Method and system for dynamic information exchange on location aware mesh network devices

ABSTRACT

A method and system for dynamic information exchange on mesh network devices. The dynamic information exchange includes allowing a mesh network device to communicate location information with a network device at pre-determined physical location and invite social contacts of the mesh network device to come to the pre-determined physical location. The network device sends various types of electronic messages (e.g., text message, e-mail, etc.) on a mesh network and/or a non-mesh communications network (e.g., the Internet, etc.) and to social networking sites. The dynamic information exchange also includes exchanging plural activity messages including a security identification authorization message for allowing access to a secure area, a building management message for automatically and dynamically managing heating, ventilation and/or air conditioning (HVAC) and/or an emergency location message for providing three-dimensional (3D) emergency location information.

CROSS REFERENCES TO RELATED APPLICATIONS

This application is a Continuation-In-Part (CIP) of U.S. utility patentapplication Ser. No. 11/880,271, filed Jul. 20, 2007, that claimspriority to U.S. Provisional Patent Application 60/833,741, filed Jul.27, 2006, said U.S. utility patent application issued as U.S. Pat. No.7,801,058, on Sep. 21, 2010, the contents of all which are incorporatedby reference.

FIELD OF THE INVENTION

This invention relates to mesh networks. More specifically, it relatesto a method and system for dynamic information exchange on locationaware mesh network devices.

BACKGROUND OF THE INVENTION

There are many types of computer and communications networks inexistence. One variety of such networks is a mesh network.

A mesh network is a self-organizing network built from plural meshnetwork nodes that may spontaneously create an impromptu network,assemble the network themselves, dynamically adapt to device failure anddegradation, manage movement of mesh network nodes, and react to changesin task and network requirements. The plural mesh network nodes arereconfigurable smart network nodes that are self-aware,self-reconfigurable and autonomous.

A mesh network is a network that employs one of two connectionarrangements, “full mesh” topology or “partial mesh” topology. In thefull mesh topology, each node is connected directly to each of theothers. In the partial mesh topology, nodes are connected to only some,not all, of the other nodes.

There are a number of problems associated with wired and wireless meshnetworks. One problem is that a number of independent mesh devices eachmake a local decision and then try to combine these decisions at acentral point to generate a global decision. Routing, bandwidth, andpower constraints determine the quality of the distributed detectionand/or estimation decision. Another problem is that is often difficultto determine a load on a mesh network and what resources are required todetermine a desired quality of service.

Another problem is that some mesh networks are mobile networks in whichit is assumed at least some of the nodes of the network are mobile unitsthat change position over time. The dynamic management of complexrouting information is very difficult. Mobile sensor networks includeplural client units in such as a personal digital/data assistant (PDA),mobile phone, or other mobile unit for airport lounges, shopping malls,offices, etc.

There have been attempts to solve some of the problems associated withmesh networks. For example, U.S. Pat. No. 6,785,725 entitled “Signalingaddress resolution in a communication network,” that issued to Ramananteaches “a network configuration and method provide communication setupbetween neighbor nodes in a communication network, without broadcastingthis setup information over the network. A signaling bandwidth separatedfrom the data communication channel bandwidth facilitates addressresolution over a common transmission medium. The user is not requiredto know any physical address properties of the neighbor nodes. Thisreduces the complexity of the information that a network administratoris required to manage. This processing feeds into a complete addressresolution table, which is employed for controlling networkcommunication over the main data communication channel bandwidth.Typically, substantially continuous transmission and/or reception overthe signaling bandwidth is useful not only to determine the neighbornode's active address upon startup, but also while the network isrunning, to detect if a signaling element has been exchanged or haschanged activity. The address resolution is automatically updated toreflect a new configuration.”

U.S. Published Patent Application No. 20050272430 entitled“Reconfigurable micro-mesh communication system,” that was published byGriebling teaches “wide area wireless networks with high networkthroughput and low provisioning and maintenance costs. The wirelessnetworks comprise a distributed reconfigurable micro-mesh cluster havingdirect wireless link capability. Multiple channels operating atdifferent frequencies can be used per direct wireless link. To furtherreduce the provisioning and maintenance costs, narrow beam antennas areused at the point of presence. To expand the wide area wireless networksinto the home market, adjustable antennas are installed at homes.”

U.S. Published Patent Application No. 20050243765 entitled “Mesh networkand piconet work system and method” that was published by Schrader etal. teaches “a method of distributed control of a wireless mesh networkwithout knowledge of global topology. The method includes: a stationjoining the network with any current member by propagating thejoin-request, or two meshes merging using the steps of: one mesh joiningthe other as a whole and then re-synchronizing its timing. The methodfurther includes: first, each station periodically transmits a beacon;second, in response to a beacon being no longer detected, a stationtransmitting a bitmap of stations that it can still receive; third, eachstation responds by adding stations that it can receive with all of thebitmaps received from other members, and retransmitting the updatedbitmap; fourth, after time for all stations to respond, all stationsbase current membership on the bitmap. The method further includes:determining sharable time slots that will not interfere with neighborsor other slot sharers, using and then releasing those slots.”

U.S. Published Patent Application No. 20050190778 entitled “Multi-systemmesh network,” that was published by Ozluturk teaches “a transmission issimultaneously provided on multiple mesh networks. Retransmissionbetween two nodes may be performed for the same communication alongmultiple networks in a mesh topography for the multiple networks. Thispermits communication to be effected in a mesh topography where one orall systems would not be able to provide a complete network connectionwithin any given system.”

U.S. Published Patent Application No. 20050074019 entitled “method andapparatus for providing mobile inter-mesh communication points in amulti-level wireless mesh network,” that was published by Handforth etal. teaches “a mobile backhaul inter-mesh communication point forms aninterface between a wireless mesh network on a first level and awireless mesh network on a second, higher bandwidth, level. The twowireless networks are differentiated, e.g., by causing the mesh networksto be formed using different spectra, protocols or coding, or antennae.The mobile intra-mesh communication point functions as an access pointin the lower level mesh network and as a relay point in the upper levelmesh network. Utilizing mobile inter-mesh communication pointsfacilitates deployment of wireless network access points while enablingthe location of access points to follow the concentration of networkusers. Mobile inter-mesh communication points may be deployed inpersonal vehicles such as cars, trucks, and motorcycles, publictransportation vehicles such as busses, trains, and aircraft, emergencyvehicles such as fire trucks and ambulances, and many other types ofvehicles.”

However, none of these solutions solve all of the problems associatedwith mesh networks. Thus, it would be desirable to solve some of theproblems associated with mesh networks.

SUMMARY OF THE INVENTION

In accordance with preferred embodiments of the present invention, someof the problems associated with sensor networks are overcome. A methodand system for dynamic information exchange on location aware meshnetwork devices is provided

The dynamic information exchange includes allowing a mesh network deviceto communicate location information with a network device atpre-determined physical location and invite social contacts of the meshnetwork device to come to the pre-determined physical location. Thenetwork device sends various types of electronic messages (e.g., textmessage, e-mail, etc.) on a mesh network and/or a non-meshcommunications network (e.g., the Internet, etc.) and to socialnetworking sites. The dynamic information exchange also includesexchanging plural activity messages including a security identificationauthorization message for allowing access to a secure area, a buildingmanagement message for automatically and dynamically managing heating,ventilation and/or air conditioning (HVAC) and/or an emergency locationmessage for providing three-dimensional (3D) emergency locationinformation.

The foregoing and other features and advantages of preferred embodimentsof the present invention will be more readily apparent from thefollowing detailed description. The detailed description proceeds withreferences to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the present invention are described withreference to the following drawings, wherein:

FIG. 1 is a block diagram of an exemplary mesh network;

FIG. 2 is a block diagram of an exemplary hardware architecture for anmesh network device;

FIG. 3A is a block diagram illustrating a specific exemplaryimplementation of the mesh network device of FIG. 2;

FIG. 3B is a block diagram illustrating a specific exemplaryimplementation of the mesh network device of FIG. 3A;

FIG. 4 is a flow diagram illustrating a method for mesh networking;

FIG. 5 is a block diagram illustrating an N-way mesh network formedusing the mesh network device of FIG. 2; and

FIG. 6 is a flow diagram illustrating a method for dynamic informationinterchange for mesh network devices;

FIG. 7 is a block diagram illustrating a data flow for dynamicinformation interchange for mesh network devices;

FIG. 8 is a flow diagram illustrating a method for enabling dynamicinformation interchange for mesh network devices;

FIGS. 9A and 9B are a flow diagram illustrating a method for dynamicinformation interchange for location aware mesh network devices;

FIGS. 10A and 10B are a flow diagram illustrating a method for dynamicinformation interchange for location aware mesh network devices;

FIG. 11A is a block diagram illustrating a mesh activity message forentering a secure area;

FIG. 11B is a block diagram illustrating a mesh activity message forautomatically and dynamically managing HVAC; and

FIG. 11C is a block diagram illustrating a mesh activity message forproviding 3D emergency location information.

DETAILED DESCRIPTION OF THE INVENTION Exemplary Mesh Network System

Mesh networking is a type of networking wherein each node in the meshnetwork may act as an independent gateway/router/switch, regardless ofwhether it is connected to another communications network or not. Itallows for continuous connections, disconnections and reconfigurationsuntil a desired destination is reached. Mesh networks differ from othercommunications networks (e.g., the Internet, an intranet, the PublicSwitch Telephone Network (PSTN), a data network (e.g., TransmissionControl Protocol (TCP)/Internet Protocol (IP), etc.) in that componentparts can all connect to each other via multiple hops. Mesh networks arealso considered as one type of ad hoc network. Mesh networks areself-healing: the network can still operate when one node breaks down ora connection goes bad. As a result, the network may typically be veryreliable, as there is often more than one path between a source and adestination in the network.

One advantage of wireless mesh networks—as opposed to wired or fixedwireless non-mesh networks—is that they are truly wireless. Mosttraditional “wireless” access points still need to be wired to anothernon-mesh communications network to broadcast their wireless signal. Forlarge wireless communications network wire cables need to be buried inceilings and walls and throughout public areas. In a wireless meshnetwork, only one mesh node needs to be physically wired to a networkconnection like a DSL or cable modem. That one wired node then sharesits Internet connection wirelessly with all other mesh nodes in itsvicinity. Those mesh nodes then share the connection wirelessly with thenodes closest to them. The more nodes, the further the connectionspreads, creating a wireless mesh “cloud of connectivity” that can servea small area or a city of millions.

FIG. 1 is a block diagram of an exemplary mesh network 10. A meshnetwork is a short range local area network (LAN) that employs one oftwo connection arrangements, “full mesh topology” or “partial meshtopology.” In the full mesh topology 12, each node is a mesh networkdevice 14, 16, 18 is connected directly to each of the other meshnetwork device. In the partial mesh topology 20 some mesh networkdevices 22 are connected to all the others, but some of the mesh networkdevices 22 are connected only to those other mesh network devices 18with which they exchange the most data. The connections can be wired orwireless in a mesh network 12 or partial mesh 20 network topologies. Amesh network is reliable and offers redundancy. If one mesh node can nolonger operate, all the rest can still communicate with each other,directly or through one or more intermediate nodes. Mesh networks workwell when the nodes are located at scattered points that do not lie neara common line. The mesh network 12 and the partial mesh network 20includes both wireless 3 and wired mesh networks 5 and wireless 3 andwired partial mesh networks 5.

