System for loss prevention and recovery of electronic devices

ABSTRACT

A system for loss prevention and loss recovery of portable electronic devices. The system includes a server administered by an administrator, a software application executable on a portable electronic device in communication with the server, a unique registration identifier associated with the portable electronic device, and a distance tracking device. The association between the portable electronic device and the unique registration identifier is stored on the server. The software application is configured to connect to the distance tracking device. The distance tracking device is configured to provide a notification when the distance tracking device is further than a predetermined boundary from the portable electronic device. When the unique registration identifier is entered at a website associated with the server, return delivery information is provided.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 15/814,277, filed Nov. 15, 2017, which claims the benefit ofU.S. Provisional Application No. 62/424,295, filed Nov. 18, 2016 and62/583,348, filed Nov. 8, 2017, the entireties of which are incorporatedby reference herein.

FIELD OF THE INVENTION

The present invention relates generally to a system for the recovery oflost items such as cellular telephones or tablets.

BACKGROUND OF THE INVENTION

When smartphones, tablets or other portable electronic devices are lost,the content is lost as well. Many times it is never recovered. Thecontent that is lost can include and is not limited to irreplaceablepersonal photos, as well as videos of family, friends and importantevents. Other content that is lost is personal data, including thecontact information of family, friends and business contacts. Thepresent invention is useful to help prevent the loss of a person'ssmartphone, tablet or other portable electronic device.

SUMMARY OF THE PREFERRED EMBODIMENTS

In accordance with a first aspect of the present invention there isprovided a system for loss prevention and loss recovery of portableelectronic devices that includes a server administered by anadministrator, a first software application executable on a firstportable electronic in communication with the server, a second softwareapplication executable on a second portable electronic in communicationwith the server, a first unique registration identifier associated withthe first portable electronic device, and a second unique registrationidentifier associated with the second portable electronic device. Theassociation between the first portable electronic device and the firstunique registration identifier is stored on the server, and the theassociation between the second portable electronic device and the secondunique registration identifier is stored on the server. The system alsoincludes first and second distance tracking devices. The first softwareapplication is configured to connect to the first distance trackingdevice, and the first distance tracking device is configured to providea first notification when the first distance tracking device is furtherthan a predetermined boundary from the first portable electronic device.The second software application is configured to connect to the seconddistance tracking device, and the second distance tracking device isconfigured to provide a second notification when the second distancetracking device is further than a predetermined boundary from the secondportable electronic device. When the first unique registrationidentifier is entered at a website associated with the server, returndelivery information associated with the first portable electronicdevice is provided, and when the second unique registration identifieris entered at the website associated with the server, return deliveryinformation associated with the second portable electronic device isprovided.

In a preferred embodiment, the first and second portable electronicdevices (or the first and second users or first and second distancetracking devices or all of these components) can be associated with agroup (e.g., a family group). When they are associated with a group alocation of the first portable electronic device can be seen on thesecond software application and vice versa. In an embodiment, when theyare associated with a group a location of the first distance trackingdevice can also be seen on the second software application and viceversa. Preferably, the first distance tracking device includes a firstbluetooth range within which the first distance tracking device is incommunication with the first portable electronic device (and outside ofwhich it is not), the second distance tracking device includes a secondbluetooth range within which the second distance tracking device is incommunication with the first distance tracking device (and outside ofwhich it is not). If the second distance tracking device is outside ofthe first bluetooth range, but is in communication with the firstdistance tracking device, a third bluetooth range is defined between thefirst portable electronic device and the second distance tracking deviceso that the second distance tracking device can communicate with thefirst portable electronic device. The third bluetooth range is greaterthan the first and second bluetooth ranges.

In a preferred embodiment, the first distance tracking device includes akey fob and a removable member. The removable member can be separatedfrom the key fob, and includes a keychain aperture defined therein.Preferably, the system includes a first tag that includes the firstunique registration identifier thereon, the first tag is secured to thefirst portable electronic device or a first case for the first portableelectronic device. The first tag can include near-field communicationsuch that it can communicate the first unique registration identifier.In a preferred embodiment, the first distance tracking device isconfigured such that the first notification changes from a first stateto a second state as the first distance tracking device comes intocloser proximity to the first portable electronic device. For example,the second state can be faster frequency beeping than the first state.

In a preferred embodiment, the first distance tracking device includes abutton thereon, and activation of the button causes the first portableelectronic device to perform a first action chosen from dial 911, dial acontact, message one or more contacts. Preferably, the first distancetracking device includes a button thereon and activation of the buttonfor a first predetermined amount of time causes a first action to occurand activation of the button for a second predetermined amount of timecauses a second action to occur. The first and second actions can bechosen from dial 911, dial a contact, message one or more contacts. In apreferred embodiment, the first distance tracking device includes aWi-Fi access point therein, whereby the first tracking device is a Wi-Fiextender that the first portable electronic device can connect to.

In accordance with another aspect of the present invention there isprovided a computer-implemented method for the loss prevention and lossrecovery of a first user's portable electronic device. The methodincludes loading a first software application on the portable electronicdevice. The first software application is associated with a server.Associating a first unique registration identifier with the first user'sportable electronic device, obtaining a first distance tracking devicethat is configured to provide a notification when the first distancetracking device is further than a predetermined boundary from the firstuser's portable electronic device, connecting the first distancetracking device to the first software application, and placing the firstunique registration identifier on the first user's portable electronicdevice or a case for the first user's portable electronic device. In apreferred embodiment, the method includes reporting the first distancetracking device as lost to the server. The first distance trackingdevice has a bluetooth (or other communication protocol) range. When asecond user's portable electronic device enters the bluetooth range, thesecond user's portable electronic device communicates a location of thefirst distance tracking device to the server. The method furtherincludes communicating the location of the first distance trackingdevice to the first user's portable electronic device.

In a preferred embodiment, the method includes associating the firstportable electronic device (and its user) with a second user's portableelectronic devices (that includes the software app thereon) with agroup. The first unique registration identifier is associated with a tagthat includes near-field communication, and the method further includesplacing a second user's portable electronic device in close proximity tothe tag, where the first unique registration identifier is communicatedto the second user's portable electronic device.

In accordance with another aspect of the present invention there isprovided a kit for loss prevention and recovery of a portable electronicdevice. The kit includes a tag configured to be secured to a portableelectronic device or a case for a portable electronic device, and adistance tracking device that is configured to connect to a portableelectronic device that has been associated with the unique registrationidentifier. The tag includes a unique registration identifier andcontact source information thereon. The contact source informationincludes at least one of a telephone number, a website or an emailaddress. The distance tracking device is configured to provide anotification when the distance tracking device is further than apredetermined boundary from the portable electronic device that has beenassociated with the unique registration identifier. In a preferredembodiment, the predetermined boundary is at least one of apredetermined distance or when the distance tracking device disconnectsfrom the associated portable electronic device. Preferably, the distancetracking device includes a button that when activated causes theassociated portable electronic device to emit at least one of a sound ora vibration.

