Remote control of article based on article authentication

ABSTRACT

Systems and methods for remotely controlling an article based on authentication of the article. A communication system with a sensor for detecting an interaction event can be coupled to an article. The communication system can be associated with an article identifier. A communication including the article identifier can be received and the identification of the article through the article identifier can be authenticated based on an association of the article identifier with the communication system to verify that the communication is generated in response to the interaction event occurring at the article and being detected by the sensor of the communication system. As follows, operation of the article can be remotely controlled based on whether the article is authenticated.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.14/793,485, filed Jul. 7, 2015, which is a Continuation-in-Part of U.S.application Ser. No. 14/639,983, filed Mar. 5, 2015, which claimspriority under 35 U.S.C. § 119(e) to U.S. Provisional Patent ApplicationNo. 61/949,935, filed Mar. 7, 2014, and to U.S. Provisional PatentApplication No. 62/040,966, filed Aug. 8, 2014, all of which areincorporated by reference herein in their entireties.

BACKGROUND 1) Technical Field

The present technology relates to the field of networking and consumerelectronics, and more specifically, to systems and methods for remotelycontrolling operation of an article based on authentication of thearticle.

2) Introduction

Presently, tracking events remotely involves humans manually notatingthat n event occurred. For example, a receptionist can sign for apackage and the courier can send a confirmation to the sender of thepackage that the package was received. However, the sender neveractually knows that the package was opened. Likewise, consumer goods(e.g. medicine containers, tires, light bulbs, etc.) are passive andrequire a human to report that they need replacement or servicing. Moreadvanced systems and methods are required to detect events at remotelocations.

SUMMARY

Additional features and advantages of the disclosure will be set forthin the description which follows, and in part will be obvious from thedescription, or can be learned by practice of the herein disclosedprinciples. The features and advantages of the disclosure can berealized and obtained by means of the instruments and combinationsparticularly pointed out in the appended claims. These and otherfeatures of the disclosure will become more fully apparent from thefollowing description and appended claims, or can be learned by thepractice of the principles set forth herein.

Disclosed are systems, methods, and non-transitory computer-readablestorage media for detecting events at remote locations.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and otheradvantages and features of the disclosure can be obtained, a moreparticular description of the principles briefly described above will berendered by reference to specific embodiments thereof which areillustrated in the appended drawings. Understanding that these drawingsdepict only exemplary embodiments of the disclosure and are nottherefore to be considered to be limiting of its scope, the principlesherein are described and explained with additional specificity anddetail through the use of the accompanying drawings in which:

FIG. 1 schematically illustrates an event detection and remotecommunications device embedded in an article, in accordance with someembodiments of the present technology;

FIG. 2 illustrates network architecture for remote detection andoperation of the article, in accordance with some embodiments of thepresent technology;

FIG. 3 illustrates network architecture for remote detection andoperation of the article, in accordance with some embodiments of thepresent technology;

FIG. 4 is a flow chart for establishing communications with the article,in accordance with some embodiments of the present technology;

FIG. 5 is a flow chart for establishing communications with the article,in accordance with some embodiments of the present technology;

FIG. 6 schematically illustrates coupling between icons on an articleand one or more event detection systems, in accordance with someembodiments of the present technology;

FIG. 7 schematically illustrates a device for providing digital contentto a user in lieu of live streaming, in accordance with some embodimentsof the present technology;

FIG. 8 is a flow chart for provisioning digital content devices, andreceiving content from same, in accordance with some embodiments of thepresent technology;

FIG. 9 is a flow chart for assigning network identifiers to articles inaccordance with some embodiments of the present technology; and

FIG. 10 is a flow chart for obtaining control of an article remotely inaccordance with some embodiments of the present technology.

DETAILED DESCRIPTION

1) Overview

Various embodiments of the disclosure are discussed in detail below.While specific implementations are discussed, it should be understoodthat this is done for illustration purposes only. A person skilled inthe relevant art will recognize that other components and configurationscan be used without parting from the spirit and scope of the disclosure.

The present disclosure addresses the need in the art for more advancedapproaches for detecting events at remote locations. Systems, methods,and computer-readable media are disclosed which detect events occurringto an article at a remote location. The technology can involveintegrating communication interface within an article. The communicationinterface can include memory, a power source, a sensor for detecting aninteraction event with the article, a processor coupled with the sensor,and a communication interface coupled with the processor. Thecommunication interface can be associated with one or moretelecommunication networks (cellular network, mobile virtual networkoperator network (MVNO), pager network, long range radio network, ad-hocevent detection network, etc.) and can be associated with one or moreidentifiers such as a network identifier, an article identifier, etc.

When the article is sent to a remote location and the sensor detects atrigger event (e.g., opening the article, detecting a thresholdluminosity, detecting a threshold pressure) the communication interfacecan send a message over the telecommunication network that includes thenetwork identifier, the article identifier, and location information(e.g., GPS coordinates, cell tower location, etc). Various actions canbe configured to occur in response to the detected event.

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present technology. It will be apparent, however,that the present technology can be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to avoid unnecessarily obscuring thepresent technology.

2) Physical Description

FIG. 1 illustrates an event detection system 100 for providing eventdetection data relating to an article over a network according to someembodiments of the present technology. The event detection system 100can be coupled with an article 101. Example articles include articles,envelopes, paper, books, magazines, shipping articles, article wrapping,gift wrapping, consumable items, price tags, price labels,theft-deterrent devices, inhalers, tires, clothing material, clothingtags, clothing labels, computing devices, consumer devices (such as anLEDs or other light-emitting fixtures), disposables (such as bottles orother containers for food products, liquids, toiletries, or otherreplenishables/perishables), off-the-shelf sensors (such as temperaturesensors or light sensors), automotive goods (such as tires, batteries,and auto parts), or any portable object.

The event detection system 100 can also include a power source 102, asensor 103, a communication interface 104, an antenna 106, amicroprocessor 108, and memory. The event detection system 100 can alsoinclude power storage 112, and an output 110. The components of theevent detection system 100 shown in FIG. 1 and similar components areexplained in more detail below.

a) Housing

In some embodiments, the event detection system 100 can be housed on asubstrate or within one or more substrates. The substrates can beattached to or enclosed within articles or other consumer articles. Thesubstrates can be distinct from the articles and can be integratedwithin the articles. Examples of articles on which the event detectionsystem 100 could be attached include paper-based articles such asenvelopes, printed materials such as menus, or packaging such as pizzaboxes. A variety of other articles and consumer articles can be benefitfrom the present technology and a number of types of articles arementioned explicitly in this disclosure. However, those with ordinaryskill in the art having the benefit of this disclosure will readilyappreciate that a wide variety of articles can be used with the presenttechnology.

In some embodiments, the event detection system 100 is implemented inone or more integrated circuits, which can include silicon-basedintegrated circuits, and in which the event detection system 100 can beattached to the articles via an adherent. The event detection system 100can be enclosed within the article, such as an envelope or pizza box. Insome embodiments, the electronics comprising the event detection system100 can be deposited, in whole or in part, on the medium of the articleitself. For instance, the components of the event detection system 100can be instantiated directly on a paper-based medium, such as anenvelope or cardboard box.

In some embodiments of the present technology, the event detectionsystem 100 is substantially visually indistinguishable from the mediumin which it is embedded or attached. For example, when the eventdetection system 100 attached to or embedded in a paper envelope, theevent detection system 100 can be visually indistinguishable to viewersfrom the paper of the envelope. It will be understood by those skilledin the art that the technology can be practiced on media that aredurable rather than disposable, and that in alternative embodiments ofthe present technology, the features of the present technology describedherein are implemented in durable materials, substrates, or othernon-disposable media. In some embodiments, the event detection system100 is attached to an article that is shippable; shippable meaning anitem designed to be sent through a delivery service (e.g., an envelope,letter, postcard, package).

b) Power

As explained above, the event detection system 100 can include a powersource 102. In some embodiments of the technology, the power source 102is an ambient power source, which receives and converts energy from thesurrounding environment. For example, the ambient power source can be aphoto-voltaic detector. In other embodiments, the power source 102 canobtain energy from radio waves or other electromagnetic spectrum.Ambient energy sources can include inductive power sources, such asthose powering RFID readers.

Also, some embodiments of the present technology can involve usingthermal power, such as from body heat, or ambient kinetic energy, suchas from the motion of a user or recipient of the article. Alternativeforms of ambient energy that can be utilized to supply power to theevent detection system 100 will be apparent to those skilled in the art.Ambient light can also be used with the power source.