Some characteristics for mesh networks 12 or partial-mesh networks 20include a network infrastructure that is decentralized, avoids a centralpoint of failure and control, is cost effective and be maintained andexpanded locally. A mesh network 12 or partial mesh network 20 includesmany-to-many connections and is capable of dynamically updating andoptimizing these connections. The mesh networks 12 or partial-meshnetworks 20 include “mobile mesh networks” in which it is assumed thatone or more of the mesh network devices dynamically change geographicallocation over time. Such mesh network devices may continuously changegeographical location over time.

The mesh networks 12, 20 may also include embedded mesh network devicesthat form an “embedded mesh network.” An embedded mesh network istypically a component of a larger more complex mesh network. Industrialmachines, automobiles, medical equipment, cameras, household appliances,airplanes, vending machines, toys, etc. typically include embedded meshnetworks. For example, an automobile may include a first embedded meshnetwork for anti-lock braking, a second for monitoring and maintainingoil pressure, etc. An embedded mesh network is designed to run on itsown without intervention, responds to events (e.g., data collection,data transfer, etc.) in-real time and provides data to the larger morecomplex network.

The plural mesh network devices 14, 16, 18, 22 include, but are notlimited to, multimedia capable desktop and laptop computers, facsimilemachines, mobile phones, non-mobile phones, Internet phones, Internetappliances, personal digital/data assistants (PDA), two-way pagers,digital cameras, cable television set-top boxes, digital televisionsincluding high definition television (HDTV) and other types of networkdevices. The plural mesh network devices 14, 16, 18, 22 also includeembedded mesh network devices.

The plural mesh network devices 14, 16, 18, 22 may also include meshnetwork tags and/or sensors and/or biometrics. A mesh network sensor isa device that receives and responds to a signal or stimulus. For examplea mesh network sensor may be used to measure a physical quantity such astemperature, pressure, sound, etc. and convert it into an electronicsignal (e.g., digital data, digital signal, etc.). A mesh network sensormay also measure an electrical quantity (e.g., a radio signal, RadioFrequency IDentification signal (RFID) signal, etc.) and convert it intoanother electronic signal.

As is known in the art, an “RFID tag” is an object that can be appliedto or incorporated into a product, animal, or person for the purpose ofidentification and/or tracking using RF signals.

As is known in the art, an “RFID sensor” is a device that measures aphysical quantity and converts it into an RF signal which can be read byan observer or by an instrument (e.g., RFID controller/RFID portalserver network device, etc.)

As is known in the art, a “biometric” is method for uniquely recognizinghumans or non-human entities based upon one or more intrinsic physicalor behavioral traits. Thus, an RFID biometric tag is an object that canbe applied to or incorporated on or into a human or animal for thepurpose of identification.

The plural mesh network devices 14, 16, 18, 22 may be used for uniqueidentity identification via voice, biometrics, supply chain management,medical, for Data, Information and Knowledge (DIaK) sensors and sensortracking extended services such as those used as part of capabilitiesoffered by Integrated Systems Health Management (ISHM) and for otherapplications.

The architecture plural mesh network devices 14, 16, 18, 22 brings arich set of state-of the-art capabilities to support ISHM systems forsensing, processing, control, and distribution. Such devices enable amesh network, a mesh sensor network or other sensor network tosignificantly to increase capabilities for improved identification andtracking, data sharing, information dissemination, online dataprocessing, automated feature extraction, data fusion, and parallel anddistributed computing functions.

In one embodiment, the mesh network sensor is a simple device thatincludes an electrical circuit and a wired or wireless transceiver. Inanother embodiment, the mesh network sensor is a complex device (e.g.,computer, PDA, mobile phone, etc.) including additional sensorfunctionality.

The plural network devices 14, 16, 18, 22 include one or more of a wiredinterface and/or a wireless interface used to connect to a mesh network12 or partial mesh network 20 to provide voice, video and datacommunications.

The plural network devices 14, 16, 18, 22 include one or more of a wiredinterface and/or a wireless interface used to connect to non-meshcommunications network 23 to provide voice, video and datacommunications such as the Internet, an intranet, the Public SwitchTelephone Network (PSTN), etc. The non-mesh network communicationsnetwork 23 has a non-mesh architecture based on the Open SystemInterconnection (OSI) model, Internet Protocol suite model, or otherconventional non-mesh networking models.

The non-mesh communications network 23 may include one or more gateways,routers, bridges or switches As is known in the art, a gateway connectscomputer networks using different network protocols and/or operating atdifferent transmission capacities. A router receives transmittedmessages and forwards them to their correct destinations over the mostefficient available route. A bridge is a device that connects networksusing the same communications protocols so that information can bepassed from one network device to another. A switch is a device thatconnects communications paths for voice, video and data streams.

The non-mesh communications network 23 may include one or more servernetwork devices 25 (one of which is illustrated) and one or moreweb-sites accessible by users to send and receive information. The oneor more servers 25, may also include one or more associated databases25′ for storing electronic information.

Preferred embodiments of the present invention include mesh networkdevices, non-mesh network devices and wired and wireless interfaces thatare compliant with all or part of standards proposed by the Institute ofElectrical and Electronic Engineers (IEEE), InternationalTelecommunications Union-Telecommunication Standardization Sector (ITU),European Telecommunications Standards Institute (ETSI), InternetEngineering Task Force (IETF), U.S. National Institute of SecurityTechnology (NIST), American National Standard Institute (ANSI), WirelessApplication Protocol (WAP) Forum, Bluetooth Forum, or the ADSL Forum.However, network devices based on other standards could also be used.IEEE standards can be found on the World Wide Web at the UniversalResource Locator (URL) “www.ieee.org.” The ITU, (formerly known as theCCITT) standards can be found at the URL “www.itu.ch.” ETSI standardscan be found at the URL “www.etsi.org.” IETF standards can be found atthe URL “www.ietf.org.” The NIST standards can be found at the URL“www.nist.gov.” The ANSI standards can be found at the URL“www.ansi.org.” Bluetooth Forum documents can be found at the URL“www.bluetooth.com.” WAP Forum documents can be found at the URL“www.wapforum.org.” ADSL Forum documents can be found at the URL“www.adsl.com.”

An operating environment for devices and interfaces of the presentinvention include a processing system with one or more high speedCentral Processing Unit(s) (CPU) or other processors and a memory. Inaccordance with the practices of persons skilled in the art of computerprogramming, the present invention is described below with reference toacts and symbolic representations of operations or instructions that areperformed by the processing system, unless indicated otherwise. Suchacts and operations or instructions are referred to as being“computer-executed,” “CPU executed” or “processor executed.”

It will be appreciated that acts and symbolically represented operationsor instructions include the manipulation of electrical signals by theCPU. An electrical system represents data bits which cause a resultingtransformation or reduction of the electrical signals, and themaintenance of data bits at memory locations in a memory system tothereby reconfigure or otherwise alter the CPU's operation, as well asother processing of signals. The memory locations where data bits aremaintained are physical locations that have particular electrical,magnetic, optical, or organic properties corresponding to the data bits.

The data bits may also be maintained on a computer readable mediumincluding magnetic disks, optical disks, organic memory, and any othervolatile (e.g., Random Access Memory (RAM)) or non-volatile (e.g.,Read-Only Memory (ROM)) mass storage system readable by the CPU. Thecomputer readable medium includes cooperating or interconnected computerreadable medium, which exist exclusively on the processing system or bedistributed among multiple interconnected processing systems that may belocal or remote to the processing system.

As is known in the art, the Open Systems Interconnection (OSI) referencemodel is a layered architecture that standardizes levels of service andtypes of interaction for computers exchanging information through acommunications network. The OSI reference model separates networkdevice-to-network device communications into seven protocol layers, orlevels, each building- and relying-upon the standards contained in thelevels below it. The OSI reference model includes fromlowest-to-highest, a physical, data-link, network, transport, session,presentation and application layer. The lowest of the seven layers dealssolely with hardware links; the highest deals with software interactionsat the application-program level.

In one embodiment of the present invention, the wired and wirelessinterfaces include wired and wireless interfaces and correspondingnetworking protocols for wired connections to the non-meshcommunications network 23 including, a Public Switched Telephone Network(PSTN) or a cable television network (CATV) including HDTV that connectthe network devices 14, 16, 18, 22 via one or more twisted pairs ofcopper wires, digital subscriber lines (e.g. DSL, ADSL, VDSL, etc.)coaxial cable, fiber optic cable, other connection media or other wiredconnection interfaces. The PSTN is any public switched telephone networkprovided by AT&T, GTE, Sprint, MCI, SBC, Verizon and others.

The non-mesh communications network 23 may also include a paging andwireless messaging network, a wireless cellular telephone network, aPacket Cellular Network (PCN), Global System for Mobile Communications,(GSM), Generic Packet Radio Services (GPRS), network/PersonalCommunications Services network (PCS), a Cellular Digital Packet Data(CDPD), Wireless Application Protocol (WAP), Digital Audio Broadcasting(DAB) network, Transmission Control Protocol (TCP)/User DatagramProtocol (UDP)/Internet Protocol (IP) network, Voice over IP (VoIPnetwork or other types of network.

The wireless cellular telephone network includes, but is not limited toCode Division Multiple Access (CDMA), Time Division Multiple Access(TDMA), or other wireless technologies.

As is known in the art, PCS networks include network that cover a rangeof wireless, digital communications technologies and services, includingcordless phones, mobile phones, voice mail, paging, faxing, mobilepersonal digital/data assistants (PDAs), etc. PCS devices are typicallydivided into narrowband and broadband categories.

Narrowband devices, which operates in the 900 MHz band of frequencies,typically provide paging, data messaging, faxing, and one- and two-wayelectronic messaging capabilities. Broadband devices, which operate inthe 1850 MHz to 1990 MHz range typically provide two-way voice, data,and video communications. Other wireless technologies such as GSM, CDMAand TDMA are typically included in the PCS category.

As is known in the art, GSM is another type of digital wirelesstechnology widely used throughout Europe, in Australia, India, Africa,Asia, and the Middle East. GSM is gaining popularity in the UnitedStates. GSM is a wireless platform based on TDMA to digitize data. GSMincludes not only telephony and Short Message Services (SMS) but alsovoice mail, call forwarding, fax, caller ID, Internet access, ande-mail.

As is known in the art, SMS is type of communications service thatenables a user to allow private message communications with anotheruser. GSM typically operates at three frequency ranges: 900 MHz (GSM900) in Europe, Asia and most of the rest of the world; 1800 MHz (GSM1800 or DCS 1800 or DCS) in a few European countries; and 1900 MHz (GSM1900 also called PCS 1900 or PCS) in the United States. GSM alsooperates in a dual-band mode including 900/1800 Mhz and a tri-band modeinclude 900/1800/1900 Mhz.