In a preferred embodiment, the kit further comprising a case and the tagis secured to the case. Preferably, the case includes a back having anopening defined therein and a protrusion that extends into the opening.The tag is secured to the protrusion. In preferred embodiments, thedistance tracking device is a key fob or a smart watch.

In accordance with another aspect of the present invention there isprovided a system for loss prevention and loss recovery of portableelectronic devices. The system includes a server administered by anadministrator, a software application executable on a portableelectronic device in communication with the server, a uniqueregistration identifier associated with the portable electronic device,and a distance tracking device. The association between the portableelectronic device and the unique registration identifier is stored onthe server. The software application is configured to connect to thedistance tracking device. The distance tracking device is configured toprovide a notification when the distance tracking device is further thana predetermined boundary from the portable electronic device. When theunique registration identifier is entered at a website associated withthe server, return delivery information is provided.

In a preferred embodiment, the return delivery information is a firstaddress associated with an owner of the portable electronic device or asecond address associated with the administrator. Preferably, the returndelivery information includes tracking information from a parceldelivery service. In a preferred embodiment, the distance trackingdevice is a second portable electronic device that includes a secondsoftware application executable thereon that is associated with thefirst software application. Preferably, the second portable electronicdevice is a smartwatch. However, the second portable electronic devicecan be a smartphone or other portable electronic device.

In accordance with another aspect of the present invention there isprovided a computer-implemented method for the loss prevention and lossrecovery of a portable electronic device. The method includes loading asoftware application on the portable electronic device. The softwareapplication is associated with or in communication with a server. Themethod includes associating a unique registration identifier with theportable electronic device and obtaining a distance tracking device. Thedistance tracking device is configured to provide a notification whenthe distance tracking device is further than a predetermined boundaryfrom the portable electronic device. The method also includes connectingthe distance tracking device to the software application, and placingthe unique registration identifier on the portable electronic device ora case for the portable electronic device. In a preferred embodiment,the method also includes entering the unique registration identifier ata website associated with the server. Return delivery information isprovided to the person entering the unique registration identifier.Preferably, the distance tracking device is a second portable electronicdevice, and the method includes loading a second software application onthe second portable electronic device.

In accordance with another aspect of the invention the softwareapplication is embodied in a computer-readable, non-transitory mediumincluding instructions that, when executed by a source device incooperation with a server, enables the source device to implement thesystem for loss prevention and loss recovery (or any portion of thesystem) of the source device as described herein. The present inventionalso included a computer implemented method for implementing the systemfor loss prevention and loss recovery of portable electronic devices asdescribed herein. U.S. Pat. No. 9,706,519 is incorporated by referencein its entirety herein.

A preferred embodiment, the present invention is a two part system thatincludes the loss prevention of smart phones, tablets or other personalor portable electronic devices and the recovery of smart phones, tabletsor other personal or portable electronic devices. In an exemplaryembodiment, the system operates under the Smartphone Registry(smartphoneregistry.com). For example, the key fobs, tags, cases andhardware can be available at QEPR.com and smartphoneregistry.com.

An exemplary set of steps for set up and activation of the lossprevention system described herein will now be described. It will beappreciated that these steps are only exemplary and those of ordinaryskill in the art can make suitable modifications or changes. 1.Bluetooth Function—under the settings tab, the Bluetooth function on thesmartphone or tablet must be turned ‘ON.’ 2. Internet connection—thesmartphone or tablet must be connected to the internet to initiallydownload the QEPR app. 3. Download the QEPR app at the iTunes App Storefor iPhones and iPads and at the Google Play Store for Androidsmartphones and tablets. 4. Set up the ‘QEPR app’ for basic use: Step1—launch the QEPR app; Step 2: activate the distance trackingdevice—find the new device icon on the screen, then swipe it to theleft; Step 3: Connect the QEPR app to the distance tracking device(e.g., smart watch, key fob or other portable sensor assembly).

For ease of explanation, the smart phones, tablets or other personal orportable electronic devices are all collectively referred to herein assmart phones.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may be more readily understood by referring to theaccompanying drawings in which:

FIG. 1 is a flow chart showing a loss prevention and recovery system inaccordance with a preferred embodiment of the present invention;

FIG. 2 is a diagram showing a networked computing environment thatallows implementation of the methods and systems disclosed herein;

FIG. 3 shows the loss prevention portion of the system shown in FIG. 1;

FIG. 4 is an elevational view of an exemplary key fob in accordance witha preferred embodiment of the present invention;

FIG. 5 is shows the loss recovery portion of the system shown in FIG. 1;

FIG. 6 is an elevational view of an exemplary tag in accordance with apreferred embodiment of the present invention;

FIG. 7 is a perspective view of a smartphone in a case having a tagthereon in accordance with a preferred embodiment of the presentinvention;

FIGS. 8-1 and 8-2 show an exemplary mind map of the smart phone app ofthe present invention;

FIG. 9 shows an exemplary mind map of the watch app of the presentinvention;

FIG. 10 shows an exemplary mind map of the website of the presentinvention;

FIG. 11 shows an example of a bluetooth mesh network between a pluralityof grouped distance tracking devices and a portable electronic device;

FIG. 12 shows an example of the steps for locating a lost distancetracking device; and

FIG. 13 is an elevational view of an exemplary key fob in accordancewith a preferred embodiment of the present invention.

Like numerals refer to like parts throughout the several views of thedrawings.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The following description and drawings are illustrative and are not tobe construed as limiting. Numerous specific details are described toprovide a thorough understanding of the disclosure. However, in certaininstances, well-known or conventional details are not described in orderto avoid obscuring the description. References to one or an embodimentin the present disclosure can be, but not necessarily are references tothe same embodiment; and, such references mean at least one of theembodiments.

Reference in this specification to “one embodiment” or “an embodiment”means that a particular feature, structure, or characteristic describedin connection with the embodiment is included in at least one embodimentof the-disclosure. The appearances of the phrase “in one embodiment” invarious places in the specification are not necessarily all referring tothe same embodiment, nor are separate or alternative embodimentsmutually exclusive of other embodiments. Moreover, various features aredescribed which may be exhibited by some embodiments and not by others.Similarly, various requirements are described which may be requirementsfor some embodiments but not other embodiments.

The terms used in this specification generally have their ordinarymeanings in the art, within the context of the disclosure, and in thespecific context where each term is used. Certain terms that are used todescribe the disclosure are discussed below, or elsewhere in thespecification, to provide additional guidance to the practitionerregarding the description of the disclosure. For convenience, certainterms may be highlighted, for example using italics and/or quotationmarks: The use of highlighting has no influence on the scope and meaningof a term; the scope and meaning of a term is the same, in the samecontext, whether or not it is highlighted.

It will be appreciated that the same thing can be said in more than oneway. Consequently, alternative language and synonyms may be used for anyone or more of the terms discussed herein. No special significance is tobe placed upon whether or not a term is elaborated or discussed herein.Synonyms for certain terms are provided. A recital of one or moresynonyms does not exclude the use of other synonyms. The use of examplesanywhere in this specification including examples of any terms discussedherein is illustrative only, and is not intended to further limit thescope and meaning of the disclosure or of any exemplified term.Likewise, the disclosure is not limited to various embodiments given inthis specification.

