Human activity reporting system

ABSTRACT

A system for detecting and reporting human activity. In some implementations, the system reports, records or rewards detected human activities including correct and incorrect human activities, behaviours or habits including additionally remotely communicating the report, record or reward.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority to Australian Provisional PatentApplication No. 2013904637, filed on Nov. 29, 2013, entitled LOSSPREVENTION DEVICE and Australian Provisional Patent Application No.2014901806, filed on May 15, 2014, entitled LOSS PREVENTION DEVICE, andAustralian Provisional Patent Application No. 2013904636, filed on Nov.29, 2013, entitled UV RADIATION PROTECTION SYSTEM, and AustralianProvisional Patent Application No. 2014901807 filed on May 15, 2014,entitled UV RADIATION PROTECTION SYSTEM, which are hereby incorporatedby reference in their entirety.

TECHNICAL FIELD

The subject matter disclosed herein generally relates to detecting andreporting human activity. Specifically, the present disclosure addressessystems and methods to report, record or reward correct and incorrecthuman activities, behaviours or habits including additionally remotelycommunicating the report, record or reward.

BACKGROUND

In our busy lives it is easy to forget items that we need during the daysuch as umbrellas, hats, bags and sunscreen as a few examples. It isinconvenient to have to return home or to another location such as anoffice to pick them up. When we are leaving a location like a house itis also inconvenient to always check predicted weather conditions suchas UV levels which would necessitate taking sunscreen, hats, sunglassesor umbrellas etc. If possessions are left at locations where there is ahigh risk of another party taking or stealing the possession then theremay be a need to warn the user very quickly, depending on the level ofrisk of the location. Ideally the user should be warned as soon as theyhave left the area or are in the process of leaving the area. Somepresent solutions exist that provide a mechanism to locate items thathave been lost, but this is inadequate because as soon as an item hasbeen left in an area of high risk the item may be stolen or moved. Suchmethods also rely on there being other monitoring to locate the device,which will not always be available, and so will limit the utility ofthat approach.

If the user and the possession are in the same area of risk it may notbe case that the user leaves the area while the possession remains, itmay instead be the case that the possession leaves the area, for examplebecause a thief takes the possession away. An example of this may bewhen the thief takes a bag away from the proximity of the user. If theuser and the possession are in the same area of risk and the possessionis moved or touched whilst staying within the area of risk then it wouldbe desirable for the user to be alerted. For example, the possession maybe a bag with a pocket with a zip closing the pocket. If the user andthe bag are both at an airport (where the user may be easily distractedand thus not noticing someone opening the zip, perhaps while his back isturned concentrating on ticket reservations) then it would be desirablefor the user to be warned if the zip is opened. Depending on the risklevel of the area or time of day, while the bag is in the area there maybe a need to also warn if the bag is even moved slightly, indicating thevery beginning of a theft. It would be helpful if the monitoring couldbe automatically started or the user might require monitoring to starteven without personally realising that the area is risky.

The user may sometimes need to leave a possession in a risk area whereactuation of an entity, such as attempted operation of a lock ormovement of a bike, should be enough to alert the user. In some highrisk areas even approaching the entity might warrant warning. Powerconsiderations should be balanced so that the small devices usingBluetooth Low Energy processors or similar devices minimise the amountof transmitting they perform to extend the life of the small batteriesthey use. It is the object of the present invention to fulfil theseneeds.

SUMMARY

A system which provides various situational based warnings on the stateof possessions relative to a moving, mobile user or fixed monitoringpoint is provided. The disclosed system may also be used to protectpersons such as dependent children, so throughout the balance of thisdocument possessions, persons and other objects requiring protectionshall be referred to as “entities”.

The system is provided as follows. The user has a mobile computingdevice 102 and one or more entity detection devices 110 attached toentities such as Umbrellas 131, sunscreen 133, children 132, bags 299and bikes 150. The entity detection devices 110 can be temporarily orpermanently attached and may also be replaceable. Radio communicationusing (but not limited to) Bluetooth Low Energy (Bluetooth 4) is used todetermine the proximity and the presence of an entity. The radiocommunication is also used to transmit information, such as whether anevent occurs. An examples of an event is the movement or opening of abag 299 as indicated by an accelerometer 118, gyroscope 119, contactswitches, potentiometers, magnetometers, Passive Infrared (PIR) sensoror any other type of sensor.

The behaviour of the entity detection device 110 and mobile computingdevice may vary according to characteristics of the current positionand/or states of a person or entity causing a multiplicity of differentwarnings and alerts to be generated according to the said position andstates.

Potential positions and/or states the system may enter include but arenot limited to: First, the movement or transition of user and mobilecomputing device between various areas zone, for example between 100 and120, but the entity and associated or attached entity detection device110 is left behind. Second, transition between areas or times of variousdifferent risk levels requiring the frequency of communicationconnections between 102 and 110 to be increased for higher risk areas toprovide prompt warnings if entity and user are separated. Third, themovement of entity and associated entity detection device 110 asdetected by accelerometer and/or gyroscope 119 potentially as the entityis being separated from the user. Fourth, the changed state of theentity as detected by the attached entity detection device 110, such asthe opening of a bag 299 or other events causing the user's mobilecomputing device to alert the user

Fifth, the movement of person as measured by a mobile computing device'saccelerometer 118 relative to an entity as measured by the entitydetection device and warning the user that the entity may be leftbehind. Sixth, the transition of the user and his mobile computingdevice out of the area but another mobile computing device 102performing the same role or monitoring and optionally also in a fixedposition termed a “hub” 109. A hub 109 is a mobile computing device 102in a fixed position (and optionally also moveable). The hub 109 canreceive and transmit to the area 120. Seventh, an entity detectiondevice or Mobile Computing Device 102 may be out of range of each otherto receive signals, indicating separation. Eighth, an entity detectiondevice or Mobile Computing Device 102 may be in range of each other andable to receive Radio Signal Strength Indication (RSSI) data but warningif the signal is weak, indicating distance has increased to somethreshold.

Warnings or alerts can be issued from the phone and/or device and/orsent to a multiplicity of receivers such as the phone of the user or theentity detection device 110 and remote users such as security personnel,parents or teachers. The warning can also be displayed by other localdevices such as an alarm device or security hub device. The batteryusage of the Entity Detection Device 110 is very important to theutility of the invention, as it may not be convenient to recharge orreplace the battery. As much processing burden as possible is placed onthe Mobile Computing Device 102 to do the more energy consumingactivities. The term “polls” is used to indicate checking by radiolistening or radio transmitting at a set frequency.

Examples of monitoring mode strategies to detect distance and otherevent in a battery conservative situation include: Firstly, the entitydetection device 110 polls by listening for the regularly transmittingMobile Computing Device 102 with a frequency appropriate to the risksituation.

Secondly, the device responds the first time it is polled by MobileComputing Device 102 or Mobile Computing Device 102 changes poll timeand thereafter the device only transmits when it loses or the signalfrom the Mobile Computing Device 102 falls below a certain level or anevent is occurs which the devices wishes to communicate to the MobileComputing Device 102. Optionally no response the first time or on polltime changes is required.

Thirdly, the entity detection device sends messages to the MobileComputing Device 102 when an event occurs such as the movement of thebags 299. Fourthly, when the entity is moving and the risk is high thenthe pairing/bonding can be used to ensure that it can keep in regularcommunication and respond rapidly to distance separation. Fifthly, theentity device turns on at a time as hinted or told by the user forperiods of time to monitor or synchronise to any nearby Mobile ComputingDevice 102 to monitor for events or report to Mobile Computing Device102 any previously collected and stored information.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may be better understood with reference to theillustrations of the embodiments of the invention, in which:—

FIG. 1 shows a system for detecting if an entity detection device 110(and therefore the object it is connected to) becomes displaced from theuser.

FIG. 2 shows the connection of contacts to an entity detection device110 attached to a bag 299 allowing detection of the opening of the bag299.

FIG. 3 shows a pill box 399 which has compartments monitored by contactswitches and the whole box by an accelerometer 118.

FIG. 4 shows a stroller or pram which has an entity detection devicewhich has connected to it a UV measurement device and contains anaccelerometer such that when the user's mobile computing device 102detects that it is outside and optionally the UV may be strong fromexternal database sources then it checks to see periodically if theentity detection device 110 is sending it a signal to alert the userthat it is measuring a consistent UV level. The entity detection device110 only measures and/or transmits and/or calculates UV levels if itdetects movement of the stroller or pram as measured by theaccelerometer in the entity detection device 110.

FIG. 5 shows a radio equipped processor and sensor device that providessome aspects of the invention;

FIG. 6 shows an Inhaler such as a Ventalin™ Inhaler used to treatasthma. When the switch is activated, the Entity Detection Devicecommunicates the usage to the Mobile Computing Device which keeps acount of the number of Inhaler applications of the puffer and so theamount of medication remaining.

FIG. 7 shows a sunscreen “roll on” dispenser consisting of a rollerdispenser sunscreen with a entity detection device attached whosemovement is measured by an accelerometer. The accelerometer can be usedto check not only that the user has applied sunscreen but also appliedover the skin surface sufficiently.

FIG. 8 show a safety system to prevent machinery from running if workersare not wearing their safety equipment.

FIG. 9 shows a safety monitoring system to measure in real time (or logfor later review) the habits of workers (compliance) in wearing safetyequipment

FIG. 10 shows a system to restrict use of electronic devices until realworld work or activity (as some non limiting examples) is completed.

FIG. 11 shows a system to allow users to create sensor programs andrecord patterns for sensor detection to allow customisation to customersunique needs which can also be shared with others.

FIG. 12 shows the flexibility of a system to allow a configured sensorprogram to win prizes, unlock game usage, show results or win physicalrewards as a few non limiting examples.

DETAILED DESCRIPTION

Potential positions and/or states the system may enter include but arenot limited to;

First, the movement or transition of user and mobile computing device102 between various areas zone but the entity and associated or attachedentity detection device is left behind and optionally the entitydetection device is required because of situations such as weathercausing a warning that the entity is required and should not be leftbehind. Second, transition between areas or times of various differentrisk levels requiring changes in the connection frequency between theentity detection device 110 and mobile computing device 102 to beincreased for higher risk areas so that the mobile computing device 102and/or entity detection device 110 can warn the user more promptly inhigh risk zones if the entity and user are being separated as may happenduring theft of an entity.

Third, the movement of entity and associated entity detection device asdetected by acceleration and/or gyroscope 119 of the attached entitydetection in areas of varying risk levels such as at an airport withhigher chance of bags 299 theft. Fourth, the change state of the entityas detected by the attached entity detection device such as the openingof a bags 299 causing the user's mobile computing device to alert theuser. Change of state may be an event a panic button operated, PIRdetecting a person, bags 299 opened by zip or any such input such ascontact switches sensors including but not limited to those used forsecurity systems.

Fifth, the movement of person as measured by a mobile computing device'saccelerometer 118 relative to an entity as measured by the entitydetection device 110 (by its accelerometer) and warning the user of thepotential leaving behind of an item as the user moves and an a wantedobject remains un moved. Such a scenario involves for example a user 101standing up form a seat where an Umbrella 131 (with attached EntityDetection Device 110) was also lying next to the user on the seat. Theuser moves away from the seat without picking up the Umbrella 131,leaving the Umbrella 131 behind on the bus 155. When the mobilecomputing device detects movement and communication 153 with entitydetection device 110 attached to the umbrella indicates that theumbrella was not moved then the mobile computing device can warn theuser. The sensing of movement can be extended from acceleration toinclude gyroscope 119, compass and also from this information pathmovements providing a more detail analysis and inference of the kind ofmovement as well as difference between the movements. The monitoring ofacceleration differences can always be on, turned on for zones, or whenthere has been travel data indicating moving following by stopping by avehicle as the following moment may be the occasions when item leftbehind.

Sixth, the transition of the user and his mobile computing device out ofthe area but another mobile computing device performing the same roleand optionally also in a fixed position termed a “hub” 109 automaticallyor manually takes on the monitoring of the position and/or state ofentities and associated entity detection device 110 such as Child 132with entity detection device 110 operating as a warning bracelet or anentity detection device attached to a a bike 150. When the position orstate of the entity changes, the user can be alerted when in range ofthe hub's low power RF or remotely if the hub 109 can communicate over afixed or mobile internet network.

Seventh, an entity detection device or Mobile Computing Device 102 maybe out of range of each other to receive signals indicating separation.Eighth, an entity detection device or Mobile Computing Device 102 may bein range of each other to receive signals radio proximity signalstrength RSSI (Radio Signal Strength Indicator) but of varyingweaknesses and hence an estimate of distance including near by throughto almost out if range. Deteriorating signal strength can be used toalert a user before the entity detection device is no longer contactableand the entity no possible to track and potentially lost. For example,the Mobile Computing Device 102 transmits a signal of known strength,the Entity Detection Device 110 is programmed to detect the signal whenit falls below a set level where the level indicates a distance thatstill allows the Entity Detection Device 110 at a same or stronger levelto respond to the Mobile Computing Device 102 to say the distance hasexceeded a specified safe range. The distance and hence transmission andthreshold signal strengths can be adaptable according to the area orzone.

The kinds of warnings or alerts can be issued from the phone and/ordevice and/or sent to multiplicity of receivers such as the phone of theuser or the entity detection device and remote users such as security,parent, teacher. The warning can also be displayed by other localdevices such as alarm device, security hub device

The battery usage of the Mobile Computing Device 102 (which can howeveroften be recharged) but particularly the Entity Detection Device 110(which can mostly not have the battery recharged and is desirable oftennot to replace) is very important to the utility of the invention. Ifthe battery usage of the non rechargeable Entity Detection Device 110 isminimised the battery will last long enough that the device may beavailable for almost same amount of time as battery's shelf life and mayeven potentially be sealable in one unit.

The emphasis can be given on placing as much burden as possible on theMobile Computing Device 102 to do the most more energy usingtransmission and where possible, compared to relatively less energyconsuming radio listening and receiving with the entity detection devicein the again lower power consumption sleep state for as long as possiblebeing woken up by a timer or Input/Output. The Conservation of energy,especially on Entity Detection Device 110, is affected by the connectionfrequency between devices as well as the amount of time spent in sleepstate. Listening and receiving can take less energy than transmitting bya 33 percent reduction or more. Allowing the Entity Detection Device 110to enter sleep mode with a timer or Input/Output to wake up is veryefficient for the Entity Detection Device 110 whereas bonding or pairingis least favoured for energy consumption but important when devices needto exchange information, compare data without waiting for theestablishment of a connection because a quick response time is required.Pairing or bonding is generally a much higher polling/connection ratebetween device being often at least every 10 seconds.

Given these energy consumption considerations, a various differentstrategies varying the connection time, and polling frequency betweenthe Mobile Computing Device 102 and Entity Detection Device 110 can beoptimised in the following ways so that where possible the EntityDetection Device 110 sleeps as long as possible with optimum pollingfrequency which still allows depending on the risk of the environmentand importance of the equipment to which the Entity Detection Device 110is connected to protect and monitor where possible minimisingtransmission and receiving power usage but also allows checking which isfrequent enough to notice events such as loss or diminishing of signalor data sent which may indicate that the entity is moving away or beingtampered with such as being opened. As one example of optimisation forbattery conservation the Entity Detection Device 110 has a timer set forUmbrellas 131 and sunscreen 133 so that the user doesn't need toremember to take at night when it would be a waste of time to turn onmonitoring.

Broadly, Polling is the process of one device transmitting a signal at aset frequency to which a second device may receive. The second devicemay be designed to respond to the first device, each time polled when itreceives the signal to indicate to the first device that it is stillpresent as one example, where the response may consist of data also tocommunicate. A disadvantage of polling is second device needs to belistening and also the first needs to transmit regularly without beingaware if there is any need. Polling can be optimised by having theagreed synchronisation time bands using synchronised clocks where theprocess occurs with both devices sleeping at other times. Thesynchronisation time can be varied.

Polling can also alternatively be the process of listening for anexpected or in case a signal may be set at set frequencies and times fora second device. A given device can both simultaneously perform bothtransmitting and receiving polling. In another variation the seconddevice only responds when it has information to send, reducing the needfor transmission.

The second device could also tell the first device to stop monitoringwhen it is about to leave the zone where it can communicate to allow thefirst device to stop monitoring. An alternative approach is event basedinvolving the first device listening for the second to transmit when anevent occurs such as the movement of the bags 299. This does howeverrequire the first device to be listening often (though againsynchronisation strategies can also be used) but means that depending onthe event being monitored this can be combined with timed synchronisedchecking so that the first device does not need to be listening all thetime. Operating systems such as iOS7 monitor for Bluetooth Low Energysignal related events to be triggered by the locationManager dependingon the detection (didEnterRegion) and loss of signals (didExitRegion)

Some non limiting examples of monitoring mode strategies to detectdistance and other event in a battery conservative situation include:

Firstly, the entity detection device 110 polls by listening for theregularly transmitting Mobile Computing Device 102 with a frequencyappropriate to the risk situation listening with a polling frequencywhich is in synchronisation to the Mobile Computing Device 102 pollingtransmitting from Mobile Computing Device 102 then the Entity DetectionDevice 110 transmits a response every time it is polled or every certainnumber of times, from which the Mobile Computing Device 102 or EntityDetection Device 110 can calculate the signal strength such as RSSI andso distance and take any required action as configured by the systemsuch as reporting if the distance exceeds some amount.

The transmission by the Mobile Computing Device 102 can always be on orit can be optimised to poll in at times synchronised with an extra errorrange also configured. If the transmission is on then if for example theEntity Detection Device 110 detects movement it does not need to waitpolling frequency before reporting.

As the Mobile Computing Device 102 moves into areas or Entity DetectionDevice 110 increased acceleration with increased risk it can communicateto the Entity Detection Device 110 to increase the polling frequency.

Secondly, the Entity Detection device 110 starts monitoring from thefirst time it is polled by Mobile Computing Device 102 and when thesignal is lost or below certain level or event occurs it alerts theMobile Computing Device 102 while it can still respond to the MobileComputing Device 102 because it is in range. The transmission strengthof the Mobile computing device 110 and/or the threshold after which toconsider the signal it too low or distance should be set so that whenthe level is reached, the Entity Detection Device 110 has sufficienttransmission strength to be able to contact the Mobile Computing Device102 and alert. While this method has the advantage that the EntityDetection Device 110 listening mostly with little transmission, butrelies on assumption that the Entity Detection Device 110 will alwayshave an opportunity to respond before being out of range. Optionally theEntity Detection Device 110 may also transmit to warn the MobileComputing Device 102 if the Entity Detection Device 110 moves near toanother fixed or variable Mobile Computing Device 102 and moves close inrange used to indicate the outer perimeter of a safe are mean timeassume it is ok.

The Entity Detection Device 110 can optionally responds the first timeit is polled by Mobile Computing Device 102 or when the Mobile ComputingDevice 102 changes poll time.

The system can also be designed so that unless the Entity DetectionDevice 110 transmits and until the Entity Detection Device 110 detectsthat it has left or is leaving the receiving range of the MobileComputing Device 102 the Entity Detection Device 110 is present andmonitoring, has not responded presently as nothing to report but willtransmit if an event occurs.