In some embodiments, the power source 102 can be a lightweight battery.Certain some embodiments can utilize a capacitor for energy storage. Forexample, a supercapacitor can be utilized. In some embodiments, thecapacitors or battery can be on a separate substrate from the eventdetection system; in other embodiments, the capacitor or battery can beimplemented within the physical medium of the event detection system,such as in paper on a paper-based article.

In other embodiments, there is no battery or power storage in the eventdetection system, and all power is received through ambient sources.Some embodiments of the present technology include power storage 112that is separate from the power source; in some such embodiments, thepower storage 112 collects power from a power source 102 fromtime-to-time, or on a periodic basis.

In some embodiments of the present technology, the power source 102 isutilized to provide a signal of an event to the event detection system100, as described further in other sections of this written description.In some embodiments of the present technology, the power source 102 ischarged prior to delivery of the event detection system 100, so that theevent detection system 100 is operable immediately without requiringpower from an external source for initial communications to be conductedvia the communication interface 104.

c) Communication Interface

The event detection system 100 can include a communication interface104. In some embodiments of the present technology, the communicationinterface 104 communicates over a long-distance wirelesstelecommunications system. For example, the wireless telecommunicationssystem can be a pager network. In some embodiments of the presenttechnology, the telecommunications system does not require a SIM card orother similar local network identifier to be included in the eventdetection system 100. Also, the wireless telecommunications system canbe a cellular network, such as a TDMA, CDMA, LTE or GSM network. Otheralternative wireless telecommunications systems that can be utilizedwith the present technology will be apparent to those skilled in theart. Additionally, the communication interface 104 can communicate overa wireless local area network (e.g., 802.11 protocol). Other alternativewireless network systems that can be utilized with the presenttechnology will be apparent to those skilled in the art.

In some embodiments, the communication interface 104 can include systemsto communicate within close proximity to other devices, such as NearField Communications (NFC), Bluetooth, or radio frequency identification(RFID) systems; other such systems for proximate communications will beapparent to those skilled in the art. The communication interface 104can include an antenna 106. In certain some embodiments, the antenna 106can be a strip line antenna; in certain some embodiments, the antennacan be printed on the same medium as the article, such as paper. In someembodiments, the communication interface 104 can include a SubscriberIdentity Module (SIM) circuit. In some embodiments, the antenna 106provides energy to the power source 102. In some embodiments, thecommunication interface 104 operates at the voltages provided by thepower source 102.

In some embodiments of the present technology, the communicationinterface 104 is configured to be relatively dormant until theoccurrence of an interaction event; at which time the communicationinterface 104 can send a message related to the interaction event. Forexample, the communication interface 104 can be configured to notperiodically “ping” the communications network until the event. Also,the communication interface 104 can be configured so that a messagestored in memory 114 and only sent by the communication interface 104once sufficient power is obtained in the power source 102 or powerstorage 112 to enable delivery of the message to the communicationsserver 202 via the telecommunications system 200.

In some embodiments of the present technology, at the time that articleis deployed, bandwidth can be purchased from the providers of atelecommunications service, in order to allow the article communicatevia the telecommunications system 200 automatically, for a minimum orperpetual subscription period. Alternatively, such connectivity can bepurchased from the providers of the telecommunications system 200 inbatches, allowing communication from the articles for limited periods oftime.

In some embodiments of the present technology, one or more eventdetection systems 100 are utilized as a virtual local area network. Insome such embodiments, each system constitutes a modem that can beattached to, or constitutes part of, hardware that would otherwise beconnected to a local area network, such as a server, laptop computer,printer, router, desktop PC, etc. In some such embodiments, allcommunications amongst such machines, via a local networking protocol,or communications between such machines and the Internet, are conductedthrough the communication interface 104; in some such embodiments, thelocal communication packets are encapsulated in the communications viathe communication interface 104.

In some such embodiments, the systems can also be coupled via a localmesh or other local network, where such local network is utilized solelyfor communications within the nodes on the network, and not for Internetcommunications.

In some embodiments, a local device serves as a bridge to thecommunications and/or operating servers. For example, the eventdetection system 100 can communicate via a short-range wireless signalto a device that then retransmits the information to the communicationsand/or operating servers.

d) Processor and Memory

In some embodiments, the event detection system 100 includes a processor108, which is operable under the power provided by the power source 102or power storage 112. In some embodiments, the processor 108 is a lowpower microcontroller. For example, the processor 108 can constitute an8-bit processor; however, in other cases, higher-bit processors can beutilized. The processor 108 can be operable at a power and voltage thatcan be supplied by the power source 102. In some such embodiments, theprocessor 108 is in communication with solid state, low-powernon-volatile memory 114 that can be embedded on the substrate, and thatis operable at the power and voltage that can be supplied by the powersource 102. The non-volatile memory 114 can in some embodiments, bereadable, programmable, or read/writeable. Suitable forms ofnon-volatile memory 114 will be apparent to those skilled in the art. Insome embodiments of the present technology, the digital components ofthe event detection system 100 are coupled over one or morecommunications buses; in some such embodiments, such one or morecommunications buses can be embedded in a common substrate with othercomponents of the event detection system 100.

e) Outputs

In some embodiments of the present technology, the event detectionsystem 100 includes an output 110 in communication with the processor108, which can be activated in response to commands received from theprocessor 108. For example, the output 110 can be an LED attached to theevent detection system 100. The LED can be Organic LEDs (OLEDs) orquantum dots. In some embodiments, the output 110 is a motor or otherphysical actuator.

In some embodiments, the output 110 can be a small, lightweight display,such as a liquid crystal display. In some such embodiments, the displaycan be utilized to display a code, such as a QR code. In someembodiments, the output 110 can be a speaker. In some such embodiments,the speaker can be utilized to issue an audible or inaudible sound thatidentifies the event detection system 100 or article 101.

In some embodiments, the output 110 can also act as sensors 103; in somesuch embodiments, a speaker 110 can also be utilized as a microphonethat provides input to the sensor 103/110, which translates the analogsignal of the microphone into a digital signal for the processor 108.Other outputs 110 will be apparent to those skilled in the art. In someembodiments, the event detection system includes an output 110, but nosensor 103; in some such embodiments, the output 110 is responsive tosignals received by the processor 108 via the communication interface104.

3) Sensors

The sensors 103 that can be present in the event detection system 100can comprise a variety of components and forms. As discussed above, theoutput mechanism can double as a sensor (e.g., a speaker as amicrophone). Sensors 103 can also comprise a photo-diode, a humiditysensor, accelerometer(s), gyroscope(s), and buttons. In someembodiments, the sensors 103 are integrated into the article 101 so asto not be visible by the user. Various sensors and inputs are describedherein.

In some embodiments, the sensor 103 is a sensor unit with an integratedprocessor that is communicatively connected to the processor 108.

4) Network

FIGS. 2 and 3 illustrate examples of communications networks used forremote interaction with articles containing event detection systemsaccording to some embodiments of the present technology.

In some embodiments, the communication interface 104 can be “loaded”with “pre-paid minutes” to permit any anticipated communication over itslifetime. For example, if the article were a light source, the lightsource is provisioned prior to delivery to the user with sufficientcall-time to exchange messages via a wireless telecommunications networkfor the expected life of the product.

a) Network Topology

As shown in FIGS. 2 and 3 , multiple articles 299 containing eventdetection systems can communicate over long-distances over a long-rangewireless communications system 200. For example, the wirelesscommunications system 200 can be a pager network, a cellular network, orother wireless communications system, which is communicable via a lowerpower system, as discussed above. In some embodiments of the presenttechnology, the wireless communications system 200 can include two ormore wireless networks from different telecommunications servicesproviders. For example, different telecommunications services providersand networks can be utilized for communications with the article 299 ifthe article 299 moves in and out of coverage, roams between networks,etc.

In some embodiments, the wireless communications system 200 can leaseexisting networks/radio towers, install new towers specific to thesystem 200, or a combination of both.

In some embodiments, the wireless communications interface 104 isconfigured to communicate over a short distance to a base station. Thebase station then transmits the data from the wireless communicationinterface to a communications server or operating server. Thistransmission can be over the internet or through a direct connection.This can enable a hybrid communication system whereby the wirelesscommunication interface 104 can communicate via one wireless protocoland the base station can communicate via another protocol. The basestation can connect to a more powerful power source for greater range.In some embodiments, the base station appends a base station identifier,geolocation data, and reception connection quality to data that iscommunicated to the communications server or operating server. The basestation can actively detect devices that are within a communicationrange.