As is known in the art, GPRS is a standard for wireless communications,which runs at speeds up to 150 kilo-bits-per-second (“kbit/s”). GPRS,which supports a wide range of bandwidths is an efficient use of limitedbandwidth and is particularly suited for sending and receiving smallbursts of data such as e-mail and Web browsing, as well as large volumesof data.

As is known in the art, CDPD is a wireless standard providing two-way,19.2-Kbps or higher packet data transmission over existing cellulartelephone channels. As is known in the art, a Packet Cellular Network(PCN) includes various types of packetized cellular data.

In one embodiment, of the invention, the wireless interfaces includeWPAN wireless personal area network (WPAN) interfaces. As is known inthe art, a WPAN is a personal area network for interconnecting devicescentered around an individual person's devices in which the connectionsare wireless. A WPAN interconnects all the ordinary computing andcommunicating devices that a person has on their desk (e.g. computer,etc.) or carry with them (e.g., PDA, mobile phone, two-way pager, etc.)

Typically, a wireless personal area network uses some technology thatpermits communication only within about 10 meters. One such technologyis “Bluetooth.” Another such technology is “Zigbee.”

A key concept in WPAN technology is known as “plugging in.” In the idealscenario, when any two WPAN-equipped devices come into close proximity(within several meters of each other) or within a few kilometers of acentral server (not illustrated), they can communicate via wirelesscommunications as if connected by a cable. WPAN devices can also lockout other devices selectively, preventing needless interference orunauthorized access to secure information.

In one embodiment of the present invention, the wireless interfacesinclude but are not limited to, an IEEE 802.11a, 802.11b, 802.11g,802.11n, 802.15.4 (ZigBee), 802.16a, 802.16 g, “Wireless Fidelity”(WiFi), “Worldwide Interoperability for Microwave Access” (WiMAX), ETSIHigh Performance Radio Metropolitan Area Network (HIPERMAN) “RF Home,”or other types of wireless interfaces. However, the present invention isnot limited to such wireless interface and other types of wirelessinterfaces can also be used.

In another embodiment of the present invention, the wireless meshnetwork device 14, 16, 18, 22 includes a wireless sensor device thatcomprises an integral or separate Bluetooth and/or infra dataassociation (IrDA) module for wireless Bluetooth or wireless infraredcommunications.

As is known in the art, an 802.11b is a short-range wireless networkstandard. The IEEE 802.11b standard defines wireless interfaces thatprovide up to 11 Mbps wireless data transmission to and from wirelessdevices over short ranges. 802.11a is an extension of the 802.11b andcan deliver speeds up to 54M bps. 802.11g deliver speeds on par with802.11a. However, other 802.11xx interfaces can also be used and thepresent invention is not limited to the 802.11 protocols defined. TheIEEE 802.11a, 802.11b and 802.11g standards are incorporated herein byreference.

As is known in the art, WiFi is a type of 802.11xx interface, whether802.11b, 802.11a, dual-band, etc. WiFi devices include an RF interfacessuch as 2.4 GHz for 802.11b or 802.11g and 5 GHz for 802.11a. Moreinformation on Wi-Fi can be found at the URL “www.weca.net.”

As is known in the art, 802.15.4 (Zigbee) is low data rate networkstandard used for mesh network devices such as sensors, interactivetoys, smart badges, remote controls, and home automation. The 802.15.4standard provides data rates of 250 kbps, 40 kbps, and 20 kbps, twoaddressing modes; 16-bit short and 64-bit IEEE addressing, support forcritical latency devices, such as joysticks, Carrier Sense MultipleAccess/Collision Avoidance, (CSMA-CA) channel access, automatic networkestablishment by a coordinator, fully handshaked protocol for transferreliability, power management to ensure low power consumption formulti-month to multi-year battery usage and up to 16 channels in the 2.4GHz Industrial, Scientific and Medical (ISM) band (Worldwide), 10channels in the 915 MHz (US) and one channel in the 868 MHz band(Europe). The IEEE 802.15.4-2003 standard is incorporated herein byreference. More information on 802.15.4 and ZigBee can be found at theURL “www.ieee802.org” and “www.zigbee.org” respectively.

As is known in the art, WiMAX is an industry trade organization formedby leading communications component and equipment companies to promoteand certify compatibility and interoperability of broadband wirelessaccess equipment that conforms to the IEEE 802.16XX and ETSI HIPERMAN.HIPERMAN is the European standard for metropolitan area networks (MAN).

The IEEE The 802.16a and 802.16 g standards are wireless MAN technologystandard that provides a wireless alternative to cable, DSL and T1/E1for last mile broadband access. It is also used as complimentarytechnology to connect IEEE 802.11XX hot spots to the Internet.

The IEEE 802.16a standard for 2-11 GHz is a wireless MAN technology thatprovides broadband wireless connectivity to fixed, portable and nomadicdevices. It provides up to 50-kilometers of service area range, allowsusers to get broadband connectivity without needing direct line of sightwith the base station, and provides total data rates of up to 280 Mbpsper base station, which is enough bandwidth to simultaneously supporthundreds of businesses with T1/E1-type connectivity and thousands ofhomes with DSL-type connectivity with a single base station. The IEEE802.16 g provides up to 100 Mbps.

The IEEE 802.16e standard is an extension to the approved IEEE802.16/16a/16g standard. The purpose of 802.16e is to add limitedmobility to the current standard which is designed for fixed operation.

The ESTI HIPERMAN standard is an interoperable broadband fixed wirelessaccess standard for systems operating at radio frequencies between 2 GHzand 11 GHz.

The IEEE 802.16a, 802.16e and 802.16 g standards are incorporated hereinby reference. More information on WiMAX can be found at the URL“www.wimaxforum.org.” WiMAX can be used to provide a WLP.

The ETSI HIPERMAN standards TR 101 031, TR 101 475, TR 101 493-1 throughTR 101 493-3, TR 101 761-1 through TR 101 761-4, TR 101 762, TR 101763-1 through TR 101 763-3 and TR 101 957 are incorporated herein byreference. More information on ETSI standards can be found at the URL“www.etsi.org.” ETSI HIPERMAN can be used to provide a WLP.

As is known in the art, Bluetooth is a short-range radio frequencytechnology aimed at simplifying communications among network devices andbetween network devices. Bluetooth wireless technology supports bothshort-range point-to-point and point-to-multipoint connections. TheBluetooth Specification, GL 11r02, March 2005, prepared by the BluetoothSIG, Inc. is incorporated herein by reference.

As is known in the art, IP is an addressing protocol designed to routetraffic within a network or between networks. For more information on IPsee IETF RFC-791 incorporated herein by reference.

TCP provides a connection-oriented, end-to-end reliable protocoldesigned to fit into a layered hierarchy of protocols that supportmulti-network applications. For more information on TCP see RFC-793,incorporated herein by reference.

UDP provides a connectionless mode of communications with datagrams inan interconnected set of networks. For more information on UDP see ITEFRFC-768 incorporated herein by reference.

As is known in the art, VoIP is a set of facilities for managing thedelivery of voice information using IP packets. In general, VoIP is usedto send voice information in digital form in discrete data packets(i.e., IP packets) over data networks rather than using traditionalcircuit-switched protocols used on the PSTN. VoIP is used on bothwireless and wired data networks.

VoIP typically comprises several applications (e.g., Session InitiationProtocol (SIP), Service Location Protocol (SLP), H.323, H.324, DomainName System (DNS), Authentication Authorization and Accounting (AAA),codecs (G.7xx), etc.) that convert a voice signal into a stream ofpackets (e.g., IP packets) on a packet network and back again. VoIPallows voice signals to travel over a stream of data packets over acommunications network.

Security and Encryption

Devices and interfaces (e.g., security interface 46) of the presentinvention include plural security and/or encryption methods for securecommunications. Wireless Encryption Protocol (WEP) (also called “WiredEquivalent Privacy) is a security protocol for WiLANs defined in theIEEE 802.11b standard. WEP is cryptographic privacy algorithm, based onthe Rivest Cipher 4 (RC4) encryption engine, used to provideconfidentiality for 802.11b wireless data.

As is known in the art, RC4 is cipher designed by RSA Data Security,Inc. of Bedford, Mass., which can accept encryption keys of arbitrarylength, and is essentially a pseudo random number generator with anoutput of the generator being XORed with a data stream to produceencrypted data.

One problem with WEP is that it is used at the two lowest layers of theOSI model, the physical layer and the data link layer, therefore, itdoes not offer end-to-end security. One another problem with WEP is thatits encryption keys are static rather than dynamic. To update WEPencryption keys, an individual has to manually update a WEP key. WEPalso typically uses 40-bit static keys for encryption and thus provides“weak encryption,” making a WEP device a target of hackers.

The IEEE 802.11 Working Group is working on a security upgrade for the802.11 standard called “802.11i.” This supplemental draft standard isintended to improve WiLAN security. It describes the encryptedtransmission of data between systems 802.11x WiLANs. It also defines newencryption key protocols including the Temporal Key Integrity Protocol(TKIP). The IEEE 802.11i draft standard, version 4, completed Jun. 6,2003, is incorporated herein by reference.

The 802.11i is based on 802.1x port-based authentication for user anddevice authentication. The 802.11i standard includes two maindevelopments: Wireless or Wi-Fi Protected Access (WPA) and RobustSecurity Network (RSN).

WPA uses the same RC4 underlying encryption algorithm as WEP. However,WPA uses TKIP to improve security of keys used with WEP. WPA keys arederived and rotated more often than WEP keys and thus provide additionalsecurity. WPA also adds a message-integrity-check function to preventpacket forgeries.

RSN uses dynamic negotiation of authentication and selectable encryptionalgorithms between wireless access points and wireless devices. Theauthentication schemes proposed in the draft standard include ExtensibleAuthentication Protocol (EAP). One proposed encryption algorithm is anAdvanced Encryption Standard (AES) encryption algorithm.

Dynamic negotiation of authentication and encryption algorithms lets RSNevolve with the state of the art in security, adding algorithms toaddress new threats and continuing to provide the security necessary toprotect information that WiLANs carry.

The NIST developed a new encryption standard, the Advanced EncryptionStandard (AES) to keep government information secure. AES is intended tobe a stronger, more efficient successor to Triple Data EncryptionStandard (3DES). More information on NIST AES can be found at the URL“www.nist.gov/aes.”

As is known in the art, DES is a popular symmetric-key encryption methoddeveloped in 1975 and standardized by ANSI in 1981 as ANSI X.3.92, thecontents of which are incorporated herein by reference. As is known inthe art, 3DES is the encrypt-decrypt-encrypt (EDE) mode of the DEScipher algorithm. 3DES is defined in the ANSI standard, ANSI X9.52-1998,the contents of which are incorporated herein by reference. DES modes ofoperation are used in conjunction with the NIST Federal InformationProcessing Standard (FIPS) for data encryption (FIPS 46-3, October1999), the contents of which are incorporated herein by reference.