Thirdly, the entity detection device send messages to the MobileComputing Device 102 when an event occurs such as the movement of thebags 299. The Entity Detection Device 110 detection device can be insleep mode until the accelerometer 118 detects movement and thentransmits the event. The Mobile Computing Device 102 needs to be able tolisten for such events. For example, in the case of iOS operatingsystem, the LocationManager:didEnterRegion can be used by the softwareto detect a signal is sent by the entity detection device.

Circuitry such as capacitance and/or counters and timers can be used tomonitor for a certain amount of movement before waking up the EntityDetection Device 110.

Fourthly, when entity is moving or can be moved quickly measured by theaccelerometer 118 and/or the Mobile Computing Device 102 using positioninformation such as GPS that the risk is high then the pairing (bonding)can be used to give immediate communication access between the devices.Fifthly, the entity detection device turns on at a time as hinted ortold by the user for periods of time to find time to monitor orsynchronise to any nearby to monitor for events or collecting previouslycollected and stored information. Sixthly, the separation of an entityand associated transmitting entity detection device from a mobilecomputing device 102 can be detected by event handlers in the softwarein the mobile computing device after the devices have come in range ofeach other, for example, as detected for iOS by thelocationManager:didEnterRegion event, by the monitoring on the mobilecomputing device of the event of the loss of signal event, for example,as detected for iOS by the locationManager:didExitRegion.

Seventhly, the presence of an entity or information communicated by anassociated entity detection device transmitting can be detected by eventhandlers in the software in the mobile computing device 102 for example,as detected for iOS by the locationManager:didEnterRegion event, by themonitoring on the mobile computing device of the event of the loss ofsignal event, for example, as detected for iOS by thelocationManager:didExitRegion. Eight, the entity detection device pairswith the mobile computing device when the mobile computing device isdetected and remains paired or alternatively, the entity detectiondevice periodically polls by transmitting to mobile computing device sothat the mobile computing device can calculate its distance and receiveany information from the entity detection device. This uses more batteryon the entity detection device particularly depending on the pollingfrequency for transmission from the entity detection device.

As an alternative to the use of radio signals and the calculation ofsignal strength and from this then estimation of distance, physicalsensors including but not limited to accelerometers, compass andgyroscope 119 as well as other sensors that can add can be used toaugment the accuracy of these distance measurement taken from radiowaves or used instead. These physical sensors can also be used tocompletely replace the use of radio based distance estimation. Forexample, in the example of the case of the movement of a bags 299 thephysical movements can be used estimate and detect if a bags 299 hasbeen moved by detecting sustained paths and paths of certaincharacteristics indicating movement. These paths may consist of a vectorof measurements which may be pre recorded paths to identify asindicating events such as the lifting of a bags 299, standing up orsitting down of a person as a few non limiting example. Paths may alsobe specifically matched to a location or starting or ending position.For example, in the case of the detection of shop lift/shop theft thesystem know it's starting position for example by being programmed oracquiring this from internal positioning IPS using for example low powerRF beacons such as bluetooth or GPS may use the physical sensor systemto estimate it's new location as it is moved and optionally also usingmap or other information deduce it's new position and if for example thenew position required a warning to be generated for example perhapsindicating being near the exit door indicate that as the device has notbeen removed by a sales assistant a theft is occurring.

In this case of leaving the house, a user's regular movements ofaccelerations, compass and gyroscope 119 and IPS path calculation can beused combined with events such as the loss of a WiFi connection orbluetooth beacons, or other networks detected by the Mobile ComputingDevice 102 or the acquisition of GPS indicating outside or reliable,consistent acquisition, and/or movements indicative of moving in avehicle or walking combined with time can be used to determine if theuser has left the house or any other zone. If the act of leaving thehouse is detected, the mobile computing device 102 can check if theEntity Detection Device 110 can be connected to, and/or, the separationdistance using Bluetooth Low Energy functionality or other RFtechnology. In this way, as the entity detection device 110 is attachedto entities that are required by the user when leaving home such as ahat 134, sunscreen 133, Umbrella 131 this system can remind the user totake them if they are about to leave them behind.

Additionally, checks can be done to determine if an Entity DetectionDevice 110 is present in the house early. Additionally, Mobile ComputingDevice 102 can contact and monitor for the Entity Detection Device 110and when the signal goes out of range this can also be used to determineof the Entity Detection Device 110 is being let behind. This indicatorof potentially leaving behind the Entity Detection Device 110 can becombined with other described indicators that the user has left thehouse or other zones. The kind of movement such as identification ofmovement in different forms of transport for example car or bus andwhether walking and at what speed can be deduced and used to determinethe risk level and hence polling frequency. In addition to locations,areas and zone where different levels of risk can be assigned theactivity or mode of transport a person currently using or experiencingcan be used to assign risk factors

The sensors can be positioned on the entity detection device and theMobile Computing Device 102 in a multiplicity of orientations and in anynumber to calculate as physical properties in all directions and angles.

GPS and other forms of positioning can also be used to the kind ofactivity or transport some one is current experiencing. For example thespeed of movement may indicate, or path and these used to determine arisk level and hence monitoring modes and polling frequency appropriateto the situation.

Referring to FIGS. 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12:—

A mobile computing device 102 consisting of a processor and radio 103,software 104, display 105, keyboard 106, antenna 107 andaccelerometer/gyroscope 108. Functions described in this disclosureinvolve information being sent, received or processed may be implementedby the software 104. The processor and radio and antenna shall be ableto communicate in or by, but not limited to, low power RF such asBluetooth, and Bluetooth Low Energy (Bluetooth 4) as well as be able tocommunicate using other forms of WiFi, mobile network communication,internet, SMS, and wire and cable as some non limiting examples. TheMobile Computing Device 102 also includes a battery. Example mobilecomputing devices 102 can include but are not limited to iPhone,Android, Smart Watches, Tablets, laptops and the like.

The mobile computing device 102 can transmit and receive from an area100.

Functions described in this disclosure involve information being sent,received or processed may be implemented by the software 104. Theprocessor and radio and antenna shall be able to communicate in but notlimited to low power RF such as Bluetooth, and Bluetooth Low Energy(Bluetooth 4). The Mobile Computing Device 102 also includes a battery.Example mobile computing devices 102 can include but are not limited toiPhone, Android, smart watches, tablets, laptops and the like.

The mobile computing device 102 can also be iWatch, smart watch, iPhone,iPod, iPod, tablet, Android, Windows or other operating system baseddevice or other such devices. An individual or group may own a set ofthese and wish for them to be kept from being lost.

Software in the Entity Detection Device 110 and Mobile Computing Device102 as an application that can run in foreground and background canperform operations described to implement the monitoring modes andalerts and other computations. The mobile computing device 102 alsocontains a battery which may also be recharged by connection to a mainspower. The processor, radio and software on the mobile computing device102 an the entity detection device 110 device 110 use low power RFcommunication protocols including Bluetooth Low Energy (also known asBluetooth 4 or Bluetooth smart). Optionally, a compass may also beincluded in the mobile computing device

An entity connected to the Entity Detection Device 110 and the usercaries the Mobile Computing Device 102. There can also be fixed alsoreferred to as a “hub” and/or temporary Mobile Computing Device 102“hub”. An example Mobile Computing Device 102 acting as a temporary hubcould be a mobile phone put inside a backpack in a hostel where the bags299 has Entity Detection Device 110 embedded into the bag for examplewhich could tell the owner remote to the hostel.

The Entity Detection Device 110 consists of a processor 112 withsoftware 113 which can run programs, including but limited to monitoringinputs, aggregation, storage and communication of measures and receivingof status to display visually 114 or audibly with an alarm or soundgenerator 115 as well as communicate using lower power RF Bluetooth, andBluetooth Low Energy (Bluetooth 4) using an antenna 116 and powered by abattery 111 that is often but not limited to being small andnon-rechargeable such as a coin battery. The sensor device has anaccelerometer 118 and/or gyroscope 119 sensors, input/ouput ports 117for interfacing to sensing and contact switches 190 as well as outputports 191. Components of the entity detection device 110 are wired tothe processor 112 by the electrical contact wire 198.

The input and output ports 117 may use a variety of protocols includingI2C, 1-wire, etc. All possible types of of input sensors 190 measuringphysical properties, including, but not limited to pressure, magnetism,water content and movement may be connected to 117. All possible typesof output 191 may be connected to 117. With reference to the entitydetection device 110 at the time of writing this description the TexasInstruments cc2540 is one example processor 112 which also includes asoftware stack for Bluetooth Low Energy which is a component of theoverall software 113.

Optionally, a compass may also be included in the entity device. Theentity device is equipped with a processor which can use differentamounts of power depending on whether it is in the listening fordevices, receiving, transmitting, sustaining a pairing or bondedconnection, or sleeping. When the device is sleep it is used limitedpower and can be “woken” from the sleep state by a timer which can beused to tailor the frequency with which the device wakes up and so usesmore energy based on the circumstance, risk level and so reasonablefrequency or amount of time to wait between each time the processorwakes ups and listens or transmits. In the case of the Entity DetectionDevice 110 it is optimal to choose a monitoring mode wherein the EntityDetection Device 110 minimised transmissions and performs listening inby polling at a certain frequency between which the processor sleeps andin this configuration only transmit when an event occurs. The EntityDetection Device 110 can also be equipped with accelerometers and otherinput output sensor devices. These can be used to provide a signal thatwakes up the processor to avoid the processor needing to wake upperiodic to check these sensor devices.

Typically, for an entity using low power RF such as Bluetooth 4, totransmit takes most power, to be listening or receiving less power andto sleep till woken up by devices such as accelerometer 118, still lesspower including the accelerometer 118 or other such input/output devicespower needs, while sleeping and awaking on a timer the least.Transmitting with Pairing or bonding typically has a bonding time of atleast ten seconds and so uses more energy and is to be avoided if one ofthe other strategies can be utilised The Strategy is to reduce the timeawake (not in sleep mode), limit receiving, polling for listening time,really reduce transmission time which uses the most power including ahigher peak load.

In order to determine whether an entity detection device 110 isdetectable by a Mobile Computing Device 102 as well as ascertain thedistance and while minimising power a multiplicity of techniques can beemployed previously described monitoring modes where the MobileComputing Device 102 controls the polling listening frequency of theEntity Detection Device 110 and minimises the need for the EntityDetection Device 110 to transmit as well as maximise sleep and attemptsto use acceleration and other Input/Outputs as a method to wake up theEntity Detection Device 110 wherever possible. “Polling listeningfrequency” refers to the frequency with which the Entity DetectionDevice 110 or also Mobile Computing Device 102 wakes up the processorand listens for transmission from another device. “Polling transmittingfrequency” refers to the frequency with which the Entity DetectionDevice 110 or also Mobile Computing Device 102 wakes up the processorand transmits for another device to receive. In all cases of pollingoptionally the processor may already be awake and so not need to wake upfirst as described.

In all the cases the frequency that the can be determined is determinedby zone, time, acceleration, or user setting of preference or the userwishing to say when turn on temporary different monitoring. Depending onthe entity being monitored time has a large effect on the frequency ofchecking, for example during night unless it is a regular occurrence,there is little point in checking if a user is leaving before 5:00 inthe morning so the Entity Detection Device 110 can be configured for thenight interval for an Umbrella 131. Acceleration for example can be usedto determine whether an Entity Detection Device 110 should wake up andwarn the user, for example in the case where a bags 299 is moved thedetection of the acceleration could be used to wake up the EntityDetection Device 110 that transmits a signal to the Mobile ComputingDevice 102 to indicate that it has been moved, and when the MobileComputing Device 102 finds it is not moving or to the same extent analert can be triggered on the Mobile Computing Device 102 and/or theEntity Detection Device 110.

One primary advantage of the prolonging the life of a battery is toincrease the battery length to be such that the Entity Detection Device110 can be designed at cheap cost or more durability or water proofwithout a battery replacement section in the casing. A database ofweather information 136 collected from various sources which can beaccessed by the user's 101 mobile computing device 102 holds current,past and predicted UV values 141 and weather values including forprecipitation 142.

Entity Detection Devices 110 connected to entities such as umbrella 131and sunscreen 133 and hat 134 whose need is determined by the UVradiation for the day 141 or weather conditions 142 for the day can inaddition to the mobile computing device 102 receive this data to enablethem to co-operate along with the mobile computing device 102, asdiscussed in the monitoring modes, in the process of reminding the userto take the items when the UV and weather conditions require. Forexample the polling transmission of listening frequency for an umbrellaor sunscreen may be increased when the UV data 141 for the day is high.

A database of locations and associated risks 138 can hold records fordifferent locations containing geographical coordinates, a list oftransmitters detectable in an area or other indicators and an associatedrisk level. The risk levels may also vary according to time. The risklevel may be expressed for example as one non limiting example as apercentage. One example record could be for an airport 140 where becauseof the high number of people, thefts and other issues as tired users 101the risk is high at perhaps 10 percent. An other example record could befor an office 139 where the risk is low 1% during the day but high 10%if any items are left unattended. As discussed in this description,including as monitoring modes, zones and areas with different risks areimportant in the determining the operation of the system thisinformation is stored in the database 138 and can be used

Other high risk locations include universities, school and gym lockerrooms and hotel rooms where keys may have been duplicated. A database ofentity profiles 137 can hold information of characteristics ofindividual entities that should be taken into consideration by thesystem during operation for example, how much acceleration activity isrequired before movement to be detected for example in the case of abag, just knocking a bag should not cause it to alert that it is beingstolen in some situations. Other identification information such asusers associated with an entity as some non limiting examples.Additionally for entities how often to alert, how to alert and how muchbefore to alert. Many other configurations settings could becontemplated depending on the entity.

Weather and UV information 136, via low power RF communication 121 canbe communicated to the mobile computing device 102, and to the hat 134,101 via low power RF communication 149, to the umbrella 131, 101 via lowpower RF communication 148, to the sunscreen dispenser 133, 101 via lowpower RF communication 146. Zone or area and associated risksinformation 138, via low power RF communication 121 can be communicatedto the mobile computing device 102, and to the hat 134, 101 via lowpower RF communication 149, to the umbrella 131, 101 via low power RFcommunication 148, to the sunscreen dispenser 133, 101 via low power RFcommunication 146, to the child 132, 101 via low power RF communication146, to the bag 135, 101 via low power RF communication 146.

Entity profile information stored in the database 137 can specify for anentity, it's ID, and characteristics such as how much movement and othertampering and actuation before an alert, as well as differencesaccording to the location and time, as well as who to contact and whatalerts to generated. In addition to profile for a bag 175, a record foran umbrella 174 and sunscreen 144 are some other examples. In the caseof the sunscreen, it may also specify that if the sunscreen was detectedto have been applied, then do not warn the user when leaving the houseas well as allow as days of the week to be excluded from the reminderfor example if the person is an office worker so that it will only beactive on the weekend.

Entity profile information 137, via low power RF communication 121 canbe communicated to the mobile computing device 102, and to the hat 134,101 via low power RF communication 149, to the umbrella 131, 101 via lowpower RF communication 148, to the sunscreen dispenser 133, 101 via lowpower RF communication 146, to the child 132, 101 via low power RFcommunication 146, to the bag 135, 101 via low power RF communication146.

In the situation of being at home and noticing that the user is moving123 away the system checks to see if any entities that are desirable totake are being taken.

The system described allows a user 101 to be provided with variousalerts when the entities such as umbrella 131, child 132, hat 134,sunscreen dispenser 133, or bag 135 (depicted in detail in FIG. 2 as299) or any other desired object attached to entity detection device 110move out of range or further away a mobile computing device 102.Initially devices are in listening mode configurable time or somefactory setting for example every 10 minutes, every hour, or when aconfiguration button for the purpose of allowing configuration isactivated. The mobile computing device 102 such as an iPhone sends asignal which is received after the said configuration time period orwhen the configuration button is pressed to set the Entity DetectionDevice 110 into configuration causing the device to temporarily listenand receive data from the Mobile Computing Device 102 whileconfiguration settings set.

In the configuration mode, the mobile computing device such as a phone,then transmits preferences such as listening polling frequency timesincluding using default values, or values for various levels of batteryusage. For example, times for the device to wake from sleep mode couldbe set to 6:00 am the earliest someone would leave for work and need tobe reminded to take. The Mobile Computing Device 102 can also monitortimes when the user leaves the house or other zones using course GPSchanges such as acquiring the GPS when leaving the house and/or positionchanges, radio triangulation for mobile towers when leaving the houseand/or position changes, WiFi signals and other radio signals includingBluetooth Low Energy beacons when leaving the house are lost, and usethese to adapt the times that the device is turned on to listen byuploading these configuration preferences to the device.

The Polling time between the Mobile Computing Device 102 and EntityDetection Device 110 can be selected for a given frequency synchronisedaccording to a set time. Polling times are set according to the hazardof the area, time of day, weather.

In addition to the Entity Detection Device 110, the Mobile ComputingDevice 102 can also turn off or disable in a similar manner to theEntity Detection Device 110 its monitoring modes and functions to reducepower usage and improve Mobile Computing Device 102 performance whenunnecessary monitoring is not required.

The Mobile Computing Device 102 monitors to determine when the userleaves the house including for example any combination of indicationsincluding also time. The system also can learn over time what thesecombination of indicators are as well as being trainable by the user orautomatically noticing potential Patterns of accelerometer 118 andgyroscopic recordings and paths can also be used solely or incombination with other indicators. The acquisition of one or more of GPSsignals, including course GPS, radio triangulation for mobile towers asthe user moves out doors, the loss of home WiFi signals, or acquisitionof external and other radio signals including Bluetooth Low Energybeacons and use these to adapt the times that the device is turned on tolisten by uploading these configuration preferences to the device. Alater indicator may also include the movement of the car if the userstarts to drive away.

Optionally at the time the Entity Detection Device 110 and MobileComputing Device 102 wake up or at some point prior to leaving 123 theMobile Computing Device 102 establishes whether the Entity DetectionDevice 110 is present so that if not present there is no need to laterwarn the user. If the user has Entity Detection Device 110 connected toitems which are only sometimes needed depending on variablecircumstances, then the Mobile Computing Device 102 will check each daywhether the item is required, for example if an Umbrella 131 is anentity that the user has then the Mobile Computing Device 102 will checkfor a rain prediction so that it will not need to later remind the userto take the Umbrella 131 if it will not rain. In a similar way if theuser has hat 134 and/or sunscreen 133 and/or sun glasses, then theMobile Computing Device 102 will check whether the UV readings will behigh for the day as if UV will be low there will not later be a need toremind the user to take these items.

For example, time such as Days of the week certain items like a sportsbag 299 may be important to take. This can be configured in a calendaron the Mobile Computing Device 102.

When the Mobile Computing Device 102 determines it and the user has leftthe house as described, and it finds always or optionally only whenadditional weather, time or other criteria are fulfilled, it eithertransmits to the Entity Detection Device 110 to respond so that it canmeasure the transmission strength of the signal from the EntityDetection Device 110 and/or begins listening polling for the EntityDetection Device 110 to see if it transmits and confirms it is alsomoving or has very recently.