In some embodiments, the event detection system can connect to an accesspoint over a low bandwidth and low power connection. The access pointcan then route the information from the event detection system to theoperating server.

b) Communication Server

In some embodiments of the present technology, an article 299 cancommunicate with one or more communications servers 202. In some suchembodiments the communications servers 202 are configured to identifyone or more network/article identifiers via an identification database204 coupled locally to the communications servers 202. In someembodiments, as depicted in FIG. 3 , the identification database 204 isremote from the communications servers 202.

In some embodiments, the communications servers 202 include protocolgateways for transforming messages received via the wirelesscommunications system 200 to a packet based protocol for furtherdistribution over the wide area network 208, as described below.

In some embodiments, the event detection system 100 sends a “heartbeat”to the communication server to indicate its status.

In some embodiments of the present technology, the identificationdatabase 204 maps network identifiers to the one or more articles. Insome embodiments, the identification database also records one or moreindividuals, through a user identifier, associated with an article. Insome embodiments, other personally identifying information can beincluded in the identification database 204, such as a postal addressfor the user to which an article is sent. Other examples of user orarticle information that can be stored in the identification database204 shall be apparent to those skilled in the art.

The identification database can be an SQL database, a flat file, a CSV,or, distributed file system, etc. In certain some embodiments, theidentification database stores records in encrypted format. In some suchembodiments, the encrypted records are only accessible by a userassociated with the article. In certain some embodiments, the user canaccess the identification database 204 via a web browser or other clientapplication 210 in communication with the identification database 204via the wide area network 208. In some embodiments, the clientapplication 210 can be a mobile application that operates on asmartphone, tablet, or other mobile computing device. In some suchembodiments, communication between the client 210 and the identificationdatabase 204 is over a secure protocol, such as, by way of example butnot limitation, Secure Socket Layer; other suitable secure protocolswill be readily apparent to those skilled in the art. In someembodiments, the identification database 204 and client 210 areconfigured to allow the user to set up a password unique to the user,which is required for operating the articles remotely.

c) Operating Server

Embodiments of the present technology include one or more operatingservers 206 for interacting with the articles 299; such interactions caninclude monitoring and/or operating the articles 299. Although it ismentioned that these communications occur with articles 299, suchcommunication may be directed at a corresponding event detection system.In some embodiments of the present technology, the operating servers 206are in communication with the communications servers 202 via a wide areanetwork 208, such as the Internet. Also, communications between theoperating servers 206 and the articles 299 can be sent over apacket-switched protocol, such as or TCP/IP or UDP. In some embodiments,the packet-switched protocol is IPv4 or IPv6. Other packet-switchedprotocols that can be utilized for communications between the articles299 and the operating services 206 shall be apparent to those skilled inthe art. In some embodiments, the one or more operating servers 206 arein direct communication with the device identification database 204.

When communications between the operating server 206 and the eventdetection system 100 are held over secure communication sessions, suchcommunications will not be transparent to the telecommunicationsservices provider.

d) Identifiers

The operating server and communication server keeps track of eventdetection systems, articles, and users by means of associatedidentifiers.

The identifiers can be distinct. The identifiers can be sequentially orrandomly allocated. Having relatively large, randomly allocatedidentifiers can help prevent unauthorized parties from brute-forceguessing a network identifier.

In certain some embodiments, identifiers can include several more bitsthan necessary to uniquely identify the event detectionsystem/article/user, for purposes of security and/or error correction.In some such embodiments, the bits in the identifier are randomized. Insome embodiments, a plurality of event detection systems 100 on a singlearticle include a common string in the network identifier, to indicatethat such event detection systems 100 belong on a single article. Incertain some embodiments, the network identifier includes errorcorrection, such as forward error correction, Hamming codes, orReed-Solomon codes. Other methods of error correction or redundancy thatcan be applied to the network identifiers shall be readily apparent tothose skilled in the art. In certain some embodiments, the eventdetection system 100 can be communicated with by the operating server206 via email, SMS, Twitter, or other text-based messaging systems. Insome embodiments, the event detection system 100 is associated with apublic key, for encrypting and authenticating keys.

Network Identifiers

Each individual event detection system 100 can have its own networkidentifier. The network identifier can be associated with thecommunication interface of the event detection system. The networkidentifiers can include an identifier on the telecommunications network,such as a telephone number. In some embodiments, the one or more networkidentifiers can include an identifier such as an IP address (such as anIPv4 or IPv6 address), a MAC address, or a universally unique identifier(UUID). Other examples of network identifiers associated with thearticles will be apparent to those skilled in the art.

Article Identifiers

In some embodiments, an article can have an article identifier. Anarticle can be associated with one or more event detection systems andthus can be associated with one or more network identifiers. Forexample, an envelope can have two or more event detection systems 100,each of which has a different network identifier. Alternatively, theevent detection systems within the envelope can be assigned the samenetwork identifier. The network identifier can inherit the articleidentifier or vice versa. In some embodiments, the event detectionsystems 100 are authenticated to the communications server 202 only ifall event detection systems 100 on the device report the sameidentifier.

User Identifiers

In some embodiments, a user has a user identifier. A user identifier canbe any data that is associated with the user. The user identifier can beunique such as a username, social security number, email address, etc.;alternatively, the user identifier can be descriptive such as a givenname, birthday etc. Although the term “user” is used, it should beunderstood that “user” can refer to any human being that is associatedwith an article. In some embodiments, the “user” is not the only personinteracting with the article.

In some embodiments, a network/article identifier is associated with oneparty while another party is given access. For example, a doctor canaccess the data generated by an event detection system 100 associatedwith a patient to ensure the patient is following a prescribed pillregime.

e) Associating Identifiers

Network, article, and user identifiers can be associated with each otherin a variety of configurations. Example methods and systems forassociating identifiers are discussed below.

In some embodiments of the present technology, the network identifier isloaded on to the communication interface 104 at the time the article isassigned. For example, the identifier can be loaded in a SIM circuit inthe communication interface 104. The telecommunications provider canroute traffic between the article and the article operating servers 206that are operated by or on behalf of the issuer of the article, based onthe network identifier for the article.

In some embodiments, the article identification database 204 ispopulated at the time the article is assigned. In some embodiments, asdepicted in the flowchart in FIG. 9 , at the time of assigning, thearticle is sent 900 through an automated process whereby informationprinted on the article is read 902. For example, a reader reads suchprinted information via optical scanning. The printed information can bea name of an intended recipient of the article and a delivery addressfor the article. Thereafter, the articles that are enclosed in orattached to the article are detected 904. For any article that has notbeen assigned in an article identification database 906, the article isread to see if it has an identifier encoded 908.

If not, an article identifier is selected from a pool of availableidentifiers and loaded onto the article 910. If there is an identifieron the article, that article identifier can be retrieved 912 and storedin the article identification database 204 along with a user identifierand the associated name and location of the intended article recipient914.

In alternative embodiments, as will be apparent to those skilled in theart, the steps in the foregoing process can be conducted concurrently orin alternative orders. By way of example but not limitation, the articlecan be detected initially, with the label/delivery address placed on thearticle based on the identifier of the article. In other embodiments,the article is not scanned, but the article identifier can be known byvirtue of an order in which the article was sent through the process. Insome embodiments, the article can be initiated through the processwithout an identifier for the article or an article label, and both canbe assigned to the article and its applicable article concurrently.Other variants will be apparent to those skilled in the art.

In some embodiments of the present technology, an event detection system100 is assigned prior to delivery of an article to the end user. In somesuch embodiments, a device scans an address on the article at the timeit is assigned. This can include scanning a printed address via opticalcharacter recognition, scanning a bar code, QR code, or other suchprinted code on the article, and/or detection of the event detectionsystem 100 via electronic communication, such as, by way of example butnot limitation, via Near Field Communication. In some such embodiments,the machines update the article identifier database to couple thepostal/physical delivery address on the article 101 (or other suchidentification of the article 101 as can be printed on the article 101or indicated in the bar code, QR code, or other such code) with anarticle and/or user identifier in an article identifier database. Othermechanisms for correlating printed information on the article 101 witharticle identifiers or other information regarding the user or articlewill be apparent to those skilled in the art. In some embodiments, suchseparate articles can be operable to adhere and/or enclose the eventdetection system 100 particular positions on an article, for conformancewith design specifications for the article, or to place articles incommunication with corresponding icons on the article.