Without intent to further limit the scope of the disclosure, examples ofinstruments, apparatus, methods and their related results according tothe embodiments of the present disclosure are given below. Note thattitles or subtitles may be used in the examples for convenience of areader, which in no way should limit the scope of the disclosure. Unlessotherwise defined, all technical and scientific terms used herein havethe same meaning as commonly understood by one of ordinary skill in theart to which this disclosure pertains. In the case of conflict, thepresent document, including definitions, will control.

It will be appreciated that terms such as “front,” “back,” “top,”“bottom,” “side,” “short,” “long,” “up,” “down,” “aft,” “forward,”“inboard,” “outboard” and “below” used herein are merely for ease ofdescription and refer to the orientation of the components as shown inthe figures. It should be understood that any orientation of thecomponents described herein is within the scope of the presentinvention.

Some of the drawings herein and the following discussion are intended toprovide a brief, general description of a suitable computing environmentin which at least a portion of the subject matter disclosed herein maybe implemented. Although not required, aspects of a system and methodfor loss recovery or loss prevention, a portion of which takes place ina networked computing environment, will be described in the generalcontext of computer-executable instructions, such as program modules,being executed by a personal computer and/or computer-readable media onwhich such instructions are stored. Generally, program modules includeroutines, programs, objects, components, data structures, etc., thatperform particular tasks or implement particular abstract data types.Moreover, those skilled in the art will appreciate that the inventionmay be practiced with other computer system configurations, includinghand-held devices, cellular or mobile telephones, multiprocessorsystems, microprocessor-based or programmable consumer electronics,network PCs, minicomputers, mainframe computers, and the like. Theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Referring now to the drawings, wherein the showings are for purposes ofillustrating the present invention and not for purposes of limiting thesame, FIG. 1—show a system for helping prevent the loss of a cell phone,tablet or other portable electronic device together with a system forrecovery of a cell phone, tablet or other portable electronic device.For descriptive purposes the invention will be described where theportable electronic device is a smart phone. Generally, the entiresystem is referred to herein as a loss prevention and recovery system10.

FIG. 1 shows an exemplary chart of the entire loss prevention andrecovery system 10 in accordance with a preferred embodiment of thepresent invention. As shown, the system 10 includes two separatecomponents, loss prevention system 12 and loss recovery system 14. Boththe loss prevention system 12 and loss recovery system 14 operatethrough or via a website (e.g., smartphoneregistry.com) 16 and an app(e.g., QEPR) 18. Both the loss prevention system and loss recoverysystem will be described in more detail below.

With reference to FIG. 2, a preferred embodiment of the loss preventionand recovery system described in the context of an exemplary computernetwork system 100 illustrated. System 100 includes two portableelectronic devices 110 and 112 as part of the system. Two portableelectronic devices are shown to illustrate two different aspects orversions of the invention. As described below, the first portableelectronic device 110 is in communication with a distance trackingdevice that is a key fob 111 and the second portable electronic device112 is in communication with a distance tracking device that is asmartwatch 113 or the like. The portable electronic devices 110 and 112,for example, are cellular or mobile telephones, tablets or otherportable electronic devices, that are linked via a communication medium,such as a network 114 (e.g., the Internet), to an electronic device orsystem, such as a server 116, that is part of an administrator system123. It will be appreciated that this essentially means that thecomponents in box 123 in FIG. 2 are part of a system operated by thecompany that owns or administers the software application to users(e.g., smartphoneregistry.com). However, this is not a limitation on thepresent invention. In a preferred embodiment, the portable electronicdevices 110 and 112 each include a source client or software application18 running thereon. As shown in some of the figures, the softwareapplication 18 is referred to herein as QEPR 18 (pronounced “keeper”).The server 116 may further be coupled, or otherwise have access, to adatabase 118 or databases and other components, such as electronicstorage, and computer systems (not shown). It will be appreciated thatthe database 118 is configured to store account information for all theusers who are registered with the system. Although the embodimentillustrated in FIG. 2 includes a single server 116 coupled to twoportable electronic devices 110 and 112 (first and second portableelectronic devices 110 and 112) via the network 114, it should berecognized that, as described herein, embodiments of the invention maybe implemented using two or more such portable electronic devicescoupled to one or more such servers. Moreover, the network 114 mayinclude or otherwise be coupled to one or more telecommunication towersthat provide network connectivity to the portable electronic devices.

It should be understood that first and second portable electronicdevices 110 and 112 include or are otherwise coupled to a computerscreen or display. First and second portable electronic devices 110 and112 can be used for various purposes including both network and localcomputing processes. The first and second user devices 110 and 112 arelinked via the network 114 to server 116 so that software programs, suchas, for example, a browser or other applications, running on the firstand second user devices 110 and 112 can cooperate in two-waycommunication with server 116. Server 116 may be coupled to database 118and/or electronic storage to retrieve information therefrom and to storeinformation thereto. Moreover, the server 116 may communicate with thefirst user device 110 (and/or second device 112) and/orGPS/triangulation systems known in the art in such manner as to allowthe server 116, using map data stored in the database 118 or elsewhere,to generate location data, such as, for example, HTML data, that may beused by a browser or similar application to display the location of thefirst portable electronic device 110 (and/or second portable electronicdevice 112). Additionally, the server 116 may be coupled to the computersystem in a manner allowing the server to delegate certain processingfunctions to the computer system. Accordingly, it should be understoodthat when reference is made herein to the server 116 performing afunction, the server 116 not actually be performing the function, butmay delegate it to a separate computer system.

The loss prevention system 12 will be described first. FIG. 3 shows anexemplary chart of the loss prevention system 12. Generally, the lossprevention system 12 includes a component or distance tracking devicethat is worn or otherwise kept on the person of a user and that is incommunication with the app user's smart phone. In a preferredembodiment, the present invention includes the software application 18loaded on the user's mobile device and a distance tracking device thatis part of either a software application that is loaded on anotherportable electronic device, such as a smartwatch 113 or a standalonedistance tracking device, such a key fob 111 or other wearable sensor.In use, the distance tracking device and smart phone app communicate tonotify the owner that their smart phone has exceeded a predeterminedproximity distance from the distance tracking device to prevent loss.When the predetermined proximity distance has been exceeded the user maybe notified via a noise, tone and/or vibration of the distance trackingdevice.

In an embodiment where a smart watch 113, such as an Apple watch orAndroid watch is used, a software application is downloaded to the smartwatch 113 and is in communication with the app 18 on the user's smartphone. When the user exceeds the predetermined proximity distance (e.g.,30 feet) from the smart phone, the smart watch 113 notifies the user. Ina preferred embodiment, the app on the smart watch 113 also includes abutton or the like that when pressed will cause the smart phone to beepand/or vibrate. This allows the user to locate a lost smart phone.