The NIST approved a FIPS for the AES, FIPS-197. This standard specified“Rijndael” encryption as a FIPS-approved symmetric encryption algorithmthat may be used by U.S. Government organizations (and others) toprotect sensitive information. The NIST FIPS-197 standard (AES FIPS PUB197, November 2001) is incorporated herein by reference.

The NIST approved a FIPS for U.S. Federal Government requirements forinformation technology products for sensitive but unclassified (SBU)communications. The NIST FIPS Security Requirements for CryptographicModules (FIPS PUB 140-2, May 2001) is incorporated herein by reference.

As is known in the art, RSA is a public key encryption system which canbe used both for encrypting messages and making digital signatures. Theletters RSA stand for the names of the inventors: Rivest, Shamir andAdleman. For more information on RSA, see U.S. Pat. No. 4,405,829, nowexpired, incorporated herein by reference.

As is known in the art, “hashing” is the transformation of a string ofcharacters into a usually shorter fixed-length value or key thatrepresents the original string. Hashing is used to index and retrieveitems in a database because it is faster to find the item using theshorter hashed key than to find it using the original value. It is alsoused in many encryption algorithms.

Secure Hash Algorithm (SHA), is used for computing a secure condensedrepresentation of a data message or a data file. When a message of anylength <2⁶⁴ bits is input, the SHA-1 produces a 160-bit output called a“message digest.” The message digest can then be input to other securitytechniques such as encryption, a Digital Signature Algorithm (DSA) andothers which generates or verifies a security mechanism for the message.SHA-512 outputs a 512-bit message digest. The Secure Hash Standard, FIPSPUB 180-1, Apr. 17, 1995, is incorporated herein by reference.

Message Digest-5 (MD-5) takes as input a message of arbitrary length andproduces as output a 128-bit “message digest” of the input. The MD5algorithm is intended for digital signature applications, where a largefile must be “compressed” in a secure manner before being encrypted witha private (secret) key under a public-key cryptosystem such as RSA. TheIETF RFC-1321, entitled “The MD5 Message-Digest Algorithm” isincorporated here by reference.

As is known in the art, providing a way to check the integrity ofinformation transmitted over or stored in an unreliable medium such as awireless network is a prime necessity in the world of open computing andcommunications. Mechanisms that provide such integrity check based on asecret key are called “message authentication codes” (MACS). Typically,message authentication codes are used between two parties that share asecret key in order to validate information transmitted between theseparties.

Keyed Hashing for Message Authentication Codes (HMAC), is a mechanismfor message authentication using cryptographic hash functions. HMAC isused with any iterative cryptographic hash function, e.g., MD5, SHA-1,SHA-512, etc. in combination with a secret shared key. The cryptographicstrength of HMAC depends on the properties of the underlying hashfunction. The IETF RFC-2101, entitled “HMAC: Keyed-Hashing for MessageAuthentication” is incorporated here by reference.

As is known in the art, an Electronic Code Book (ECB) is a mode ofoperation for a “block cipher,” with the characteristic that eachpossible block of plaintext has a defined corresponding cipher textvalue and vice versa. In other words, the same plaintext value willalways result in the same cipher text value. Electronic Code Book isused when a volume of plaintext is separated into several blocks ofdata, each of which is then encrypted independently of other blocks. TheElectronic Code Book has the ability to support a separate encryptionkey for each block type.

As is known in the art, Diffie and Hellman (DH) describe severaldifferent group methods for two parties to agree upon a shared secret insuch a way that the secret will be unavailable to eavesdroppers. Thissecret is then converted into various types of cryptographic keys. Alarge number of the variants of the DH method exist including ANSIX9.42. The IETF RFC-2631, entitled “Diffie-Hellman Key Agreement Method”is incorporated here by reference.

However, the present invention is not limited to the security orencryption techniques described and other security or encryptiontechniques can also be used.

As is known in the art, the HyperText Transport Protocol (HTTP) Secure(HTTPs), is a standard for encrypted communications on the World WideWeb. HTTPs is actually just HTTP over a Secure Sockets Layer (SSL). Formore information on HTTP, see IETF RFC-2616 incorporated herein byreference.

As is known in the art, the SSL protocol is a protocol layer which maybe placed between a reliable connection-oriented network layer protocol(e.g. TCP/IP) and the application protocol layer (e.g. HTTP). SSLprovides for secure communication between a source and destination byallowing mutual authentication, the use of digital signatures forintegrity, and encryption for privacy.

The SSL protocol is designed to support a range of choices for specificsecurity methods used for cryptography, message digests, and digitalsignatures. The security method are negotiated between the source anddestination at the start of establishing a protocol session. The SSL 2.0protocol specification, by Kipp E. B. Hickman, 1995 is incorporatedherein by reference. More information on SSL is available at the URL See“netscape.com/eng/security/SSL_(—)2.html.”

As is known in the art, Transport Layer Security (TLS) providescommunications privacy over the Internet. The protocol allowsclient/server applications to communicate over a transport layer (e.g.,TCP) in a way that is designed to prevent eavesdropping, tampering, ormessage forgery. For more information on TLS see IETF RFC-2246,incorporated herein by reference.

In one embodiment, the security functionality includes Cisco CompatibleEXtensions (CCX). CCX includes security specifications for makers of802.11xx wireless LAN chips for ensuring compliance with Cisco'sproprietary wireless security LAN protocols. As is known in the art,Cisco Systems, Inc. of San Jose, Calif. is supplier of networkinghardware and software, including router and security products.

Exemplary Mesh Network Device

FIG. 2 is a block diagram illustrating an exemplary mesh network devicearchitecture 24. The architecture 24 includes, but is not limited to, amesh network device 26 comprising a universal serial bus (USB) interface(I/F) 28, a selectable communications bit-interface (e.g., 16/32 bit)30, a flash memory 32, an erasable electronically programmable read onlymemory (EEPROM) 34, a first-in-first-out (FIFO) buffer 36, a data-linkchip 38 (e.g., Medium Access Control (MAC) chip, etc.), a basebandand/or ultra wideband transceiver (e.g., Zigbee, Bluetooth, WiFi, WiMax,etc.) 40, a wireless Radio Frequency (RF) antenna 42, a clock 44, and asecurity interface 46.

The EEPROM 34 may include one or more software modules used fornetworking (e.g., TCP/IP/UDP, etc.), security or for other purposes. Inone embodiment, the security interface 46 is not a separate hardwareinterface but includes one more software modules included in the EEPROM34 or in the flash memory 32.

As is known in the art, a “baseband” transceiver is a transceiver inwhich information is carried in digital form in one or more channels ona transmission medium. A baseband includes any frequency band on whichinformation is superimposed, whether or not a frequency band ismultiplexed and on which digital information can be sent on sub-bands.

In one embodiment, the mesh network device 26 further comprises anexternal power source 48 (e.g., via USB, etc.), an external flash memoryor external disk drive 50, an external wireless radio frequency (RF)front end 52 (e.g., a wireless RF antenna, etc.) and an external hostnetwork device 54 (e.g., computer, PDA, mobile phone, etc.). Theexternal flash or disk drive 50 includes, but is not limited to, aremovable device such as a Compact Flash (CF), Secure Digital Card (SD),Memory Stick (MS), Micro Drive, MultiMediaCard (MMC) xD-Picture Card(xD), SmartMedia (SM) card or other removable device. However, thepresent invention is not limited to this embodiment and more, fewer orother components can also be used to practice the invention.

In one embodiment, the mesh network device 26 includes ComplementaryCode Keying (CCK). As is known in the art, CCK is a modulation schemeused with wireless networks (WLANs) that employ the IEEE 802.11bspecification. A complementary code includes a pair of finite bitsequences of equal length, such that a number of pairs of identicalelements (e.g., one or zero) with any given separation in one sequenceare equal to a number of pairs of unlike elements having the sameseparation in the other sequence.

In one embodiment, the mesh network device 26 includes differentialquadrature phase shift keying (DQPSK). DQPSK modulates usingdifferential quaternary phase shift keying. DQPSK transmits onlydifferences between values of a phase of a sin wave, rather than a fullabsolute value. DQPSK makes use of two carrier signals, separated by90-degrees. The output is a baseband representation of the modulatedsignal.

In one embodiment, the mesh network device 26 includes differentialbinary phase shift keying (DBPSK). DBPSK modulates using thedifferential binary phase shift keying. DBPSK maps phase differences ofθ and π+θ, respectively, to outputs of zero and one, respectively, whereθ is a phase rotation parameter. The output is a baseband representationof the modulated signal.

In one embodiment, the mesh network device 26 includes Orthogonalfrequency division multiplexing (OFDM). OFDM is also called discretemulti-tone modulation (DMT) and is a transmission technique based uponthe idea of frequency-division multiplexing (FDM) where multiple signalsare sent out at different frequencies. OFDM uses a composite of narrowchannel bands to enhance its performance in high frequency bands (suchas 5.x GHz) in urban and rural applications where building clutter andfoliage can negatively impact the propagation of radio waves forwireless devices.

In one embodiment, the mesh network device 26 includes Carrier SenseMultiple Access/Collision Avoidance (CSMA/CA). CSMA/CA is a data-linklayer protocol used in the data-link chip 38 for carrier transmission in802.11xx networks. CSMA/CA acts to prevent collisions before theyhappen.

In one embodiment, the mesh network device 26 is an internal device to amesh network device 12, 14, 16, 22. In another embodiment, the meshnetwork device an external portable removable device as illustrated inFIG. 3. However, the present invention is not limited to such anembodiment and other embodiments can be used to practice the invention.

FIG. 3 is a block diagram illustrating an outer view 56 of a specificexemplary implementation 58 of the mesh network device 26 of FIG. 2.

FIG. 3B is a block diagram illustrating an inner view 59 specificexemplary implementation 58 of the mesh network device of FIG. 3A. Meshnetwork device 26 can be used as an embedded component in otherelectronic devices (e.g., mobile phone, PDA, smart phone, etc.) with orwithout the USB interface component 28.

In one embodiment, the mesh network device 58 further comprises a firstlight emitting diode (LED) 60 indicating when the mesh network device isconnected to a mesh network or partial mesh network and a second LED 62indicating whether the mesh network device is active. The mesh networkdevice 58 further includes a cover 64 for the USB interface 28.

In one specific exemplary embodiment, the mesh network device 58 iscalled “MOBEE®” and is a self-contained USB based-mesh network devicefor exchanging multimedia content between mesh network devices (e.g.,host devices, PC/Laptop/PDA/Smart Phone/Mobile/Smart Home devices, etc.)through a meshed mobile network to maximize communication portability.

In one embodiment, a mesh network device 26, 58 further includes a SmartTransducer Interface Modules (STIM) with an Ultra wideband transceiver(e.g., in a physical layer), a mesh network protocol adapter (e.g., in adata-link layer (e.g. MAC layer, with CCK, DBPSK, OFDM encoding etc.))and authentication and encryption software (e.g., in data-link layer).

Ultra-wideband (UWB) refers to a radio communications technique based ontransmitting very-short-duration pulses, often of duration of onlynanoseconds or less, whereby the occupied bandwidth goes to very largevalues.