In some embodiments, when the event detection system 100 is created, itis provisioned a network identifier. Alternatively, the event detectionsystem 100 can be shipped “blank” and can then be provisioned a networkidentifier while with an intermediary. As another alternative, the eventdetection system 100 can be provisioned a network identifier uponreceipt by the intended user or destination.

In some embodiments the creator of event detection system 100 can assigneach event detection system 100 to a user upon creation. For example,the creator can provision the event detection system 100 with an IDprovided by the user. Alternatively, the creator can provision a networkidentifier to the event detection system 100 and then associate the user(or user identifier) with the network identifier. In some embodiments,after the network identifier is assigned, such information can beprogrammed or affixed to the event detection system 100.

In some embodiments, an intermediary receives the event detection system100 and then assigns it to a user. In some embodiments, the intermediaryassociates an event detection system 100 with an article. Theintermediary can be a store or reseller. A network identifier can bealready placed in the event detection system 100 and the store, uponsale, can associate the network identifier with an end user.

In some embodiments, the intermediary can repurpose event detectionsystem 100 s that have been previously assigned. Repurposing can entailrelabeling, reflashing, or otherwise reassigning a network identifier toan event detection system 100. Repurposing can also include assigning anetwork identifier to a new end user.

Another example embodiment is a pill container being supplied by apharmacy. The pharmacy can read the network identifier from the eventdetection system 100 contained within the pill container and then assignthat network identifier to the patient. This would enable the eventdetection system 100 to monitor the patient's self-administration of thepills and report.

In some embodiments, this assignment occurs at “checkout.” This checkoutconfiguration can happen without extra interaction. For example, asystem can take the registration information of the purchaser andassociate the network identifier with the user/purchaser. In someembodiments, the configuration can include configuring the article withthe user's stored WiFi network passwords and/or Bluetooth pairings etc.In some embodiments, this checkout process can happen automatically orwith assistance. For example, the user/purchaser can carry the articlethrough a purchasing area which could cause the event detection systemto send a message to a server with the network/article identifier. Theserver can then receive the network/article identifier and associate itwith the user identifier that can be within the same message.

In some embodiments, the receiver/user can make the assignment. Forexample, the user can assign the event detection system 100 tothemselves by scanning a bar code, scanning a QR code, imputing anactivation code into a web site, etc. This can enable users to transferownership and association of the event detection system 100 withoutrequiring complicated processes involving a third party. For example, ifthe event detection system 100 were within a toaster, there can be anumeric code that is visible on the bottom of the toaster that is onlyvisible after removing the toaster from the packaging. Thus configured,a transfer of ownership would enable a new owner to see the numeric codeand assign the toaster to the new owner.

In some embodiments, a network identifier can be assigned to anotheruser for a temporary period of time. For example, a user can allow afriend to borrow their car for a day. Assignment of the event detectionsystem 100 could last during the duration specified and then revert backto the original user.

In some embodiments, assignment of network/article identifiers to userscan be recorded in a centralized server or in a distributed network viaa “consensus” as is done with many distributed digital currencies.

In some embodiments, the event detection system has an identifier thatis provided to the user. For example, the identifier can be included inpackaging for the product. Alternatively, the product can be configuredto communicate with a mobile device of the user via a near fieldprotocol, such as NFC, and to be bound by an identifier set by the user.In some such embodiments, after receipt 1000 of the article the user canenter 1002 the article identifier/credentials included in the articleinto the client device. The user is then authenticated by an articleoperating server 206 by use of the credentials 1004. If the user isauthenticated 1006, the user is then granted authorization 1008 tocontrol the article, including rights to receive data from sensors 103and control outputs 110. In some embodiments, the user is grantedauthority to remotely monitor and operate the article via the client210. In some embodiments of the present technology, after authenticationof the user, the user can transfer authority 1010 to operate the articleto a third party. In some such embodiments, such transfer can beeffectuated through a third party login/authorization system (such as,by way of example but not limitation, Facebook Connect; otheralternatives will be readily apparent to those skilled in the art) andthe article identifier database 204 is updated with the credentials forthe third party 1012.

5) Interchange Entities

The technology can further involve an interchange entity receiving themessage and recording the occurrence of the event at the location itoccurred. The interchange entity can also provision article identifiersfor tracking articles. Similarly, the interchange entity can acquirebulk bandwidth for communicating over the telecommunication network andcan provision articles with network identifiers associated with aportion of the bandwidth to allow the telecommunication network topermit messages to be sent to the operating servers.

In some embodiments of the present technology, the functions and systemsdescribed above can be performed or operated, as applicable, bydifferent entities. For example, one or more articles including an eventdetection system can be sent by or on behalf of one or more issuers tothe end users. An issuer can utilize an interchange entity, such as forexample, a telecommunications network provider, Mobile Virtual NetworkOperator (MVNO), a legacy network, such as a pager communicationnetwork, postal service, mail courier, retailer (storefront or online),delivery service, and the like for functions associated with thearticles. In some such embodiments, the interchange is responsible foroperating the operation servers 206. In some embodiments, theinterchange creates, operates and maintains the article identificationdatabases 204. In some embodiments, the interchange is responsible forthe procurement of bandwidth from one or more telecommunicationsservices providers of the telecommunications systems e.g., when thecommunications servers are operated by the telecommunications servicesproviders. In some embodiments, as depicted in FIG. 2 , the articleidentifier database 204 is operated by the telecommunications servicesprovider. Also, the article identifier database 204 can be operated bythe interchange, as shown in FIG. 3 . Identifiers for the applicableissuer and interchange can be included in the communication interface104.

In some embodiments, the interchange utilized for an article 101 isresponsible for routing communications from the article to theappropriate issuers via the network/article identifier. In some suchembodiments, upon receiving or exchanging messages from or with anarticle, the interchange updates billing records associated with theissuer, or accounts payable to the telecommunications services provider.In some embodiments, the operation servers 206 can be operated oraccessed by the issuer, and communications between the issuer and thearticles are routed by the interchange to the appropriatetelecommunications services provider by reference to the article/networkidentifiers. In some embodiments, an issuer can utilize differentinterchanges for communications with different articles or differenttypes of articles. For example, an issuer can communicate with articlesvia different interchanges which are selected or determined based uponthe geographical destination of the article or location of the intendeduser/consumer. Alternatively, interchanges can be selected or determinedbased on the bandwidth required for communication with the applicablearticle, the type of communications to be conducted with the articles,or the applications supported by the articles. Those with ordinary skillin the art having the benefit of this disclosure will readily appreciatethat other a wide variety of criteria can be used for selection ofinterchanges.

6) Trigger Events

The method 400 also involves the article communicating 404 with thecommunication server 202 in response to the event, e.g., via atelecommunications system.

The method 400 involves, upon receipt of communication from the eventdetection system containing an identifier for the article, thecommunications server checking the identifier 406 against a localarticle identification database 204 to authenticate the identificationof the article, and establish communication 408 with the article. If thearticle identifier is not authenticated 410, the communication isdropped. For example, if the identifier is not authenticated, suchidentifier can be placed on a blacklist in the local articleidentification database 204, so that future communications are notreceived from such article identifier.

FIG. 5 illustrates an exemplary method 500 for authenticating an articlewith an article identification database 204 using an operating server206 according to some embodiments of the present technology. In someembodiments, after the triggering event is detected 502 at the article,the article establishes communication 504 with the communications servervia the communications network. The communications server thenencapsulates one or more identifiers received from the article in one ormore packet payloads 506. The communications server forwards theencapsulated packets to the operating server via the packet-switchednetwork 508. In some embodiments, the encapsulated packet is forwardedto the operating server in an encrypted or secure form. In some suchembodiments, such communications are conducted using a Secure SocketLayer protocol, and/or by use of the IPSec protocol suite; otheralternative security protocols that can be utilized for communicationsbetween the communications server and the operating server will beapparent to those skilled in the art.

On receipt, the operating server de-encapsulates the article identifier,and authenticates 510 the article identifier against the articleidentifier database. Upon authentication, the operating serverestablishes 512 a session with the article (or alternatively, is nowconfigured to accept and exchange asynchronous messages with thearticle) over a packet switched protocol, with such messages routed tothe article via the communications server 202 and the telecommunicationsnetwork. In some embodiments of the present technology, subsequentcommunications between an operating server 206 and the article areconducted over a secure protocol, such as a Secure Socket Layerprotocol, IPSec, etc. In some such embodiments, secure communicationssessions are established between the article and the device operatingserver 206, so that such communications are not transparent to thecommunications servers 202.

