Electronic location identiication and tracking system with beacon clustering

ABSTRACT

A system and method for determining the presence of an individual at a particular spot within a location preferably based on the strength of signals received from beacons assigned to the particular spot by a software application (“App”) running on an electronic device of the individual. In one embodiment, certain presence calculations are performed by the App. In another embodiment, the App forwards information regarding the received beacon signals to an electronic identification and location tracking system and the presence calculations are performed by the system.

This application is a continuation-in-part of U.S. application Ser. No.15/818,020, filed Nov. 20, 2017, which is a continuation of U.S.application Ser. No. 15/627,820, filed Jun. 20, 2017, now U.S. Pat. No.9,858,741, which is a continuation of U.S. application Ser. No.15/286,753, filed Oct. 6, 2016, now U.S. Pat. No. 9,691,206, which is acontinuation of U.S. application Ser. No. 15/055,477, filed Feb. 26,2016, now U.S. Pat. No. 9,466,163, which is a continuation-in-part ofU.S. application Ser. No. 14/827,222, filed Aug. 14, 2015, now U.S. Pat.No. 9,424,699, which claims priority to and the benefit of U.S.application Ser. No. 62/037,684, filed Aug. 15, 2014. All applicationsare incorporated by reference in their entireties for all purposes.

BACKGROUND

Controlled access areas have become increasingly commonplace in modernsociety. From hospitals to gated communities, sensitive industries toprison complexes, there is a need to control the flow of human capital.Systems for doing so are often rudimentary, such as those that utilize aguard who checks an individual's identification and access rights. Othersystems involve physical keycards and passes, which allow access paststatic checkpoints.

These systems are often insufficient for controlling and tracking themovement of guests who have access for a particular, limited purpose.Once past a static checkpoint, control systems have limited means fortracking a guest's movements. Furthermore, guests may become lost orenter into areas beyond the scope of their invitation.

Furthermore, determining accurate indoor locations for people andobjects has been the goal of numerous government, academia and corporateinstitutions for well over a decade. GPS, while excellent for outdoorslocation, isn't well suited for indoor location due to signalattenuation caused by the building materials causing significant powerloss for the signals. Numerous technical approaches to accomplishing thegoal of accurate indoor location have been researched, developed andtested though the effectiveness and accuracy of each of these methodscan vastly differ.

The industry classifies indoor location technologies intoinfrastructure-based and infrastructure-free technologies.Infrastructure-based technologies require the installation andconfiguration of physical beacons, typically based on a radio-frequencytechnology such as IR, WiFi, RFID and Bluetooth but can also includebeacons based on sound, magnetic signals or light. Infrastructure-freetechnologies, typically utilize the existing infrastructure available ina location such as WiFi access points, cellular/GSM signals,geo-magnetic and sound sources though they usually involve quite a bitof configuration in the form of fingerprinting, or the analysis of thespecific properties of WiFi, Magnetic, Sound and other signals atvarious points within the room.

Once the initial infrastructure, fingerprinting, analysis and otherimplementation steps are done, the various systems currently inexistence rely on various forms of signal triangulation, signalmeasurement, signal disturbance, movement detection, barometric pressuredetection, or other forms to detect the location of a person in anindoor space. The technical names for these existing technologies ormethods include, but are not limited to, 2.4 Ghz Phase Offset, 2.4 GhzTime-of-Flight, Ultrasonic Time-of-Flight, IR/Radio Time-of-flight,Modulated Magnetic signals, WiFi+Bluetooth+IMU, WiFi Fingerprinting withBayesian Filter, WiFi Fingerprinting with Neural Network, WiFiTime-of-Flight with Adaptive filter, WiFi+IMU Fingerprinting andSteerable Antenna Time-of-Flight.