In another embodiment, the mesh network device 58 includes a WirelessSensor Portal (WSP) with a Thin Film Transistor (TFT) high-resolutionuser graphic interface (GUI) 65 for displaying WSP information andsensor topology information and an Organizing Agent (OA). The OA managesthe WSP and TFT. The OA is also responsible for collecting andorganizing sensor data in a fashion that allows for a particular classof mesh network queries to be answered. However, the present inventionis not limited to these embodiments and other embodiments can also beused.

As is known in the art, a TFT is type of LCD flat panel display screenin which each pixel is controlled by one to four transistors. TFTdisplays are sometimes called active matrix Liquid Crystal Diodes(LCDs).

In one exemplary embodiment, the mesh network device 26, 58 is a tinydevice that integrates at least three elements together: (1) a wirelessbaseband module 40 such as 802.11g/b/a, 802.15.4 (ZigBee), Bluetooth,Ultra wideband 802.16x, (e.g., WiMAX, etc.) etc. (2) a flash memory 32;and (3) an external power source 46. The mesh network device 26, 58 mayfurther include an external removable memory module 48 such as a SecureDigital (SD) card, Pro Multimedia Card (MMC), Memory Stick (MS),Microdrive, XD card or other external storage cards. However, thepresent invention is not limited to this embodiment and more, fewer orother components can also be used to practice the invention.

In one embodiment the mesh network device 26, 58 includes at least thefeatures illustrated in Table 1. However, the present invention is notlimited to the features listed in Table 1 and more, fewer or othercomponents can also be used to practice the invention.

TABLE 1 Wireless module such as: IEEE802.11a/b/g, IEEE 802.15.4(ZigBee), Bluetooth, Ultra wideband, or IEEE 802.16 (WiMAX) Wireless +NAND Flash combo solution with external removable Flash memory such asSecure Digital (SD) card, Pro Multimedia Card (MMC), Memory Stick (MS),Microdrive, and XD. Mesh networking and WPAN software USB 2.0 interfaceand compatible with USB 1.1 IEEE 1394 TCP/IP/UDP Programmable wirelessRF interface High level security includes, but are not limited to,WEP64/128/256, WPA (HW TKIP support) and AES128. Auto-installationfunction Software wireless access point

In another embodiment, the specific implementation 58 of the meshnetwork of FIG. 3 includes at least the features illustrated in Table 2.However, the present invention is not limited to the features listed inTable 2 and more, fewer or other components can also be used to practicethe invention.

TABLE 2 Wireless Standards IEEE 802.11b/g, 802.15.4 Host Interface 28USB 2.0 Plug and Play Wireless Antenna Chip Antenna Connector 42Frequency Range 2.412 GHz-2.4835 GHz Number of Selectable USA, Canada:11 channels Channels Europe: 13 channels Asia (e.g, Japan): 14 channelsModulation Techniques Direct Sequence Spread Spectrum (CCK, DQPSK,DBPSK) Orthogonal frequency division multiplexing (OFDM) Security 4664/128/256 bit WEP, WPA, WPA2, CCX1.0, CCX2.0, 802.1x Data-Link 38Protocol CSMA/CA (Collision Avoidance) with acknowledgment Output RFPower 11g: 13 dBM 11b: 16 dBM Sensitivity −71 dBM@54 Mbps −84 dBM@11Mbps Data Rate 802.11g (54 Mbps, 48 Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12Mbps, 9 Mbps, 6 Mbps) 802.11b (11 Mbps, 5.5 Mpbs, 2 Mbps, 1 Mbps)Throughput 33 Mbps @ 11g + mode 24 Mbps @ 11g mode LEDs 58, 60 Link:Green Active: Green Weight 10 g Dimensions 71.5 mm(L) × 19 mm (W) × 9 mm(H) Power 48 Requirements Operating Voltage: 5 V DC Continuous TXCurrent: 350 mA @54 Mbps Continuous TX Current: 330 mA @11 MbpsContinuous RX Current: 245 mA Typical Current 240 mA

Exemplary Mesh Network Device Method of Use

FIG. 4 is a flow diagram illustrating a Method 66 for mobile meshnetworking. At Step 68, a first mobile mesh network device (e.g., 14)moves within a pre-determined distance of a second mobile mesh networkdevice (e.g., 16), wherein the second mobile mesh network device 16 isalso moving. At Step 70, mobile mesh network data is exchanged over asecure communications channel between the first mobile mesh network 14and the second mesh network device 16. At 72, the mesh network data isverified on the second mobile mesh network device. At Step 74, theverified mesh network data is distributed to other mesh network devices(e.g., 18), if any, on the mesh network 12, thereby creating an N-waymobile mesh network 12 between the plural network devices 14, 16, 18.

Method 66 is illustrated with an exemplary embodiment. However, thepresent invention is not limited to such and embodiment and otherembodiments can also be used to practice the invention. In such anexemplary embodiment at Step 68, a first mobile mesh network device(e.g., 14) moves within a pre-determined distance of a second mobilemesh network device (e.g., 16). The first mobile mesh network device 14and the second mobile mesh network device 16 include implementations 26,58 described above.

At Step 70, mesh network data is exchanged over a secure communicationschannel between the first mobile mesh network 14 and the second meshnetwork device 16 to create a mobile mesh network 12. The mesh networkdata includes, but is not limited to, routing data, spatial data, meshnetwork load data and other mesh network data.

At 72, the mesh network data is verified to the second mesh networkdevice 16. The verification includes verifying routing paths, spatialdata, mesh network load data and other mesh network data.

At Step 74, the verified mesh network device is distributed to othermesh network devices (e.g., 18), if any, on the mesh network 12, therebycreating an N-way mobile mesh network 12 between the plural networkdevices 14, 16, 18.

FIG. 5 is a block diagram 76 illustrating an N-way mesh network formedusing the mesh network device of FIG. 2. FIG. 5 illustrates twoadditional network devices including a television 78 and a laptopcomputer 80. The network devices 14, 16, 18, 22, 78, 80 in FIG. 5 areattached to the mesh network device 26 that is used to create an N-waymesh network. FIG. 5 illustrates a full mesh topology 12. However, themesh network devices 26,58 can also be used to form a partial meshtopology 20 (not illustrated in FIG. 4).

Wireless Mesh Sensor Networks

Wireless sensor networks provide distributed network and Internet accessto sensors, controls, and processors that are deeply embedded inequipment, facilities, and the environment. Wireless sensor networksprovide monitoring and control capability for applications intransportation, manufacturing, health care, environmental monitoring,and safety and security. Wireless sensor networks provide low powersignal processing, low power computation, and low power, low costwireless networking capability in a compact system. Wireless sensornetworks provide sensing, local control, and embedded intelligentsystems in structures, materials, and environments.

In one embodiment, the mesh network device 26, 56 is an embedded meshnetwork device. In such an embodiment, the mesh network device 26, 56 isembedded into a mobile telephone, PDA, hand-held gaming device, smartphone, RFID tag, and other portable/mobile electronic devices.

In another embodiment, the mesh network device 26, 56 is a wireless meshnetwork sensor to collect and monitor spatial data. In such anembodiment, the mesh network device 26, 56 may include only selectedones of the components illustrated in FIG. 2 to make the wireless meshsensor device simpler, smaller and less expensive.

Mesh sensor networks are used to determine spatial data including thelocation of objects. Location prediction is used to determine locationsof a spatial phenomenon from maps of other spatial features such asbuilding walls, natural phenomenon such as mountains, etc.

The method and system described herein also integrate wireless and wiredsensor data acquisition for distributed sensing and monitoring forexample, for rocket propulsion testing, agricultural efficiency, coastalmanagement, disaster management, ecological forecasting, energymanagement, homeland security, and detecting ice accretion and detectionof emissions, air quality, other data sensed around specificenvironments and other applications.

The method and apparatus described herein can be used for at least theseexemplary applications: (1) Sensing and monitoring for Aircraft—icing onwings—data from heaters and sensors; (2) Aircraft emissions—collectionof data around airports; (3) Verification and validation of equipment(e.g., Radio Frequency Identifiers “RFID”); and (4)Security—geo-location and personal location. However, the presentinvention is not limited to these applications and the present inventioncan be applied to other applications.

The method and apparatus described herein may provide at least thefollowing advantages: (1) Spatial data is Extremely Difficult toIntercept—Wideband pulsed radar spreads the signal and allows more usersaccess to a limited amount of scarce frequency spectrum, thus allowingspectrum reuse; (2) Multipath Immunity—A low path loss and low energydensity minimizes interference to other services. UWB is very tolerantof interference, enabling operation within buildings, urban areas, andforests; (3) Precision Network-wide timing—Real-time, continuousposition location down to a centimeter of resolution results inprecision geolocation systems (4) Low Cost—Requires minimal componentsresulting in small size and weight; (5) Low Power—Typical consumption isin microwatts; and (6) Antennas—Can be very small (2 cm) because theyare non-resonant.

Mesh Network Device Dynamic Information Exchange

FIG. 6 is a flow diagram illustrating a Method 78 for dynamicinformation interchange for mesh network devices. At Step 80, a firstset of profile information is received on a first mesh network device.At Step 82, a wireless signal is periodically sent from the firstnetwork device to a mesh network including plural other mesh networkdevices including other sets of profile information. At Step 84, one ormore wireless signals from the plural other mesh network devices on themesh network are received on the first mesh network device. The one ormore wireless signals include other sets of profile information storedon the plural of other mesh network devices. At Step 86, a test isconducted to determine from the received one or more wireless signalswhether any items in first set of profile information on the firstnetwork device match any items in other sets of profile informationstored on the plural other mesh network devices. At Step 88, if anyprofile items match, a set of data is exchanged between the firstnetwork device and the one or more other mesh network devices via themesh network.

Method 78 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 80, the mesh network device 56is equipped with a short-range wireless module and flash memory as isillustrated in FIGS. 2 and 3. In another embodiment, the small meshnetwork device is embedded within an audio player (e.g., MP3 player,etc.) or other popular handheld devices.

At Step 80, the user profile information 91, 91′ (FIG. 7) includes, butis not limited to, an e-mail address, an IP address, a hardware address(e.g., Medium Access Control (MAC) address, etc.), a URL, a name, anaddress, an telephone number, an instant message identifier, a textmessage identifier, a encryption key, a digital signature, a securemessage digest, a security identifier, a mesh network identifier orother types of profile information such as advertisements, public oremergency notices, location specific information includinglocation-aware information and/or physical location information (e.g.,Global Positioning Satellite (GPS) information, street addressinformation, two-dimensional (2D) (e.g., X,Y) (e.g., building, floor),three-dimensional (3D) (X, Y, Z) (e.g., building, floor, floor location)or other physical location information. However, the present inventionis not limited to such profile information and other profile informationcan also be used.

At Step 80, a user profile 91 is entered or edited through a templatestored on the mesh network device 56 or via a web-site on a server onthe mesh network 12 or on another public or private network such as theInternet or an intranet. The user profile 91 is saved to the first meshnetwork device 56 via USB connection. Personal information is stored inthe flash 32. The user of the mesh network device selects one, severalor all of the items in the user profile to match to user profiles inother mesh network devices. The profile information may also be enteredthrough the display 66.