In some embodiments of the present technology, after the event detectionsystem 100 has been authenticated, the occurrence of the event 402 isrecorded at one or more operation servers 206, and associated with anidentifier of the article. In some such embodiments, the operationservers receive and records an identifier for the article 101, one ormore identifiers for the event detection systems 100 on the article 101,identifiers for an intended, expected, or authenticated recipient oruser of the article 101, the time at which the event 402 occurred, ageo-location for the article 101 at the time of the event 101, asidentified automatically through the event detection system 100 (vialocation parameters determined from the communications system 200, or,in other embodiments, a low-power geo-location system, such as alow-power Global Positing System interface, included in the eventdetection system 100), a postal address to which the article 101 wassent, purchases or other electronic transactions conducted byinteraction with the icons, etc. In some embodiments, such informationis stored in one or more databases, which can be relational databases orother distributed databases. In some such embodiments, multiple eventsand corresponding records are stored and identified with an individualuser or physical address.

In some embodiments, following authentication of an article 511, aninterchange can elect to decline facilitation of communications betweenan issuer and the article, based on policies. By way of example but notlimitation, such a policy can be based on a geo-location of the device,or a volume of data intended to be transmitted to the device, etc.

In some embodiments of the present technology, the operating server 206collects and generates reports and/or performs analytics on datareceived from and about the article. In some embodiments, the operatingserver 206 sends commands to the article to operate the article. In someembodiments, the reports are delivered by the operating server 206 tothe client application 210. In some embodiments, the client application210 can also provide instructions to operate the article via theoperating server 206. In some embodiments, a user of the article can beauthenticated and authorized to operate the article and/or receive datafrom the article via the client 210.

FIG. 4 illustrates an example for authenticating articles or otherarticles containing communication interfaces according to someembodiments of the present technology. The method 400 can involve acommunication interface 104 detecting an event (e.g., interaction event)at an article 402. By way of example but not limitation, the event canbe an initial detection that a threshold of energy has been received atthe power source 102, or that another event has been detected at asensor 103 separate from the power source 102. As a non-limitingexample, the power source 102 can be a photo-diode, and the processor108 can be initially configured in a sleep state, and subsequentlyenclosed or embedded in an enclosed article, such as an envelope orcardboard box. The processor 108 can be configured to wake when a powersource 102 reaches a certain threshold of energy, such as, by way ofexample but not limitation, a certain luminosity arriving at thephoto-diode by virtue of the enclosure being opened by an end user, or acertain current or voltage threshold being received or produced at thepower source 102.

Alternatively, the event detection system 100 can be charged initiallywith power, and can be configured to periodically poll one or more portsor sensors 103 in order to determine if an event has occurred, such asthe breaking of a circuit. As an illustrative, non-limiting example, theevent detection system 100 could be enclosed in an article such as anenvelope or box, and the event could be the breaking of a circuit, forexample, when the enclosure is opened. Other examples of such triggeringevents will be apparent to those skilled in the art.

7) Example Embodiments

As will be apparent to those skilled in the art, the articles describedherein can constitute a consumer device, such as an LED or other lightbulb or fixture, disposables such as bottles or other containers forfood products, liquids, toiletries, or other replenishables orperishables, off-the-shelf sensors such as temperature sensors or lightsensors, automotive goods such as tires, batteries, or auto parts;additional examples are too numerous to mention, but will be readilyapparent to those skilled in the art. Certain such media, or goods, havestates to be monitored by either the user via a client 210, or by avendor or other entity in communication with the article and eventdetection system 100 via an operating server 206.

In some embodiments of the present technology, an article is monitoredautomatically and remotely via an operating server, without requiringprovisioning or other manual intervention by the user. For example, anarticle can be a medicine bottle that is delivered to a user, whereby anevent corresponds to detection of an amount of medicine remaining in thebottle. By way of illustration, the bottle can be configured such thatmultiple measurements, such as weight measurements, or detection offluid levels, are taken by the event detection system 100, in order todetermine robustly that an amount of medication has fallen below adefined threshold, with the multiple measurements taken in order tominimize false-positive results. In some embodiments of the presenttechnology, a delivery of refills for the medication is dispatched tothe location of the bottle upon when notification of the threshold isreceived at the operating server, and a determination is made by theoperating server that the result is robust and the medicine hasdefinitively fallen below a designated threshold. For example, themedicine can be an inhaler, and the triggering event can be adetermination of pressure in the inhaler, or detection of a certain gasmixture in the inhaler, indicating a need for replenishment. Theforegoing information can also be correlated and stored with othermedical records of the applicable users. Other examples of suchreplenishables shall be readily apparent to those skilled in the art.

In some embodiments, the event is an indication that a consumablerequires replacement. This event can be a detection of the state of thearticle or it can be an interactive button whereby a user can indicatethe article needs replacement. This can enable a user to purchase anarticle using the event detection system 100. There are many advantagesof using a dedicated connection (i.e., not a user's WiFi/home internetconnection). For example, if a user does not want to go through thehassle of configuring the event detection system 100 to connect to theirinternet, or if it is important that the event detection system worksindependent of the home connection.

The event detection system 100 can be used in conjunction with anautomobile tire, and a triggering event can correspond, for example, toa dramatic pressure drop, and a message is sent by the event detectionsystem 100 to an operating server indicating the drop in tire pressureand a geolocation of the automobile. In some embodiments of the presenttechnology, the power source 102 of the event detection system 100 is aseparate power source from the car battery. For example, the powersource can derive from heat sources or kinetic sources in the car, orfrom alternative redundant power sources in the car. In some suchembodiments, the geolocation of the event detection system is separatefrom geolocation systems in the car or otherwise. For example, thegeolocation data can be inferred from telecommunications networks 200 bywhich the event detection system 100 communicates. In some embodimentsof the present technology, upon detecting a failure of the tire andreceiving the geolocation of the automobile, an operating server canautomatically dispatch service to the location of the event detectionsystem 100. As will be apparent to one skilled in the art, the presenttechnology can be similarly utilized for event detection system 100included in an automobile battery, where the triggering eventcorresponds to a voltage indicating a battery failure. Other exampleswill be readily apparent to those skilled in the art.

In an embodiment of the present technology, the event detection system100 is embedded/attached to a mobile device, such as a cellular phone,laptop, tablet, etc. In some such embodiments, the event detectionsystem 100 can embedded on such device in a manner that isinconspicuous, or that cannot be detached physically from the devicewithout destruction/mutilation of the device. In some such examples, theevent detection system 100 communicates over a wirelesstelecommunications system 200 that is separate from the antenna andcommunication interface of the mobile device. In some such embodiments,the event detection system 100 has an ambient power source separate fromthat of the mobile device, so that the phone periodically reports itslocation to the operating server 206, separately from the mobile deviceitself, so that its location can continue to be tracked in case themobile device itself is wiped or runs out of power.

In some embodiments, the event detection system 100 is a medical deviceto monitor vitals of a patient. For example, the event detection system100 can monitor a patient's blood sugar level, oxygen level (i.e.,through pulse oximetry), or end tidal CO2 (the emitted carbon dioxidelevels of a patient. In some embodiments, the event detection system 100is in a pill form that is passed through the gut and records data as itpasses through a patient's system, wirelessly communicating the data toan external device.

In some embodiments, the event detection system 100 comprises an NFCdetector that can be embedded in the skin of the user. For example, auser could have an NFC detector in their hand which would enable theuser to place their hand on an object to read an NFC chip in the object.The NFC detector can also transmit data. For example, instead of tappinga NFC card on a reader to authenticate a user and provide them access toa building, the user can place their hand on the reader forauthentication.

In some embodiments, the event detection system 100 features amicrophone and a speaker, thus enabling a user to have an audioconnection to another party. This can be useful for customer servicepurposes, for example if a user has difficulty assembling an item theypurchased, they can easily contact customer support for guidance. Thiscan also be useful in emergencies as a direct connection to emergencyprofessionals, similar to dialing “911”. For example, a person thatfears they may be attached can press a button on event detection system100 to be connected to police.

In some embodiments, the event detection system 100 can monitor powerfrom a power outlet. In some embodiments, the event detection system 100has a power source independent of the power outlet. The event detectionsystem 100 can monitor power consumption and the status of the outlet.

