the user interface as depicted as the display and userinterface 606 of FIG. 6. The cellular-data modem or wireless interface610 of the tracking receiver of FIG. 6 receives information from thedevice controller via the existing cellular network infrastructure. Theinformation is suitably transmitted via the Internet over the existingcellular network infrastructure to the tracking device 500. Operativelycoupled to the modem 610 is an antenna 616, which is alternativelyintegrated into the tracking receiver enclosure or extending externallytherefrom. Communications between the device controller and the trackingreceiver are transmitted from the modem 610 to the microcontroller 604.Such communication allows the tracking receiver to function remotelyfrom the device controller and allows the operator to participate in thetracking of the tracking device 500.

In an alternate embodiment, the GPS receiver 612, the GPS antenna 614and the heading sensor (compass) 608 are also depicted in FIG. 6. Theinclusion of these two components into the tracking receiver allows thedevice controller to monitor and plot the location of all trackingreceivers currently being fielded in the search for tracking device 500.While currently available cellular systems already integrate GPScapability, it is to be appreciated that the implementation of the GPSreceiver 612 need not be integral to the tracking receiver. GPS modulesare capable of subsequent attachment via any means known to one ofordinary skill in the art.

Furthermore, depending upon the configuration of the tracking receiver,the power supply (not shown) for the tracking receiver will vary. Suchpower sources include, but need not be limited to, photovoltaic cells,rechargeable batteries, alkaline batteries, generator means, or, in thecase of the vehicle mounted embodiment, directly to the 12-volt systemoperating the internal combustion engine of the vehicle.

As used in FIG. 7, the tracking device 500 is implemented, in the formof the planar embodiment, for use with tracking a stack of bank notesstolen during a robbery, and for purposes of explanation, the planarembodiment is represented as device transmitter 702. It should beappreciated that the following example is easily relatable to anothervaluable article equipped with the tracking device 500 or even a missingchild on which the tracking device 500 has been affixed onto an articleof clothing. It should also be understood by those skilled in the artthat the use of a single tracking device 500 is for exemplificationonly. The subject invention is equally capable of employing multipledevices for use in a single stack of currency, layered between orattached to different bills in the stack. The skilled artisan willappreciate that multiple devices in the stack of currency suitablyenables continual tracking should one or more devices loose power, bediscovered, or be destroyed.

Returning to FIG. 7, there is shown a device controller 706communicatively coupled to the cellular network represented by cellulartowers 710, 712, and 714, as well as in communication with the securityagency 715. In the preferred embodiment, the security agency is anysuitable law enforcement agency, such as a local police force, theFederal Bureau of Investigation, a state highway patrol and the like.The device controller 706, as explained above, operates to coordinateefforts of tracking the device transmitter 702 as it is moved fromlocation to location. The device controller 706 is any suitable serveror personal computer known in the art capable of executing computerprogram products to operate in accordance with the present invention. Asthe stack of bank notes (not shown) in which a device transmitter 702 ishidden, are removed from the bank drawer in which they had previouslybeen stored, fixed strength of the magnet (not shown) mounted in thedrawer and which had kept the trigger 502, e.g. inverse reed switch,opened is removed, thereby allowing the circuit to close. This thenactivates the microcontroller 504 by supplying power from the energysource 510. The microcontroller 504 uses the cellular modem 508 toconnect to the existing cellular telephone infrastructure, representedby towers 710, 712, and 714. Concurrently with this activation of thecellular modem 508, the microcontroller 504 also instructs the beacontransmitter 506 to begin RF broadcast.

As the bank notes in which the device transmitter 702 is hidden, arebrought into the coverage area of the cell tower 710, a specific 120degree sector 710A of the 360 degree coverage area around the cell siteis identified for direction purposes when the broadcast signal is pickedup and the device controller 706 receives the information. The devicecontroller 706 processes the signal, noting that the cell tower 710 isthe originating tower (or access point, in the event of implementationby a wireless networking application, as will be detailed furtherbelow). The device controller 706 then determines the location of thecell tower 710 and the 120 degree Sector 710A direction (the sectorindicated direction) and plots its location on a tactical map foruploading to the trackers 707, 708, 709 and the hand-held tracker 704.The trackers 707, 708, 709 and the hand-held tracker 704 are thendirected by the device controller 706 to the specific Sector 710Acoverage area of the cell tower 710. The 360 degree coverage area aroundany given cellular tower is divided into three (3) 120 degree sectors,represented in FIG. 7 as 710A, 712A, 714A, the size of the coverage areavaries, but a typical coverage area ranges from a diameter of one mileto upwards of ten miles. It will be appreciated by one skilled in theart that the subject invention need not be limited to 120 degreesectors. For example, the subject invention is equally capable ofimplementing six (6) 60 degree sectors, or various other arcs ofcoverage, as dictated by the circumstances surrounding implementation ofthe subject invention.