The existing indoor location technologies have performance and accuracyissues related to a variety of factors including but not limited torequiring a line of sight between a persons' device and thebeacons/sensors, signal bleed complications, interference from othersources, objects and construction materials, and even the human bodyacting as a barrier to a signal. Additionally, the overhead in terms ofdeployment of custom infrastructure, space evaluation, fingerprintanalysis, system configuration, equipment costs and other systemimplementation related issues is relatively high for existingmethodologies.

The current disclosure is directed at addressing or reducing the aboveissues, including, without limitation, with indoor location accuracy,performance and overhead with the additional benefit of useridentification and tracking throughout a venue.

SUMMARY OF THE DISCLOSURE

A method and system are described that allows members (as definedbelow), system administrators or other authorized individuals accessinto to controlled access locations; as well as the ability for membersand administrators to grant temporary and limited access to guests intothese locations. Additionally, the method and system allows fornavigational services to be provided to members and guests, andreal-time tracking and confirmation to members and administrators thatguests have arrived at their destination and did not enter anyunauthorized areas.

The disclosed method preferably can work through a system of wirelessradio, sound and/or light-based beacons communicating with member andguest's smartphones, computer systems, or other electronic devices.Members and administrators can send one or more temporary electronicaccess keys to a guest's smartphone or other electronic device. Wirelessradio, sound and/or light-based beacons provide an access control &location tracking system with real-time data about the member and guestwhereabouts, allowing for the confirmation and tracking described aboveand below. Depending on the type of location using the system, incertain circumstances one or more members, in addition to guests, alsomay not have access to all restricted areas at the given location. As anon-limiting example, where the system is used by a condominium(“condo”) building and a particular condo owner is delinquent on theirCondo Association fees, access to community areas (i.e. exercise rooms,club house, etc.) for the particular condo owner could be restricted,but not the entrance, elevators or garage. As another non-limitingexample, commercial buildings may allow a tenant to access the buildingentrance, elevator for their particular floor and garage, but not otherfloors of the building.

Additionally, a method and system are described that allows for theelectronic determination of a person's location in an environment whereexisting technologies such as GPS are often unable to provide accuratelocation information. Additionally, the method and system allow fornavigational services to be provided to persons, and real-time locationdetermination and location tracking. The disclosed method preferably canwork through a system of wireless radio, sound and/or light-basedbeacons communicating with the customer's smartphone, computer system,or another electronic device of the customer. Wireless radio, soundand/or light-based beacons provide a system with real-time data aboutthe user's whereabouts, allowing for the confirmation and trackingdescribed above and below. Depending on the type of location using thesystem, in certain circumstances one or more functions of the system maynot be needed or available to users and companies alike. As anon-limiting example, where the system is used by a company thatprovides food and beverage service, a user can place an order forfood/beverages and the order delivered to the person at their currentlocation as determined by the system whereas when the system is used bya company which retails consumer products the company may not implementor need this specific feature of the system.

Thus, in certain embodiments, a method and system that allows authorizedindividuals access into controlled access locations and the ability togrant temporary and limited access to guests into these locations. Themethod and system allows for navigational services to be provided tomembers and guests, and real-time tracking and confirmation to membersand administrators that guests have arrived at their destination and didnot enter any unauthorized areas. The method preferably can work througha system of wireless radio, sound and/or light-based beaconscommunicating with member and guest's electronic devices. Members andadministrators can send one or more temporary electronic access keys toa guest's smartphone or other electronic device. Wireless radio, soundand/or light-based beacons provide an access control and locationtracking system with real-time data about the member and guestwhereabouts, allowing for the confirmation and tracking.