As shown in FIGS. 3 and 4, the other type of distance tracking device isa wearable or portable sensor such as a key fob 111. The key fob 111preferably includes Bluetooth capability to pair with the user's smartphone (and communicate with the app 18 thereon), along with a chip,battery and necessary firmware. In use, when the user exceeds thepredetermined proximity distance from the smart phone, the key fob 111notifies the user (e.g., via a sound or vibration on the key fob 111and/or phone). In a preferred embodiment, the key fob 111 also includesa ‘Find’ button or switch that when pushed or otherwise activated causesthe connected smart phone to emit a loud ring tone and/or vibration sothe smart phone can be located.

FIG. 4 shows an exemplary key fob 111 in accordance with the presentinvention. Key fob 111 includes casing or housing 22, notification light24, keychain aperture 26 and find button 28. The chip, sensor, and othercomponents are housed in the housing 22.

It will be appreciated that other types of wearable or portable sensorsare also within the scope of the present invention. For example, theactual sensor can be housed in a case made of plastic, rubber,elastomer, metal or the like. Preferably, the case is water resistant toprevent the entry of sweat, rain or other liquids. However this is not alimitation, and the case may not be water resistant. In an embodiment,the distance tracking device can include a screen, such as an OLEDscreen or the like. Internally, the distance tracking device may includea battery (e.g., a rechargeable lithium ion or lithium polymer battery)or a battery that is rechargeable via USB to micro USB or the like withan AC adapter. The distance tracking device.

In an exemplary embodiment, the distance tracking device can beinterchangeably worn on different wristbands or watchbands. For examplethe wristbands can be made of leather, metal (e.g., stainless steel),silicon, nylon (paracord), elastomer or the like. In other embodiments,the distance tracking device can be worn on a bracelet (e.g., leather,metal, classic bands) or a clip-on sensor that can be worn on, e.g.,belts, pants pockets, shirt pockets, etc.

In a preferred embodiment, The distance tracking device can be attachedto the wearable items or accessories, garments or other personalaccessories with an attachment device or fastener, such as a plasticclip, metal clip, metal clip and lock, metal ring, silicone pocket,silicone pouch, elastomer pocket, elastomer pouch, leather strip, nylon,buttons, snaps, Velcro or the like.

In a preferred embodiment, the distance tracking device can be housed ina case that includes a special design or shape. For example, the casecan be plain or include items on their such as an American flag, dogpaw, heart, cross, peace symbol, musical note, Ying/Yang, Celtic goodluck knot, horseshoe, “like”/thumbs up, shaka/hang ten sign or I loveyou hand sign. In preferred embodiment, the screen on the housing orcase of the distance tracking device can display a call, text, calendarevent, time and date.

With reference to FIGS. 5-7, the loss recovery system 14 will now bedescribed. FIG. 5 shows a portion of the FIG. 1 flowchart that isassociated with the loss recovery system 14. As shown in FIG. 6, in apreferred embodiment, the loss recovery system 14 includes a smart phoneidentification label or tag 40 that can be placed on the smart phone oron a smart phone case. In an exemplary embodiment, the label can be adie cut vinyl sticker or a brushed aluminum or thin stainless steelplate. The tag 40 can be placed on the back or side of the smart phoneor the smart phone case. In a preferred embodiment, the tag 40(positioned on the back, side, top or front) includes website, telephonenumber (can be texted or called), email address of other contact sourceinformation for contacting the administrator 123 (e.g.,smartphoneregistry.com) together with a unique registration identifier(may include numbers, letters or both) associated with the user and/orthe particular smart phone. The unique registration identifier isregistered with the administrator. Any unique registration identifier iswithin the scope of the present invention. For example, the tag 40 caninclude a barcode or a QR code. QR codes enable the ability to determinethe location of where the QR code was located when scanned. Therefore,when a finder finds a phone and scans the QR code,smartphoneregistry.com can be advised of the location of the finder. Inanother embodiment, the tag 40 can include the ability for a finder to“tap” the tag 40 with their phone (or place it in close proximity to thetag) to scan or receive/retrieve the unique registration identifier. Forexample, the tag can include near-field communication or NFC technology.Near-field communication is a set of communication protocols that enabletwo electronic devices, one of which is usually a portable device suchas a smartphone, to establish communication by bringing them within arelatively short distance (e.g., 4 cm) from one another. Therefore, whena finder finds a lost phone the finder can tap their NFC enabled phoneon or place their phone close to the tag and the finder's phone willreceive the unique registration identifier. Preferably, when the tag istapped or scanned by the portable electronic device the QEPR URL comesup on the screen, thus allowing the user to go to the website to gothrough the steps described herein to return the lost phone. Forexample, at the website, the finder can enter their first name and phonenumber, which will send it to the app contacts and/or app supportdashboard.

As shown in FIG. 7, in another embodiment the label 40 can come togetherwith a case 42. The tag 40 can be embedded in an indentation ordepression in the case or 3-D printed within the case itself. In FIG. 7,the tag 40 is secured to or otherwise positioned on a bumper orprotrusion that extends upwardly from the bottom of the case 42 and intoa central opening defined by the sides, top and bottom of the case 42.It will be appreciated that the bumper can be located anywhere on thecase 42. In another embodiment, the case can include a solid back andthe tag 40 can be located anywhere thereon. The tag 40 can also belocated on the sides, the bottom, the top or the front of the case.

In a preferred embodiment, the system includes the central database 118in which the smart phone's unique registration identifier and theowner's information is entered into and stored (see FIG. 2). Forexample, the central database 118 can store owner information, such asname, address, mobile and home phone numbers and email address. Thecentral database can also store smart phone information, such as brand,model and/or serial number. The database 118 can also include photos,videos and contacts of users, as described below.

It will be appreciated, that, the loss recovery system 14 can reunitelost smart phones with their owners, if a phone is found. In use, when aphone is lost and is found by a finder, the system 14 provides at leastone, and preferably more than one, way for the finder to contact theadministrator (e.g., smartphoneregistry.com). First, the finder can callor text message the phone number on the tag 40 and provide the uniqueregistration identifier to the administrator so that the associatedsmart phone can be identified. In a preferred embodiment, the finder canalso log on to smartphoneregistry.com to enter the unique registrationidentifier (via email, chat or other message entry) so that theassociated smart phone can be identified. In each situation, the phonecan then be returned to the owner. In a preferred embodiment, when theadministrator receives the unique registration identifier, theassociated smartphone is automatically identified by the system. Anemail or phone call can then be sent or made to the owner to let themknow that their phone has been located. Location information can also beprovided to the owner. In a preferred embodiment, the app 18 includesthe ability for the owner to see where there phone is located using GPStechnology. That way the owner can log on to smartphoneregistry.com andsee the location of their lost or stolen phone.