In some embodiments, the event detection system 100 is attached toconsumer good articles at the time of production, prior to delivery tostores, as a means of theft detection. By way of example but notlimitation, the event detection system 100 can be attached to a consumerarticle, such as an article of clothing, at the time of manufacture, andprovisioned with sufficient bandwidth/“talk-time minutes” on atelecommunications network to send its location to the operating server206 for a period of time that is substantially longer than the expectedsales cycle for the consumer good. On initial receipt of a location thatis outside of the permitted stores to which the consumer good can bedelivered, the operating server can check a database to determinewhether or not the article has been sold. If the article has not beensold, a theft alert is generated. Alternative data flows for frauddetection will be apparent to those skilled in the art. In someembodiments of the present technology, an article, article, and systemare also remotely operable, by the user via the client 210, or by athird party via an operating server 206, as further depicted in theflowchart in FIG. 10

For example, when the article is an electronic device, the user canreduce a luminosity of the device remotely via a client. As anotherexample, the article can be a thermostat, and the user can obtainauthorization to obtain data from the thermostat and operate thethermostat remotely after authentication using codes on the article thatare submitted to the article operating server by the user. Otherexamples/embodiments of such remote authentication and operation ofarticle and articles will be readily apparent to those skilled in theart.

In some embodiments, the article can be wearable by a user. By way ofexample but not limitation, an article can constitute a button embeddedinto clothing or jewelry, whereby, by pressing the button, a call isimmediately placed to an emergency number. In some such embodiments, theuser can communicate with the emergency responders audibly, through amicrophone/speaker in communication with the event detection system. Insome such embodiments, the call is placed directly via the cellularnetwork 200. In other embodiments, a call center talks to the emergencyresponders based on data delivered from the article. As depicted in FIG.6 , an article 101 can have one or more printed icons/sensors 602, 604that are in communication with one or more event detection systems 100embedded in the article 101. In some such embodiments, an event istriggered by breaking or completing a circuit by virtue of the userinteraction. For example, the event detection system 100 can beconfigured so that, by virtue of touching the icon 602, 604, a circuitbetween the power source 102 and the remainder of the event detectionsystem 100. In other embodiments, the event detection system 100includes touch detection at the icon 602, 604. In other embodiments, theevent 402 corresponds to detection of light from the opening of anenclosed article, such as an envelope or box. Many alternativeembodiments will be apparent to those skilled in the art.

The processor 108 can be configured to operate the communicationinterface 104, in response to events detected by the event detectionsystem 100. In some embodiments, the power source 102 also serves as asensor that detects events which are reported to the processor 108. Asan illustrative, non-limiting example, the processor 108 can beprogrammed to detect when a photo detector acts as a power source 102 inthe event detection system 100 and receives light at a certainluminosity, and can be configured to send a signal via the communicationinterface 104 in response. In alternative embodiments, the eventdetection system 100 includes a sensor 103 that is separate from thepower source 102, wherein the sensor 103 is in communication with theprocessor/microprocessor 108, and the processor/microprocessor 108 isoperative to poll and respond events detected at the sensor 103.

In some embodiments of the present technology, the event detectionsystem 100 is utilized to measure and track the interaction of the userwith an article or article. In some such embodiments, the event 402 is aproxy indicating an interaction of the user with the article or article.By way of example but not limitation, the event 402 can indicate thatthe user touched an icon on the article 101, such as, by way ofillustrative example but not limitation, a printed “button” on thearticle 101. In some such embodiments, the articles 101 and icons 602,604 include marketing or promotional literature or materials. Some suchembodiments are utilized for tracking the responses of users tomarketing or advertising campaigns. By way of example but notlimitation, events recorded in some embodiments of the presenttechnology include measuring the opening of envelopes or other articlesin response to their contents; the opening or viewing of printed pages(e.g., views of a magazine advertisement); recording and measuringcustomer responses such as pushing an icon 602 604, which can bedepicted as a “button” or can otherwise indicate that part of an articlewas touched. In some such embodiments, such data can be used forreal-time, or asynchronous off-line optimization of marketing campaigns.In some embodiments of the present technology, a geo-location of theevent detection system 100 at the time of the customer interaction isdetermined; in some such embodiments, such geo-location data is trackedagainst the databases 204 to determine whether or not the interactionwith the event detection system 100 was by the targeted user. Suchdeterminations can be utilized, by way of example but not limitation, todetermine or enhance the accuracy of success rates in direct mailapplications.

In some embodiments, such information can be used to determine paymentsto third parties for marketing/advertising on an article, e.g., payingthird parties based upon user interactions with the article ortransactions conducted via the article. Such analytics can also include,by way of example but not limitation, determination of success rates fordirect mail campaigns. In some embodiments, subsets of the articles 101can be selected to estimate the applicable statistics by statisticalsampling. Other examples of analytics made possible by the presenttechnology will be apparent to those skilled in the art.

In some embodiments of the present technology, the event detectionsystem 100 is operable to communicate with a user via a mobile phoneapplication via a short-range protocol (e.g., NFC, Bluetooth, etc.). Insome such embodiments, the event can correspond to a determination bythe event detection system 100 that the user's mobile phone is within adetermined proximity of the event detection system 100. For example, anevent detection system 100 can be embedded in an article, whereby theevent detection system 100 triggers an event when the event detectionsystem 100 detects via the NFC that a device with a specified identifieris within a distance threshold of the event detection system 100, andthe event triggers interaction between the event detection system 100and the mobile device (e,g, communication of a message from the eventdetection system 100 to the mobile device via the NFC, for display onthe mobile device).

In some embodiments, an article 101 includes two or more components thatcommunicate via an NFC, whereby the event detection system 100 isoperative to detect from the NFC signals when such two or morecomponents are physically moved relative to one another. For example,such components can be located on opposite pages of a magazine, suchthat an event can correspond to a page of the magazine being turned.Alternatively, one such component can be on a detachable part of thearticle and another component is on a non-detachable portion, wherebythe event detection system 100 is operative to detect that theapplicable portion of the article has been detached. Other suchimplementations of multiple short-range radio components within anarticle will be apparent to those skilled in the art.

In some embodiments of the present technology, the event detectionsystem 100 is utilized to conduct electronic commerce transactions viathe event detection system 100, i.e., the article 101 can constitute abill or an invoice, e.g., a cable bill or a credit card bill.

For example, an article in the form of a bill for cable television caninclude an event detection system 100 sent to a user's home, and caninclude the icons 602, 604 that indicate options to enable a user toselect purchases of cable television articles, which are indicated bythe icons 602 604. Also, the article 101 can be a credit card bill, andthe icons 602, 604 can indicate whether or not the user approves orwishes to dispute individual payments. In another example, an icon 602,604 on a credit card bill with an event detection system 100incorporated therein can be used to indicate whether or not a creditcard invoice should be deducted from a user's bank account. In otherembodiments of the present technology, the article 101 can be anadvertisement, for instance, in a publication such as a magazine, whichenables the user to purchase advertised items by touching an icon 602,604. In some such embodiments, the user's credit card information isstored on or is otherwise accessible by one or more article operatingservers 206, and purchases are allowed via the icons 602, 604 after theuser has been authenticated. In some such embodiments, communicationsbetween the event detection system 100 and the device operating servers206 in connection with the transaction is conducted via encryptedprotocols as described above.

As other examples, the articles 101 can be printed take-out/carry-outmenus, or containers for food delivery, such as pizza boxes. In somesuch embodiments, the user can purchase an item for delivery viatouching a corresponding icon 602, 604. In some such embodiments, adelivery service is reached via an operating server 206, which receivesan electronic message (e.g., an email, SMS, Twitter message, or othersuch electronic communication) from the event detection system 100 viathe Internet. In other embodiments, the event detection system 100places a telephone call to via the communications network 200 to thevendor. Some such embodiments can include miniature a microphone and/orspeaker that attached to or part of the event detection system 100, andis in communication with the processor 108; the microphone/speaker willbe operable at the energies provided by the ambient power source 102,and can be inconspicuous in or visually indistinguishable from thearticle 101. Also, the microphone or speaker is used for vocalcommunication with the vendor via the communications network 200. Insome such embodiments, the transactions and fulfillment occur only afterthe postal address to which the article 101 was sent has beenauthenticated against one or more of the geo-location data from theevent detection system 100 and/or an identifier for the user or eventdetection system 100 that has been authenticated in accordance withembodiments of the present technology. In some examples, the purchaseditem is delivered in response to event, to the authenticated/validatedphysical/postal address of the article 101.