If the Entity Detection Device 110 has been moved as sensed for examplean accelerometer 118, then it will increase it's listening pollingfrequency or transmission polling frequency to tell the Mobile ComputingDevice 102 that it is being moved.

By these various methods, the Mobile Computing Device 102 receives ameasurement of the signal strength and hence distance of the EntityDetection Device 110 in relation to the Mobile Computing Device 102 andif it is not a close distance or the user and Mobile Computing Device102 moved but not the Entity Detection Device 110 and by these meansthat the entity has not or may not have been brought then an alert thatthe entity has been left behind is issued on the Mobile Computing Device102 and/or the Entity Detection Device 110.

If time and conditions indicate that the item should be taken and notforgotten then an alert is generated to the Mobile Computing Device 102and/or Entity Detection Device 110.

A range of additional rules could also include checking that if asunscreen 133 has already been applied then the user may not need to bereminded to bring it.

In one situation the user begins in a home zone 171 (as indicated bybeing within range of a Bluetooth network or beacon, Bluetooth LowEnergy network, signal or beacon, WiFi local network 100 or at a givenposition determined by GPS and radio tower positioning), when the userleaves home as indicated by loss of connection or weakening of signalfrom these networks, beacons or signals, or a detected increase indistance measured by Bluetooth Low Energy proximity function, asmeasured by the mobile computing device 102, then an alert is providedas the user (with associated 102) and object (with associated 110) moveaway from each other according to settings in a database 137 for eachentity. In the case where sunscreen has not been applied as detected bythe entity detection device 110 (having failed to receive a dispensedetection), then when the user is detected to have left home 171 withoutapplying sunscreen so is at risk of sunburn an alert is given not toleave the sunscreen behind. In the case where the sunscreen has beenapplied sunscreen it may still be important to ensure that the sunscreenis taken as it may need to be applied later so an alert may also begiven not to leave the sunscreen behind. In the database 137 a record175 for bag 299 may specify days of the weak a sports bag 299 or laptopbag 299 should be taken. On these calendar days according to the recordfor the bag 299 if the bag 299 is required the user is alerted. Theconfiguration information for the bag 175 in the database 137 may alsoinclude information such as which users should be contacted if an alertoccurs in relation to the bag 135 as well as much movement and/oropening according to different locations and times (and hence risks) isto be recorded before an alert is generated as well as after whatdistance the bag is to be considered to be out of safe range and analert generated. Configuration settings for an umbrella 174 could setthe locations with high risk of forgetting and so more frequentmonitoring as well as safe distance or difference in movement that wouldtrigger an alert and how the alert is displayed whether in the mobilecomputing device and/or the entity detection device mounted on theumbrella.

The software on the application can be trained by taking allowing it torecord the events that occur has it leaves the house in terms ofchanges.

When user and entity leave home the emphasis on protection moves fromforgetting to take from a safe environment where inconvenient ratherthat getting lost to one where get lost or stolen.

Database can use pre exist zones and hazard levels and/or user can alsodefine their own with the zones and hazard levels where the software onthe mobile computing device can also notice common locations and ask fora rating. Crime statistic maps providing by police may be one sourcewhere geographic locations and areas have associated crimes statisticsfrom which given a coordinate a risk level for different levels ofpersonal and property safety can be looked up.

Users voting on crime safety based on areas they feel safe and/or timesthey turn on for example a panic alarm into stand by mode or use a panicalarm can also be combined into a database.

The zone the user and Mobile Computing Device 102 Entity DetectionDevice 110 is in is determine from GPS, WiFi, radio position, Bluetoothas determined by the mobile computing device. The zone withcorresponding hazards and coordinate and geometry is looked up database138. The polling time is retrieved by using GPS lookup from phone tolookup to find risk.

The device can also determine an area using an low power RF signals suchas Bluetooth Low Energy available. The polling time and monitoring modeincluding also bonding or pairing is varied according to zone and/or ifthe Mobile Computing Device 102 and/or Entity Detection Device 110 aremoving and/or also time. For example, if moving there is a greater riskof a child 132 and parent, or bag 299 and person being quickly separatedfor example, if travelling on a train or in a busy station then so thisincreased risk triggers a more frequent communication between thedevices established to ensure that separation or opening of a bag 299 isquickly identified.

The listening polling could be done with the bag 299 listening and onlytransmitting an alert if the signal strength and hence distance isreduced below a certain level indicating for the risk level the distanceof separation is concerning or acceleration and other movement indicateconcern that the object is moving away quickly. Optionally, also inlistening mode the Entity Detection Device 110 may let the MobileComputing Device 102 know the device is still present by issueoccasional transmissions from the Entity Detection Device 110. Thisstyle of occasional transmission or heart beat as well as allowing thelocating of the device also provide some protection against a thiefattempt to shield or jam any alert signals from the Entity DetectionDevice 110 as the Mobile Computing Device 102 can detect the lack of aregular heart beat as an alert condition. Again the heart beat can bevaried according to the desired battery usage needs and safety of thelocation and movement.

The frequency of connection between the Entity Detection Device 110 andMobile Computing Device 102 may be even increased to that pairing withpolling in the range of seconds which does have advantage of instantcommunication of distance as well as passing of acceleration movementswhich if zone hazard high and both items not acceleration in unison orindividually indicate potentially for example, a bag 299 is being movedaway from the user which may be helpful in high risk areas where a thiefmay take away an object while the user is busy and there are so manypeople around that it is difficult to notice the theft is occurring.

The parent can define a play park setting in the play park 137 with aset distance of separation between the Mobile Computing Device 102 andEntity Detection Device 110 after which an alert is generated. This ishelpful even if the child 132 is still around but just out of sight ofthe parent which is annoying for the parent to keep on checking. TheMobile Computing Device 102 which has a larger and also rechargeablebattery source transmits constantly or at assigned frequency intervalswhich can also be synchronised with the Entity Detection Device 110.When the distance between the Entity Detection Device 110 and MobileComputing Device 102 pass a threshold that is still close enough thatthe Entity Detection Device 110 has the ability to transmit to theMobile Computing Device 102 the Entity Detection Device 110 will alertthe Mobile Computing Device 102 the child 132 is getting out of range.In this way, the Entity Detection Device 110 uses listening polling tonotice the transmission from the Mobile Computing Device 102 andcalculates the signal strength and estimates a distance, avoiding theneed to transmit often.

As previously described a heart beat transmission depending on the riskin the area or zone could also be combined with this approach. If theheart beat is frequent enough this could replace the need for the MobileComputing Device 102 to transmit and the Mobile Computing Device 102would calculate the distance from the signal strength from the EntityDetection Device 110 and warn when it falls below a certain level and soa predicted distance. Additionally a pressure sensor or contact switch,or heart rate, including heart beat signature could be used to ensurethat the child 132 still wearing an alert also given.

In one embodiment, all the communication between the mobile computingdevice 102 and entity detection devices 110 is via Bluetooth Low Energysignals or other low power RF.

The system described also allows a user 101 to receive alerts if anentity such as a bag 135 (299) is moved such as when being picked up,being moved away from the user and so mobile computing device, opened asmeasurable by acceleration and gyroscopic calculations particularly withreference to the hazard of the area relating to location and/or time aswell when the user selects closer monitoring of the entity.

Again the zone area, movement time, will determine how often againpolling transmissions signals are sent. By controlling these variablesunnecessary battery can be reduced. The polling time can also be variedby user at request following at the next opportunity that the devicesynchronises when for example the Mobile Computing Device 102 polls theEntity Detection Device 110 a new polling frequency at user requestbecause the user feels a zone is unsafe or by looking up the user,Mobile Computing Device 102 and Entity Detection Device 110 currentposition and on noticing the risk level in a database is high setting afast polling frequency.

For example, when one a bus 155, train or plane and the user leavesluggage to go to the toilet, then in order to ensure that he is aware ifanyone opens or moves his bag 299 while he is in the toilet and EntityDetection Device 110 monitors the bag 299. An alarm and/or flashingdisplay may also be given to deter an attack in addition to the alertbeing sent to the user's Mobile Computing Device 102. The bag 299 mayalso have insignia (such as a trademark) or a display that flashes or inother ways indicates that the bag 299 is protected by this system as adeterrent to thieves. In another example, a user may have a bag 299stowed under a bus, when the bus stops and the user is on the busseparated from the bag 299, if the bag 299 is moved significantly more,for a prolonged time or in a consistent paths that may indicate the bag299 by accident or theft is being carried away as determined byaccelerometers and gyroscopes and other sensors, and optionally the samemovements are not being made by the Mobile Computing Device 102 with theuser.

In order to achieve this the Mobile Computing Device 102 and EntityDetection Device 110 both monitor acceleration patterns. The user mayeither be aware of this risk knowing that while he cannot get off thebus and the bags 299 are being taken out he can do nothing to know ifsomeone has his bag 299. If a difference in acceleration is noticed thenthe user is warned via his Mobile Computing Device 102 and he canremotely activate an alarm on the Entity Detection Device 110 or analarm on the Entity Detection Device 110 may be activated automatically.

Or the previous travel acceleration on the bus or by some otherinformation the system may know the that the bag 299 has been travellingon a bus that is now stopped and this analysis may be performedautomatically for example when the bus is stopped for a period of time.

Additional heuristics can be employed to detect if the Mobile ComputingDevice 102 has no accelerations at all indicating that the user is notholding the Mobile Computing Device 102 so that comparison of movementsof the Mobile Computing Device 102 and Entity Detection Device 110 isnot to be made.

Referring to FIG. 2, The system can detect if an entity such as a bag200 with bag strap 201 has individual components opened such as theopening of a pocket flap 208 to take items from the inside of the pocket207 where the opening separated two magnetised switch contacts 206 whichare normally kept closed by the magnets. The circuit if completedconnecting the components 203, 204 and 205 to the entity detectiondevice 110 by electrical conductor 202.

As an alternative to magnets press studs or other mechanical methods canbe used to close the pocket. The circuit if completed connecting thecomponents 206 to the entity detection device 110 by electricalconductor 209. The system can additionally detect if an entity hasindividual components opened such as the opening of zipper section whichconducts 203 which is done by passing a current through the conductingcomponent 203. The zipper tag 204 which conducts can act as a pivot on apotentiometer with varying the resistance 205 between sections 203 alongone side of the zipper as it is moved back and forward. The circuit ifcompleted connecting the components 203, 204 and 205 to the entitydetection device 110 by electrical conductor 202.

Alternatively Sets of one or more plates measuring capacitance acrossthe opening of the bag 299 may also be employed. A magnet andmagnetometer to measure the change in magnet strength from the magnet oralternatively a reed switch between two sides of the bag 299 may also beemployed to detect the opening of the bag 299.

The entity detection device 110 in the bag 200, can communicate an alertto the mobile computing device 102 via low power RF 210 such asBluetooth energy when movement or opening of the bag occurs as well asthe bag being detected to be leaving an area. Additionally the display114 and audible 115 components on the entity device 110 can createalerts. The bag 200 containing the entity detection device 110 may bemonitored by a mobile computing device 102 by according to saidpreviously described monitoring modes.

Referring to FIG. 3, a pill box 399 is depicted with individualcompartments 300, and a second compartment 302 of an optionalmultiplicity that can be included, and a lid 303 for each compartmentwhich has switch contacts 304 on the lid and compartments where theswitch contacts 304 are connected by wires 305 to the Entity detectiondevice 110. Each compartment contains medicines 301 for example pillswhich are to be taken at different times of day. Although only twocompartments 300 and 302 are shown the pill box may have any number ofcompartments with multiple for one day and this configuration repeatedfor multiple days. The entity detection device 110 attached to the pillbox 399 also has an accelerometer 118 which can detect when the pill boxis moved and even small movements corresponding to the opening of acompartment lid 304. The entity detection device 110 can communicate 306with the mobile computing device 102 when the pill box is moved asdetected by the accelerometer 118 or by the opening of the contactswitches including which contact switch and so for which time period themedicine has been taken. The monitoring modes determining the poll timeand hence energy usage is selected by location, time or user choice. Inone configuration the mobile computing device 102 performs polling tolisten for the entity detection device 110 mounted on the pill box. Thepolling listening for signals from the pill box can be optimised to beonly performed at the times when the user should be opening the pill boxallowing for some extra time before and after the time when the usershould have taken the medicine. If the mobile computing device 102including as a hub 109 does not receive communications from the pill box399 within the correct period of time as determined by medicationinstructions 309, then it can remind the user requiring the medication313 via display 114 or audio 115 on the pill box or by sending an alert314 sent to the mobile computing device 102 of the user 313. If the user313 does not respond then an alert 314 can be sent via the mobilecomputing device 102 with access to internet, SMS, email or other meansto a remote person 311 with a mobile computing device 102 who cancontact the user and see why they have not taken their medicine and thatthey are OK. This remote person 311 may be, for example a nurse orfamily member. The alert 314 indicating that the medicine has not beenapplied can also be sent to a remote server 312 where it can be storedor logged as results 308 for later analysis for use by software on theremote server 312 which can also generate alerts 314 to remote users311.

The correct period of time at which the user should take the medicationmay be determined by scanning a QR code or bar code 310 on the medicinebottle or packaging as some non limiting examples. The code 310 can bescanned by the mobile computing device and information in this code 309or by looking up the medication times 309 on the remote server and otherinstructions 309 can be used by the user's 313, 311 mobile computingdevices 102 and/or entity detection device 110 and/or remote server 311running software to monitor and know based on the instructions 309 thetime to expect either a dispensed event 306, heartbeat without dispensedevent 307 and/or the alert 304. When none of the signals 304, 306 nor307 are received within the correct time then the absence of thesesignals in itself constitutes an event indicating that no administrationof medication has been performed.

To allow monitoring software on the user 313's mobile computing device102, monitoring software on the remote server 312 and/or monitoringsoftware on the remote user 311's mobile computing device 102 to havemore ability to determine why the alert 314 was not generated, inaddition to the no medicated alert 314 the dispensed event 306 as wellas heartbeat 307 information signals can be provided to one or more ofthe user 313's mobile computing device 102, remote server 312 and remoteuser 311's mobile computing device 102.

Software in user 311's and user 313's mobile computing devices 102, orthe remote server 312 can use the signals 306 and 307 to provide extradetail about medication activities in addition to simply relying on analert 304 when the medication has not be taken. These extra signals alsoallow the calculation and alerting to be performed on devices other thanjust the entity detection device.

If a mobile computing device 102 or remote server 312 have monitoringsoftware using the medication information 309 to determine whether auser should be reminded to take medication, then provision of adispensed event 306 will alert when no reminder is required, however, ifno dispensed event has occurred it may be possible that the medicationhas been taken but in the case of the monitoring being performed fromthe remote server 312 or mobile computing device 102 of user 311, themobile computing device 102 or user 313 may not be in range with theentity detection device 110 but the medication may have been taken. Theabsence of a heart beat signal 307 will indicate this state themonitoring software could then alert the user 304 that the pill box 300and entity detection device 110 are not in range of the mobile computingdevice. It is also possible a broken communication link between devicesis causing the heart beat and dispensed signal not to be received or adevice has no power or is turned off. If a heartbeat signal is notreceived then optionally, a different frequency of messaging may bedisplayed with perhaps less urgency may be displayed because it is notclear that the medication was not taken, however depending on theproduct information 309 the absence of positive conformation that themedication has not been taken is serious and should be investigated.

In one instance, the dispensed signal 306 is generated when the usertakes the message whereas the not medicated signal 314 is generated whenthe dispensed signal is not taken according to the time as determined bythe product information 309.

Where a heartbeat 307 and/or dispensing 306 and/or alerts 314 are notreceived, then devices may attempt to regularly reconnect to receivethese events including but not limited to the monitoring modes describedin this disclosure.

In addition to the mobile computing device 102 or 311 or 313 monitoringand reminding the user if the correct period of time is exceeded, aremote server 312 may also be configured to send a message to a remoteperson 311 who can contact the user and see why they have not takentheir medicine and that they are ok.

Where medication should be stored in a fridge this can also be measuredand reported in case the medicine becomes useless because of goingstale. The entity detection device can be fitted with a temperature,light and/or other sensors so that the conditions for medicine storagecan also be monitored.

Antibiotics as an example should not be missed and if a dosage is takenat an incorrect time then the time for the next dose should be adjusted.An algorithm in the entity detection device associated with the pill boxcan adjust the time for the next dose from knowing when the correct timewas. Additionally an alert 304 could also be provided if the medicine isnot being stored in the correct environment (taking into accounttemperature and ambient light for example) as configured by productinformation 309 or has expired, which may be specifically looked up froma QR code on the packaging encoding a unique product or a batch ID.

The application of medicines is not limited to the case where the useradministers the medication to themself.

Parents (for example as user 311) have a need to know that medicationhas been correctly given to their children in a setting where thechildren do not have access to the medicine to give it to themselves andthe parent may not be present, such as schools.

Relatives and carers 311 for patients may also wish to know when a nurseor teacher has given the medicine for peace of mind.

Additionally the teacher or nurse 313 may have identification 318 thatis communicated to the device 312, 102, 110 when the medication isgiven.

The teacher or nurse ID 318 may be sent from their mobile computingdevice 102 or an entity detection device 110 fitted to them as 317, thisallows verification that the person who is giving the medication isauthorised. This gives assurance to the patient and family of the ofpatient.

The device 317 or mobile computing device used to communicate may beprotected with a password to ensure other people cannot use the samedevice or code. There are many cases where care facilities are allowingunqualified staff to give medicine which can cause death or furtherillness.

These systems also enables a parent to know the medication that thechild has had in his absence such as at school or to capture thesituation where medication is need to discover patterns that may beleading to health issues.

As one example, in many schools, all medications are administers bystaff from one location where a mobile computing device 102 may bescheduled with all medicines and times to administer stored. Eachstudent's medicine box or device such as Inhaler with entity detectionattached may be monitored by the device 102.

A staff member 313 can may receive an alert from the mobile computingdevice 102.

In the case of antibiotics as one example, which need to be taken atregular intervals in a day, a parent would like to know that either themedication has been taken or has not been taken so that they could ringthe school. If the mobile computing device detects the application viathe entity detection device within a configured time frame then it cansend an message to remote user such as a parent. If the staff memberdoes not respond to the mobile computing device 102 then a message canbe sent to the parent. A remote server can also be setup to receive aconfirmation message when the medication is given and if it does notreceive to send a message to the parent as backup in case the mobilecomputing device can't communicate whether or not the medication hasbeen given.

Additionally, for example, a school child 315 may also wear braceletthat is programmed with the medication times 310 and with to alert thechild also if the so they can remind the teacher.

The mobile computing device 102 can also communicate the applicationevent to remote users such as parents or physicians 311 including thelog results 308.