While shown as a PDA, it will be appreciated that the hand-held tracker704 is capable of implementation as any other portable communicationsdevice known in the art, provided the components, as presented herein,are included. Furthermore, the device controller 706 is depicted as astationary personal computer, however one of ordinary skill in the artwill appreciate that another computer processing device is capable ofbeing advantageously employed in the subject invention.

The device controller 706 is capable of being implemented as a softwareapplication that runs on a standard PC, or alternatively is run as aprocess on a multi-tasking server-computer at the security agency (notshown) location or the service provider location (not shown). The devicecontroller 706 provides for coarse tracking through a proprietary arrayof antennae distributed around an area of interest. These antennae areused to obtain information allowing for the positioning of secondarytracking devices. The device controller 706 receives status data fromthe fielded trackers 704, 707, 708 and 709, provides databaseregistration/deregistration for the device 702 entering or leaving theservice area, provides event logging for all devices in service, andprovides a graphical representation of locations of both devices andactive tracking receivers.

As the trackers 707, 708, 709 and the hand-held tracker 704 are vectoredin to the general vicinity of device transmitter 702, the bank notes inwhich the device transmitter 702 is hidden enter the coverage area ofcellular tower 712. Typical procedure for cellular architecture is toallow the cell tower 712 to pick up transmission and the cell tower 710to drop transmission. The present invention, however, uses the relativeknown locations of cell towers 710 and 712, allowing the devicecontroller 706 to narrow the location of the device transmitter 702 to amuch smaller area. The art of triangulation is well known in the art andneed not be re-presented for purposes of this example. The narrowedlocation is then transmitted from the device controller 706 to thetrackers 707, 708, 709 and the hand-held tracker 704 via the cellularmodems 610. At this point in the tracking process all vehicles in thelaw enforcement fleet equipped with vehicle data terminals 713, 717,718, 719 and 720 become part of the tracking process.

Having thus been directed towards the device transmitter 702, thetrackers 707, 708, 709 and the hand-held tracker 704 are now in range ofthe beacon transmitter 506. As the four trackers 704, 707, 708 and 709approach the device transmitter 702, the DF receivers 602 (located oneach tracker) triangulate the signal being broadcast by the devicetransmitter 702, i.e., the tracking device 500, located in the stolenbank notes. The microcontrollers 604 of the trackers 704, 707, 708 and709 processes the triangulated signals received by the DF receivers 602and present the operators with graphical information via the display anduser interfaces 606. Updated information received via the cellulartowers 710 and 712, as well as updated information from the trackers704, 707, 708 and 709, is continually transmitted to the devicecontroller 706. This allows the device controller 706 to monitor anddirect the trackers 704, 707, 708 and 709 ever closer to the devicetransmitter 702.

In an alternate embodiment, using the above example and FIG. 7, there isshown one satellite representative of the constellation of globalpositioning satellites 716. In this embodiment, the trackers 704, 707,708 and 709 are equipped with GPS receivers 612. Currently GPSinformation is available for use in tracking cellular phones. In oneembodiment, GPS information is made available to a cellular serviceprovider, and location information is selectively made available fromthe cellular service provider pursuant to an authorized request. Inanother embodiment, this GPS data is communicated directly to amonitoring agency via the telecommunication network. In the embodimentin which information is provided via a service provider, a server orworkstation disposed at a security agency or a law enforcement agencyplaces a request for GPS information associated with a tracking call,and this information is captured and used to generate a display. Thisembodiment enables a service provider to use the trackers 704, 707, 708and 709 to track the tracking device 500, and then notify authorities tomove in on the subject. Such positioning would be extremely helpful inthe hands of Federal Bureau of Investigation agents pursuing akidnapper. The agents in the field would be able to give definitivepositions, in the form of longitude and latitude coordinates to otheragents, closing in on the kidnapped victim.

It should be noticed that the ability to transmit position data from atracker to the device controller 706 using existing cellularinfrastructure has a myriad of potential applications. The devicecontroller 706 is able to record and report last known positions of thedevice 702, the trackers 707, 708, 709 and the hand-held tracker 704.Such reports are used by law enforcement or search and rescueauthorities for both the apprehension of criminals and for the rescue ofstranded hikers. The use of the existing cellular infrastructure furtherallows the device controller 706 to transfer small data payloads to andfrom the device transmitter 702, implemented by using standardtext-messaging protocols, such as SMS. For example, a child's shoeequipped with the device notifies the child or responsible adult of anemergency. The most appropriate format would be latitude and longitudecoordinates of the site and should include a mean radius of the cellsite's sector coverage area. Data transfer protocols should bestandardized across all network providers. The data interface betweenthe existing cellular telephone network and the device controller 706could take several forms, including, but not limited to, Internetconnectivity via an Internet service provider, dial-in access, or directaccess via a cellular modem at the display console.