At Step 82, a wireless signal is periodically sent out via the wirelessantenna 42 periodically to the mesh network 12. (e.g., sent out to othermesh network devices up to 10 meters away).

The user profile includes virtually any type of information such as,gender, age, Looking for . . . , Hobby, e-mail address, home address,home telephone number, work information, advertising, etc.

At Step 84, one or more wireless signals from the plural other meshnetwork devices 56′, 56″ on the mesh network 12 are received on thefirst mesh network device 56. The one or more wireless signals includeother sets of profile information stored on the plural of other meshnetwork devices 56′, 56″.

At Step 86, a test is conducted to determine if the first set of profileinformation matches any other sets of profile information stored onother mesh network devices 56′, 56″, and if so, the first mesh networkdevice 56 exchanges a set of data with the one or more other meshnetwork devices 56′, 56″.

At Step 88, when a mesh network device 56′ 56″, etc. matches anyselected information (one, several, all items) in the first mesh networkdevice 56, data is dynamically exchanged wirelessly and stored on eachother's Flash memory in the mesh network devices. In one embodiment, thedata is securely exchanged using a pre-determined security and/orencryption method.

The received data is retrievable via display 66, a computer or otherinterface (e.g., web-site page, etc.). The data dynamically exchangeincludes one, several or all items stored in the profile and/or othertypes of data stored on the mesh network devices. For example, a user ofthe first mesh network device 26, 56, may wish to dynamically exchangeaudio files such as MP3 files, etc. with a friend's mesh network device26′, 56′. At Step 88, the two mesh user devices 26, 56 and 26′ and 56′may exchange MP3 files based on a set of designated e-mail addresses(e.g., the first user's and the friend's e-mail, etc.).

As is known in the art Motion Picture Expert Group (MPEG) Audio Layer 3,more commonly referred to as “MP3,” is a popular encoding format foraudio information.

In such an example both the user profile on the first mesh networkdevice 26, 56 and the friend's mesh network device 26′, 56′ may includeboth e-mail addresses. In another embodiment, the user profiles may onlyinclude one designated e-mail address (e.g., the e-mail address of theuser of the first mesh network device, etc.).

FIG. 7 is a block diagram illustrating a data flow 90 for dynamicinformation interchange for mesh network devices using Method 78.

FIG. 8 is a flow diagram illustrating a Method 90 for enabling dynamicinformation interchange for mesh network devices. At Step 92, a userprofile template is activated on a first mesh network device. At Step94, plural profile information items are received on the first networkdevice for the profile template. At Step 96, the profile information inthe profile template is stored in non-volatile storage on the first meshnetwork device. At Step 98, a wireless signal including the storedprofile information is periodically broadcast from the first meshnetwork device to plural other mesh network devices on a mesh network.The stored profile information allows the first mesh network device toexchange data with one or more of the plural other mesh network deviceson the mesh network whose stored profile information that matches any ofstored profile information of the first mesh network device.

Method 90 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 92, a user profile template 91is activated on a first mesh network device 26, 56. In one embodimentthe user profile template 91 is activated when a user plugs the meshnetwork device 26, 56 in a USB port on a computer or other device. Insuch an embodiment, flash 32 or EEPROM 34 includes a URL to allow thefirst mesh network device to obtain a profile template. The URL is usedto access the user profile template 91 at another location on the meshnetwork 12. In such an embodiment, a user is directed via the URL to auser login page or web page from which the user is allowed to obtain,view and fill a profile template 91.

In another embodiment, at Step 92 the user profile template 91 is storeddirectly in flash 32 or EEPROM 34 of the first mesh network device 26,56 and is activated as part of an initialization sequence for the firstmesh network device 26, 56. In such an embodiment, the profile templatecan be re-activated at a later time to change profile items.

In one embodiment, the profile template is securely stored using apre-determined security and/or encryption method.

In either embodiment, the profile items can be viewed via display 65 orvia host 54 (e.g., a user computer via a USB port, etc).

At Step 94, plural profile information items are received on the firstnetwork device 26, 56 for the user profile template 91.

At Step 96, the profile information in the user profile template 91 isstored in non-volatile storage (e.g., flash 32, etc.) on the first meshnetwork device 26, 56. The profile information may also be stored inother devices (e.g., a mesh network server) on other locations on themesh network 12. For example, if the profile template was activated viaa URL, the profile template items may also be stored on the deviceidentified by the URL.

At Step 98, a wireless signal including the stored profile informationis periodically broadcast from the first mesh network device 26, 56 toplural other mesh network devices 56′, 56″ on the mesh network 12. Thestored profile information allows the first mesh network device toexchange data with one or more of the plural other mesh network deviceson the mesh network whose stored profile information that matches any ofstored profile information of the first mesh network device using Method78 and other methods.

Social Networking Mesh Network Device Dynamic Information Exchange

FIGS. 9A and 9B are a flow diagram illustrating a Method 100 for dynamicinformation interchange for location aware mesh network devices. In FIG.9A at Step 102, a wireless message including a first set of profileinformation is received from a first mesh network device with one ormore processors on a second network device with one or more processorsover a wireless mesh network. The first mesh network device includes anultra wideband wireless transceiver and a mesh network protocol adapterwith Complementary Code Keying (CCK), Differential Quaternary PhaseShift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing(OFDM) encoders. The second network device resides at a pre-determinedphysical location. At Step 104, The second network device obtains fromthe first set of profile information in the received wireless message alist of electronic identifiers for plural designated social contacts ofan owner of the first mesh network device, wherein each of the pluraldesignated social contacts include one or more electronic identifiersfor one or more designated social contact network devices or one moresocial networking web-sites. At Step 106, a first set of pluraldifferent types of wireless or wired communications messages are sentfrom the second network device over the wireless mesh network or a wiredmesh network to selected ones of the one or more designed social contactnetwork devices indicating the first message network device isphysically located at a pre-determined distance from the pre-determinedphysical location of the second network device. The first set of theplurality of types of wireless and wired communications messages includean invitation message to join the owner of the first message networkdevice at the pre-determined physical location of the second networkdevice. In FIG. 9B at Step 108, a second set of a plural different typesof wireless or wired communications messages are sent from the secondnetwork device to other selected ones of the one or more designedlocation contact network devices and to one more social networkingweb-sites over the non-mesh communications network indicating the firstmessage network device is physically located at the pre-determineddistance from pre-determined physical location of the second networkdevice. The second set of plural types of wireless and wiredcommunications messages include an invitation message to join the ownerof the first message network device at the pre-determined physicallocation of the second network device.

Method 100 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment in FIG. 9A at Step 102, a wirelessmessage including a first set of profile information 91 is received froma first mesh network device (e.g., 14, 26, 56, etc.) with one or moreprocessors on a second network device 25 with one or more processorsover a wireless mesh network 12. The first mesh network device 14, 26,56 includes an ultra wideband wireless transceiver 40 and a mesh networkprotocol adapter with Complementary Code Keying (CCK), DifferentialQuaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency DivisionMultiplexing (OFDM) encoders (Table 1 and 2, etc.).

The second network device resides at a pre-determined physical location.For example, the second network device may be a wireless access point ata coffee shop, retail store, bar, restaurant, park, health club,recreational facility, etc.

In one embodiment, the ultra-wideband wireless transceiver 40 includes a(WiMAX) wireless transceiver. In another embodiment, the first meshnetwork device 14, 26, 56 includes a baseband wireless transceiver 40.However, the present invention is not limited to the wirelesstransceivers described and other wireless transceivers can also be usedto practice the invention.

In one embodiment, first mesh network device 14 includes a mobiletelephone, personal digital/data assistant (PDA), smart phone, RadioFrequency IDentification (RFID) tag, RFID sensor or RFID biometric tagmesh network device or a the mesh network device 26, 56 is embedded intoanother non-mesh network device 16, 18, 22. However, the presentinvention is not limited to the mesh network devices described and othermesh network devices and other non-mesh network devices can also be usedto practice the invention.

In one embodiment, the second network device 25 includes a mesh ornon-mesh server network device, a gateway, router, switch, wired accesspoint, wireless access point or Radio Frequency IDentification (RFID)sensor portal, RFID tag portal, or RFID biometric tag portal networkdevice. The second network device 25 also includes a mesh network device14, 16, 18, 22, 26, 56, etc. However, the present invention is notlimited to the network devices described and other network devicesand/or mesh network devices and/or non-mesh network devices can also beused to practice the invention.

At Step 104, The second network device 25 obtains from the first set ofprofile information 91 in the received wireless message a list ofelectronic identifiers for plural designated social contacts of an ownerof the first mesh network device 14, 26, 56, wherein each of the pluraldesignated social contacts include one or more electronic identifiersfor one or more designated social contact network devices 16, 18, 22 orone more social networking web-sites 19 (e.g., FACEBOOK, U-TUBE,TWITTER, MYSPACE, MATCH.COM, E-HARMONY, etc.). The social networkingweb-sites include dating web-sites, blogs, RSS feeds, and other types ofinformation web-sites in which messages can be left or posted for avariety of activities. However, the present invention is not limited tothe social networking sites described and other public and privatesocial networking sites can also be used to practice the invention.

In one embodiment, the first set of profile information 91 includes ane-mail address, an Internet Protocol (IP) address, a hardware address, auniversal resource locator (URL), a name, a street address, a telephonenumber, an instant message identifier, a text message identifier, aencryption key, a digital signature, a secure message digest, a securityidentifier, a mesh network identifier, a physical location information,public or emergency notices or location specific information includinglocation-aware information or a social networking web-site loginidentifier However, the present invention is not limited to the firstset of profile information described and more fewer or other types ofprofile information 91 can also be used to practice the invention.

In one embodiment, the one or more electronic identifiers for one ormore designated location contact network devices include a telephonenumber, an e-mail identifier, an instant message identifier, a textmessage identifier, a multi-media identifier, a mesh network identifier,a Radio Frequency Identifier (RFID) identifier or a social networkingweb-site login identifier. However, the present invention is not limitedto the electronic identifiers described and other electronic identifierscan also be used to practice the invention.

At Step 106, a first set of plural different types of wireless or wiredcommunications messages are sent from the second network device 25 overthe wireless mesh network 3 or wired mesh network 5 to selected ones ofthe one or more designed social contact network devices 16, 18, 22indicating the first message network device 14 is physically located ata pre-determined distance 21 from the pre-determined physical locationof the second network device 25. The first set of the plurality of typesof wireless and wired communications messages include an invitationmessage to join the owner of the first message network device 14, 26, 56at the pre-determined physical location of the second network device 25.

For example, a user of a mesh network device 14, 26, 56, may be in closeproximity to other mesh network devices 16, 18, 22, etc. that form amesh network 12 or a partial mesh network 20 because of their closeproximity. Step 106 is used to send messages directly on the meshnetwork 12 or partial mesh network 20 without having to use a non-meshnetwork 25 (e.g., the Internet, etc.). This allows for much fastermessage sending and receiving than can be accomplished by accessing andusing a non-mesh network 25. The mesh network 12 and partial meshnetwork are ad hoc networks. Mesh network devices join and leave themesh network by moving in range and out of range of other mesh networkdevices.