Referring to FIG. 4, battery consumption by an entity detection device110 and mobile computing device 102 can be optimised for the detectionof UV exposure of a child 132 in a stroller or pram 402. When the user101 such as a parent leaves 405 the house 404 and using previouslydescribed methods this is detected such as the acquisition of a GPSsignal and if it is also day light hours and the UV values 141 fromremote databases 136 indicate there is some level of UV, then it beingto performing periodic polling listening for a signal from the entitydetection device 110 on the stroller 402. The entity detection device110 on the pram will only begin to measure UV radiation 401 from the sun400 using an additional UV sensor 406 attached to the device when theaccelerometer 118 detects the stroller is moving 403. It will then senda signal to the mobile computing device 102 when the UV exposure is overa certain value indicating a risk of too much UV exposure. Optionally,the step of check from a remote database that there is some level of UVcan be omitted so that simply by detecting the user is outside, themobile computing device 102 can periodically check for signals from theentity detection device 110.

When the Entity Detection Device 110 detects the bag 299 is opened inany one if a number of ways but not limited to the methods discussedabove, it turns on the transmission so that the Mobile Computing Device102 can see from the fact that the bag 299 attached Entity DetectionDevice 110 is advertising itself some event has occurred oralternatively the event is known only after the two device pairs andcommunicate the event. The Mobile Computing Device 102 is configuredalways, or according to the zone, or at certain times, or always only ifa specific item has been taken, or is known to be carried for examplefrom the home that day.

Zones, areas or locations can be defined as geographic locations as wellas including trips between locations, and over approximately similartimes or lengths of times at different times of day or week. Overtimethe Mobile Computing Device 102 can notice trips and also when they cometo end by way of final GPS location, the length of trip, accelerationand gyroscope 119 patterns including when the bus stops and it ispredicted to be the final destination. Users can also turn on explicitlymonitoring when think conditions are higher risk. These higher risk areadata can be stored at a remote server for use to determine overall riskyareas and share this risk information with other users in a socialwebsite manner. The ends of trips and journeys, for example when theuser may get off a bus is a risky time for leaving items behind, thetime during the time travelling on the train may also have a higher riskof threat of theft.

In these ways GPS and other location determination, acceleration, timeand/or location as well as patterns of these associated with journeywhich may also optionally be a repeated journey, can then be used tolearn when to increase the polling frequency or use any of themonitoring modes as well as potentially as described in monitoring modebonding can be performed especially some time before, or as soon as whenfor example, the predicted the bus stop from this said this location,movement and trip information indicates or predicts that the person isabout to get off bonding or frequency of polling increased so that thedistance between the Entity Detection Device 110 and the entity to whichit is attached and the Mobile Computing Device 102 and it's user can bemonitored to ensure that during these critical high risk moments whenthe user is getting up the signal strength is strong and the distanceindicated is close to ensure that the item is not left behind andadditionally that the acceleration is matched

An additional heuristic that may also be used in addition to themonitoring using location, time, path information is movement analysisusing acceleration and gyroscopic detection of movements correspondingto someone standing up as measure from the Mobile Computing Device 102.This can be used as a trigger to check if the Entity Detection Device110 is also being moved and optionally in a similar fashion indicatingthat they are both moving together and so the entity is not being leftbehind.

Acceleration of the entity which is not equal to the Mobile ComputingDevice 102 and it's user depending on a journey of location may indicateentity such as bag 299 is moving whereas the user staying still. If thisis in an area of hazard like an airport then the monitoring mode shouldbe set to ensure constantly higher frequency monitoring using one of themonitoring modes included bonding or pairing.

In each of this embodiment the Entity Detection Device 110 and MobileComputing Device 102 can be considered to be communication using but notlimited to any of the monitoring modes previously described.

In each of these other embodiments the Entity Detection Device 110 andMobile Computing Device 102 can be considered to be communication usingbut not limited to any of the monitoring modes previously described.

Zones, areas or locations can have a fixed mobile computing devicecontact hub 109 which performs the same function as a mobile computingdevice, but differing in that when the user and/or the user's mobilecomputing device is absent the hub 109 can relay a detection of entitiesleaving or moved or in other ways actuated or triggered to the user'smobile computing device if the user and associated mobile computingdevice is remote to the zone in this way and allow the fixed hub 109mobile computing device to take over the monitoring for triggers andinformation from entity devices. These hubs 109 can be useful forexample when the user wishes to leave an object with entity detector towatch an entity and/or area.

A hub 109 could also be used to collect and forward information fromentity devices that are constantly in range or come and go from being inrange using monitoring modes techniques as described including theentity device listening periodically for hubs 109 and transmittinginformation when a hub 109 is found and/or enough information has beencollected, awaking from sleep mode at set times chosen by the user aslikely to be able to transfer stored information and listening for a hub109 or awaking from sleep and transmitting the presence of the entitydevice to which the hub 109 replies and then a response is sent by theentity device to the mobile computing device to transfer information.Optionally when the user mobile computing device leaves range the entitydevice can be configured to search for a hub 109. As described, adaptivediscovery of the best place and time for entity device and/or mobilecomputing device to awake or transmit can be adaptive algorithm,learning from previously success data exchanges and also having theEntity Detection Device 110 awake and listen at set times for a hub 109.Additionally, the adaptive algorithm can take different strategiesdepending on the urgency of the transfer and data storage remaining forexample if little storage room remained then transfer may be urgent orif data transfer is required at least once a week then as come near tothe time the Entity Detection Device 110 must transfer turn on with morefrequency.

As described for the monitoring modes, a transmission from the EntityDetection Device 110 can be initiated by the Entity Detection Device 110when the signal strength of the hub 109 is below a certain level whichstill allows depending on the transmission power of the Entity DetectionDevice 110 the Entity Detection Device 110 to contact the hub 109 andalert it that the Entity Detection Device 110 is leaving range. In thecase of a child 132 leaving a play area wearing on his hand an EntityDetection Device 110, the Entity Detection Device 110 can transmit backto the hub 109 when the child 132 is determined by the signal strengthto be a certain distance from the hub 109. The hub 109 which may haveinternet connection, Bluetooth connection as well as SMS and email maythen contact the teacher locally as well as parents remotely.Information on who to contact can be in a database or stored in thedevice.

In the case of bag 299 or bike 150 with an Entity Detection Device 110sensing for example acceleration if they are moved even slightly as aprecursor to being stolen, then depending if and how much accelerationas per the Entity Detection Device 110 profile, then the hub 109 can bealerted and optionally a camera and/or alarms action or the owner asidentified by an ID for the Entity Detection Device 110 can be contactedwhere details are stored in database. In another example, a hub 109could monitor a room allowing a bag 299 with Entity Detection Device 110to be left in hotel room or office and be monitored. In the case of thebag 299 and/or the bike 150 using any of the monitoring modes, if theymove out of range of the hub 109 then an alert is triggered. Optionally,movement of the entities under the monitoring of a hub 109, can beignored if the user's Mobile Computing Device 102 is detected by the hub109 using any of the monitoring modes to be present including also theMobile Computing Device 102 periodically transmitting it'sIdentification.

Presently there is little recourse for a passenger whose bag isillegally opened during travel. In this situation it would be highlydesirable to discover who opened their bag. If the bag 299 is opened inthe presence of hub 109 and both the entity detection device 110 and thehub 109 can authenticate each other cryptographically or otherwise, forexample in the case where the hub 109 is in a secure baggage handlingcentre, then the entity detection device 110 will cause the attachedgreen indicator 211 to illuminate which is the state after the usercloses the bag in the presence of the user's mobile computing device 102or otherwise indicates to the device 110 that it is in a secure state tobe indicated as green. If the bag is later opened in the presence of theauthenticated hub 109, then the indicator 211 will change to yellow toindicate to the user and security authorities that the bag has beenopened but at a secure hub 109 indicating also the hub's ID andassociated staff including mobile computing devices 102 to further allowidentification of who opened the bag including time and device 102proximity information. If the bag is opened without successfulauthentication with a hub and not in the presence of the user's mobilecomputing device 102, then the time will be logged and the indicator 211set to red to warn that the bag has been opened illegally. An alarm 212may optionally also be configured to be sounded when the user's mobilecomputing device 102 is not present and/or the bag is in a high riskarea. Several alarms 212 may be dispersed at various points on the bagand/or hidden or placed below mesh running over a wide area so that itis difficult to silence the alarm(s) by covering or damaging them. Inall cases, the time duration of the opening of a bag can be logged alongwith accelerometer movements, allowing a later reviewing of the data ifa bag has been damage to ascertain at which point during the trip it wasdamaged.

TSA locks are routinely used and trusted however the locks can be openedwith legitimate or copied keys. In another embodiment, a version of theTSA lock is configured in a similar fashion so that in place of the bag299 it is the opening of the lock that is monitored in the same fashion.In this way the passenger would have proof the lock was opened and thetime it was opened.

Referring to FIGS. 1 and 5, Parents with small children are often verybusy and may forget to buckle the seat belt from time to time. Whilemodern cars have mechanisms to detect if someone is sitting in a seatbut the buckle is unfastened there is no such mechanism for child seats160 in cars. In the case of a car seat 160 in a car holding a child 161safely by a seat belt 162 the child is safe only if the connector orbuckle 163 is connected. An entity detection device 110 with a contactswitch 164 connected to the buckle can sense if it is connected to thebelt 162. Additionally an accelerometer on 110 can also detect themotion corresponding to the act of connection measured by changes in theaccelerometer, as well as the orientation of the belt by the varying X,Y and Z orientations on a 3-D accelerometer indicating if the belt islying unconnected on the seat or connected as indicated by some form ofangle and/orientation when the child is in the seat and the belt isconnected in place. If the user such as a parent has their mobilecomputing device 102 with them, either the entity detection device 110connected to the buckle 163 or the mobile computing device 102 candetect acceleration consistent with car movements and if there was noconnection of the buckle as sensed by no accelerometer measurementscorresponding to connection or the correct position of the connector orswitch contact or pressure measured on the strap by a pressures sensoras some examples, the entity detection device 110 can send an alert tothe mobile computing device 102 which is listening and especially whenit also detects acceleration consistent with a car moving. The mobilecomputing device 102 can also detect acceleration of the car and send asignal to the device 110 to find out if the belt is connected and if notconnected, then send an alert to the user via the mobile computingdevice 102. As still another option, the entity detection device 110 candetect the acceleration and generate an alert such as an audio alertwhen the car movement is detected.

Referring to FIG. 5, in one of many possible configurations a beltbuckle 164 consists of two halves, some form of female socket 501 andmale section 500 that mates and locks the belt together with a switch164 to detect the joining of the belt 162. The entity detection device110 can be connected to measure by accelerometer position and movementwhich indicate connection of the belt.

Pressure sensors 503 can measure the belt tension to detect if the belts506, 162 are connected. Sensors are connected by wires 502 which areconnected back to the entity detection device 110. In the case of thecontact switch 164, the switch can close a circuit for wire 502 whenpressure is placed on the switch.

Many car seat designs also require a belt 504 to pass through the backof the car seat be connected by a buckle 506 to the car by a second belt505. This buckle 506 can also be instrumented in a similar fashion to163. If the belt buckle 506 is not closed then the car seat will bedangerous.

A detector 508 is provided in order to detect if someone is sitting inthe car seat. Detector 508 may sense movement of the belt's connector orit may sense that the position of the connector is not correct by use ofaccelerometer readings. Alternatively detector 508 may take the form ofa contact switch or pressure transducer positioned to experiencepressure when the child 161 sits on the seat. Further alternativesinclude optical or thermal sensors, as some non limiting ways to detectthe presence of a child in the seat. When a child is detected to besitting on the seat and belts are not buckled then a detection should bemade, in another alternative the belts should alarm whenever they arenot plugged-in regardless of the presence of a child 161.

In another embodiment, the entity detection device 110 checks if thecontact switch 164 is closed as requested by mobile computing device 102when 102 detects acceleration consistent with car movement.

In another embodiment, the belts in a pram or stroller could also usethe same system described above to ensure the safety of a child byensuring all belts are in place when the pram moves.

A Profile can be set for the Entity Detection Device 110 depending onthe entity it is attached to and user preferences defining for anyentity how much and what activities will trigger for example certainaccelerations and/or bag 299 opening alerts. For example, minor movementacceleration of a bicycle lock or lock on a tent can be ignored but ifthey are consistent over a certain time, or indicates tampering then analarm may be triggered.

Hubs 109 include, can be located at the bike 150 racks or cages, hotelsand hostels, in kindergarten, play parks, and apartment buildings tomonitor. Optionally a Camera communicating by Bluetooth could be usedalso and security guard via server.

Initially, a bag 135 (299) may be monitored by a mobile computing device102 by radio connections 124 according to monitoring modes. However theuser 101 can leave 129 the bag 135 in the area 120 within radio range of109 so that the hub 109 (fixed mobile computing device 102) can takeover monitoring the bag and hub 109 which is monitoring the bag canalert 128 the user 101 when remote from the area 120 via the user'smobile computing device 102.

As one example a person could leave a bag 299 or laptop with an attachedEntity Detection Device 110 in their room and know that the hotel,hostel, office, hub 109 will tell them according to the type ofconfiguration for the entity such as if the item is moved at all, orover a certain amount, in a pattern according to gyroscope 119 is beingmoved, as well as if it is opened or goes out of range as shown by thepath 125, of the hub 109 and it's area 120 for that room or area of thehotel, or moves as determined by triangulation then the Entity DetectionDevice 110 could send message to the hotel security staff by contact thehub 109 which is connected to local WiFi or internet. The hub 109 couldalso contact the user who is remote to the location via internet, SMS,email or other communication methods.

As well as fixed hubs 109, a Mobile Computing Device 102 could be acheap Bluetooth device placed in your car to monitor for example anentity detection device 110 attached to tools or equipment or sportsequipment such as a surfboard 152 on top of a car 151. When the EntityDetection Device 110 detects movement this communicated to the MobileComputing Device 102 which then contacts the user via internet, SMS,email or other communication methods. Alternatively, if there is no hub109 in a hotel room again a cheap bluetooth enabled Mobile ComputingDevice 102 could be placed in the bag 299 and either its ownacceleration and/or that of the Entity Detection Device 110 can be usedto alert the remote user.

In another embodiment a hub 109 or multiplicity of hubs 109 could beused to protect a child by alerting one or more interested parties suchas parent far away, teacher nearby and also the child when the childexceeds or reaches the edge of a perimeter as measured by a reduction insignal strength which is can be considered to have exceeded or beapproaching the edge of a perimeter where various known algorithms maybe applied to ensure an accurate reading including methods not limitedto but including averaging and excluding anomalous values.

The system may use some of the monitoring modes previously discussedincluding, using a timer to allow the entity device to sleep times ofdays and optionally days of the week when the device may not be needed,only turning on at other times and listening, and again with an adaptivelistening receiving cycle which is of low frequency of less likely timesfor the entity or child and entity device to enter a hub 109 area.Additionally acceleration of the device can be used to trigger theincrease polling at any stage. Additionally, the polling time can bekept at a low frequency until initial acquisition of the entry in thehub 109 as the likelihood of leaving before the device can notice theincreased polling rate that would occur after entry is smaller. In theseways the battery life can be extended at times before a entity needs touse ore power to monitor.

In addition the system employs a method to auto mate the turning on andoff of the device so that again the battery life can be preserved.

Once the entity device moves in range a hub 109 or multiplicity of hubs109, it assume a higher polling rate that is proportional to increasingdistance (closeness to perimeter) from the hub 109 and the risk of thearea where the zone is located and the amount of movement.

Triangulation can also be employed when the entity is estimated to benear the edge of a perimeter and require accurate monitoring includingdetection of movements in paths leaving the area.

Additional hubs 154 can be placed with overlapping areas to the main hub109 covering the area 120, for example near exits or places throughwhich a child may leave. If additional hub areas 154 are present andthey are indicated to the entity device as extra exit markers by aidentifier then if the Entity Detection Device 110 detects them as canstill detect the main hub 109 then it may bond or frequently poll tocheck if the distance from the Entity Detection Device 110 to the hub109 is decreasing while still in the presence of the extra hub 109. Ifthis continues and especially if both the distance from the main andextra hub 109 increase then an alert is generated indicating that theEntity Detection Device 110 is leaving the hub 109 area as shown by thepath 157.

The extra hub 109 can be used to protect the circumstance for examplewhen there is a door so that an alert is generated if using any of themonitoring modes the extra hub 109 is detected at a certain signalstrength and hence distance.

If an Entity Detection Device 110 detects that the user's MobileComputing Device 102 is leaving an area but there is a hub 109 that cantake over monitoring and the Entity Detection Device 110 has beenconfigured to allow this then the hub 109 will then take over monitoringand pass alerts and data to the user who is now remote as well asoptionally additionally local users who can monitor. If a child, orentity such bag 299 with attached Entity Detection Device 110 leaves anarea however the user (or a group of users) and attached MobileComputing Device 102 are also within a certain range then an alert maynot be generated as the person or entity is considered to be able toprotect the person or entity and also know and be supervising thepersons departure from a monitored hub 109. Alternatively, the user viathe Mobile Computing Device 102 may receive an alert to confirm thatthey know that the child or object is leaving the area and optionallythat monitoring is to be turned off. One or more remote users may alsoreceive a message to let them know that the Entity Detection Device 110is leaving a hub 109 with a user and attached Mobile Computing Device102.

In addition to the monitoring of children, the system may also be usedto monitoring the sick or elderly.

The hub 109 and extra can also communicate information and match updata.

In one embodiment, one or more hubs 109 can be placed permanently ortemporarily and used to collect information as “hub informationcollectors” by monitoring entity device either as events happen and aresent immediately if the hub 109 is present onto a server for activitiesincluding not limited to logging or alert a third party including whenthe are not there. As the entity device does not have the ability toconnect to WiFi, internet or other such as network connections it canuse the hub 109 as the means to achieve this in a energy efficientmanner connecting to the hub 109 when it is present using a variety ofconnection techniques involving techniques such as the entity pollingthe listening for a transmitting hub 109 with maximum sleep for theentity and listening for a hub 109 transmitting only when only necessaryincluding also accumulating results where possible to limit thefrequency of connection as disclosed in this invention descriptionincluding but not limited to the description for “monitoring modestrategies”

In one method, the entity device turns on discoverable advertising whenit has data to transmit. The user suggests a time or the phone learnsthe time it can contact the hub 109 and when the data transfer is overthe Entity Detection Device 110 sleeps between transfers.

Parents spend a lot of money on musical tuition. Progress with andinstrument is tightly tied to the frequency, length of time and spacingof practising. A method is desired to a track and reward students forconsistent practising as well as alert them and parents and teacher whenthis is not happening. As one example, musical instrument cases, standsor the instruments themselves have contact switch, accelerometer 118,tilt switches or pressure sensors attached that trigger when the case isopened, or an instrument lift off a stand, for example, the removal andreplacement of a flute on a flute stand. In the case of a flute standwhere the flute is slid vertically over a cylinder that holds it uprightas will be well known to the reader, the base of the stand in contactwith the flute could have a contact, pressure switch trigger by theweight of the flute, or an optical sensor as some examples to sense whenthe flute is paced on the base. The Entity Detection Device 110 can bein sleep state but woken up when the said switch mechanism is operatedas one example. In this manner, the time the flute is off the stand aswell as the frequency and time can be logged and recorded. Additionallyto verify that the flute is played, noise sample using a microphoneattached also to the Entity Detection Device 110 which could alsoperform analysis to detect frequency characteristics of the musicalinstrument. This description is for a flute but the same principle couldbe applied to other musical instruments. As an alternative mechanism anentity detection device 110 containing an accelerometer 118 could beplaced on the flute to sense movement.