Also illustrated by FIG. 7 is a variation in a triggering mechanism thatallows for lessening a risk of false triggering, as well as to allow forpre-selected areas of acceptable asset location that are not consideredto be adverse. Illustrated is an area 721, suitably any acceptable areaor areas that are dependent on a specific situation. Such a definedarea, or areas, advantageously set forth a selected area of acceptableasset location, or conversely, a selected triggering area. Such adefined area allows for limited movement of an asset, for example,within the confines of a bank in the case of currency, or in theconfines of a day care center in the case of a child, which is deemedacceptable. Conversely, in selected situations it may be advisable tohave assets excluded from certain areas. Analogs of such technology maybe found in home confinement bracelets, or bracelets defined to enforcemaintaining selected distances of stalkers from their targets. Whencoupled with the subject tracking technology, additional advantages arereadily realized.

Such functionality is often referred to as “geo-fencing.” In the subjectsystem, geo-fencing is suitably accomplished by pre-selecting acceptableGPS coordinates, acceptable cellular towers or wireless access points,or use of RFID triggering. Such parameters are suitably set in either adevice associated with an asset, in a transmitter, on a server, or by atracking agency or law enforcement agency.

As will be appreciated by those skilled in the art, the presentinvention is suitably adapted to use existing telecommunicationsnetworks to facilitate the transmission of location data from the device702 to the trackers 704, 707, 708 and 709. In addition thereto, as shownin FIGS. 8A and 8B, the present invention further includes installingthe tracking device 500 in the client asset, e.g., FIG. 8A, andinstalling the corresponding tracking equipment, e.g., FIG. 8B.Referring to FIG. 8A, the installation of the tracking system beginswith the installation of the client transmitters, or the tracking device500, at 802. In the preferred embodiment, the tracking device 500 isinstalled inconspicuously into the asset to be tracked. In an alternateembodiment, the tracking device 500 is incorporated into the asset, forexample a stack of bank notes, in a currency drawer at the client'splace of business. It will be appreciated by those skilled in the artthat the tracking device 500 is suitably adapted for incorporation intoany asset desired to be protected. The service provider then trains theclient subscribers to use and operate the tracking device 500 at 804.The tracking device 500 then reports, on a predetermined cycle, a statusof the tracking device 500 batteries on a specified interval, such as ona weekly basis, which status is transmitted at 806 to the devicecontroller 706.

Referring to the installation of the tracking equipment of FIG. 8B, theskilled artisan will appreciate that in accordance with the descriptionabove, one or more trackers 704, 707, 708 and 709 are installed for thesecurity agency 715 at 810. In the preferred embodiment, the trackers704, 707, 708 and 709 are suitably installed into one or more securityagency 715 vehicles, e.g., police cruisers. The hand-held tracker 704does not require that the unit be incorporated into a vehicle, andrather remain independent of the vehicle for locating an asset on foot.A communications link between the service provider and the securityagency 715 is also installed, enabling direct communications andtransmissions of location signals from the service provider to thesecurity agency 715 and from the security agency 715 to the serviceprovider. The skilled artisan will appreciate that the transmission oflocation signals from the trackers 704, 707, 708 and 709 to the devicecontroller 706 enables the service provider to update the position orlocation of an asset to the subscribing client. In the preferredembodiment, the trackers 704, 707, 708 and 709 are provided to thesecurity agency 715 at little to no cost, so as to facilitate adaptationof the tracking system of the present invention by the security agency715.

Security agency personnel, or law enforcement officers, are then trainedat 812 in the use of the trackers 704, 707, 708 and 709 to locate anasset incorporating the device 702. In the preferred embodiment, thetraining provided to the security agency 715 includes training ofpersonnel at all levels, including, but not limited to, officers,dispatchers, commanders, and the like. The trackers 704, 707, 708 and709 transmit a periodic status report at 814 to the security agency 715and/or the service provider. It will be appreciated by those skilled inthe art that the status report is transmitted to the device controller706 at the service provider, or to a communications link at the securityagency 715. In a preferred embodiment, the installation of both theclient device 702 and the trackers 704, 707, 708 and 709 also includesregular system maintenance and user training.