Embodiments of the present technology support one-way, two-way, ormulti-party vocal messages. In some embodiments of the presenttechnology, the user can click on an icon 602, 604, or activate anotherevent via the article, in order to send an audio message to apre-determined recipient. For example, the recipient can be a vendor ora customer service representative. In some embodiments of the presenttechnology, following occurrence of the event, and provided thatsufficient power is available from the power source 102, a message isrecorded from the user via the microphone on the article 101. In someembodiments, this message is stored at the microprocessor 108 and/orcommunications processor 104 until there is sufficient power from thepower source 102 to send the message via the communications system 200.In some embodiments, the message is sent via the telecommunicationssystem 200 automatically after recording.

In some embodiments, the event establishes direct communication with therecipient via the communications network 200 in real-time, withoutintermediate storage. In some embodiments, the message from the user isforwarded to the recipient as an electronic message, such as an email,SMS, Twitter message, or other similar asynchronous electronic message.In some embodiments, the message is forwarded telephonically. In someembodiments, the communication interface 104 in each of several articles101 sent to different recipients can be pre-loaded with a call-in numberof other identifier for a conference call, so that the recipients canestablish and/or join the conference call via the telecommunicationsnetwork 200 by clicking on the icon 602, 604 or through another event atthe article. In some embodiments of the present technology, prior todelivery of the article to the end user, charges for expected use of thetelecommunications network 200 by the event detection system 100 havebeen pre-paid.

In some embodiments of the present technology, an article is mailed tothe user and the user is informed (via text on the article) that anevent triggered by the user will indicate an assent by the user to atransaction. By way of illustrative example but not limitation, the textcan state that the user will be charged for or will otherwise reimbursethe postage or other delivery costs for the delivery of the article 101to the user in the event of the user opening of the article, touching acorresponding icon 602, 604, etc. In some embodiments of the presenttechnology, a message indicating that the user has assented to thecharge is sent by the event detection system 100 to the operating server206, and the user is then charged separately. In other embodiments, uponthe occurrence of the event, the user is automatically charged for thereimbursement, for example, by a charge to a credit/debit card or otheron-line account that is previously stored for the user for access by theoperating server 206.

In some embodiments of the present technology, an article is physicallymailed with prepaid postal or delivery charges for return of the articleto the sender. In some such embodiments, an article identifier for theevent detection system 100 can be reutilized for the individual user towhom the article was sent, for use in subsequent deliveries to thatuser. Alternatively, following return of the original article orarticle, the article identifier can be decommissioned for the originaluser, and can be returned to a pool of available article identifiers.

In some embodiments, the user can indicate, via interaction with an icon602 604 or other event, that they are to receive a financial credit orreward on return of the article or article.

In some embodiments, the user can indicate, via the icon 602 604 orother event at the article, that the article is to be collected, and amessenger can be dispatched to the user's location or postal address tocollect the article 101 in response. Other variants for arranging returnof an article via the event detection system 100 will be apparent tothose skilled in the art.

Embodiments of the present technology comprise a storage device thatincludes a high-speed wireless cellular connection, whereby the storagedevice is preloaded with user content, and the device is configured torelease the user content by way of the cellular connection. Suchembodiments are depicted schematically in FIG. 7 . In some embodimentsof the present technology, the device 700 can be in a small form factor,such as a key fob or memory stick; other suitable form factors will beapparent to those skilled in the art. The device 700 includes one ormore high capacity storage media 702, such as, by way of example but notlimitation, flash memory. Some embodiments of the present technologyinclude a port 704, which can be utilized for receiving power for thedevice 700, and/or for transfer of the content resident in the storagemedia 702 to another device; by way of example but not limitation, theport can be a USB port. The device further includes a cellularcommunication interface 706. The cellular communication interface 706can, by way of example but not limitation, be a 4G system, such as LTEor Mobile WiMax; other alternatives will be apparent to those skilled inthe art.

In some embodiments of the present technology, the device 700 isconfigured to release content to an individual user, by virtue of one ormore user identifiers associated with the user. In some embodiments ofthe present technology, a user can have content released from the device700 by provisioning the applicable identifier to the device 700. Anexample of the provisioning and utilization of the device 700 inaccordance with such embodiments is depicted in FIG. 8 . At the time ofconfiguration, the device is loaded with one or more pieces of content800. Such content can be, by way of example but not limitation, moviesor other video, songs, books, software, or other digital content that isgenerally streamed to an end user; other such content which can bedelivered to a user by use of the device 700 will be readily apparent tothose skilled in the art. As will be apparent to those skilled in theart, remote authentication steps described herein can alternatively beconducted locally on the device 700.

In some embodiments, each such piece of content is associated with anidentifier that is unique to the user, the content, and/or the device802, i.e. public keys. The device, content, and user identifiers arestored in a database 804. The device is then physically shipped to theuser 806, associated with a user at the time of purchase or delivery ofthe device 700 to the user, etc. In some embodiments, the association,or binding, of the identifiers with the device can be conducted via anapplication running on a user's smartphone, whereby the instance of theapplication on the user has previously been authenticated. Inalternative embodiments, such association/binding of the identifierswith the device 700 occurs at the point of sale, via a point of saledevice in communication with the database 204 via the Internet 208.

Following receipt of the device by the user 808, the user can unlock thecontent on the device by providing the key for the applicable content tothe device 810. In some embodiments of the present technology, the keyis automatically provided to the device 700 by another device; by way ofillustration but not limitation, the ID can be provided by a televisionin communication with the device via the port 704 or the communicationinterface 706. The key is sent by the device to a central server via thetelecommunications system 812. The key is authenticated by a centralserver 814, and upon authentication, the central server grants apermission to the device 700 to release the applicable content to theuser 816. In some embodiments of the present technology, contents arecontinually updated to the device by the central servers via thecellular system 706, for potential later retrieval by a user. Inalternative embodiments, the communication interface 706 can be alow-bandwidth cellular communications system; in some such embodiments,the communications interface is not utilized to update content to thedevice.

In certain some embodiments, the devices are physically returned by theuser to receive new content, whether loaded on the same device 700 orsent to the user in a new device 700. Embodiments of the presenttechnology include additional security measures for accessing orreleasing content from a device 700.

In some embodiments of the present technology, in addition toauthentication of the user/device/content identifiers, the geo-locationof the device is determined, and the content is only released if thegeo-location is approved for such device/content. In some embodiments ofthe present technology, such geolocation authentication is conducted atthe remote database 204; in alternative embodiments, the geo-locationauthentication is performed locally on the device 700. In someembodiments, the geo-location is performed using telecommunicationssystem on the device 700. In alternative embodiments, the geo-locationor alternative authentication utilizes short-range radio communicationsto a user's mobile device; examples of short-range radio protocols thatcan be used for such location include, by way of example but notlimitation NFC, Bluetooth, RFIDs, beacons; etc. In other embodiments,the supplemental security measure can include biometric identificationof the user by the device 700.

Embodiments of the present technology utilize the information collectedfrom a user via an article 101 to personalize on-line, Internet andmobile-based content to such user; such customization can be conductedoff-line or in real-time with the data received via the article 101. Forexample an online identifier of the user which identifies the user'sactivities on the World Wide Web or elsewhere on the Internet (such as apersistent identifier stored in a cookie, login usernames for on-lineservices, mobile phone numbers, or other such on-line identifiers aswill be apparent to those skilled in the art) can be correlated withidentification of the article in the device identification database 204.Web-based content can be customized for the user based on the datarecorded about such user from a triggering event and their otherinteraction with the event detection system 100. By way of example butnot limitation, advertisements or other web-based or mobile content canbe selected or customized for the user based on magazine contents thathave been viewed by the user, as detected by the event detection system100 and reported to the operating server 206.

Alternatively, emails, texts, Twitter messages, or other such electronicmessages can be sent to a user based on their interaction with thearticle or article, as detected and communicated by the event detectionsystem 100. By way of example but not limitation, a user can be sent athank you note following interaction with the event detection system100. The article 101 can also be used by the end user (actively orpassively) to update other records and workflows. By way of example butnot limitation, health or insurance records of a user could be updatedby way of the user's interaction with the event detection system 100.

In some embodiments of the present technology, analytics can beconducted on data sets contained in the database 204 which combine datafrom the users' on-line activities (e.g., their Web usage) with dataregarding such users' interactions with article or articles. Forexample, the fees charged to advertisers can be based upon delivery orresponse to Web or mobile based ads served to users as well as responserates from such users to paper-based advertising, as the latter isdetected and reported by the event detection system 100. Other examplesof integration of feedback of the event detection system 100 with userinteractions via separate electronic media will be apparent to thoseskilled in the art.