The accelerometer patterns detected by the accelerometer 118 or othersensors that constitute the action of playing the flute as opposed tojust picking it up for a while can be stored in the entity profile 137as a sensor detection pattern 196 as well as being stored in the sensorpattern database 195.

Sensor detection patterns 196 can be configured for a variety of sensorsthat can be connected to entity detection device 110. The patterns canbe configured by but not limited to, entering data sequences, values andranges of data, or with the sensor(s) attached to the entity detectiondevice (s) the user can move or in other ways actuate the sensors orenvironment so the sensor is sensing in a record mode which can bestarted, paused and stopped. The sensor detection patterns 196 can beuploaded to the entity detection device 110 and/or mobile computingdevice and backend server to perform the processing. Individual datavalues in the sensor detection pattern can be termed sensor values.

Different sensor data can be recorded for different detections. Forexample accelerometer data can be used to detect when someone waswalking and stopped, picked up a flute, picked up and inverted acontainer for example while feeding fish, or opened a door etc.

The Sensor detection patterns 196 may also have an icon, title anddescription associated with them and may be reusable for a user andshareable to other users.

To make a positive detection of a sensor detection pattern 196, sensordata must be matched against the pattern 196. To achieve this in knownart there is a variety of well established principles includingcorrelation, as well as techniques to clean data and allow for variance.The placement of the sensor on specific devices or measurement atspecific times when activities should occur add context that makesdetection simpler when beginning from a known context.

Sensor detection patterns 196 and outputs can be combined into sensorprograms 197 expressed as programmatic constructs such as “IF THEN ELSE”statements or graphical combinations of sensors and actions to performactions. The outputs can be displays or alerts on a entity detectiondevice 110 and/or mobile computing device 102 being visual or audio. Forexample, in the case of the flute, on detection of a sensor detectionpattern 196 defined as movement with the flute mostly in the horizontalposition but moving for approximately 20 minutes a “flute sensordetection pattern” is detected. A sensor program 197, defines that whenthe “flute sensor detection pattern” is triggered, points 1002 are sentto a server 1001. The sensor program 197 defined by the user may havesections of software running on the entity detection device 110 such asthe detection of the flute playing pattern, sections of the program onthe mobile computing device 102 or hub 109 that check for completed“flute patterns” and upload them as points 1002 to 1001 as one nonlimiting example. As described various “monitoring modes” as describedcan be combined to deal with the distribution of the sensor program 197detections and outputs spread over a set of hardware from entitydetection devices 110, mobile computing devices 102, 109 and backendservers 1001.

The information collected could be used to give or reduce rewards,points or scores, sharing progress data with the teacher, unlock levelsor new characters or “power ups” in games, or contribute to pointstowards a purchase physical of real goods and services on an onlinestore, allow the use of resources such as computers, game consoles,tablets, TV or be converted into money or time access to devices orservices. For example, if an adult earns rewards, points or scores thesemay translate into time using a gym or a holiday, bonus pay or time offwork. Games could use themes that reinforce the activity being trainedfor example, a musical theme for the could be used in the game. Inaddition to flutes, guitars, pianos (measuring the vibration whenplayed) and all kinds of musical instruments can be monitored each withdifferent accelerometer or sound signatures to be detected to indicatedwhen played either by movement of the instrument while playing or soundcoming from the instrument. The entity detection device 110 may be insleep mode and woken up when acceleration is recored which is thenlogged along with duration and time which may be directly communicatedwith a mobile computing device 102 and onto a remote server 1001 orlogged and stored on the entity detection device 110 and at a later timetransferred to the mobile computing device 102.

In one embodiment, a system is provided where users may combine avariety of inputs expressed as sensor patterns 196 and outputs into asensor programs 197 expressed as programmatic constructs such as “IFTHEN ELSE” statements or graphical combinations of sensors and actionsto perform actions.

Referring to FIG. 11, ten example graphical sensor programs are shown. Asensor program 107 to remind someone to feed fish is shown in 1100 whichcan also be shared for download and use by other users into their ownentity detection device 110 and mobile computing device 102. The icon1100 may be used to communicate to other users what the purpose of theprogram is and it may be accompanied by a title and description notshown in the figure. The program reads left to right. A sensor detectionpattern 196 has been recorded and used in 1102 to detect the shaking ofthe device 102 with accelerometer 118 mounted on a fish feed containerin a pattern that would correspond to the pattern of shaking of a tin(in this case fish feed). The plus sign 1103 represents the addition ofthe second condition in 1104 that must happen every day otherwise thearrow symbol 1105 indicates the action to take when this does not happenis to contact the user 1106 (who is in charge of feeding) via theirdevice 102 and if there is no response contact the owner 1107 throughtheir device 102.

A second sensor program 1110 rewards children who are active in thegarden for 20 mins with 20 points towards a physical or virtual reward.The Icon 1111 represents activity while the sensor detection pattern1112 detect general physical activity from an entity detection device110 on the child such as on a shoe or wrist band which occurs 1113outside as specified by another sensor pattern which is a proximitydetection to a bluetooth transmitter beacon placed in the garden andthis activity occurs for 20 mins 1114 then 20 points 1115 is awardedstored on the mobile computing device 102 and/or score server 1001 aspoints 1002.

A third sensor program 1120, for rewarding children for sleeping (icon)1121, uses a sensor pattern 1122 which detects minimal activitycorresponding to sleep which occurs for the whole time between 9 pm and6 am 1123 will award 30 points on the mobile computing device 102 and/orscore server 1001 as points 1002. A child would be fitted with abracelet, pillow, or soft toy mounted entity detection device 110.

A fourth sensor program 1130, warns if the stove is left on when no oneis present for more than 5 mins (as this is dangerous) represented bythe icon 1130. A sensor detection pattern for temperature or infrareddetection of a flame 1132 indicates that when this is detected and itoccurs for more than 5 minutes 1133 and the user is not present(represented by the symbol 1134) and detected by the proximity of anentity detection device 110 mounted near the stove and connected to aninfrared sensor and the user's mobile computing device 102 being morethat 10 m distant. Consequently 1135 the user's mobile computing device102 is first contacted 1136 and if there is no response then an alarm israised 1137 and transmitted 1138 to at least one device 102.

When the user was present and the stove was detected as turned on by thePIR reading then via the mobile computing device 102 a message is sentthrough to the server at this initial time and the server also executesthe sensor program specified 5 min timer at the backend. This means thatafter 5 mins if the the mobile computing device 102 cannot determinefrom the entity detection device 110 if the PIR is still reading thestove is on not only will the entity detection device sound an alarm (ifone is configured) but also the mobile computing device can alert theuser that it has been 5 mins that the Stove may have been on with noability to confirm whether it has now been turned off, but additionallythe server will also know after 5 mins if it has not either received asignal from the PIR detecting that the stove is off, or the person isstill there and it is still on, or the person is not there but hasacknowledged that risk when he was alerted on his mobile computingdevice 102 in which case it may also send a message such as an SMS orpush message to the mobile computing device 102 and/or a message to oneor more other third parties. This is particularly helpful in the case ofAlzheimer's patients.

A fifth sensor program 1140, protects against theft (icon 1141). When apassive infrared detector sensor detection pattern for general movementis detected 1142 mounted near a bike connected to an entity detectiondevice 110 or the bike with an entity detection device 110 withaccelerometer is moved 1144 and the time is between 11 pm and 5 am 1145and the user is not present 1146 as detectable by the entity detectiondevices 110 from the user's mobile computing device 102 and the userdoes not respond 1147 then an alarm connected to one of the entitydetection devices sounds 1148.

A sixth sensor program 1150, rewards children for the wearing of ahelmet such as for a bike or skateboard (icon 1151). When an entitydetection device 110 with accelerometer 118 mounted in a kids safetyhelmet is moved 1144 for 5 minutes 1052, then 10 points are awarded 1053on the mobile computing device 102 and/or score server 1001 as points1002.

With reference to FIGS. 11 and 12:—

A seventh sensor program 1160, consists of a configurable “to do list”or “rewards chart” 1161 where the parent can write on a label 1208 tasksand configure on the mobile computing the frequency with which theyshould be repeated from a calendar as well as points to be awarded andtime of day they should be done. These details would also be explainedto the child and optionally included on the label. When the childcompletes a task she presses a button 1206. The indicator 1207 isinitially off, green when done in time, moving to yellow when littletime is left to complete a task to red when there is no time left.

In the case of 1160, if the child makes her bed (indicated by pressingthe 1st button on the chart with the symbol 1162), cleans her teeth(indicated by pressing the 2nd button on the chart with the symbol1163), makes her lunch (indicated by pressing the 3rd button on thechart with the symbol 1164), packs homework (indicated by pressing the4th button on the chart with the symbol 1165), gets dressed (indicatedby pressing the 5th button on the chart with the symbol 1166), all by 8am each day then 20 points are awarded per day on the mobile computingdevice 102 and/or score server 1001 as points 1002.

The eighth sensor program 1170 reminds a user if they leave a door orwindow open and leave the house or it is late at night and they arearound but may have gone to sleep without closing the window (icon1171). In one embodiment, a window uses a typical security detectionapparatus such as a magnet on one side and a reed switch on the other.The reed switch is connected to the entity detection device 110 toenable sensing of the position of the window. When the window isdetected to be open 1172 (as detected by an open circuit reed switchbecause the magnet is not in range) and it is between 11 pm and 6 am1174 or 1176 the user is not present 1135 (perhaps having left thehouse) then the mobile computing device of the user will be alerted1175. In the case where the person is not present they will be alertedif as they left the entity detection device 110 was checked and wasfound to be open, or the last known state was unchecked or opened. Thebrackets 1173 mean that the operations inside are grouped together, asis normal practice in computer programming.

An alternative system may involve use of an accelerometer to detectmovement and infer that from a starting position whether a window ofdoor is open or closed or locked or unlocked.

A ninth sensor program 1180 takes a rain gauge 1213 measurement 1183 at6 pm 1182 each day and then output a signal activating a solenoid 1216that empties the gauge for the next day 1184. The rain icon 1181represents the rain gauge sensor program.

A tenth sensor program, 1190, deals with rewards for sunscreenapplication as custom specified by a parent user. When the largersunscreen bottle is moved or pumped 1192 or the small size bottle isused 1193 as indicated by the child pressing the button on it and it is1194 between 11 and 12 pm (so before lunch but not too early forreapplication), then 20 points 1195 are awarded each day on the mobilecomputing device 102 and/or score server 1001 as points 1002. The icon1191 represents this program.

In these examples it is assumed that either immediately or after theevent the entity detection device 110 can pair with the mobile computingdevice to transmit data.

The five graphical program constructs discussed could alternatively alsobe constructed using “if, then, else” statements where conditions can becombined with boolean operators as one example and more than one action.For example, in the case of the graphical construct, 1100 to specifywhat to do if the fish is not fed regularly, then the same program maybe described by the expression “IF NOT (shake acceleration) AND TIME>2DAYS THEN REMIND Feeder AND Remote Owner” as one such example of how theconstruct could be written.

With further reference to FIG. 1:—

The sensor programs 197 are stored as in a sensor program database 193that can be shared between users. Each Sensor program has an associatedTitle, Icon and Description. The sensor programs 196 can be uploaded toan entity detection device 110 and/or mobile computing device and/orbackend server to perform the processing.

Referring to FIGS. 11 and 12:—

When programs are successfully completed they transmit points 1002 via amobile computing device 102 to a score server 1001 for storage andsubsequent retrieval. Usage of devices such as tablets 1000, TVs 1201and virtual or physical shops 1202 and graphing visualisation 1203 canbe accessed by redeeming earnt points 1002.

The feeding of fish each day determined by measurement of a fish foodcontainer 1203 with attached device 110 with included accelerometer 118will generate points 1002 stored in the score server 1001.

The reading of a book such as the Bible 1204 with device 110 includingaccelerometer 118 as determined by movement by a child each day willearn points 1002 stored in the score server 1001 as 1002.

A “task completed” chart 1205 is fitted with a series of multiplehorizontal rows each consisting of a contact switch 1206, an indicator1207 which is initially off, green when done in time, moving to yellowwhen little time is left to complete a task to red when there is no timeleft and resets at some period such as each day (or depending on theperiod of the task), and also a label 1208 which can be added by theuser for example “made bed”. Only one row is shown in FIG. 12.

A Sensor Program could be created to award points 1002 for each contactswitch 1206 activation (corresponding to a task completion), optionallyif also done on time as specified by the program. In this manner,children are incentivized to complete tasks as they will receive aphysical reward, TV or console time.

The playing of a child 1219 fitted with a bracelet attached to entitydetection device 110 in proximity to a “outside” position bluetoothbeacon 1212 with transmission area as shown by 1299 can earn the childpoints 1002 stored in the score server 1001 as 1002. This encourageskids to be active and incentivizes kids to do physical play to getvirtual play time.

A child 1220 trying to sleep fitted with bracelet 1211 with attachedentity detection device 110 who goes to sleep on time as specified by asensor program 197, can also earn points 1002 stored in the score server1001 as 1002.

A rain gauge 1213 takes a measurement of the rain 1217 that hascollected for a period of time using a capacitive or resistive moisturemeasurement sensor 1215 connected by wire 1214. At an assigned time theentity detection device 110 outputs a signal activating a solenoid 1216that empties the gauges of rain 1218 for the next day or time period andsends 1298 the measured rain level to 102.

These points 1002 can be used as an incentive for children or adultsbecause they allow access to tablets 1000 or watching TV 1201, as wellas winning physical prizes 1202 or viewing of graphs 1203 of pointsearned or compliance. The graphs 1203 allow users to track performanceand provide motivation for better performance in the future.

The scanning of a QR code by a mobile computing device 102 may alsoredeem or earn points for a selected user. As some non limitingexamples, the checking of a garden area for snails, or watering a gardenby a child may have a QR code outside which they have to scan when theystart and end the activity or when the sections of a book are completeda QR code can be scanned to earn points. Parents can also hand out QRcodes including with scratch away covers as rewards to redeem points1002. A parent may also use the mobile computing device 102 to assign ordeduct points 1002 stored in the score server 1001 as 1002.

Depending on the measurement required, input sensors 190 measuringphysical properties, including, but not limited to pressure, magnetism,water content, movement may be connected to 117. All possible types ofoutput 191 may be connected to 117.

The kinds of sensing that can be performed includes, but is not limitedto,

Light, UV, Infra red, contact switches, pressure, magnetic field,accelerometers, Gyroscope, voltage, current, resistances, sound, gases,vibration, temperature, as well as proximity measured between bluetoothdevices, as well as presence and absence of users depending on whethertheir Bluetooth Low Energy enabled device fitted with an ID is detectedin proximity as well as time, date, frequency. Location can also bedetermined by detecting Bluetooth Low Energy beacons and/or GPS locationfrom a 102. Inputs and output can be to and from the internet. Outputscan also be a notification to a device, a siren, audio alarm or displayon a mobile computing device.

By qualifying symbols and ID for with a device ID to indicate whichdevices to run the element of code on, multiple device 110, 102 and 1001can be combined to create a detection symbol.

In some embodiments, given an entity detection device 110 to whichvarious sensors 190 and outputs 191 can be attached, and having software(either alone or in a combination of devices 110 and 102), a range ofcustomized sensor programs 197 can be created by users, shared withother users or configured into a commercial product shipped with theprogram.

Habits can be created by monitoring, reporting and rewarding actions andconsistent behaviours. Having a way to check that an activity has beencompleted when the user has instructed an agent to perform the activityon his behalf provides peace of mind.

In one embodiment, the user may wish to know (whether in real time or ata later date) when a hose, watering can or mister has been used to waterplants and have a mechanism to allocate rewards to motivate complianceor activity. This may be done to either remind the user or an agentperforming the action on the user's behalf, including for example, achild who has been asked by a parent to remember to perform a task oralternatively a employer and employee. An entity detection device 110fitted with an accelerometer 118 and/or contact, tilt or vibrationswitch connected to the hose, watering can or mister, or other sensorssuch as a flow meter measuring the water output as some non limitingexamples of ways to determine the watering has been done, including alsohaving the user press a switch on the device 110 to indicate completion,can be used to log the time and duration of usages and optionallyaccording to the sensor program 197, report scores, rewards includingmoney and/or points 1002 and this logged information to a mobilecomputing device 102 of the user and/or agent or to a hub 109 and thenlogged or communicated to a remote user's mobile computing device 102 atthe point when detected or when the entity detection device 110 andmobile computing devices 102, 109 can exchange data. The data is thenstored as reward, points, scores, money, progress 1002 and/or logrecords in the database 1001.

In one embodiment, the user may wish to know (whether in real time or ata later date) when pets are fed, including for example, when the user isaway and wants some assurance that agent has completed the task, or toremind a user or agent for example, by tracking when a fish has been fedand/or the water changed, or a cat or dog bowl refilled or moved whileeating and have a mechanism to allocate rewards to motivate complianceor activity. This may be done to either remind the user or an agentperforming the action on the user's behalf, including for example, achild who has been asked by a parent to remember to perform a task oralternatively a employer and employee. An entity detection device 110fitted with an accelerometer 118 and/or contact, tilt or vibrationswitch is connected to the feeding containers (such as the fish foodcontainer) or bowls, or other sensors such as a flow meter as some nonlimiting examples of ways to determine pets have been fed, includingalso having the user press a switch on the device 110 to indicatecompletion, can be used to log the time and duration of usages andoptionally according to the sensor program 197, report scores, rewardsincluding money and/or points 1002 and this logged information to amobile computing device 102 of the user and/or agent or to a hub 109 andthen logged or communicated to a remote user's mobile computing device102 at the point when detected or when the entity detection device 110and mobile computing devices 102, 109 can exchange data. The data isthen stored as reward, points, scores, money, progress 1002 and/or logrecords in the database 1001.

In one embodiment, the user may wish to know (whether in real time or ata later date) when a child wears clothing, for example, at school, whenit is cold such as a coat or hot such as a hat and have a mechanism toallocate rewards to motivate compliance or activity. This may be done toeither remind the user or an agent performing the action on the user'sbehalf, including for example, a child who has been asked by a parent toremember to perform a task or alternatively a employer and employee. Anentity detection device 110 fitted with an accelerometer 118 and/orcontact, tilt or vibration switch is connected to the clothing as somenon limiting examples of ways to determine the clothes have been worn,including also having the user press a switch on the device 110 toindicate wearing, additionally to instrument whether a zipper is doneup, in a similar manner to the mechanism for the zipper 204 in FIG. 2,can be used to log the time and duration of usages and optionallyaccording to the sensor program 197, report scores, rewards includingmoney and/or points and this logged information 1002 to a mobilecomputing device 102 of the user and/or agent or to a hub 109 and thenlogged or communicated to a remote user's mobile computing device 102 atthe point when detected or when the entity detection device 110 andmobile computing devices 102, 109 can exchange data. The data is thenstored as reward, points, scores, money, progress 1002 and/or logrecords in the database 1001.