Returning to FIG. 1, the service provider, following the subscription ofa client and upon installation of the tracking system, activates thedevice 702 and bills the client at step 112 for the costs associatedthereto. In the preferred embodiment, the client leases each device 702and pays a monthly fee for the tracking and monitoring servicesprovided. In an alternate embodiment, each device 702 is purchased for aset price and the client is billed for a subscription rate on a daily,weekly, monthly or yearly basis. As previously stated the securityagency 715 purchases the trackers 704, 707, 708 and 709 at a reducedrate or are provided the trackers 704, 707, 708 and 709 at no charge tothe security agency 715. Upon activation, the client device 702 ismonitored by the service provider at step 114. Status reports arecontinually updated while the monitoring occurs.

At step 116, the service provider detects the tracking device 500 hasbeen involved in an incident, such as a theft or robbery. The detectionof an incident at step 116 initiates the tracking of the tracking device500 at step 118. Referring now to FIG. 9, there is shown an example ofthe initiation of a track of the tracking device 500 in accordance withthe present invention. Following the detection of the incident, such asa robbery or theft, the transmitter of the tracking device 500 isactivated at 902. It will be appreciated by those skilled in the artthat the activation of the transmitter suitably includes registration ofthe transmitter on a cellular network, as described in detail above.Thus, the activation requires the transmitter to initiate a telephonecall to the service provider. The service provider then contacts thecellular carrier requesting location data indicating the cellular toweror towers from which the tracking device 500 is transmitting. It will beappreciated by those skilled in the art that suitable communicationsbetween the cellular carrier and the service provider occurs over suchcommunications systems as the public switched telephone network, acellular telephone network, data communications via wireless WAN, or theInternet.

The skilled artisan will appreciate that the call suitably includesidentification data identifying the unit making the call. Using CDMA, orcode division multiple access, identifying data is automaticallytransmitted with the cellular call. The level of encoding inherent insuch a call requires that the cellular carrier participate in thetracking operations, commonly referred to as location based service.When using, for example GSM, or Global System for Mobile Communications,the level of encoding, when suitably decoded, does not requireparticipation by the cellular carrier for tracking. The cellular towerreceiving and transmitting the call is able to be determined from thecall itself. This type of location determination can use unintendedinformation inherent in the network communications of the cellularnetwork that describes the available cellular site location, or intendedinformation about the cellular site location, direction and signalstrength. Alternatively, when suitably selected by the client, thetracking device 500 employs GPS transmissions, thereby enabling locationusing GPS coordinates directly or as relayed through a cellularprovider. Such tracking information is available since ownership of andaccess to the cellular medium is controlled.

Preferably, following registration on the cellular network, an inquiryis made to the carrier network server to establish the transmitter onthe appropriate network, e.g., paging, proprietary wide area network, orcellular network. As will be understood by those skilled in the art, thetracking device 500, as stated above, is capable of being tracked usinga Radio-Frequency homing beacon, the cellular location methods, or thecellular location methods combined with the GPS coordinate system, asset forth more fully herein. After the activation of the transmittercomponent, closed-circuit television, if available at the clientlocation where the tracking device 500 was stored, is activated at 904.

The activation of the transmitter and the closed-circuit television feedare then uploaded to a web-server at 906. The service provider isnotified at 1008 of the incident and verifies at 910 that thetransmitter has actually been activated. In the preferred embodiment,the web server initiates a web tracking session, which enables a clientto log on to the web server and view status information regarding thetransmitter and the efforts being made to locate and recover the asset.Once verification of the incident has occurred, the security agency 715is notified at 912. The security agency 715 then activates the trackers704, 707, 708 and 709 in preparation of responding thereto. In analternate embodiment, the web tracking session further includes a postsession analysis regarding the track of the asset, from loss torecovery.

Referring now to FIG. 10, there is shown a flow chart depicting theoperation of the system of the subject invention. The operation of thesystem requires a number of operations to be performed to allow thelocation of the tracking device 500 to be used by the trackers 704, 707,708 and 709. Beginning at step 1002, the cellular modem 508 of thetracking device 500 is activated and registered with the cellularnetwork. It will be understood, with respect to the subject inventiondiscussed above, that the triggering event, i.e., the event causing theactivation, is any movement or other means of activating the trackingdevice 500. The method progresses to step 1004 where a determination ismade whether the cellular network has failed to recognize the cellularmodem. If the cellular modem is not recognized by the cellular network,the method then returns to step 1002 and the cellular modem againattempts to register with the existing cellular network. If the trackingdevice 500 has successfully registered with the cellular network at step1004, the method proceeds to request the cellular location informationfrom the cellular networks location based service Server at step 1006.