In one embodiment, the first set of plural different types of wirelessor wired communications messages include text messages, instantmessages, multi-media messages, voice messages, RFID messages, socialnetworking site messages (e.g., FACEBOOK post, a TWITTER tweet, etc.)

For example, the first mesh network device 14, 26, 56 may be locatedinside a coffee shop within 250 feet of the second network device 25which may include a wireless access point, etc.

In FIG. 9B at Step 108, a second set of a plural different types ofwireless or wired communications messages are sent from the secondnetwork device 25 to other selected ones of the one or more designedsocial contact network devices 16, 18, 22 and to one more socialnetworking web-sites 19 over the non-mesh communications network 23indicating the first message network device 14 is physically located atthe pre-determined distance 21 from pre-determined physical location ofthe second network device 25. The second set of plural types of wirelessand wired communications messages include an invitation message to jointhe owner of the first message network device 14 at the pre-determinedphysical location of the second network device 25.

For example, there are likely mesh network devices and non-mesh networkdevices that are not on a mesh network 12 or partial mesh network 20that are included in the user profile information 91 associated with thefirst mesh network device 14, 26, 56. Such devices are contacted using anon-mesh network 23 such as the Internet, PSTN, an intranet, etc.

In one embodiment, if the second network device is successful using Step106 to contact a designated social contact network device, then Step 108is not executed.

In another embodiment, both step 106 and 108 are executed to ensure alldesignate social contact network devices are contacted on mesh networksand non-mesh networks.

In one embodiment, the first set and second set of the plural differenttypes of wireless communications messages include an IEEE 802.15.4(ZigBee), IEEE 802.11a, 802.11b, 802.11g, 802.11n, 802.16a, 802.16 g,Bluetooth or Infrared wireless protocol communications messages.However, the present invention is not limited to the wirelesscommunications messages described and more, fewer or other types ofwireless communications messages can also be used to practice theinvention.

Activity Event Mesh Network Device Dynamic Information Exchange

FIGS. 10A and 10B are a flow diagram illustrating a Method 110 fordynamic information interchange for location aware mesh network devices.In FIG. 10A at Step 112, a selected type of wireless communicationsmessage from a first set of plural wireless activity messages is sentover a wireless mesh network or a wireless non-mesh communicationsnetwork from a first mesh network device with one or more processors toa second network device with one or more processors located at apre-determined physical location. The first mesh network device includesan ultra wideband wireless transceiver and a mesh network protocoladapter with Complementary Code Keying (CCK), Differential QuaternaryPhase Shift Keying (DQPSK) or Orthogonal Frequency Division Multiplexing(OFDM) encoders. The first set of plural wireless activity messagesincludes: a first type of wireless activity message including a securityidentification authorization message to determine if the first meshnetwork device is allowed access to a secure area within apre-determined distance of the pre-determined physical location of thesecond network device, a second type of wireless activity messageincluding a building management message to dynamically and automaticallymanage heating, ventilation or air conditioning (HVAC) of an area withthe pre-determined distance of the pre-determined physical location ofthe second network device, or a third type of wireless activity messageincluding a emergency location information message that includesphysical location information to dynamically and automatically locatethe first mesh network device at a three dimensional (3D) physicallocation in the building at the pre-determined physical location of thesecond network device in the event of an emergency situation. At Step114, the first mesh network device receives over the wireless meshnetwork or the wireless non-mesh communications network from the secondnetwork device a request for a first set of profile information storedon the first mesh network device in response to sending the selectedtype of wireless communications message. At Step 116, the first set ofprofile information is sent from the first mesh network device to thesecond network device over the wireless mesh network or the wirelessnon-mesh communications network. In FIG. 10B At Step 118, one or morewireless acknowledgement messages are received on the first mesh networkdevice from the second network device over the wireless mesh network orthe wireless non-mesh communications network indicating that the secondnetwork device has acknowledged the first mesh network device beingphysically located within the pre-determined distance of the physicallocation of the second network device.

FIG. 11A is a block diagram 120 illustrating a mesh activity message 122for entering a secure area 124.

FIG. 11B is a block diagram 126 illustrating a mesh activity message 128for automatically and dynamically managing HVAC 130.

FIG. 11C is a block diagram illustrating a mesh activity message 132 forproviding 3D emergency location information 134.

Method 110 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment in FIG. 10A at Step 112, selected typeof wireless communications message from a first set of plural wirelessactivity messages is sent over a wireless 3 mesh network 12 or awireless non-mesh communications network 23 from a first mesh networkdevice (e.g., 14, 26, 56, etc.) with one or more processors to a secondnetwork device 25 with one or more processors located at apre-determined physical location. The first mesh network device 14, 26,56 includes an ultra wideband wireless transceiver 40 and a mesh networkprotocol adapter with Complementary Code Keying (CCK), DifferentialQuaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency DivisionMultiplexing (OFDM) encoders.

The first set of plural wireless activity messages includes the firsttype of wireless activity message 122 (FIG. 11A) including a securityidentification authorization message to determine if the first meshnetwork device 14, 26, 56, is allowed access to a secure area 124 (e.g.,room, laboratory, building, etc.) within a pre-determined distance 21 ofthe pre-determined physical location of the second network device 25.

The first set of plural wireless activity messages further includes thesecond type of wireless activity message 128 (FIG. 11B) including abuilding management message to dynamically and automatically manageheating, ventilation or air conditioning (HVAC) 130 of an area with thepre-determined distance 21 of the pre-determined physical location ofthe second network device 25.

The first set of plural wireless activity messages further includes thethird type of wireless activity message 134 (FIG. 11C) including aemergency location information message that includes physical locationinformation to dynamically and automatically locate the first meshnetwork device 14, 26, 56 at a three dimensional (3D) physical location136 in the building at the pre-determined physical location of thesecond network device 25 in the event of an emergency situation.

Returning to FIG. 10A at Step 114, the first mesh network device 14, 26,56 receives over the wireless 3 mesh network 12 or the wireless non-meshcommunications network 23 from the second network device 25 a requestfor a first set of profile information stored on the first mesh networkdevice 14, 26, 56 in response to sending the selected type of wirelesscommunications message.

At Step 116, the first set of profile information is sent from the firstmesh network device 14, 26, 56 to the second network device 25 over thewireless 3 mesh network 12 or the wireless non-mesh communicationsnetwork 23.

In FIG. 10B at Step 118, one or more wireless acknowledgement messagesare received on the first mesh network device 14, 26, 56 from the secondnetwork device 25 over the wireless 3 mesh network 12 or the wirelessnon-mesh communications network 23 indicating that the second networkdevice 25 has acknowledged the first mesh network device 14, 26, 56being physically located within the pre-determined distance of thephysical location of the second network device 25.

In one embodiment, Method 110 further includes the additional steps of:the selected type of wireless communications message is received overthe wireless 3 mesh network 12 or a wireless non-mesh communicationsnetwork 23 on the second network device 25. The second network device 25sends the first mesh network device 14, 26, 56 over the wireless 3 meshnetwork 12 or the wireless non-mesh communications network 23 a requestfor a first set of profile information 91 stored on the first meshnetwork device 14, 26, 56 in response to receiving the selected type ofwireless communications message. The first set of profile information 91from the first mesh network device 14, 26, 56 is received on the secondnetwork device 25 over the wireless 3 mesh network 12 or the wirelessnon-mesh communications network 23. The one or more wirelessacknowledgement messages are sent to the first mesh network device 14,26, 56 from the second network device 25 over the wireless 3 meshnetwork 12 or the wireless non-mesh communications network 23 indicatingthat the second network device 25 has acknowledged the first meshnetwork device 14, 26, 26 being physically located within thepre-determined distance 21 of the physical location of the secondnetwork device 25. The first set of profile information 91 is stored ina non-transitory computer readable medium (e.g., database, etc.) on thesecond network device 25 to indicate the first mesh network device beingphysically located within the pre-determined distance 21 of the physicallocation of the second network device 25. However, the present inventionis not limited the additional steps described and more, fewer or othersteps can also be used to practice the invention.

The dynamic information exchange includes allowing a mesh network deviceto communicate location information with a network device atpre-determined physical location and invite social contacts of the meshnetwork device to come to the pre-determined physical location. Thenetwork device sends various types of electronic messages (e.g., textmessage, e-mail, etc.) on a mesh network and/or a non-meshcommunications network (e.g., the Internet, etc.) and to socialnetworking sites. The dynamic information exchange also includesexchanging plural activity messages including a security identificationauthorization message for allowing access to a secure area, a buildingmanagement message for automatically and dynamically managing heating,ventilation and/or air conditioning (HVAC) and/or an emergency locationmessage for providing three-dimensional (3D) emergency locationinformation.

The dynamic information exchange includes allowing a mesh network deviceto communicate location information with a network device atpre-determined physical location and invite social contacts of the meshnetwork device to come to the pre-determined physical location. Thenetwork device sends various types of electronic messages (e.g., textmessage, e-mail, etc.) on a mesh network and/or a non-meshcommunications network (e.g., the Internet, etc.) and to socialnetworking sites. The dynamic information exchange also includesexchanging plural activity messages including a security identificationauthorization message, a building management message and/or an emergencylocation message.

It should be understood that the architecture, programs, processes,methods and It should be understood that the architecture, programs,processes, methods and systems described herein are not related orlimited to any particular type of computer or network system (hardwareor software), unless indicated otherwise. Various types of generalpurpose or specialized computer systems may be used with or performoperations in accordance with the teachings described herein.

In view of the wide variety of embodiments to which the principles ofthe present invention can be applied, it should be understood that theillustrated embodiments are exemplary only, and should not be taken aslimiting the scope of the present invention. For example, the steps ofthe flow diagrams may be taken in sequences other than those described,and more or fewer elements may be used in the block diagrams.

While various elements of the preferred embodiments have been describedas being implemented in software, in other embodiments hardware orfirmware implementations may alternatively be used, and vice-versa.

The claims should not be read as limited to the described order orelements unless stated to that effect. In addition, use of the term“means” in any claim is intended to invoke 35 U.S.C. §112, paragraph 6,and any claim without the word “means” is not so intended.

Therefore, all embodiments that come within the scope and spirit of thefollowing claims and equivalents thereto are claimed as the invention.