In one embodiment, the user may wish to know (whether in real time or ata later date) when good habits are being practised and reward them andhave a mechanism to allocate rewards to motivate compliance or activity.This may be done to either remind the user or an agent performing theaction on the user's behalf, including for example, a child who has beenasked by a parent to remember to perform a task or alternatively aemployer and employee. An entity detection device 110 fitted with anaccelerometer 118 which is connected to the wrist, for example as awrist band, can be used with a sensor detection pattern 196 to detectaccelerometer movements. For child sufferers of cerebral palsy andstroke victims it is important to develop skills with everydayactivities (self-care) such as tying shoes, using a knife and fork,brushing hair and teeth and getting dressed. Sensor detection patterns196 can be created for different activities when the activity isdetermined to have been done or when the activity being done isspecified and the compliance of the activity is measured then points canbe awarded. For children who need to practice writing or do home work anentity detection device 110 connected to a pen with an associated sensordetection pattern 196 to reward a child when they use the pen in amanner representative of writing as detected by the sensor detectionpattern 196. The acceleration on wrist can be used to log the time andduration of usages and optionally according to the sensor program 197,report scores, rewards including money and/or points and this loggedinformation 1002 to a mobile computing device 102 of the user and/oragent or to a hub 109 and then logged or communicated to a remote user'smobile computing device 102 at the point when detected or when theentity detection device 110 and mobile computing devices 102, 109 canexchange data. The data is then stored as reward, points, scores, money,progress and/or log records in the database 1001.

In a similar manner an entity detection device 110 fitted with anaccelerometer 118 which is connected to the wrist can be used to senseactivities according to a sensor detection patterns 196. As one example,the use of a water can, playful activity outside by a child, washinghands as some non limiting examples.

In one embodiment, the user may wish to use (whether in real time or ata later date) environmental changes as a method to monitor for events.This may be done to alert the user of circumstances needing attention.An entity detection device 110 fitted with one or more temperaturesensors could be used to measure that a garden composter is in theoptimum temperature range at one or more points in the heap where thetemperature may need to be different for different positions and Sensordetection patterns 196 and sensor programs 197 can be defined usingtemperature values and ‘>’, ‘=’ and ‘<’ operators in the program to setlevels at which a user is alerted.

These various sensors with associated sensor detection patterns 196 canbe used to log the time and duration of usages and optionally accordingto the sensor program 197, report scores, rewards including money and/orpoints and this logged information 1002 to a mobile computing device 102of the user and/or agent or to a hub 109 and then logged or communicatedto a remote user's mobile computing device 102 at the point whendetected or when the entity detection device 110 and mobile computingdevices 102, 109 can exchange data. The data is then stored as reward,points, scores, money, progress 1002 and/or log records in the database1001.

In addition to these examples, by creating sensor programs 197 andconfiguring any desired appropriate sensor and defining or using. TheSensor detection patterns 196 and combined then extendable system. Thesensor program 197 may also take an input from a remote server orexternal input defined to receive a number or boolean value for use bythe sensor program 197 being returned by a url or a data typetransmitted to the same or different remote server.

The sensor detection patterns 196 can be uploaded to the entitydetection device 110 and/or mobile computing device and backend serverto perform the processing by software on these devices.

In some embodiments, the sensor program 197 sensors can be distributedacross a network of multiple devices 110, 102, 1001 defined by one ormore programs where the sensor program's 197 elements including but notlimited to the sensors can be qualified by a device number to indicatewhich device 110 or 102 they are attached to.

Many people need to take medication each day. It is important thatmedication be taken at the correct intervals and regularly. Missingdoses can cause the effect to be reduced and trying to make up doses canbe dangerous. Busy people including the elderly, forgetful, orborderline dementia can easy to miss to take their medication. A pillbox helps people remember by setting out the compartments in days, andtime of days it is designed with individual compartments for differenttimes of the day such as breakfast, lunch, dinner, night and days of theweek.

In another embodiment of a “hub information collector”, a “pill box”such as a Webster pill box or similar is instrumented with contactswitches to measure whether each compartment has been accessed and atwhat time, a series of pill box sections (such as seven sectionscorresponding to the days of the week) are instrumented with one commonmeasurement such as a contact switch.

The measurement method for each compartments or series of compartmentsmay be a contact switch as one non limiting example or an accelerometer118 could be used to check that the pill box as a whole as been movedconsistent with opening of the pill box and at approximately theassigned times or at whatever time the box is moved and to what amount.

The pill box has an entity device attached to it and integrated into thebox if contact switches are instrumented with a multiplicity of contactswitches attached to a multiplicity of wires connected to the inputs onthe entity device. The entity can be programmed from the mobilecomputing device to expect the pill box be opened moved for one or morespecific times of the day as well as days of the week. The programmingcan be done in both or either of the software in the entity device orthe Mobile Computing Device 102. The pill box is then monitored by theattached entity device to see whether it is moved.

The pill box can operate with several modes, in one of several modes,firstly, the Entity Detection Device 110 is awoken from sleep modewhenever the an event occurs and attempts to communicate the event tothe Mobile Computing Device 102 so that that the Mobile Computing Device102 can also inform a remote carer such as a nurse and they can havepositive confirmation that the medication event occurred. Secondly, theEntity Detection Device 110 is awoken from the sleep more when an eventoccurs and a timer that has been set to confirm the medication event iscancel because the user medicated but if the a timer is not cancelledthen the user is reminded and then if still no medication event occursthen a remote carer is informed. Thirdly, medication events are recordedand periodically reported.

The pill box can have configuration data such as medication times etcprogrammed by pressing a button on the pill box to enter configurationmode or it may listen for a configuration request event from the MobileComputing Device 102 at certain times at which the configuration data issent.

If the mobile computing device is not in range of the Entity DetectionDevice 110 this is also reported as this is a different state to havingpositive or negative confirmation of a medication event.

Audio or visual alarms on the pill box or the Mobile Computing Device102 can also alert the user if they fail to medicate.

When the pill box needs to have medicines refilled this refillingprocess can be signified to the entity device to distinguish if from thetaking of a compartments medicine, through pressing a button on the pillbox or the phone at the time of refiling on the entity device or theacceleration can be monitored on the device and an unscheduledacceleration, opening of contacts, ignored as assumed to be the refilingprocess. The refiling process can also be recognised if many contactsare opened simultaneously or in quick succession or if the accelerationis characteristic of the refiling process as configured from softwaresettings set from factory settings, recorded from the customer refillingthe device.

In another embodiment the same concept as for pill box could be appliedto Brushing teeth, flossing and other such hygiene activities. TheEntity Detection Device 110 and accelerometer 118 as well as optionallya gyroscope 119 may be attached and re-attached between changes in toothbrushes and flossing containers so as to be re-used or alternativelythey may be permanently joined.

The amount of acceleration and time as well as angles of movement asmeasured with an additional gyroscope 119 which constitute adequatemovement and so brushing or flossing may be recorded for an individualor taken from a library of recorded acceleration sequences, the sensorpattern database 195.

Regular brushing or flossing may be used to earn time on a game consoleor points towards a virtual of physical prize or movement through agame.

The game may be styled in such a way as to reinforce the message ofdental hygiene.

Result 1002 reported for activities performed as recorded by an EntityDetection Device 110 can be sent to a server 1001 where they can betracked by person, family member, health professional each day.

In one embodiment, it is desirable to have a portable security systemfor example when travelling it is seldom possible to be sure how safe ahotel door lock system is. This system consists of a passive infrareddetector (PIR) and/or accelerometer 118 that can be placed in front of aperson (perhaps in the entrance to a room) facing out of the room in thedirection that an intruder may approach, or in the case of anaccelerometer 118 on the door. The entity detection device fitted withPIR can then send signals if it detects movement to the user's MobileComputing Device 102 placed next to the user which will raise an alarmand/or start a countdown which if the user does not cancel it will causean alarm to be sent remotely or if there is a hub 109 for the hotel tothe hotel security staff.

In one embodiment, it is desirable to have portable security system forexample when travelling it is never possible to be sure how safe a hoteldoor lock system is. This system has a consists of a passive infrareddetector (PIR) and/or accelerometer 118 that can be placed in front of aperson perhaps in entrance to a room facing outward of the room in thedirection that an intruder may approach or in the case of anaccelerometer 118 on the door. The entity detection device fitted withPIR can then send signals if it detects movement to the user's MobileComputing Device 102 placed next to user which will raise an alarmand/or start a countdown which if the user does not cancel will cause aalarm to be sent remotely or if there is a hub 109 like for the hotel tothe hotel staff security

An Entity Detection Device 110 with an attached PIR can be configured tobe turned on by an Mobile Computing Device 102 when it detects an unsafetime or location.

A PIR attached to an Entity Detection Device 110 could be used forexample to watch a location where a car is parked at night so that ifanyone approach u can be warned or depending on configuration if theyare present for a certain amount of time. The Entity Detection Device110 with attached PIR could communicate with a hub 109 for a whole blockof departments and when an event is detected one or more users connectedto the hub 109 can receive the alert, or receive if the user is notconnected to the hub 109, a signal can also be sent to the user if he isremote to the hub 109. A white list of people can be programmed so thatthe Entity Detection Device 110 or the mobile computing device receivesa broadcast sent from phone of for example a cohabitant it will notactivate the alarm if they enter and are detected by the PIR

This PIR and accelerometer 118 mounted Entity Detection Device 110 andsystem can also be used to protect sections of house that people can goor not go into, Or touch or not touch.

The PIR can be linked to hotel or a hub 109 or set of hubs 109 in a setof units and the hub 109 can detect any other users who are in the hub109 or set of hubs 109 who are configured to receive the alert on yourbehalf. The alert can be sent via SMS, internet or from the bluetooth toother Bluetooth devices.

In another embodiment an additional bluetooth entity device 110 separateto the entity that can act as an alarm with a noise alarm such aspiezoelectric alarm or any such form of very loud alarm or display witha more advanced power light source component with great capacityallowing shareable resources attached to the hub 109. The alarm may befitted in common walkway areas or dangerous spots as a shared resourcethat any panic alarm system can use in an emergency. This alarm mayalternatively be a mobile computing device 102 and communicate usingwireless or internet with a central security location such as if thealarms were placed on a university campus reporting back to a centralsecurity command. On a university campus, students own mobile computingdevices 102 may also have their panic alert configured to be sent to thesame central security command.

The alarm may also be placed personally on the being a bit bulking in abag 299 or built into a bag 299.

Mobile computing device applications presently allow a user to trigger apanic alarm alert by pressing a button on the application, It isdifficult to manage the operation and implementation of theseapplications to allow the user to at any stage conveniently trigger thealarm by pressing a button on the screen. For example the applicationshould always need to be the to most application, even when the user islistening to music as one example. Also the screen should never beallowed to lock otherwise the button may not be able to be accessible tobe used. The screen will also use a lot of power if always on.

A problem faced by present solutions includes how to prevent the panicbutton from being activated as a false positive during times when thebutton should be disabled.

In one embodiment, the entity detection device 110 consists of one ormore panic buttons 119 which when pressed send a signal such as aBluetooth Low Energy signal to a mobile computing device which can thenalert a remote party via internet, SMS or email. The panic button mayconsisting of one or more non limiting examples including contact,capacitive or pressure sensor of various sizes. Depending on thesituation as specified by the user and/or location and associated riskas determined by consulting a database then the mobile computing devicelistens and receives the panic button signal if pressed in thosesituations only, this saving false positives and the mobile computingdevice battery. The user can use the mobile computing device to alsorecord the start, stop and midpoints of a journey, or times and lengthof time for journeys of dangerous times of day or access local or remoteinformation security information including also crime statistics.

People can also vote an area as dangerous explicit or if they turn thepanic button into a dead handle, or countdown to alarm mode. If themobile computing device application notices that a person regularlytravels an area it may also ask the user to vote the safety of thisarea. The information can be reported to a map of critical dangerousareas. When the panic button 119 is pressed and the mobile computingdevice is configured to receive the trigger it may send the alarmstraight away or begin a countdown. The countdown itself can also beconfigured to be silent or alert the user by vibrating or by sound orcombination, again being configurable based on the situation. The panicbutton entity that has button and one or more cancel buttons. Separateto phone so that can be easily access and cancel a countdown by pressingone or more button in a pre-described order, a second order of buttonscan be defined to send the signal straight away to a remote party.

The panic could also be built into or attached to a watch band/or smartwatch. The panic button could be part of smart watch also. The panicbutton could be built into earphones with button placed on the earphoneand the Entity Detection Device 110 inside on or other of earphonesand/or with the us of the accelerator so that if falls out a countdownstarts on the mobile if not cancel sends location to 3^(rd) party. Whenthe user is concerned for example as a stranger approached the selectionof one or more button can put the entity device and/or mobile computingdevice in a countdown mode preconfigured, if the danger passes withoutthe user cancelling the alert will be triggered. The panic button isuseful for example for a dad to give to her daughter going into a femaletoilet he cant enter as one non limiting example. Trains, bus, and otherfixed locations have panic button stations installed where pressing abutton will call a security guard or alert others to help. A problemwith this is that users cannot always reach the button.

In one embodiment this system describe could allow the panic buttonentity device to communicate with this panic station which would actlike a hub 109, and in this way the hub 109 can be listening continuallyfor connections and when the panic button contacts then the alert can besent to the security guards including also an ID so that the person'sinformation can be known to help identify them as well as theirposition. In locations underground in build where the location can't befixed it can still be exactly fixed to the location of the hub 109 evenif moving a train carriage. An ID can be blocked for panic buttonmisused or stolen

In one embodiment, instead of the triggering a panic alert from thepanic button, it can be triggered by the measurement of movements todetect if a person has fallen over. The accelerometers 118 and gyroscope119 on the entity detection device 110 can be used to compare movementsto those typical of a fall and if so detected trigger an alert to theuser. Characteristics about the movements for the fall can be stored inthe database 137 for the panic device.

It is a common problem for parents and/or spouses, family members to beworried about their family members when they are travelling betweenlocations. A method would be desirable to allow family members tomonitor their travelling family members and so even if nothing is wrongthe fear of not knowing if their safe can be removed.

The system can be used to track the return of a child or partner fromschool or work as they pass a point with mobile computing devices actingas hubs 109 without needing to have mobile computing device with GPS andinternet access but instead a smaller entity detection device. It isparticularly useful for children who don't carry a mobile computingdevice with internet and GPS. When they come into range of the hub 109the Entity Detection Device 110 sends an unique identifier (ID) for theperson to the server through the hub 109 that has a connection to theinternet through which it can communicate to remote user with aninternet enabled device such as mobile computing device.

The entity detection device can be pre programmed by the parent orspouse to be listening at certain times with a certain frequency forsignals from hubs 109 to which the entity responds with an ID or tobroadcast at set time ranges and intervals so that as the person passesby a hub 109 there is a sufficiently high frequency of polling to ensurethat the signal is not missed by a hub 109 as the entity device goes by,but that at other times the device is not using battery unnecessarilyand draining it. The system is designed for the entity device to belistening then it response with it's identifier that the hub 109 sendsto a server and to a remote user which has been associated in aconfiguration database to receive the information.

Hubs 109 could include around school gate to detect departure andarrival from school where as described when the entity comes in range ofthe hub 109 an ID is communicated and a report sent to the personsmonitoring remotely. Hubs 109 could also be installed on the bus, atcommon public places, safe house for children could have them installedto detect child as walk by, as well as a hub 109 at home so that againif the person monitoring is remote to the home location also they canknow that the child reached home safely. For example, this would allow aparent waiting on the bus stop not to need to wait till the bus toarrive and their child not be on board before searching for the childalerting the teacher.

Additionally, other family members or carers who may for example bepicking a child up from school can have an application or entity devicethat also indicates their presence in the zone at the same time as thechild to allow for situations where another authorised person takes achild out or accompanies of a zone but all other family member(s)monitoring can still be informed. The described panic button systemallows the safe tracking of shift workers, nursing staff and universitystaff and students a few non limiting examples. Nursing car parks anduniversity campus are closed environments where the alerts can be sentback to a local security guard already setup to assist. Staff travellinghome across a city also need a system to protect them, the panic buttonsystem utilises existing infrastructure in the form of the mobilecomputing device 102 to transmit safety information to third party suchas family or security personnel who may belong to companies currentlywith staff constantly in many areas performing patrols who, incentivisedbut a fee charge when the button is pressed will respond to the call. Inan alternative embodiment, the when the panic button is pressed the usermay receive an alert, coded or otherwise indicating the time for a guardto arrive.

Many people live alone and have no one who will be aware if they do notreturn home each evening, including the elderly as well as single peopleliving alone. Such a system can be configured to detect and report thesafe arrival in the home zone or the progress of the entire trip. Acommon need for cyclist and motorbike riders as well as children is tobe noticed by car drivers. Many drivers are very concerned to keep alertfor cyclists and motor bike rides but it is a known issue that they areeasy to miss in traffic or when the driver is not concentrating or themotorbike is in a blind spot. Another hazard for motorists is to noticechildren nearby particularly when parking. The user's mobile computingdevice can generate an alert when cyclists, motorbikes and childrenwearing the entity detection device using any of the aforementionedmonitoring methods connects or discovers a mobile computing device andthe user is identified as in the zone of their car identified by aBluetooth beacon or tag in the car or by inferring that the user istravelling by one or more combinations of accelerations, gyroscopeactivity or travel path analysis from locations analysis such as GPS,combined also with optionally asking the driver to confirm activitiesare associated with driving to subsequently recognise these times,geographical paths as car travel times.

In another embodiment, a tent door including both zipper opening orother methods of closing, or accelerometer 118 on the tent can beinstrumented to see if the it is opened and the a mobile computingdevice nearby perhaps the user inside the tent could be alerted or ifremote to tent a hub 109 in the caravan park or left inside tent tomonitor it or in a car near by could relay an alert to a remote personsuch as user or security. In another embodiment, a tool box lid,accelerometer 118 on the lid of whole box can be instrumented to see ifthe it is opened and the a mobile computing device nearby perhaps theuser nearby could be alerted or if remote a mobile computing device inthe box in a car near by could relay an alert to a remote person such asuser or security. Similarly to a toolbox, individual tools could also beprotected in this way. In the described embodiments throughout thisdescription, a primary form of system is using low power RF such as, butnot limited to Bluetooth Low Energy, otherwise known as Bluetooth smartor Bluetooth 4. Combined with processors with lower power in sleep. Itis further assumed that the typically processes also have analogue todigital converter

In some embodiments, the methods described for a bag 299 can be appliedto wallets, purses, camping back packs, sleeping bags 299, travel bags299, lap top cases as well as for detecting if the a person is wear acoat and jacket which is zipped up.