After capture of the location information, the system will proceed tostep 1008, where the location information is transmitted to the Trackingservice provider or Internet service provider. The service provider,depending upon the type of services being provided, or alternatively,the Internet service provider, forwards the information along to thedevice controller 706 in step 1010, or provides the location of thetracking device 500 to the owner as part of the services providedthereto. In the event that the information is passed on to the devicecontroller 706 in accordance with step 1010, the device controller 706at step 1014 receives the information and processes the cellular/Sectordata and the corresponding vehicle tracker data to establish the speedand direction of the tracking device 500.

At step 1015, the security agency 715 receives the information anddisplays the location on a local map screen. It will be understood bythose skilled in the art that the security agency 715 is anygovernmental or security organization capable of locating and/orapprehending the tracking device 500. It will be further appreciated byone of ordinary skill in the art that any other suitable display will besatisfactory to accomplish the forgoing.

The security agency 715 is then able to forward the tracking informationto its police units in the field at step 1016. This equates to thesecurity agency 715 using the information garnered from the existingcellular network to vector its units towards the tracking device 500.Once in the general area, as directed by the security agency 715 in step1016, the fielded units use a vehicle mounted tracker or a hand-heldtracker 704 to close in on the tracking device 500.

Alternatively, as shown in FIG. 10, when the cellular network is notavailable, the tracking device 500 activates a Radio-Frequency (RF)transmitter at step 1007. At step 1009, the device controller 706receives the RF transmission and becomes aware of the activation. Thedevice controller 706 then notifies tracking vehicles of the activationat step 1011. Beginning at step 1012, the tracking vehicles receive theRF transmission from the tracking device 500. The tracking vehicles thensend their corresponding location, direction, signal strength anddirection from which the RF transmission is being received to the devicecontroller 706 at step 1013. The system then returns to step 1014, wherethe device controller 706 processes the incoming information in order toaccurately determine the location, speed and direction of the trackingdevice 500. The system continues to operate as set forth above.

Returning to FIG. 1, following the initialization of the tracking of thetracking device 500, the system continuously updates, in real-time, theincident and tracking device 500 status information at step 120. Forexample, the client and the security agency 715, via the web session,can follow the search and recovery efforts being undertaken inreal-time. Referring now to FIG. 11, there is shown an illustrativeexample of the status update according to the subject invention.Beginning at 1102, the service provider displays the location of thetransmitter, e.g., the tracking device 500, and the tracking units,e.g., the trackers 704, 707, 708 and 709, on the service providerwebsite. FIG. 12 illustrates a template of an activation alert screendisplayed to a user, informing the user that a tracking device 500 hasbeen activated. As demonstrated in FIG. 12, a user is suitably providedwith relevant information regarding the incident giving rise to theactivation alert. For example, FIG. 12 illustrates the confirmationidentity of an individual confirming the activation was not in error. Inaddition, suitable law enforcement information is provided, as well asinformation regarding the type of event, the description of the suspectsand the time/date information relating to the event. The skilled artisanwill appreciate that suitable identifying information regarding thesuspects includes, without limitation, articles of clothing, vehicledata, armament of suspects, and the like. The skilled artisan willfurther appreciate that suitable event information includes, withoutlimitation, kidnapping, bank robbery, retail robbery, stolen vehicle andthe like. As additional information becomes available regarding theincident site, it is retrieved by the service provider server at 1104.At 1106, the additional information, if any, is uploaded to the websiteand displayed to the client and to any security agency 715 personnelhaving access to the website. FIG. 13 is a template illustrating asuitable web-based display regarding the incident, or tracking event. Asshown in FIG. 13, the client or security agency 715 is able toselectively view different tracking displays, such as only the trackingdevice 500, the trackers 704, 707, 708 and 709, or the tracking device500 and the trackers 704, 707, 708 and 709. Via the map display, theviewer is able to zoom in or out on the tracking device 500, track thespeed and the current and starting locations of the tracking device 500.In addition, as shown in FIG. 13, the viewer is able to select audio,video, or an intercept, via access links located on the template screen.

The intercept function, as illustrated in FIG. 13, provides forsignificant advances over earlier tracking systems. In accordance withan embodiment employing a tracking function, location data associatedwith an asset being tracked is relayed to the security agency. In thissystem, tracking data is also advantageously received for each of atleast one tracking vehicle (or individual) associated with tracking theasset. Such vehicles are suitably supplied with tracking devices, suchas tracking device 500 that is employed in connection with a trackedasset. It is to be appreciated, however, that with a tracking vehicle, atracking device is likely connected with a more durable power supply,and is suitably provided with a more powerful transmitter. Also, thesystem is not generally required to be hidden or disguised. Thus suchtracking devices do not have limitations associated with a discreet orhidden tracking device. Tracking information from such vehicles is alsosuitably supplied to the tracking agency via a direct broadcast, orcommunication via any suitable transmission medium, such as WiFi, 802.x,WiMax, or the like.