As will be appreciated, it may take some effort for a finder to returnan owner's phone. Therefore, in a preferred embodiment, the presentinvention includes the ability for a finder to deliver the phone to acourier service (e.g., FedEx, UPS, USPS) and then have the courierservice deliver the phone to the owner or the administrator. Preferably,an address and/or tracking number is communicated to the finder (e.g.,by text message on the found phone or their own phone, by email, by acall or other method). The finder can then take the phone to thecourier, provide the courier with the tracking number and the courierwill return it to either the owner, to smartphoneregistry.com or toanother designated address. If the phone is delivered tosmartphoneregistry.com it can then be shipped to or picked up by theowner. In an embodiment, the tracking number has the delivery addressassociated therewith. The shipping costs can be charged tosmartphoneregistry.com or the owner. In another embodiment, the couriercan be notified by the finder or smartphoneregistry.com and the couriercan pick up the phone from the finder.

FIG. 5 also shows the ability for users to register with the website ata number of different membership levels. Each of the differentmembership levels can provide different features to the user. Forexample, as shown, the basic membership level can be offered for free tothe user. Further membership levels may include payment from the user.These membership levels (e.g. Pro and platinum) may provide enhancedfeatures. For example, the platinum level may allow a user to choose acustom unique registration identifier (e.g., their initials), and mayinclude the ability to back up photos, videos and contacts stored in thememory of the user's smart phone.

It will be appreciated by those of ordinary skill in the art that thesoftware portion in the loss prevention system 12 herein is tied to aprocess and a physical machine (such as a computer and/or a mobiledevice). It is also tied to the hardware, central database and processin the loss recovery system 14 herein.

As will be understood by those of ordinary skill in the art, FIGS. 8-10show exemplary mind maps of the smart phone application (FIGS. 8-1 and8-2), the smart watch application that associated with the lossprevention system (FIG. 9) and the website (FIG. 10), e.g.,smartphoneregistry.com. The mind maps are described further below. Itwill be appreciated, that the mind maps are only exemplary and notlimiting. Features can be added or omitted.

As shown in FIG. 8-1, the app 18 also includes a splash screen 130 whenthe app is opened and tutorials 132 for teaching a new user how to usethe app. Login 134 includes the ability for manual login by entering anemail address or phone number and a password or social media loginthrough Facebook or Twitter, etc.

Under sign-up 130, the user follows a number of steps to register withthe app. The exemplary steps are: step 1 where the user enters theirprofile picture, full name, email address, phone number and a password;step two where their mobile number is verified; step three where theyprovide answers to security questions; and step four where they set andconfirm a PIN number. The user also has the ability to decide whether toenable location or GPS tracking of their phone (so that it can be seenon the website or watch app). Under permission to read contacts 132 theuser has the ability to allow access to the contacts within their smartphone memory.

On the home screen 134 of the app 18 a message to purchase services isincluded. The list of services may include, for example, the ability topurchase a key fob 111 or a tag 40. The user has the ability to addthese services or items to their cart 136 or make payment.

Under locate my device 138, the user has the ability to add a secondconnected device by adding the tag number associated with the device. Inthis situation, a user with first and second cell phones can view andtrack the second cell phone on the app on the first cell phone, and viceversa.

Notifications 140 can be made in a number of different situations, forexample, that the connected device has a low battery, that the connecteddevice has crossed the threshold or predetermined limit or distance,notifications from the administrator, alert that the connected devicehas been stolen and that the Sim card needs to be changed, among others.

With reference now to FIG. 8-2, the app allows the user to connect withor add other members of their family (or friends) under the “my family”142 option. Under this option, the user has the ability to search formembers by name or number, add a new family member by entering theirinformation under “add new” or adding them from the device memory under“sync from device.” Under “share application,” the user can send to afriend or family member request to download the app on their phone. Ifthe friend or family member downloads the app the user can request totrack the friend or family members phone on the user's phone/app. Forexample, a parent could use this to track their child's phone.

Under the connected devices 144 option the user can connect to theirportable electronic device, a smart watch 113 or a key fob 111 (or otherdevices listed herein). Once the portable electronic device isconnected, the user can set up the tone used for alerts, set the modefor alerts, such as vibration mute or sound, manage whether the smartphone's flash is used for alerts, manage the sound by increasing ordecreasing the volume, sync videos, pictures and/or contacts between theadministrator and the device memory (as described below), and turnaccess to the phone's camera on or off.

Once a smart watch is connected, the watch app will alert the user whenthe connected device strays beyond the threshold distance. The watch apppreferably includes a distance bar (as described below), and alerts theuser after phone has been stolen (i.e., if the phone strays beyond thethreshold distance). The app can also include a button that when pressedplays a sound on the phone (to locate the phone) and vice versa. Thelocation of the watch can also be viewed on the connected device.

Once a key fob is connected, the key fob 111 and/or connected devicerings or alerts when the threshold distance is crossed. Furthermore, auser can press the button 28 to cause the connected device to make asound so the phone can be located. In a preferred embodiment, the soundmade by the key fob can change as the key fob comes into closerproximity to the connected device or gets farther away from theconnected device. For example, the sound can be a beeping that getsfaster or slower between beeps or tones (increase or decrease infrequency) as the key fob gets closer or further away to the connecteddevice. In another example, the sound change can get louder or softer asthe key fob gets further away or closer to the connected device. Thiscan also be done in reverse where a button on the phone app can bepressed to cause the key fob 111 to make a sound so that it can belocated. In a preferred embodiment, this feature is achieved throughreceived signal strength indicator (RSSI), which is a measurement of thepower present in a received radio signal. The RSSI of the modem isindicated by a negative dBm value. This value relates to the signalstrength of the cellular signal from the tower to the modem. The higherthe number, the better the signal. The exact numbers vary betweencellular carriers. However, −70 dBm and higher values usually equate tothe modem being in an excellent coverage area. The closer to 0 dBm, thestronger the signal.

Under the settings 146 option the user has the ability to chooseprofile, under which they can view their profile or edit their profile.The profile includes a profile picture, name, email address, home orfull address, and mobile number. On the app or the website, the user hasthe ability to order items, such as a tag 40 (with their uniqueregistration identifier thereon) or case 42 (with their uniqueregistration identifier thereon). The user can also view their orders.The user can track their order; which may include an order ID, and orderdate, product details and status. The user can also view the history oftheir past orders to see when they were placed, shipped and/ordelivered. The user can also sync their contacts, photos and videos byuploading them to database 118 run by the administrator 123 (e.g.,smartphoneregistry.com). In this situation, if a user's phone is lostand not returned, the contacts, photos and videos will be stored in asafe location. In an embodiment of the invention, smartphoneregistry.comincludes a concierge service where the user can call and speak withsomebody to help upload their contacts, photos and videos to eithersmartphoneregistry.com or other choice of location (e.g., iCloud, GoogleDrive).

Under settings, the user can also view what type of account they have(e.g., free, Pro, platinum) and upgrade or downgrade their account type.The user can also manage the threshold or predetermined boundary atwhich the alert will be sounded. The predetermined boundary can be anactual distance, such that when the user is too far from their smartphone (e.g., 5-500 feet) the alert or notification is sounded and/orvibrated, or, the alert or notification can be provided when theBluetooth is out of range from the phone and disconnects.