In another embodiment, if a mobile computing device detects that theuser has lost GPS or radio signal or gained internal positioning (IPS),then it can make an hypothesis that the user has entered a building, andat this stage it can send a signal to any entity devices to see if thereand then when GPS or radio is regained it can check those items arethere and prompt the user they may have left them behind. In this way,without geographic lookup or database can deduce locational changes ofimportance including entering and leaving a building. In someembodiments, a fixed hub 109 can be is used to perform occasional orcontinuous audit tracking of asset each with a entity device attached.Example assets may include computers, chairs, tools. If someone attemptsto move an asset as detected by accelerometer 118 or break a stickerwith a wire embedded that breaks a contact switch causing a circuit tobe opened and the Entity Detection Device 110 is sleeping waiting for anInput/Output event to wake up and trigger a signal to the hub 109.

Other connections could include magnetize contact switch, loss ofpressure between the object and the entity or another other form ofswitches as widely known in the security field of art. In cases such astheft tracking to track the movement of the equipment where the EntityDetection Device 110 remains connected to the entity but the wholeentity is moved the methods described for monitoring a child in areas ofsafety could be employed. In additional to real time asset checking ifit may be sufficient to get occasional synchronise as once a day, week,month. If it is important to regularly establish the location of theobject then any of the monitoring modes may be employed and Additionallyin a similar way to the monitoring of bags 299 previously described.

When a entity is detected to have been moved or opened then an mobilecomputing device or local registered person in the office, or a localalarm can be triggered if the person is not there or in addition to thealarm or camera activated in that otherwise or also a remote message forexample to a security guard. Additionally an auditor that enters abuilding a walks through can also transmit a signal, if the devices aredesigned to listen for the auditor at a time and/or day of week, or haveone specific time each week where they listen and can be set by mobilecomputing device to be ready for an audit at a particular time then thiscan. In addition to assets in an office this technique could be appliedto monitoring goods in a shop against theft. As soon as the objects aremoved, the Entity Detection Device 110 may also immediately wake up andstart sending updates of their position until they stop moving allow asystem to track if their movement is may indicate theft such as by theirmovement towards the door without passing past checkout. The position ofthe device can be determined by the calculate of distance by signalstrength such as RSSI or other methods using low power RF of one or morereceivers or transmitters from the entity.

In addition to monitoring when an asset is moved, it may be important tohave an item provide regular updates to prevent a thief Shielding orjamming the signal that would be performed by thief to prevent thewarning signal being. In this way the hub 109 can deter something mayalso be wrong if heartbeats not received. The system should also attemptto scan for jamming signals.

In some embodiments, processing of data can be performed at the EntityDetection Device 110 and/or Mobile Computing Device 102 or distributedbetween the two devices. In some embodiments, a fixed hub 109 canmonitor doors in a building to see if they are opened using magneticswitches, contact switch accelerometer 118 s and the like. Changes instates or continuous states of interest such as open long time can betransmitted to the hub 109.

In some embodiments, activities that should be performed regularly suchas the cleaning of an office can be monitored for example, the cleanercan be fitted with Entity Detection Device 110 on their person orcleaning equipment can be fitted with an Entity Detection Device 110 sothat when the equipment is moved as measured by the accelerometer orturned on or the cleaner moves the hub 109 can be alerted by any of themonitoring modes. Additionally if the cleaner or equipment EntityDetection Device 110 are out of range of the hub 109, then when the theycome into range then the information can be collected. see descriptionof “monitoring modes”.

Alternatively, the cleaner's own mobile computing device could act asthe hub 109 sending the information about their location and activityfrom and including from an IPS using triangulation using low power RF orGPS and also movement information including but not limited toaccelerometer 118 and/or gyroscope 119. Optionally movement informationincluding location, accelerometer 118 and/or gyroscope 119 can be usedto detect styles of movement indicative of a cleaning activity beingperformed. Previous cleaning location and movement information can berecorded and compared with current measurements to determine howthoroughly an areas is being moved this information may be sentimmediately in real time via the Mobile Computing Device 102 orcollected and sent at certain time intervals. In addition to cleanersthe principles can be applied to maintenance and home care staff as wellas the monitoring of security guards, hotels staff.

The hub 109 can have an ID, indicating the location which can be sentwith information from the entity detection device 110 such as movements,time and also the person present (as identified by an ID from theirmobile computing device 102 or 110, if on their person). If the data issent from the user's mobile computing device then the hub 109 ID can besent also to identify in what area the data was collected.

To assist cleaners and service personnel to avoid unnecessary cleaningand call outs, toilet doors, sanitary bins and shower curtains, taps canall have an entity detection devices 110 placed on them withaccelerometers 118. When they are moved then a message can be sent via ahub 109 to a remote person 102 or system allowing them to know when afacility needs to be serviced. In this way the personnel can avoidunnecessary checking if equipment has not been detected as used. A hub109 can be used as a bridge between a blue tooth low energy and WiFinetworks allow entity detection devices 110 to transmit to remote mobilecomputing devices 102 via the WiFi connection. In this way a low costmobile computing device 102 without a mobile carrier can be used.Monitoring is required to ensure workers on building sites or doingother high risk work comply with safety requirements to wear safetyequipment.

Referring to FIG. 9, as a further example of this monitoring from a hub908 in a fixed position or person's mobile computing devices, a worker900 in a potentially dangerous work site 901 can be monitored to checkthat she is wearing as non limiting example of safety gear, safetyglasses 902, safety hat 903, ear protection 904, sunscreen 905, safetyfoot ware 906, and safety clothing 907 each fitted with the entitydetection device 110. In one mode of operation, the hub transmits asignal 909 periodically and the entity detection devices 110 mounted onthe safety devices 902, 903, 904, 905, 906 and 907 checks at variousintervals during work days and times or as per a calendar, or receivethis signal and if they are being used detected by contact switchesfitted to measure the pressure of someone body wearing them or byaccelerometers then either the device 110 transmit back 910 an score orpoints or other such acknowledgement to the hub 908 or alternatively,collects and stores the score and at a later time 930 when connected toa hub such as a mobile computing device 102, then the score information1002 which combines a user ID, time, duration, score, and optionallywhich safety devices worn as well as location is transmitted to a remotescore database 1001. From here the a worker could receives incentivessuch as prizes, payment for work if they were wearing the helmet andpenalties if they are not wearing safety equipment. In another mode, theentity detection device 110 detects acceleration (or switch 912 pressed)and then it checks for an hub location is transmitting 909 and thentransmits back 911 information such as combines a user ID, time,duration, score, and optionally which safety devices worn. Resultsuploaded from hub 908 or 102 to 1001 as 1002. can Unlock payment forwork, bonus competition entry or, compliance data, including forinsurance and government.

Referring to FIG. 8, the monitoring of wearing of safety equipment by amonitoring hub 109 or otherwise can be extended to prevent dangerousequipment 800 function, or at least record who has used equipment whenit is turned on when no safety equipment is being used. This is done toensure that safety gear is being warn around dangerous equipment whichwithin a general work site is a particular more dangerous period of thework day. Dangerous equipment may include ride on mower, chain saw,industrial equipment, earth moving equipment as some non limitingexamples.

In one embodiment, If it is only necessary to monitor who is using theequipment when it is turned on then when the on button is pressed 801 toturn on 800 connected by wires 802 to the entity detection device 110,it causes the device to function as a hub 109 transmitting a signal 805to the entity detection device 110 on the safety device 803 which canthen log or record that it was being worn as detected by contact switch,pressure, or accelerometer 118 or by pressing of a button 804 or whenacceleration 118 is measured, the device responds back 806 to the entitydetection device 110 that the hat 803 or glasses 808, ear protection, orsafety boots as some non limiting examples are actively been used.

If the safety equipment 803 has or is being warn then later when 102 orhub 109 is in range, the device 110 on 803 can communicate the loggedinformation to the 102, 109 from where points or events 1002 can belogged for later analysis and for example the awarding of points forcompliant workers. Additionally if the equipment is not configured toturn off and if no safety gear are detected, the entity detection device110 on 800 can record and when 102, 109 in range transmit 1002 eachevent and time of non compliance for investigation. An advantage of thissystem is that the contact switch, pressure, or accelerometer 118 on 803needs to be close to the 110 on 800 to a configured position such as 1 mand being used to allow usage of 800. In one embodiment, the entitydevice 110 attached to the child's wrist band/or optionally shoe or,shoe lace can be also be in a monitoring mode wherein it listens forbroadcast from a mobile computing device 102 that is sending a signalwhen a driver is moving his car or broadcast a signal that a driver'smobile computing device 102 can detect to allow drivers to know whenchildren are close to the moving car.

Referring to FIG. 10, it is desired by parents to restrict access tocomputers, games consoles, tablets, smartphones or TVs as excessiveusage of them is not good for child development. The system describedcontrols the access to such devices (computers, games consoles, tablets,smartphones or TVs) 1000 such as allowing users including children toonly have access to devices 1000 in a restricted regime when they havebeen allocated time by a parent or optionally as a reward event 1002 forcompleting work where the allocation of time or points 1002 is stored ina server 1001. These time or points may have been added to the server asa result of the parent giving time manually using their mobile computingdevice 102 display or from a multiplicity of sources such as in oneexample an sunscreen application event 1009 where a parent wishes toreward a child for apply sunscreen, where the child presses a button1011 attached to device 110 mounted on a sunscreen tube 1010 when sheapplies sunscreen. As another example, time points 1021 could be givenwhere a parent wishes to reward a child playing actively outside 1020 asmeasured by the accelerometer 118 on the entity detection device he iswearing.

When the device such as tablet 1000 is turned on or accessed, or moved,or specific software on 1000 are used, software monitoring in thebackground or foreground, accesses 1004 the remote server 1001 andlocates for the user associated with the device a score or points record1002. The number of points retrieved 1005 is used to determine how theuser may use the device 1000. For each time period of use for example 10mins the number of points 1002 is decremented and updated 1004. Shouldthe retrieved number of points 1005 fall below 0 then a message 1006 isdisplayed to the user to tell them they should no longer access thedevice (and optionally usage of the device is disabled). A message isalso sent 1007 to the mobile computing device 102 user such as parent totell them all points have been used and if user persists, the user mayalso be blocked from using the Communication 1004, 1005, 1007, and 1002can all be via Bluetooth Low Energy, WiFi, internet or cable.

Any attempt to remove the application may also be prevented and/or awarning sent to the parent. A regular heart beat signal reporting thatthe application has remained installed on device 1000. An alternativeconfiguration would be to place an entity detection device 110 on thetablet or other device along with also a connector between the device1000 and the entity detection device 110 such as pressure, contactswitch or contact switch in sticker (damaged when remove or many otherforms of tamper protection) then a report sent to mobile computingdevice 120 of the parent when movement of the device is sensed with nopoints 1002 available.

In the case of controlling TV 1201 usage, a device 110 can be fittedwith an amplifier and relay which can switch the main voltage whichpowers a TV. The amplifier takes the TV time reward output signal 1012and increases the power to drive the secondary coil of the relay andturn off and on the TV 1201. In one embodiment, the habits of childrenabout saving energy could be developed by placing entity detectiondevices 110 on doors, blinds, dressing gowns, which measure that theyare closing doors and wearing warm clothes by accelerometer or contactswitches as some limiting examples and temperature gauges in roomsfitted to entity detection devices 110 which are reported to device 102and on as events and/or points 1002 to 1001. When energy savingpractices are monitored such as the closing doors, blinds and wearingwarm clothes fitted with accelerometer to detect wearing are followedand optionally the temperature is maintained then points 1002 arerewarded to a score database 1001.

By these methods, the receiver users are empowered with a method tocheck With the growth in antibiotic resistance all possible techniquesto reduce transmission of diseases are vital.

Additionally if the cleaner or equipment Entity Detection Device 110 areout of range of the hub 109, then when the they come into range then theinformation can be collected. Alternatively, the cleaner's own mobilecomputing device could act as the hub 109 sending the information abouttheir location and activity from and including from an IPS usingtriangulation using low power RF or GPS and also movement informationincluding but not limited to accelerometer 118 and/or gyroscope 119.Optionally movement information including location, accelerometer 118and/or gyroscope 119 can be used to detect styles of movement indicativeof a cleaning activity being performed. Previous cleaning location andmovement information can be recorded and compared with currentmeasurements to determine how thoroughly an areas is being moved thisinformation may be sent immediately in real time via the MobileComputing Device 102 or collected and sent at certain time intervals. Inaddition to cleaners the principles can be applied to maintenance andhome care staff as well as the monitoring of security guards, hotelsstaff.

In some embodiments, activities that should be performed regularly suchas the cleaning of an office can be monitored for example, the cleanercan be fitted with Entity Detection Device 110 on their person orcleaning equipment can be fitted with an Entity Detection Device 110 sothat when the equipment is moved as measured by the accelerometer orturned on or the cleaner moves the hub 109 can be alerted by any of themonitoring modes. Additionally if the cleaner or equipment EntityDetection Device 110 are out of range of the hub 109, then when the theycome into range then the information can be collected. see descriptionof “monitoring modes”

In some embodiments it may be desirable to sense whether a tap in thegarden or in the house has been left on by mistake by someone when busyor by an elderly person who is forgetful and have the user or a thirdparty remotely be able to check or receive a warning when this occurs.This would be desirable to prevent water wastage or flooding of anapartment or house. The entity device can sense this using a hall effectsensor to detect the flow of water, accelerometer flow of water byvibration or noise or moisture. The detection of water flow for acertain amount of time or volume determine by the magnitude of thesensor reading or combination of volume and time can be used to triggeran alert to be sent to the mobile computing device or hub 109 from theEntity Detection Device 110. If the person doesn't respond then an alertis sent by a fixed hub 109 in the house to the a remote user.

In some embodiments, where a mobile computing device fixed hub 109exists for example in a block of units, flats or apartments, then theEntity Detection Device 110 can monitor when shared devices such as awashing machine are turned on by way of integration into the deviceitself for example into a washing machine where the interface panelincluding on and off buttons and length of time remaining as some nonlimiting examples can be connected to the Entity Detection Device 110 sothat it can communicate to a user via their own mobile computing deviceor via the hub 109. This will allow a multiplicity of users in a blockof flats or units to coordinate the usage of shared resources andequipment not limited to but including washing machine, dryer. All userscan see when a machine was started, how long remaining, the usercurrently using, and book time slots. If a user specifies it, anyequipment belonging to them may be configured to use the hub 109 tocommunicate using the low power RF to other users, devices or a remoteperson when the user is not present and including also when the user ispresent and does not respond.

In a similar manner, an Entity Detection Device 110 and/or a secondlocal user's mobile computing device can both be configured so that ifan alert that has been configured so that when the movement of a bike150 secured in a common area of a flat reaches a certain thresholdindicating a potential theft attempt in progress, then in addition tothe owner, other apartment block members in the same set of apartmentsand hub 109 could be alert and/or an alarm linked to the low power RFhub 109 also activated. The system could be designed so that only if theuser's mobile computing device is not in the hub 109 area will otherapartment block members be alerted. A PIR detector on an entitydetection device 110 could also be used protect areas where it isexpected that people should not go or loiter as particular times of day.For example a car park could have a series of PIR Entity DetectionDevice 110 monitoring cars and if anyone comes in this area and bytriangulation of distance to bluetooth beacons is detected and there isno one in that are area who has an ID that when polled by the hub 109 isin a “white list” of allowable people then if the loiter time is over alevel then the car owner(s) connected to the hub 109 in that area willbe alert.

In this way a social form of security can be created with apartmentowners working together to protect each other and their property andgives them tools to be aware of security issues in their area. It meansfor example, that if a neighbour hears a noise and cannot raise theirneighbour but there was a panic button pressed that they have someobjective information for the police.

It also means that even where there is a theft there will be telemetryfor the time of the event. The detection mechanisms can be combined withtriggering security camera recording. The general provision of extrainformation for other people to use may reduce the reluctance of peopleto assist as they often feel they do not know whether they are overreacting to noise they heard as opposed to a real problem. Whenneighbour also give all or individual neighbours permission they feelsome engagement. The ability to communicate on a network that is trulylocal allow a set of otherwise isolated neighbours to vote and discussissues such as noise levels or policing issues as well as vote on asolution that is acted on by a moderator. As another example, pegs forclothing, clothes, or clothes lines can have Entity Detection Device 110attached to warn against clothes theft. Residents can share ownership ofwatering plants in common areas or each others flats y receiving alertsthrough a Bluetooth hub 109 by either the signal Bluetooth hub 109signal or group of them relaying messages by bluetooth or mixed withcable and/or internet between hubs 109 depending on the size of theblock of apartments of building.

Additionally, IPS using low power RF triangulation can be used to locateand warn when a person is in the wrong place. The Entity DetectionDevice 110 communicates to one or more users Mobile Computing Device 102or optionally also by a hub 109 if present to remote users MobileComputing Device 102.

In some embodiments, the Entity Detection Device 110 and MobileComputing Device 102 can communicate with any of the monitoring modes,with a Mobile Computing Device 102 able to concurrently monitor one ormore Entity Detection Device 110 as well as an Entity Detection Device110 be concurrently monitored by one or more Mobile Computing Device 102s, including Mobile Computing Device 102 acting as hubs 109 as well asremote user Mobile Computing Device 102 which receive data and alertfrom the hub 109 via communication methods including but not limited tointernet, SMS, email.

In some embodiments the mobile computing device may be smart devices,smart phones and tablets, smart watches, as well as all kinds ofportable computing devices with low power RF as well as optionally ableto communicate using other forms of WiFi, mobile network communication,Examples of such devices include but are not limited to devices runningiOS, Android and Windows operating systems. The term can also be appliedto laptops and may also include desk tops and be broadened to alsoinclude fixed computers configurations. Additionally, where mobilecomputing devices are mentioned as fixed this may included mobilecomputing devices that are portable in characteristics including sizeand weight and connection to a network that accessible while the deviceis moved by has been placed in a fixed, or to some degree unchangingposition.

Power to the mobile computing device is assumed to provided from asource that can used to constantly supply the charge or recharge abattery in the mobile computing device.

In some embodiments the entity devices can also include all kinds ofmobile computing devices. As one example as smart watches such as iWatchcan be taken off and potentially left behind when changing after sportas one non limiting example, The iWatch could operate, including in itsapplication software in a similar way to other Entity Detection Device110 for purpose of it being protect from loss as described in thisdisclosure. However the iWatch can also operate as mobile computingdevice for the purpose of monitoring other entity detection devices.

A smart watch may also act as a mobile computing device. The Power tothe entity device is assumed to provided from a battery that isgenerally small and not rechargeable and needs to be conserved withminimal usage to extend the life of the battery including trying tomaximise sleeping time, and receiving as opposed to transmitting timehowever it could also be considered that it could be connect to a sourcethat can used to constantly supply the charge or recharge a battery.

In some embodiments, the distance between the entity detection deviceand mobile computing device can be determined by using signal strengthcalculations using low power RF transmitters and receivers such as RSSI.Low power RF methods may including but are not limited to Bluetoothclassic, Bluetooth Low Energy also known as Bluetooth smart andBluetooth 4.0. In some embodiments, Low power RF methods may includingbut are not limited to Bluetooth classic, Bluetooth Low Energy alsoknown as Bluetooth smart and Bluetooth 4.0. In some embodiments, thedistribution of monitoring and processing of data can be spread tovarious degrees between the Entity Detection Device 110 and the mobilecomputing device software and processors. For example, in the case ofthe monitoring acceleration of an entity detection device which is to bemonitored when a the mobile computing device notices the user hasentered a new location or area, which requires careful accelerationmonitoring to be performed to see if for example a bag 299 is lifted upor moved in a purposeful manner for some reason that the system may wishto deduce, then a software algorithm can be applied to the movement datain either the entity device or the mobile computing device. Allalgorithms for movements as well as other algorithms for other purposescan be applied in software and/or additional hardware on either and/orboth the entity device and/or mobile computing device.