A security agency is thus provided with location data associated with atracked asset, along with position of tracking vehicles. This locationinformation, coupled with readily available geographic information,allows for ready calculation of separation, relative displacement,relative velocity and optimal intercept parameters. Such optimalintercept parameters suitably include a vehicle that is closest, andadvantageously integrates readily available topographic and streetlayout data so as to calculate a best intercept route. Also, withmultiple vehicles, a calculation is readily made to allow forpositioning of various vehicles to cover possible, or likely,alternative routes that may be chosen by a perpetrator of an asset ofinterest. Of course, since it is contemplated that tracking informationassociated with an asset is continuously or periodically updated,tracking vehicles are suitably positioned and repositioned in accordancewith asset movement. A best intercept route advantageously takes intoaccount travel distance, speed limits, traffic congestion, and the like.

A display, such as that of FIG. 13, is enabled to give a visualrepresentation of the tracked asset as well as each tracking vehicle.Intercept data is communicated, either in real time, or periodically, toeach tracking vehicle to allow for better tracking, adjustment, andoptimized coordination between vehicles.

At 1108, the service provider server retrieves location information ofthe tracking device 500 and the trackers 704, 707, 708 and 709 from thecellular network, as set forth in detail above. This locationinformation is then uploaded to the website at 1110 for the client toview. It will be understood by those skilled in the art that the websiteis suitably capable of displaying past and current tracking information,such as on a map, grid or the like. The skilled artisan will alsoappreciate that the information uploaded to the website is continuousand in real-time. At 1112, the website displays for dispatch, thecoordinates of the track with GPS. As the trackers 704, 707, 708 and 709converge on the cell location/beacon signal of the tracking device 500,the respective positions of the trackers 704, 707, 708 and 709 areupdated on the website.

Referring to FIG. 1, at step 122, the service provider assists in thetracking and recovery of the asset. As shown above with respect to FIG.10, the service provider assists in the recovery of a stolen or missingasset. A determination is then made at step 124 that the asset has beenrecovered. At step 126 the service provider assists in the prosecutionof the apprehended perpetrator as requested by the security agency 715.When the asset has not been recovered at step 124, the device statusinformation is updated at step 120 and the service provider continues toassist the security agency 715 in the apprehension of the perpetratorand the recovery of the asset at step 122.

The present invention further provides for the storing and viewing oftracking and service data in a database for viewing by the client and/orsecurity agency 715. As illustrated in FIGS. 14–17, various templatesenable the client and/or security agency 715 to access and search thedatabase for information relating to a specific client, an event, aspecific tracking device 500 and the like. The skilled artisan willappreciate that various other displays are capable of being displayedand the screenshots illustrated in FIGS. 14–17 are for exemplarypurposes only.

Referring now to FIG. 14, there is illustrated a template screenshotshowing a spreadsheet 1400 regarding various devices 500. As will beappreciated by those skilled in the art, the spreadsheet 1400 of FIG. 14suitably represents a visual depiction of data stored in an associateddatabase and accessible via a web-site. From FIG. 14, a client orservice provider is able to view a listing of devices 500, locations,date placed in operation and the like. The skilled artisan willappreciate that other suitable data fields other than those shown arecapable of being stored and displayed and the present invention is notlimited to those fields illustrated in FIG. 14. The spreadsheet 1400 issuitably selected via the device database tab 1402, as shown. Inaddition, the skilled artisan will appreciate that the viewer is able toselect other displays by selecting the event history tab 1404, theservice log tab 1406, and the tracking log tab 1408. With respect to thespreadsheet 1400, various data fields are shown, including a device IDfield 1410, a transmitting code ID 1412, a telephone number 1414, anasset ID 1416, a client number 1418, the installation type 1420, thedate provisioned 1422, the SIM number 1424, the date installed 1426, andthe location 1428 in which the device 500 was installed. As will beunderstood by those skilled in the art, the viewer is able to search thedatabase displayed on the spreadsheet 1400 via the device ID 1410, thetransmitting code ID 1412, the telephone number 1414, or the asset ID1416 associated with the device 500 being queried.