In some embodiments of the present technology, the output 110 can becoupled to sensors 103 such as a camera that is operable at the powerprovided by the supply 102. In some such embodiments, the eventdetection system 100 is operable to take a picture of the user via thecamera 103 when the user opens the article, and then transmit thepicture over a wireless network 200. In some such embodiments, thepicture is at a low-resolution, transmittable over low-baud ratenetworks. In some embodiments, the picture can be utilized toauthenticate the user, or provide proof that the individual opened thearticle. For example, for confirmation of service of process. Other usesand variants of such a camera will be readily apparent to those skilledin the art.

Some embodiments of the present technology include mechanisms forwirelessly detecting the presence of an article in the vicinity of thedetection mechanism, in order to detect the presence of such amechanism. In some such embodiments, the wireless detector checks forsignature wireless transmissions in the vicinity that confirm thepresence of an article or article. Such detection can be used by anindividual to elect to dispose or destroy an article or article, or toopen an article in an area that cannot transmit wireless signals (e.g.,a Faraday cage).

In some embodiments of the present technology include an applicationprogramming interface (API) that allow interactions with the eventdetection system 100 to be programmed or re-programmed. By way ofexample but not limitation, the API can allow the interactions fromicons 602 604 to be programmed or reprogrammed, and result in differentworkflows. For example, the API can be utilized to program the eventdetection system 100 such that differing sequences of interactions withthe icons 602, 604 result in different workflows being determined by thedevice operating servers 206. As another illustrative example, the icons602, 604 can have the visual effect of numbers on a keypad, and the APIcan be utilized in a first instance to allow the entry of certainnumbers to lock or unlock a remote device that is in communication withthe operating servers 206; the API can subsequently utilized in analternative program/instruction set that can be uploaded to the eventdetection system 100 via the telecommunications network 200, whereby therevised instructions allow the user to operate an alternative device viathe telecommunications network 200. Many other examples of work flowsthat can be programmed by use of the API in accordance with the presenttechnology will be readily apparent to those skilled in the art.

Although a variety of examples and other information was used to explainaspects within the scope of the appended claims, no limitation of theclaims should be implied based on particular features or arrangements insuch examples, as one of ordinary skill would be able to use theseexamples to derive a wide variety of implementations. Further andalthough some subject matter can have been described in languagespecific to examples of structural features and/or method steps, it isto be understood that the subject matter defined in the appended claimsis not necessarily limited to these described features or acts. Forexample, such functionality can be distributed differently or performedin components other than those identified herein. Rather, the describedfeatures and steps are disclosed as examples of components of systemsand methods within the scope of the appended claims.

The various embodiments described above are provided by way ofillustration only and should not be construed to limit the scope of thedisclosure. Those skilled in the art will readily recognize variousmodifications and changes that can be made to the principles describedherein without following the example embodiments and applicationsillustrated and described herein, and without departing from the spiritand scope of the disclosure.

We claim:
 1. A method comprising: coupling a communication system withan article, wherein the communication system includes a sensor fordetecting an interaction event with the article at a first location, amicrocontroller coupled with the sensor, and a communication interfacecoupled with the microcontroller; associating the communication systemwith an article identifier of the article upon the sensor detecting afirst trigger event associated with the interaction event, the firsttrigger event initiating communication with the article at a firstlocation upon a predetermined threshold of the interaction event beingmet at the article, wherein the communication indicates a status of thearticle in relation to the interaction event; in response to thepredetermined threshold being met, authenticating the article based onan authentication policy, the authentication policy configured tofacilitate communication with the article based on a geo-location of thedevice and the interaction event; detecting a second trigger event at asecond location remote from the first location, wherein the secondtrigger event initiates a communication at the communication systemincluding the article identifier from the article at the first location,the communication indicating a remedial action to resolve the firsttrigger event at the article; in response to the second trigger event,authenticating the communication from the second location based on thearticle identifier and a set of credentials to verify that thecommunication is generated in response to the first trigger eventdetected by the sensor of the communication system, wherein theauthentication is performed remotely from the interaction eventoccurring at the article; and permitting a third party to remotelycontrol operation of the article at the second location based on theauthentication of the article identifier, the set of credentials, andthe remedial action to resolve the first trigger event.
 2. The method ofclaim 1, further comprising sending instructions to the article tocontrol operation of the article based on whether the identification ofthe article is authenticated.
 3. The method of claim 2, furthercomprising refraining from sending the instructions to the article ifthe identification of the article fails authentication.
 4. The method ofclaim 1, further comprising: storing an indication of the association ofthe article identifier with the communication system in an articleidentifier database; and authenticating the identification of thearticle by comparing an indication associated with a provider of thecommunication system and the article identifier to the indication of theassociation of the article identifier with the communication system inthe article identifier database.
 5. The method of claim 1, wherein thearticle identifier is assigned to the article concurrently with theassociation of the article identifier with the communication system. 6.The method of claim 1, wherein the article identifier is pre-assigned tothe article before either or both the communication system is coupledwith the article and the communication system is associated with thearticle.
 7. The method of claim 1, wherein the article identifier isassigned to the article after the communication system is coupled to thearticle.
 8. The method of claim 1, wherein the interaction eventincludes a user activating the article.
 9. The method of claim 1,wherein remotely controlling operation of the article comprisescontrolling the article to remotely onboarding the article for operatingthrough one or more communication networks.
 10. The method of claim 1,wherein remotely controlling operation of the article further comprisescontrolling relates of user content through the article.
 11. A systemfor controlling an article coupled with a communication system includinga sensor for detecting an interaction event with the article at a firstlocation, the system comprising: a microcontroller coupled with thesensor, and a communication interface coupled with the microcontroller;one or more processors; and at least one computer-readable storagemedium having stored therein instructions which, when executed by theone or more processors, cause the one or more processors to performoperations comprising: associating the communication system with anarticle identifier of the article upon the sensor detecting a firsttrigger event associated with the interaction event, the first triggerevent initiating communication with the article at a first location upona predetermined threshold of the interaction event being met at thearticle, wherein the communication indicates a status of the article inrelation to the interaction event; in response to the predeterminedthreshold being met, authenticating the article based on anauthentication policy, the authentication policy configured tofacilitate communication with the article based on a geo-location of thedevice and the interaction event; detecting a second trigger event at asecond location remote from the first location wherein the secondtrigger event initiates a communication at the communication systemincluding the article identifier from the article at the first locationincluding the article identifier, the communication indicating aremedial action to resolve the first trigger event at the article; inresponse to the second trigger event, authenticating the communicationfrom the second location based on the article identifier and a set ofcredentials to verify that the communication is generated in response tothe first trigger event detected by the sensor of the communicationsystem, wherein the authentication is performed remotely from theinteraction event occurring at the article; and permitting a third partyto remotely control operation of the article at the second location,article based on authentication of the article identifier the set ofcredentials and the remedial action to resolve the first trigger event.12. The system of claim 11, wherein the instructions which, whenexecuted by the one or more processors, further cause the one or moreprocessors to perform operations comprising sending instructions to thearticle to control operation of the article based on whether theidentification of the article is authenticated.
 13. The system of claim12, wherein the instructions which, when executed by the one or moreprocessors, further cause the one or more processors to performoperations comprising refraining from sending the instructions to thearticle if the identification of the article fails authentication. 14.The system of claim 11, wherein the instructions which, when executed bythe one or more processors, further cause the one or more processors toperform operations comprising: storing an indication of the associationof the article identifier with the communication system in an articleidentifier database; and authenticating the identification of thearticle by comparing an indication associated with a provider of thecommunication system and the article identifier to the indication of theassociation of the article identifier with the communication system inthe article identifier database.
 15. The system of claim 11, wherein thearticle identifier is assigned to the article concurrently with theassociation of the article identifier with the communication system. 16.The system of claim 11, wherein the article identifier is pre-assignedto the article before either or both the communication system is coupledwith the article and the communication system is associated with thearticle.
 17. The system of claim 11, wherein the article identifier isassigned to the article after the communication system is coupled to thearticle.
 18. The system of claim 17, wherein the interaction eventincludes a user activating the article.
 19. The system of claim 11,wherein remotely controlling operation of the article comprisescontrolling the article to remotely onboarding the article for operatingthrough one or more communication networks.
 20. The system of claim 19,wherein remotely controlling operation of the article further comprisescontrolling relates of user content through the article.