Under settings, the user also has the ability to determine whether theirhome address will show when a finder finds their phone and enters theirtag information on the website. If the user choose yes, the finder willlearn the address and can then ship it directly to the owner or user. Ifthe user chooses no, the finder will be given a separate address, suchas a central holding location (e.g., smartphoneregistry.com). The finderthen ships the phone to the central holding location where the phone isthen forwarded to the owner. Settings also allows the user to changetheir mobile number.

FIG. 9 shows the smart watch 113 mind map. It will be appreciated thatthe watch is paired with the phone on which the application (e.g., FIG.8) is installed. The watch app can also receive notifications such aswhen the connected smartphone has been stolen, when the connectedsmartphone has crossed the threshold limit and administratornotifications. The watch app also includes a distance bar so that theuser can see how far away the connected device or smart phone is. Forexample, the distance bar can extend as the user gets farther away fromthe connected device and can show the distance in feet or meters.

Under find my phone 152, the user can find their phone when it has beenlost. The user can view the location of the connected device on a map.This feature can also include the ability to cause the phone to ring ormake a notification sound to find it, and to remotely wipe data asdescribed herein.

Under map location 154, the user can view the location of their friendsor families connected devices on a map. Under access camera 156 the userhas the ability via the watch app to turn on the camera of the connecteddevice. This allows the user to view on the watch what is being capturedby the camera on the connected smart phone.

FIG. 10 shows the mind map for the website. Under locate 158 the userhas the ability to add a second connected device, as described above.Under play sound 160, the user has the ability to press a button on thewebsite that causes the connected device or phone to make a sound sothat it can be located.

Under wipe 162, the user has the ability to remove or delete all oftheir pictures, videos, contacts and other personal information from aconnected device. It will be appreciated that this will likely be donewhen a phone is lost or stolen. Under take picture 164, the user has theability to take a picture with the connected device in an attempt tofind out where the phone is located. The picture can be viewed on thewebsite. Under sync 166, the user can upload their photos, videos andcontacts, as described above. In the website, the user can also login168, order services 174, and sync contacts 176 similar to what wasdescribed above with respect to the mind map for the app 18.

As shown in FIG. 11, in a preferred embodiment, the recovery system 10includes the ability for a group 50 of users, such as a family, to eachhave a distance tracking device or key fob 111. Each of the distancetracking devices can be viewed on any of the associated portableelectronic devices with the group 50. For example, FIG. 11 shows fourkey fobs 11. Each of the key fobs 11 is associated with a user and isassociated with that user's mobile device. However, the location of eachof the key fobs in the group 50 and the associated portable electronicdevices can be viewed on the app 18 on each of the portable electronicdevices in the group 50.

In a preferred embodiment, the present invention also includes theability for the distance tracking devices within the group 50 to extendthe distance of the bluetooth network or provide a BLE (Bluetooth LowEnergy) mesh network. In other words, as shown in FIG. 11, a singleportable electronic device can be connected via Bluetooth to distancetracking devices with the group that are further away via the meshnetwork. For example, as shown in FIG. 11, the first portable electronicdevice 110 is connected to the first key fob 111 a that is paired withit and in range of bluetooth. First key fob 111 a is in a mesh networkwith second and third keyfobs 111 b and 111 c because they are in rangewith first key fob 111 a. Fourth key fob 111 d is in range of the secondkey fob 111 b. Therefore, all four key fobs are connected via a meshnetwork and can communicate with one another. Therefore, first key fob111 a receives data from second, third and fourth key fobs 111 b, 111 cand 111 d (and vice versa). As a result, first key fob 111 acommunicates with the first portable electronic device and then passesdata to the other key fobs (second to fourth). Furthermore, the meshnetwork allows the first portable electronic device to pass data orcommands to any of the key fobs in the mesh network. This function canbe useful, for example, when one member of the group does not have theirphone and they want to find their beacon or key fob with another groupmember's phone. For example, as shown in FIG. 11, each of the key fobsseparately have a bluetooth range of about 30 meters. Therefore, if thefourth key fob 111 d is over 30 meters away from the portable electronicdevice it would normally be out of communication range. However, withthe mesh network, communication between the fourth key fob 111 d and theuser mobile is provided. FIG. 11 shows an exemplary range within thenetwork of 70 meters.

As shown in FIG. 12, in a preferred embodiment, the recovery system 10includes the ability to find a lost distance tracking device or key fob111 that is scanned by another user's portable electronic device. Inthis scenario, when a first user's key fob is lost they would report itas lost on the app (see step 54). When a second user (who has the app ontheir phone) comes within bluetooth range of the first user's key fob,the second user's phone scans the lost key fob and uploads the locationto the database/cloud (see step 56) (or otherwise uploads a UUID(universally unique identifier) and/or the unique registrationidentifier). A UUID can be associated with the key fob. The seconduser's portable electronic device then uploads the location of the lostkey fob to the database or cloud (see step 58). The first user thenreceives an update on their associated portable electronic device (orcomputer or the like) that the lost key fob was found and is providedwith a location so they can retrieve the lost key fob (see step 60).

As shown in FIG. 13, in a preferred embodiment, the key fob 111 includesan SOS or emergency button 52 thereon that can be pressed by a user inthe event of an emergency. For example, the emergency button 52 can beconfigured such that if it is depressed for a predetermined first periodof time a first event happens, if it is depressed for a predeterminedsecond period of time a second event happens, and if it is depressed fora predetermined third period of time a third event happens. Any numberof periods of times and associated events is within the scope of thepresent invention. For example, if the button 52 is pressed or held downfor five seconds an SOS event triggers an event where the user'semergency contact(s) are automatically contacted through the user'sportable electronic device (e.g., via text, email, phone call, etc.). Ifthe button 52 is pressed for ten seconds the associated phoneautomatically calls 911. If the button 52 is pressed for fifteen secondsthe GPS data of the phone and/or the key fob is shared to theadministrator and/or a designated contact.

As shown in FIG. 13, in a preferred embodiment, the key fob 111 includesa removable member 62 that has the keychain aperture 26 thereon.Therefore, the key fob 111 can be removed from the removable member 62and be separated from the user's keys. The removable member 62 caninclude buttons 64 that operate a latch or the like so that theremovable member 62 can be separated from the key fob 111.

In a preferred embodiment, a button on the key fob can activate thecamera on the associated portable electronic device so that pictures canbe taken. In an embodiment, where the same button is used for allfunctions on the key fob, for example, a triple (or other designatednumber) click on the key fob opens the camera and automatically takes aphoto after a predetermined amount of time (e.g., 2 seconds) of thecamera open event. In this embodiment, no separate actions/presses ofthe button are necessary for opening the camera and taking the photo. Inanother embodiment, if the button is pressed twice (or other amount) thecamera opens and, after it is opened, a single press of the button cancause a picture to be taken. In a preferred embodiment, a button on thekey fob can trigger an automated assistant, such as SIRI, GoogleAssistant or Alexa to be activated.