Referring to FIG. 15, there is shown a template screenshot illustratingan event history spreadsheet 1500 corresponding to a specific client, orto a specific service provider. As will be appreciated by those skilledin the art when viewing the spreadsheet shown in FIG. 15, a viewer isable to view a historical listing of an event, from initiation of thetracking to final location of the asset. As shown by the template ofFIG. 15, a viewer has selected the event history tab 1504 in order toview the event history associated with a device 500. The viewer iscapable of selecting other views of data stored in the database byselecting the device database tab 1502, the service log tab 1506 and thetracking log tab 1508. The event history spreadsheet 1500 suitablydisplays a variety of data fields representing data stored in thedatabase. As shown, the spreadsheet 1500 includes an event number 1510,a start time 1512, a start location 1514, a location request time 1516,a request type 1518, a network type 1520, a network response time 1522and the location/coordinates 1524 of the device 500. A viewer issuitably capable of searching the database for a selected event andviewing the information corresponding to that selected event inspreadsheet 1500.

FIG. 16 illustrates a template screenshot showing a service log 1600regarding each device 500 in use. As will be understood from FIG. 16, aviewer selects the service log tab 1606 to display log data in theservice log spreadsheet 1600. A viewer is capable of selecting variousdatabase screens by selecting the device database tab 1602, the eventhistory tab 1604, and the tracking log tab 1608. As shown in the servicelog spreadsheet 1600, various data fields are displayed to the viewerincorporating data from the database regarding a selected device 500.The service log 1600 suitably includes a device ID 1610, a location 1612where the device 500 was installed, a date the device 500 was installed1614, the date/time of a report 1616 regarding the device 500 wasgenerated, the type of service 1618 required, the date 1620 the servicewas performed on the device 500, a description 1622 of the serviceperformed on the device 500, the date 1624 the device 500 was removed,and the field associate 1626 performing the service on the device 500.Various other types of information are stored in the database and arecapable of being displayed to the viewer in addition to those fieldsshown in FIG. 16 and the present invention is not limited to thosefields listed above.

As illustrated in FIG. 17, there is shown a spreadsheet illustrating atracking event log 1700 corresponding to a specific device 500. Upon theviewer's selection of the tracking log tab 1708, the tracking event logspreadsheet 1700 is suitably displayed. The skilled artisan willappreciate that other views of data stored in the database are able tobe selected via tabs 1702, 1704 and 1706. The tracking event logspreadsheet 1700 advantageously displays tracking events associated witha device 500. As shown in FIG. 17, the spreadsheet 1700 includes variousdata fields displaying tracking information stored in the database tothe user. As illustrated by FIG. 17, the fields include an event number1710, a date 1712 associated with the event, a time 1714 when the eventstarted, a time 1716 when the event stopped, i.e., ended, the duration1718 of the tracking event, and suitable details 1720 associated withthe device 500, the event, or both.

The skilled artisan will appreciate that FIGS. 14–17 are illustrated asviewable via a web-browser and in spreadsheet format, however any meansof displaying and viewing the data are equally capable of being employedwithout departing from the scope of the present invention.

As noted above, the subject invention is suitably realized in a cellularenvironment. Cellular telephony and cellular networking, such as WiFiand WiMax commonly access points that typically defined overlappingregions. FIG. 18 is provided to illustrate an environment specific to acurrent 802.11x setup. In the illustration, a series of 1, 2, . . . , nwireless access points (AP) cover respective areas 1800, 1802 and 1804,which overlap to form continuous, or near continues coverage over alarger area.

The environment of FIG. 18 is configured as a wireless local areanetwork (WLAN) such as a 802.11 standard network. The wireless networkcomprises access points (AP) 1800, 1802, and 1804 having knownlocations. Access points 1800, 1802, and 1804 are connected by abackbone network (not shown) to an Authentication, Accounting, andAuthorization (AAA) server 1810, for example a Remote AuthenticationDial-In User Service (RADIUS) server. The backbone network is anysuitable wireless or wired topology. A device transmitter (not shown) isconfigured as a mobile unit to operate on the network. When the devicetransmitter (not shown) is activated, it establishes a session with anearby access point, for example, in FIG. 18, the access point issuitably 1804. When the device transmitter (not shown) establishes asession with an access point (e.g. AP 1804), the access pointauthenticates the device transmitter (not shown) with Authentication,Accounting, and Authorization server 1810 Thus, because theAuthentication, Accounting, and Authorization server 1810 knows theidentity of the access point with which mobile unit (not shown) isassociated, the location of the device transmitter (not shown) isdetermined.

Newer wireless networks, such as wireless networks compliant with theI.E.E.E. 802.11i standard, also provide the capability for mobile units(not shown) to preauthenticate with access points on the network thatthey are receiving beacons from. For example, as shown in FIG. 18, adevice transmitter (not shown) receives beacons from the access point1804. A device transmitter (not shown) preauthenticates with an accesspoint 1804 by sending a message to the access point it is currentlyassociated with, access point 1802 in this example, which forwards thepreauthentication request to Authentication, Accounting, andAuthorization server 1810. The preauthentication requests received byAuthentication, Accounting, and Authorization server 1810 enable moreprecise location determination by as well as speed determination. Thus,it is appreciated that such wireless networking protocols are analogousto cellular telephony, as described herein.