I claim:
 1. A method for dynamic information interchange for meshnetwork devices, comprising: receiving a wireless message including afirst set of profile information from a first mesh network device withone or more processors on a second network device with one or moreprocessors over a wireless mesh network, wherein the first mesh networkdevice includes an ultra wideband wireless transceiver and a meshnetwork protocol adapter with Complementary Code Keying (CCK),Differential Quaternary Phase Shift Keying (DQPSK) or OrthogonalFrequency Division Multiplexing (OFDM) encoders and wherein the secondnetwork device resides at a pre-determined physical location; obtainingon the second network device from the first set of profile informationin the received wireless message a list of electronic identifiers for aplurality of designated social contacts of an owner of the first meshnetwork device, wherein each of the plurality of designated socialcontacts include one or more electronic identifiers for one or moredesignated social contact network devices or one more social networkingweb-sites; sending a first set of plurality of different types ofwireless or wired communications messages from the second network deviceover the wireless mesh network or a wired mesh network to selected onesof the one or more designed social contact network devices indicatingthe first message network device is physically located at apre-determined distance from the pre-determined physical location of thesecond network device, wherein the first set of the plurality of typesof wireless and wired communications messages include an invitationmessage to join the owner of the first message network device at thepre-determined physical location of the second network device; andsending a second set of a plurality of different types of wireless orwired communications messages from the second network device to otherselected ones of the one or more designed social contact network devicesand to one more social networking web-sites over the non-meshcommunications network indicating the first message network device isphysically located at the pre-determined distance from thepre-determined physical location of the second network device, whereinthe second set of the plurality of types of wireless and wiredcommunications messages include an invitation message to join the ownerof the first message network device at the pre-determined physicallocation of the second network device.
 2. One or more processorsincluding a non-transitory computer readable medium have stored thereina plurality of software instructions for causing the one or moreprocessors to execute the steps of the method of claims
 1. 3. The methodof claim 1 wherein the first set of profile information includes ane-mail address, an Internet Protocol (IP) address, a hardware address, auniversal resource locator (URL), a name, a street address, a telephonenumber, an instant message identifier, a text message identifier, aencryption key, a digital signature, a secure message digest, a securityidentifier, a mesh network identifier, a physical location information,public or emergency notices or location specific information includinglocation-aware information or a social networking web-site loginidentifier.
 4. The method claim 1 wherein the first set and second setof the plurality of different types of wireless communications messagesinclude an IEEE 802.15.4 (ZigBee), IEEE 802.11a, 802.11b, 802.11g,802.11n, 802.16a, 802.16 g, Bluetooth or Infrared wireless protocolcommunications message.
 5. The method of claim 1 wherein the step of thestep of sending a first wireless message includes securely sending thefirst wireless message from the first mesh network device to the secondnetwork device using a pre-determined security method over the wirelessmesh network.
 6. The method of claim 1 wherein the one or moreelectronic identifiers for one or more designated location contactnetwork devices include a telephone number, an e-mail identifier, aninstant message identifier, a text message identifier, a mesh networkidentifier, a Radio Frequency Identifier (RFID) identifier or a socialnetworking web-site login identifier.
 7. The method of claim 1 whereinthe first mesh network device includes a mobile telephone, personaldigital/data assistant (PDA), smart phone, Radio FrequencyIDentification (RFID) tag, RFID sensor or RFID biometric tag meshnetwork device or the first mesh network device embedded into anothernon-mesh network device.
 8. The method of claim 1 wherein the ultrawideband wireless transceiver includes a Worldwide Interoperability forMicrowave Access (WiMAX) wireless transceiver.
 9. The method of claim 1wherein the second network device includes a server network device, agateway, router, switch, wired access point, wireless access point orRadio Frequency IDentification (RFID) sensor portal, RFID tag portal, orRFID biometric tag portal network device.
 10. A method for dynamicinformation interchange for mesh network devices, comprising: sending aselected type of wireless communications message from a first set of aplurality of wireless activity messages over a wireless mesh network ora wireless non-mesh communications network from a first mesh networkdevice with one or more processors to a second network device with oneor more processors located at a pre-determined physical location,wherein the first mesh network device includes an ultra widebandwireless transceiver and a mesh network protocol adapter withComplementary Code Keying (CCK), Differential Quaternary Phase ShiftKeying (DQPSK) or Orthogonal Frequency Division Multiplexing (OFDM)encoders, and wherein the first set of plurality of wireless activitymessages includes: a first type of wireless activity message including asecurity identification authorization message to determine if the firstmesh network device is allowed access to a secure area within apre-determined distance of the pre-determined physical location of thesecond network device, a second type of wireless activity messageincluding a building management message to dynamically and automaticallymanage heating, ventilation or air conditioning (HVAC) of an area withthe pre-determined distance of the pre-determined physical location ofthe second network device, or a third type of wireless activity messageincluding a emergency location information message that includesphysical location information to dynamically and automatically locatethe first mesh network device at a three dimensional (3D) physicallocation in the building at the pre-determined physical location of thesecond network device in the event of an emergency situation; receivingon the first mesh network device over the wireless mesh network or thewireless non-mesh communications network from the second network devicea request for a first set of profile information stored on the firstmesh network device in response to sending the selected type of wirelesscommunications message; sending the first set of profile informationfrom the first mesh network device to the second network device over thewireless mesh network or the wireless non-mesh communications network;and receiving one or more wireless acknowledgement messages on the firstmesh network device from the second network device over the wirelessmesh network or the wireless non-mesh communications network indicatingthat the second network device has acknowledged the first mesh networkdevice being physically located within the pre-determined distance ofthe physical location of the second network device.
 11. One or moreprocessors including a non-transitory computer readable medium havestored therein a plurality of software instructions for causing the oneor more processors to execute the steps of the method of claims
 10. 12.The method of claim 10 further comprising: receiving the selected typeof wireless communications message over the wireless mesh network or awireless non-mesh communications network on the second network device;sending to the first mesh network device over the wireless mesh networkor the wireless non-mesh communications network from the second networkdevice a request for a first set of profile information stored on thefirst mesh network device in response to receiving the selected type ofwireless communications message; receiving the first set of profileinformation from the first mesh network device on the second networkdevice over the wireless mesh network or the wireless non-meshcommunications network; sending one or more wireless acknowledgementmessages to the first mesh network device from the second network deviceover the wireless mesh network or the wireless non-mesh communicationsnetwork indicating that the second network device has acknowledged thefirst mesh network device being physically located within thepre-determined distance of the physical location of the second networkdevice; and storing the first set of profile information in anon-transitory computer readable medium on the second network device toindicate the first mesh network device being physically located withinthe pre-determined distance of the physical location of the secondnetwork device.
 13. The method of claim 10 wherein the first set ofprofile information includes an e-mail address, an Internet Protocol(IP) address, a hardware address, a universal resource locator (URL), aname, a street address, a telephone number, an instant messageidentifier, a text message identifier, a encryption key, a digitalsignature, a secure message digest, a security identifier, a meshnetwork identifier, a physical location information, public or emergencynotices or location specific information including location-awareinformation or a social networking web-site login identifier.
 14. Themethod claim 10 wherein the selected type of wireless communicationsmessages includes an IEEE 802.15.4 (ZigBee), IEEE 802.11a, 802.11b,802.11g, 802.11n, 802.16a, 802.16 g, Bluetooth or Infrared wirelessprotocol message.
 15. The method of claim 10 wherein the step of thestep of sending a selected type of wireless communications messageincludes securely sending the selected type of wireless message from thefirst mesh network device to the second network device using apre-determined security method over the wireless mesh network or thewireless non-mesh communications network.
 16. The method of claim 10wherein the first mesh network device includes a mobile telephone,personal digital/data assistant (PDA), smart phone, Radio FrequencyIDentification (RFID) tag, RFID sensor or RFID biometric tag meshnetwork device or the first mesh network device embedded into anothernon-mesh network device.
 17. The method of claim 10 wherein the ultrawideband wireless transceiver includes a Worldwide Interoperability forMicrowave Access (WiMAX) wireless transceiver.
 18. The method of claim10 wherein the second network device includes a server network device, agateway, router, switch, wired access point, wireless access point orRadio Frequency IDentification (RFID) sensor portal, RFID tag portal, orRFID biometric tag portal network device.
 19. A system for dynamicinformation interchange for mesh network devices, comprising incombination: means for receiving a wireless message including a firstset of profile information from a first mesh network device with one ormore processors on a second network device with one or more processorsover a wireless mesh network, wherein the first mesh network deviceincludes an ultra wideband wireless transceiver and a mesh networkprotocol adapter with Complementary Code Keying (CCK), DifferentialQuaternary Phase Shift Keying (DQPSK) or Orthogonal Frequency DivisionMultiplexing (OFDM) encoders and wherein the second network deviceresides at a pre-determined physical location; means for obtaining onthe second network device from the first set of profile information inthe received wireless message a list of electronic identifiers for aplurality of designated location contacts of an owner of the first meshnetwork device, wherein each of the plurality of designated locationcontacts include one or more electronic identifiers for one or moredesignated location contact network devices or one more socialnetworking web-sites; means for sending a first set of plurality ofdifferent types of wireless or wired communications messages from thesecond network device over the wireless mesh network to selected ones ofthe one or more designed location contact network devices indicating thefirst message network device is physically located at the pre-determinedphysical location of the second network device, wherein the first set ofthe plurality of types of wireless and wired communications messagesinclude an invitation message to join the owner of the first messagenetwork device at the pre-determined physical location of the secondnetwork device; means for sending a second set of a plurality ofdifferent types of wireless or wired communications messages from thesecond network device to other selected ones of the one or more designedlocation contact network devices and to one more social networkingweb-sites over the non-mesh communications network indicating the firstmessage network device is physically located at the pre-determinedphysical location of the second network device, wherein the second setof the plurality of types of wireless and wired communications messagesinclude an invitation message to join the owner of the first messagenetwork device at the pre-determined physical location of the secondnetwork device; means for sending a selected type of wirelesscommunications message from a first set of a plurality of wirelessactivity messages over a wireless mesh network or a wireless non-meshcommunications network from a first mesh network device with one or moreprocessors to a second network device with one or more processorslocated at a pre-determined physical location, wherein the first meshnetwork device includes an ultra wideband wireless transceiver and amesh network protocol adapter with Complementary Code Keying (CCK),Differential Quaternary Phase Shift Keying (DQPSK) or OrthogonalFrequency Division Multiplexing (OFDM) encoders, and wherein the firstset of plurality of wireless activity messages includes: a first type ofwireless activity message including a security identificationauthorization message to determine if the first mesh network device isallowed access to a secure area within a pre-determined distance of thepre-determined physical location of the second network device, a secondtype of wireless activity message including a building managementmessage to dynamically and automatically manage heating, ventilation orair conditioning (HVAC) of an area with the pre-determined distance ofthe pre-determined physical location of the second network device, or athird type of wireless activity message including a emergency locationinformation message that includes physical location information todynamically and automatically locate the first mesh network device at athree dimensional (3D) physical location in the building at thepre-determined physical location of the second network device in theevent of an emergency situation; means for receiving on the first meshnetwork device over the wireless mesh network or the wireless non-meshcommunications network from the second network device a request for afirst set of profile information stored on the first mesh network devicein response to sending the selected type of wireless communicationsmessage; means for sending the first set of profile information from thefirst mesh network device to the second network device over the wirelessmesh network or the wireless non-mesh communications network; and meansfor receiving one or more wireless acknowledgement messages on the firstmesh network device from the second network device over the wirelessmesh network or the wireless non-mesh communications network indicatingthat the second network device has acknowledged the first mesh networkdevice being physically located within the pre-determined distance ofthe physical location of the second network device.