In a preferred embodiment, the system 10 includes the ability to locatea distance tracking device or key fob using the GSM network (or othermobile network) in addition to or as opposed to GPS data. Preferably,the key fob communicates directly with the cloud or database enabledwith NBIoT. In other words, the key fob is connected with the NBIoTgateway, so that the key fob can send data directly to the NBIoT gatewaywithout the need of cellphone connectivity.

In a preferred embodiment, the key fob can be a Wi-Fi extender. Forexample, a Wi-Fi access point can be placed in the key fob, which willbe a Wi-Fi extender from the portable electronic device. This featurecan combine with the BLE mesh network discussed above.

In a preferred embodiment, they key fob includes the ability to providecontrol of devices within a user's home (or other location) that arepart of a smart home. For example, dedicated buttons can be provided onthe key fob for controlling certain smart home appliances orapplications.

In a preferred embodiment, the key fob provides the ability toauthenticate the user to their mobile bank application. In other words,the bank app on the user's phone can only be opened using the key fob,for example, by pressing a dedicated button or performing anotheraction. It will be appreciated that each key fob has a unique identity.Therefore, when a particular key fob is paired with the user's phone thebank app on the user's phone will only be opened by a press of a button(or other action) on the user's key fob. Buttons are mentioned hereinfor providing several functions and actions. As described herein, thedistance tracking device can include several discrete buttons for eachaction, a single button that is either pressed for a predeterminedamount of time before an action is triggered or is pressed multipletimes within a predetermined amount of time to trigger an action (e.g.,double clicking a mouse) or a combination of both. It should beunderstood that the button is a switch. Accordingly, as used herein, thephrase “a button is activated”, “a button that when activated”,“activation of the button” or anything similar encompasses any of thebutton pressing actions or switching actions or methods describedherein.

In another embodiment, the associated software application 18 includesan artificial intelligence based assistant that gives the user thefeeling of personal chat for commands and/or can also recognize key fobor phone losing patterns of the user and notify the user in advance tokeep track of their phone.

In a preferred embodiment, the key fob can be wirelessly charged. Awireless charging coil and supporting electronic components can be addedto the key fob for this feature. With this feature, the key fob can becharged from the back of a smartphone that enables wireless powertransfer, for example. In another embodiment, it can be charged via awired connection.

In a preferred embodiment, the system 10 includes GSM based locationsharing between designated users (e.g., users within a group 50). Withthis feature each user in the group be able to see the real timelocations of their designated contacts (e.g., emergency contacts, familymembers) on the app. Preferably, the users' locations are availablethrough the cellular connection provider of the individual phoneswithout GPS. In another embodiment, the locations are available via GPS.In this situation, a GSM connection is used in case GPS is not availablein (e.g., in an indoor area) to provide the location of the desiredcontact or user.

In a preferred embodiment, the system includes a safe zone within whichthe distance tracking device will not sound or vibrate the notificationeven if the associated portable electronic device is outside thepredetermine boundary. This can be used, for example, in a home, at abusiness or another designated location. Using a home as an example, ifthe user places their keys (with the distance tracking device) at alocation in the home and the predetermined boundary is thirty feet, andthe user takes the associated portable electronic device farther awaythan thirty feet, the notification will not go off. This can be done,for example, by using the home's wi-fi network. As long as the phoneand/or key fob is connected to the wi-fi network the notification willnot be activated. However, as soon as the user leaves the home with oneor the other of the phone or key fob and not the other of the phone orkey fob and the device disconnects from the wi-fi, the notification willgo off

All text on FIGS. 1-13 is incorporated herein by reference.

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof, means any connection or coupling,either direct or indirect, between two or more elements; the coupling ofconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, shall referto this application as a whole and not to any particular portions ofthis application. Where the context permits, words in the above DetailedDescription of the Preferred Embodiments using the singular or pluralnumber may also include the plural or singular number respectively. Theword “or” in reference to a list of two or more items, covers all of thefollowing interpretations of the word: any of the items in the list, allof the items in the list, and any combination of the items in the list.

The above-detailed description of embodiments of the disclosure is notintended to be exhaustive or to limit the teachings to the precise formdisclosed above. While specific embodiments of and examples for thedisclosure are described above for illustrative purposes, variousequivalent modifications are possible within the scope of thedisclosure, as those skilled in the relevant art will recognize. Forexample, while processes or blocks are presented in a given order,alternative embodiments may perform routines having steps, or employsystems having blocks, in a different order, and some processes orblocks may be deleted, moved, added, subdivided, combined, and/ormodified to provide alternative or subcombinations. Each of theseprocesses or blocks may be implemented in a variety of different ways.Also, while processes or blocks are at times shown as being performed inseries, these processes or blocks may instead be performed in parallel,or may be performed, at different times. Further, any specific numbersnoted herein are only examples: alternative implementations may employdiffering values, measurements or ranges.

The teachings of the disclosure provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various embodiments described above can be combined toprovide further embodiments. Any measurements described or used hereinare merely exemplary and not a limitation on the present invention.Other measurements can be used. Further, any specific materials notedherein are only examples: alternative implementations may employdiffering materials.

Any patents and applications and other references noted above, includingany that may be listed in accompanying filing papers, are incorporatedherein by reference in their entirety. Aspects of the disclosure can bemodified, if necessary, to employ the systems, functions, and conceptsof the various references described above to provide yet furtherembodiments of the disclosure.

These and other changes can be made to the disclosure in light of theabove Detailed Description of the Preferred Embodiments. While the abovedescription describes certain embodiments of the disclosure, anddescribes the best mode contemplated, no matter how detailed the aboveappears in text, the teachings can be practiced in many ways. Details ofthe system may vary considerably in its implementation details, whilestill being encompassed by the subject matter disclosed herein. As notedabove, particular terminology used when describing certain features oraspects of the disclosure should not be taken to imply that theterminology is being redefined herein to be restricted to any specificcharacteristics, features or aspects of the disclosure with which thatterminology is associated. In general, the terms used in the followingclaims should not be construed to limit the disclosures to the specificembodiments disclosed in the specification unless the above DetailedDescription of the Preferred Embodiments section explicitly defines suchterms. Accordingly, the actual scope of the disclosure encompasses notonly the disclosed embodiments, but also all equivalent ways ofpracticing or implementing the disclosure under the claims.

While certain aspects of the disclosure are presented below in certainclaim forms, the inventors contemplate the various aspects of thedisclosure in any number of claim forms. For example, while only oneaspect of the disclosure is recited as a means-plus-function claim under35 U.S.C. § 112, ¶6, other aspects may likewise be embodied as ameans-plus-function claim, or in other forms, such as being embodied ina computer-readable medium. (Any claims intended to be treated under 35U.S.C. § 112, ¶6 will begin with the words “means for”). Accordingly,the applicant reserves the right to add additional claims after filingthe application to pursue such additional claim forms for other aspectsof the disclosure.

Accordingly, although exemplary embodiments of the invention have beenshown and described, it is to be understood that all the terms usedherein are descriptive rather than limiting, and that many changes,modifications, and substitutions may be made by one having ordinaryskill in the art without departing from the spirit and scope of theinvention.