The embodiments above allow for a non-governmental entity, in the formof a service provider, to provide security for a customer. That is, theservice provider is able to provide a customer with the whereabouts ofthe customer's designated objects at any time. In the event thedesignated object has been purloined, the service provider is even ableto direct the police to the location of the missing object, usingnothing more than the existing cellular telephone networkinfrastructure.

The invention extends to computer programs in the form of source code,object code, code intermediate sources and object code (such as in apartially compiled form), or in any other form suitable for use in theimplementation of the invention. Computer programs are suitablystandalone applications, software components, scripts or plug-ins toother applications. Computer programs embedding the invention areadvantageously embodied on a carrier, being any entity or device capableof carrying the computer program: for example, a storage medium such asROM or RAM, optical recording media such as CD-ROM or magnetic recordingmedia such as floppy discs. The carrier is any transmissible carriersuch as an electrical or optical signal conveyed by electrical oroptical cable, or by radio or other means. Computer programs aresuitably downloaded across the Internet from a server. Computer programsare also capable of being embedded in an integrated circuit. Any and allsuch embodiments containing code that will cause a computer to performsubstantially the invention principles as described, will fall withinthe scope of the invention.

The foregoing description of a preferred embodiment of the invention hasbeen presented for purposes of illustration and description. It is notintended to be exhaustive or to limit the invention to the precise formdisclosed. Obvious modifications or variations are possible in light ofthe above teachings. The embodiment was chosen and described to providethe best illustration of the principles of the invention and itspractical application to thereby enable one of ordinary skill in the artto use the invention in various embodiments and with variousmodifications as are suited to the particular use contemplated. All suchmodifications and variations are within the scope of the invention asdetermined by the appended claims when interpreted in accordance withthe breadth to which they are fairly, legally and equitably entitled.

1. An asset tracking management system comprising: means adapted forreceiving device data representative of properties of a plurality ofasset tracking devices; means adapted for displaying the received devicedata representative of properties of the plurality of asset trackingdevices; means adapted for receiving event data representative of atleast one asset tracking event associated with at least one of theplurality of asset tracking devices; means adapted for displaying thereceived event data representative of properties of the plurality ofasset tracking devices; means adapted for receiving device service datarepresentative of a maintenance history of the plurality of assettracking devices; means adapted for displaying the received deviceservice data representative of a maintenance history of the plurality ofasset tracking devices; means adapted for receiving tracking datarepresentative of a temporal property associated with the at least onetracking event; and means adapted for displaying the received trackingdata representative of the temporal property associated with the atleast one tracking event.
 2. The asset tracking management system ofclaim 1 wherein the device data includes identification data uniquelyassociated with each of the plurality of asset tracking devices.
 3. Theasset tracking management system of claim 2, wherein the identificationdata is one of a device ID, an asset ID, a transmitter code ID and atelephone number.
 4. The asset tracking management system of claim 3wherein event data associated with each event includes: a unique eventidentifier associated with the event; and location data representativeof a location of an asset associated with the event.
 5. The assettracking management system of claim 4 wherein the device service dataincludes, for each of the plurality of asset tracking devices: datarepresentative of an installation date of the device; and datarepresentative of a service period for the device.
 6. A method formanaging asset tracking, comprising the steps of: receiving device datarepresentative of properties of a plurality of asset tracking devices;displaying the received device data representative of properties of theplurality of asset tracking devices; receiving event data representativeof at least one asset tracking event associated with at least one of theplurality of asset tracking devices; displaying the received event datarepresentative of properties of the plurality of asset tracking devices;receiving device service data representative of a maintenance history ofthe plurality of asset tracking devices; displaying the received deviceservice data representative of a maintenance history of the plurality ofasset tracking devices; receiving tracking data representative of atemporal property associated with the at least one tracking event; anddisplaying the received tracking data representative of the temporalproperty associated with the at least one tracking event.
 7. The methodfor managing asset tracking of claim 6 wherein the device data includesidentification data uniquely associated with each of the plurality ofasset tracking devices.
 8. The method for managing asset tracking ofclaim 7 wherein the identification data is one of a device ID, an assetID, a transmitter code ID and a telephone number.
 9. The method formanaging asset tracking of claim 8 wherein event data associated witheach event includes: a unique event identifier associated with theevent; and location data representative of a location of an assetassociated with the event.
 10. The method for managing asset tracking ofclaim 9 wherein the device service data includes, for each of theplurality of asset tracking devices: data representative of aninstallation date of the device; and data representative of a serviceperiod for the device.