In some embodiments, acceleration, compass and gyroscopic data can becollected from the entity device and/or the mobile computing device andused to determine if certain kinds of movement have been performed suchas the purposeful movement of a bag 299 away from a person indicatingfor example that the bag 299 is being taken away as for example in oneinstance a possible theft.

In some embodiments, the user sets the panic button into a count downstate which will cause an alert to be sent if a single button ormultiple buttons 119 is not then issued to cancel the countdown.

In some embodiments, the transmitting of a signal or alert can beachieved by a device advertising and/or making itself discoverablewithout then need to form a connection. For example, if a bag 299 isopened the Entity Detection Device 110 can sense this then by turning onand advertising it can be considered to have communicated an alert. Insome embodiments, the alarm may be of various volumes or visualappearances or battery usages depending on whether the mobile computingdevice of entity device and also on the power connected. In someembodiments, all known methods can be used to send a remote message oralert from the mobile computing device to a remote such as SMS, datasent by internet, or recorded or live voice and video data. The messagesent may include information such as the GPS, Bluetooth beacons ortransmitter ID nearby as well a day and time.

In some embodiments, the remote server may include a database, andsoftware to collect and process information according to variousalgorithms, and be able to contact other users via their mobilecomputing device including by SMS, data sent by internet, or recorded orlive voice and video data. In some embodiments, advantage is provided byprolonging the battery life as this means that the device may use verylittle battery and so approach the shelf life of the battery or at leastlong periods of time which match or exceed the stated or anticipatedexpected life time of the device so that the casing can be arranged in amanner where the battery is permanently sealed to save costs and/orimprove water resistance.

In some embodiments, the said monitoring modes can be applied to thewarning when a child wearing an Entity Detection Device 110 and a parentwith Mobile Computing Device 102 are separated by distance and theMobile Computing Device 102 using location sensing such as GPS identifythat the child and parent are in an area of risk from traffic danger forchildren. The distance after which an alert is given can also specifiedand adapted according to the traffic risk in the zone. The child canreceive warning on his Entity Detection Device 110 if he is beginning tomove away from the parent. The zones can be very specific with distancesless than for example 0.5 metre as one example, when right near the edgeof a road.

In some embodiments, where many different separate software applications104 in the mobile computing device 102 are concurrently monitoring suchas polling for the purposes of listening and/or transmitting forconnections using lower power RF between mobile computing devices 102and entity detection devices 110, then the software 104 on the mobilecomputing device 102 can be consolidated or combined or in other wayspartitioned in to a separate application or service for the purpose ofoverall performance efficiency. The said combined application, softwareor service can call back other individual applications when events occuror on the status of regular polling done on behalf of one or moresoftware applications as well as marshal outputs on behalf of the samesoftware applications. In some embodiments, multiple mobile computingdevices 102 can communicate with a single entity detection device 110.In some embodiments, an addition camera can be included with the entitydetection device 110 or the mobile computing device 102 and used for thepurpose of recording a particular event that is being monitored. In someembodiments, the entity detection device 110 and the mobile computingdevice 102 can be synchronised to communicate at set times andfrequencies using the synchronised clocks and/or timers.

In some embodiments, entities such as safety equipment on publictransport or other public places including fire equipment, hammers tobreak glass, life jackets can be attached and monitored by entitydetection devices 110 reporting movement to a fixed hub to alert oftheir use and potential unauthorised use or damage. In some embodiments,the a list of user Identifiers is kept as a “white list” so that when analert is to be sent the alert is not sent if the mobile computing deviceto perform the detection detects any user's mobile computing device ispresent as specified on this list wherein optionally the user's mobilecomputing device has also been moved in recent times to ensure that theuser is likely to also be present. In some embodiments, the entitydetection device 110 has an ID as well as a range of configurationsparameters to tell the said entity detection device as well as themobile computing device how to respond and alert to different levels ofmovement, locations, times, and events on a customised way for theentity and/or user as stored in a local and remote database 137 whichcan be accessed by Identification number.

In some embodiments, the sunscreen dispenser 133 is moved or opened thena signal is sent to the mobile computing device 102 so that it knows thesunscreen dispenser was used and does not therefore matter if leftbehind. In some embodiments, The entity detection device 110 attachedto, or co resident to a multiplicity of entities, can communicate analert to the mobile computing device 102 via low power RF such asBluetooth energy when movement or opening or a multiplicity of otherevents occurs as well as the entity being detected to be leaving anarea. Additionally the display 114 and audible 115 components on theentity device 110 can create alerts. In some embodiments, allocatingrewards may also include allocating negative points for incorrectbehaviour or failure to comply.

Alternatively a small indicator on the entity detection device 110 onthe cup such as an led could also be configured to be displayed. In someembodiments, the power usage of the entity detection device 110 can bereduced by having the processor, for example, as one non limitingexample, the texas instruments cc2540 processor enter a sleep mode withminimal current drawn and have devices such as a MEMs Accelerometergenerate an interrupt to awaken the processor rather than have theprocessor poll the sensors regularly. In some embodiments, the systemsdescribed here combining software and hardware may be used at productiontime to create and ship to customers a fixed product, while in otherembodiments the system can be supplied as a configurable or customisablesystem where the user connects the individual sensors and defines thesensor program 197. In some embodiments, the communication between theentity detection device 110 and other devices 110 and 102, 109 can bedone with Bluetooth Low Energy or other low power rf methods, or otherrf methods, including WiFi, as well as wire connections or standardwire. Communication between mobile computing devices 102, 109, andservers 1001 and other devices can be done by Bluetooth Low Energy,WiFi, internet connections, sms, chat, facebook or other social mediacommunication mediums. In some embodiments, the use of electronicequipment may be monitored by the use of hall effect, magnetometer, orinduction of voltage or current in a sensor coil attached to the powercord or other sections of the device from where energy usage can bedetected. These sensors are connected to the entity detection device 110and measure the can be used with a sensor program 197 and sensordetection pattern 196 to detect and alert, or rewards points or negatepoints based on the measured usages of devices.

In some embodiments the rewards and games unlock may be mechanisms forgranting and storing rewards, displaying them to others and/or playinggames as hosted by social network and media sites such as but notlimited to Facebook, Google, Google Plus. In some embodiments, theentity detection device 110 may be attached to critical medical devicessuch as Inhalers, epi pen, heart medications, pill boxes as some nonlimiting examples and as described for hats, sunscreen and umbrellas areminder issued if the user leaves them behind at a particular locationor forgets to take them from home. In the case where the medication isfor a child and they do not carry a mobile computing device 102, thechild may also carry an entity detection device 110 which will checkwhen the device 110 connected to the child and the device connected tothe medical device are separated. With the rise in food allergiesrequiring epi-pens (epinephrine auto injector) and asthma, this methodcould reduce that chance of a person dying because the device wasforgotten. Leaving medicines behind also erodes their effectiveness whenthey are there fore not able to be taken at the correct times. It isvery important that antibiotics not be left behind and by placing adevice 110 on the package this can be averted.

In one embodiment, a shared piece of equipment such as a key may have anentity detection device 110 (including an accelerometer 118) attached.When the device 110 is moved as measured by the accelerometer 118, thenthe device attempts to read an ID associated with the mobile computingdevice 102 of the person moving the shared piece of equipment. The eventof the movement/use of the equipment can be logged by the device 110including time an duration and location if bluetooth beacons areavailable, and along with the ID of the person also communicated via 102to a remote server for logging or monitoring. In one instance, if theequipment is moved without a person ID logged (or an unauthorised one)then an additionally attached alarm may sound.

In some embodiments, the application software on the mobile computingdevice 102 checks the location of the user periodically using GPS, Wi-Fior radio towers as some non limiting examples, to determine whether theuser is outdoors, and so potentially exposed to UV radiation, byconsulting a database of geographical features identifying areas andlocations that are not inside or shaded. The application softwarerecords how much time, on which days, at what times, and how regularlythe user is in these locations. This information can be used toidentifies days and times when the system should monitor for theseparation of the user and sunscreen dispenser 133 as the user will beat risk of having no sunscreen on days when it is needed.

In some embodiments, the functions described for the entity detectiondevice 110 may be performed by software and sensors in devices such asmobile computing devices 102, as well as devices such as smart watches,including the iOS based devices such as the iWatch and Android andWindows based devices such as smart watches.

Referring to FIG. 7 shows a sunscreen “roll on” dispenser 700 consistingof a roller 702 dispensing sunscreen 701 with a entity detection device110 attached whose movement is measured by an accelerometer 118. Theaccelerometer can be used to check not only that the user has appliedsunscreen but also applied over the skin surface sufficiently. Setpatterns (sensor detection pattern) and times of acceleration can beused to gauge if sufficient sunscreen has been applied. The patterns maybe derived from recording of acceleration patterns or magnitudes and forwhat period of time they occur with accounting for variability in thevalues based on real user studies. The acceleration readings and timescan be used to determine whether a sufficiently adequate applicationevent has occurred by processing by the entity detection device 110which then communicates whether a dispensing event has occurred 705 tothe mobile computing device 102 or the raw acceleration and time data706 maybe transferred to the mobile computing device 102 for processingand determination. The transfer of data 706, 705 may be initiated 704 bythe mobile computing device 102 requesting device 110 to transfer anydata with the device 110 in listening mode awaiting a request all thetime or at regular listening time intervals. Alternatively, the device110 may transfer results 706,705 at set intervals or pre arranged timeswith the mobile computing device 102, or when the device 110 and mobilecomputing device are paired. The results 706, 705 may also becommunicated 707 by internet or WiFi as some examples to a server 730for data access by other parties.

Referring to FIG. 6 shows a Inhaler 699 such as a Ventalin™ Inhaler usedto treat asthma. The Inhaler consists of an outside section from whichthe gas is dispensed 603 from a canister 601 that fits inside 620 theoutside section 600. To dispense the gas the top of the canister 601 ispressed which is fitted with Entity Detection Device 110 and a switch604 such as but not limited to, a contact, pressure or capacitive switchconnected to the device 110. A connector 605 such as plastic or rubberallows the device 110 and switch 604 to be connected, disconnected andreconnected to new canisters 601 as they are used and replaced. Theswitch 604 is connected by wire 622 to device 110. When the switch 604is activated, the Entity Detection Device 110 communicates the usage 606to the Mobile Computing Device 102 which keeps a count of the number ofInhaler applications of the puffer and so the amount of medicationremaining. The mobile computing device 102 can obtain medicationinformation such medication remaining by scanning using it's camera thebar code, QR code of the product package or by other means to know thetotal number of dispense events possible. The Entity Detection Device110 may also receive the medication information from the mobilecomputing device 102 scanned from codes or otherwise as described andusing an audio and or visual display such as change or flashing ledcolors or an small audio alarm 609 to communicate to the user that themedication is running out. An alternative method of measuring thedispensing would involve the use of a contact switch 621 at the base ofthe canister 601 to detect dispensing as the canister is depressed. Theswitch is connected by wire 622 to device 110. As described thedispensing event 606 may be communicated to the mobile computing device102 when it occurs if the device 102 is listening either all the time orat set prearranged intervals. Alternatively, device 110 may be inlistening mode at regular intervals when it has new dispensinginformation and when the mobile computing device 102 requests an update607 it responds with the dispenses count 606 as some non limitingexamples. The dispensing count 606 combined with other information suchas when and where it occurred may be communicated and stored 610 in theserver 630.

A significant number of hospital admissions occur because the dispenseris appears to still have gas but has actually run out and the patient'scondition deteriorates because they were not medicated. This systemwould permit the user (parent and or child) to have visibility throughalert on the mobile computing device which is often a high visibilityway to receive information and or alerts. The server 630 can alsocalculate when the dispenser is running low and provide sms, push alertsor other warns to multiple devices 102 as well as automate reorders fromsuppliers. Software on the mobile computing device 102, 110 or 630 couldalso be used to predict and warn the average or shortest time before themedication will run out as well as allow patterns of usage such as timelocation and frequency from 610 to be used to determine patterns whereasthma is triggered. This concept could also be applied to other medicaltreatments.

In some embodiments, the hub 109 may act as a Bluetooth Low Energybeacon.

1. A human activity reporting system, the system comprising: at leastone sensor detection pattern consisting of at least one sensor value; atleast one sensor coupled to a first processor attached to an entityactuated by a human; a BLUETOOTH™ low energy radio link; and a secondprocessor coupled by said BLUETOOTH™ low energy radio link to said firstprocessor, wherein said first processor reads at least one sensor valuefrom said at least one sensor, and wherein said first processor comparessaid at least one sensor value to said sensor detection pattern, andwherein said first processor communicates a report to said secondprocessor based upon said comparison.
 2. The system of claim 1, furthercomprising a sensor program consisting of a combination of amultiplicity of said sensor detection patterns, wherein said sensorprogram is evaluated on said first processor or said second processor.3. The system of claim 2, further comprising a repository of at leastone sensor detection pattern or at least one sensor program and acommunications link connecting said second processor to said repository,and wherein said at least one sensor program or said at least one sensordetection pattern is downloaded from said repository to said secondprocessor, and whereby said at least one sensor program or said at leastone sensor detection pattern is executed on said second processor ordownloaded by BLUETOOTH™ low energy radio link and executed on saidfirst processor.
 4. The system of claim 1, wherein said report isselected from the group consisting of the allocation of rewards,deduction of rewards, allocation of points, deduction of points,allocation of time usage, deduction of time usage and incrementing of anoccurrence count.
 5. The system of claim 4, further comprising arepository for said time usage on said second processor, and whereinaccess to said second processor or application installed on said secondprocessor is granted based on available said allocation of time usagestored in said repository.
 6. The system of claim 1, further comprisingat least one sensor detection pattern to be detected at a location, andwherein detection of said sensor detection pattern at said locationgenerates a report on said second processor, and wherein said report isselected from the group consisting of the allocation of rewards,deduction of rewards and incrementing of an occurrence count on saidsecond processor.
 7. The system of claim 1, further comprising at leastone BLUETOOTH™ low energy device coupled to an audio alarm, wherein saidfirst processor communicates a report to said BLUETOOTH™ low energydevice coupled to said audio alarm based upon said comparison of said atleast one sensor value to said sensor detection pattern, and whereby anaudible alarm is generated.
 8. The system of claim 1, wherein saidreport is suppressed based upon the detection of a BLUETOOTH™ low energysignal of known identity detected by said first processor or secondprocessor by reception of BLUETOOTH™ low energy radio signal.
 9. Thesystem of claim 1, further comprising a timer on said second processorand a third processor coupled by a communication link to said secondprocessor, and wherein said timer is initiated concurrently with displayof said report on said second processor for response by user, andwherein said second processor sends said report to said third processorbased upon expiration of said timer occurring prior to receipt of aresponse from said user.
 10. The system of claim 1, further comprising atimer on an alarm entity device consisting of an audio alarm and coupledby a BLUETOOTH™ low energy radio link to said first processor or saidsecond processor, and wherein said alarm entity device activates saidtimer based upon reception of said report from said first processor, andwherein said alarm entity device generates said audio alarm based uponexpiration of said timer prior to receipt of a cancellation signal fromsaid first processor or said second processor by said BLUETOOTH™ lowenergy radio link.
 11. The system of claim 1, further comprising a timeron said second processor, and wherein an alert is displayed on saidsecond processor based upon expiration of said timer before receipt ofsaid report from said first processor.
 12. The system of claim 1,further comprising a timer on said second processor, and furthercomprising a third processor coupled by a communication link to saidsecond processor, and wherein an alert is sent to said third processorbased upon expiration of said timer before receipt of said report fromsaid first processor.
 13. The system of claim 1, wherein said firstprocessor is attached to an inhaler, and wherein said sensor is selectedfrom a group consisting of contact switch and accelerometer, and whereina matched sensor detection pattern by said first processor iscommunicated as a usage count to said second processor, and wherebyremaining applications of said Inhaler can be calculated.
 14. The systemof claim 1, wherein said first processor is attached to a roll onsunscreen dispenser, and wherein said sensor is an accelerometer, andwherein the sensor detection pattern is specified to match the typicalaccelerometer values corresponding to proper application of sunscreen.15. A human activity reporting system, the system comprising: at leastone sensor detection pattern consisting of at least one sensor value; atleast one sensor coupled to a first processor attached to an entityactuated by a human; a BLUETOOTH™ low energy radio link; a secondprocessor coupled by said BLUETOOTH™ low energy radio link to said firstprocessor; a communication link; and a third processor coupled by saidcommunication link to said second processor, wherein said firstprocessor reads at least one sensor value from said at least one sensor,and wherein said first processor compares said at least one sensor valueto said sensor detection pattern, and wherein said first processorcommunicates a report to said second processor based upon saidcomparison of said at least one sensor value to said sensor detectionpattern, and wherein said second processor communicates said report tosaid third processor.
 16. The system of claim 15, further comprising asensor program consisting of a combination of a multiplicity of saidsensor detection patterns, wherein said sensor program is evaluated onsaid first processor or said second processor.
 17. The system of claim15, further comprising a camera attached to said second processor,wherein said report includes image recordings based upon said comparisonof said at least one sensor value to said sensor detection pattern. 18.The system of claim 15, wherein communication of said report iscancelled based upon the detection of a BLUETOOTH™ low energy device bysaid first processor or second processor.
 19. The system of claim 15,wherein said first processor is attached to a medicine dispensingcontainer, and wherein said at least one sensor coupled to said firstprocessor is an accelerometer.
 20. The system of claim 15, wherein saidfirst processor is attached to a door or window, and wherein said atleast one sensor coupled to said first processor is selected from agroup consisting of a contact switch, magnetometer and accelerometer.21. A habit rewarding system, the system comprising: at least one sensorcoupled to a first processor attached to an entity actuated by a human;at least one sensor detection pattern consisting of at least one sensorvalue; a BLUETOOTH™ low energy radio link; a second processor coupled bysaid BLUETOOTH™ low energy link to said first processor associated witha single user; a communication link; and a third processor consisting ofa repository of usage time allocation associated with said single userand coupled by said communication link to said second processor, whereinsaid first processor reads at least one sensor value from said at leastone sensor, and wherein said first processor compares said at least onesensor value to said sensor detection pattern, and wherein said firstprocessor communicates a report to said second processor when saidcompared said at least one sensor value is matched to said sensordetection patterns, and wherein said second processor communicates saidreport to said third processor by said communication link, and whereinsaid third processor stores said report as an assignment of said usagetime allocation in said repository of usage time allocation associatedwith said single user, and wherein a multiplicity of processorsconnecting by a communication link associated with said single user gainusage time on said multiplicity of processors according to the saidrepository of said usage time allocation.