What is claimed is:
 1. A system for loss prevention and loss recovery ofportable electronic devices, the system comprising: a serveradministered by an administrator, a first software applicationexecutable on a first portable electronic in communication with theserver, wherein the first portable electronic device is owned by a firstuser, a second software application executable on a second portableelectronic in communication with the server, wherein the second portableelectronic device is owned by a second user, a first unique registrationidentifier associated with the first portable electronic device, whereinthe association between the first portable electronic device and thefirst unique registration identifier is stored on the server, a secondunique registration identifier associated with the second portableelectronic device, wherein the association between the second portableelectronic device and the second unique registration identifier isstored on the server, and a first distance tracking device, wherein thefirst software application is configured to connect to the firstdistance tracking device, wherein the first distance tracking device isconfigured to provide a first notification when the first distancetracking device is further than a predetermined boundary from the firstportable electronic device, a second distance tracking device, whereinthe second software application is configured to connect to the seconddistance tracking device, wherein the second distance tracking device isconfigured to provide a second notification when the second distancetracking device is further than a predetermined boundary from the secondportable electronic device, wherein when the first unique registrationidentifier is entered at a website associated with the server, returndelivery information associated with the first portable electronicdevice is provided, and wherein when the second unique registrationidentifier is entered at the website associated with the server, returndelivery information associated with the second portable electronicdevice is provided.
 2. The system of claim 1 wherein the first andsecond portable electronic devices can be associated with a group,wherein a location of the first portable electronic device can be seenon the second software application.
 3. The system of claim 2 wherein thefirst distance tracking device includes a first bluetooth range withinwhich the first distance tracking device is in communication with thefirst portable electronic device, wherein the second distance trackingdevice includes a second bluetooth range within which the seconddistance tracking device is in communication with the first distancetracking device, wherein a third bluetooth range is defined between thefirst portable electronic device and the second distance trackingdevice, and wherein the third bluetooth range is greater than the firstand second bluetooth ranges.
 4. The system of claim 1 wherein the firstdistance tracking device includes a key fob and a removable member,wherein the removable member can be separated from the key fob, andwherein the removable member includes a keychain aperture definedtherein.
 5. The system of claim 1 further comprising a first tag thatincludes the first unique registration identifier thereon, wherein thefirst tag is secured to the first portable electronic device or a firstcase for the first portable electronic device.
 6. The system of claim 5wherein the first tag includes near-field communication such that it cancommunicate the first unique registration identifier.
 7. The system ofclaim 1 wherein the first distance tracking device is configured suchthat the first notification changes from a first state to a second stateas the first distance tracking device comes into closer proximity to thefirst portable electronic device.
 8. The system of claim 1 wherein thefirst distance tracking device includes a button thereon, whereinactivation of the button causes the first portable electronic device toperform a first action, wherein the first action is chosen from dial911, dial a contact, message one or more contacts.
 9. The system ofclaim 1 wherein the first distance tracking device includes a buttonthereon, wherein activation of the button for a first predeterminedamount of time causes a first action to occur and activation of thebutton for a second predetermined amount of time causes a second actionto occur, and wherein the first and second actions are chosen from dial911, dial a contact, message one or more contacts.
 10. The system ofclaim 1 wherein the first distance tracking device includes a Wi-Fiaccess point therein, whereby the first tracking device is a Wi-Fiextender that the first portable electronic device can connect to.
 11. Acomputer-implemented method for the loss prevention and loss recovery ofa first user's portable electronic device, the method comprising thesteps of: loading a first software application on the portableelectronic device, wherein the first software application is associatedwith a server, associating a first unique registration identifier withthe first user's portable electronic device, obtaining a first distancetracking device, wherein the first distance tracking device isconfigured to provide a notification when the first distance trackingdevice is further than a predetermined boundary from the first user'sportable electronic device, connecting the first distance trackingdevice to the first software application, and placing the first uniqueregistration identifier on the first user's portable electronic deviceor a case for the first user's portable electronic device.
 12. Thecomputer-implemented method of claim 11 further comprising the steps ofreporting the first distance tracking device as lost to the server,wherein the first distance tracking device has a bluetooth range,wherein when a second user's portable electronic device enters thebluetooth range, the second user's portable electronic devicecommunicates a location of the first distance tracking device to theserver, and wherein the method further comprises communicating thelocation of the first distance tracking device to the first user'sportable electronic device.
 13. The computer-implemented method of claim11 further comprising the steps of: loading a second softwareapplication on a second user's portable electronic device, wherein thesecond software application is associated with the server, associating asecond unique registration identifier with the second user's portableelectronic device, obtaining a second distance tracking device, whereinthe second distance tracking device is configured to provide anotification when the second distance tracking device is further than apredetermined boundary from the second user's portable electronicdevice, connecting the second distance tracking device to the secondsoftware application, placing the second unique registration identifieron the second user's portable electronic device or a case for the seconduser's portable electronic device, and associating the first and secondusers' portable electronic devices with a group.
 14. Thecomputer-implemented method of claim 11 wherein the first uniqueregistration identifier is associated with a tag that includesnear-field communication, and the method further comprises placing asecond user's portable electronic device in close proximity to the tag,wherein the first unique registration identifier is communicated to thesecond user's portable electronic device.
 15. A kit for loss preventionand recovery of a portable electronic device, the kit comprising: a tagconfigured to be secured to a portable electronic device or a case for aportable electronic device, wherein the tag includes a uniqueregistration identifier and a contact source thereon, wherein thecontact source includes at least one of a telephone number, a website oran email address, and wherein the unique registration identifier isassociated with a QR code, and a distance tracking device that isconfigured to connect to a portable electronic device that has beenassociated with the unique registration identifier, wherein the distancetracking device is configured to provide a notification when thedistance tracking device is further than a predetermined boundary fromthe portable electronic device that has been associated with the uniqueregistration identifier, wherein the predetermined boundary is at leastone of a predetermined distance or when the distance tracking devicedisconnects from the associated portable electronic device, wherein thedistance tracking device is a key fob, wherein the key fob includes abutton that when activated causes the associated portable electronicdevice to emit at least one of a sound or a vibration.
 16. The kit ofclaim 15 wherein the first distance tracking device is configured suchthat the first notification changes from a first state to a second stateas the first distance tracking device comes into closer proximity to thefirst portable electronic device.
 17. The kit of claim 16 wherein thetag includes near-field communication such that it can communicate theunique registration identifier.
 18. The kit of claim 17 wherein thefirst distance tracking device includes the key fob and a removablemember, wherein the removable member can be separated from the key fob,and wherein the removable member includes a keychain aperture definedtherein.
 19. The kit of claim 18 wherein activation of the button causesthe first portable electronic device to perform a first action, whereinthe first action is chosen from dial 911, dial a contact, message one ormore contacts.
 20. The kit of claim 19 wherein activation of the buttonfor a first predetermined amount of time causes a first action to occurand activation of the button for a second predetermined amount of timecauses a second action to occur, and wherein the first and secondactions are chosen from dial 911, dial a contact, message one or morecontacts.