The following non-limiting definitions are provided as an aid inunderstanding at least some of the embodiments for the disclosed novelmethods and systems:

Access The electronic database where permissions and Control & locationsof guests and members are managed and stored. Location Tracking DatabaseAccess The specially programmed computer/electronic system Control &which monitors guest and member authorizations and Location locationsbased on information received from and Tracking being in communicationwith wireless Radio, Sound System and/or Light-based Beacons to monitoractivity in controlled access areas. Member/Guest A specially programmedcomputer system or electronic Electronic device including, but notlimited to, cell phone, Computer smartphone, key card, tablet, laptop orother computer System system belonging to a member, guest, or Deviceadministrator or public service personnel. Access An electronic databasethat stores digital access keys Control & sent to a specific member,guest, administrator or Location public service personnel's device. Thekeychain Tracking database can store digital keys from one or moreKeychain different access control & location tracking systems Databaseand is preferably stored on the member/guest's electronic device whichstores the particular member's or guest's keys. This allows the systemto be used at multiple locations via a single electronic device app. Theother above defined database (Access Control & Location TrackingDatabase) is preferably provided at each location of installation forthe system and stores the keys, member/guest information and accessrights for the particular installation of the system. Administrator Aperson responsible for the determining who is authorized to enter into acontrolled access area. Authorized Persons who have permission to entera controlled Persons access area. Checkpoint A pre-determined locationwithin a controlled access area where the Access Control & LocationTracking system is programmed to determine whether a member or guest hasthe necessary credentials to proceed further. Controlled Locations wherethe general public may not enter Access without permission from a memberor administrator. Area Or (e.g. sensitive areas in hospitals, gatedcommunities, Controlled prisons, private areas of businesses, apartmentAccess buildings). Location Device A smartphone, cellular phone,computer, tablet, laptop or any electronic device with wireless radio,sound and/or Light-based Beacon communication capability andspecifically programmed with the App and/or the below defined“Permissions Application”. Guest An individual with temporary, limitedaccess into all or part of a controlled access area. Key An electronicor digital code, which is stored in the permissions application. Thiscode is checked against the access control & location tracking databaseto determine whether a member or guest has permission to be in acontrolled access area at a given date and time. Member An individualwith permission to be in a controlled access location, and authority togrant guests access to a controlled access location. Permissions Asoftware based application which retains the Application permissions forentry into controlled access locations. This application can be run on asmartphone, computer, tablet, or other electronic device. Electronic Anelectronic database where locations, permissions Location and userprofiles are managed and stored. Identification & Tracking SystemDatabase (database) Electronic A specially programmed electronic orcomputer Location system which electronically determines users'Identification locations, presence at locations and departure & Trackingfrom locations based on information received System from and being incommunication with wireless (system) radio, sound and/or light-basedbeacons. Electronic A specially designed software application Location“App” that is installed on the Identification user's electronic systemor device and & Tracking which allows and directs the user's Systemelectronic system or device to communicate Application with wirelessradio, sound and/or light- (App) based beacons in order to identify theuser's current location. User One or more persons who have entered thephysical location of an organization who wishes to utilize the locationidentification and tracking system on their device. System One or morepersons responsible for entering Administrator and maintaininginformation about each user in the system and database as well asconfiguring locations and performing beacon management. User's Acomputer system or electronic device, Electronic preferably portable ormobile, including, System but not limited to, cell phone, smartphone, orDevice key card, tablet, laptop or other computer system belonging toand/or carried/possessed by a user that is specially programmed with theElectronic Location Identification & Tracking System App to permitcommunication with one or more wireless radio, sound and/or light-basedbeacons. Wireless A small receiver/transmitter capable of operatingRadio, on short and/or long range wireless communication Sound betweenelectronic devices. Capabilities include, and/or but are not limited to,pinpointing its own location, Light-based being programmed or designedto utilize, or otherwise Beacon utilizing, the software in a smartphone, cellular phone or other electronic device to determine thatdevice's location and bi-directional data transmission. Wireless radio,sound and/or light- based beacons can utilize technologies including,but not limited to, Near Field Communication (NFC), Bluetooth, WiFi,Light-Fidelity (LiFi), Magnetic, Ultrasound, InfraRed (IR), and RadioFrequency (RF). All of these technologies and similar current or similarlater developed communication technologies are included in the term“wireless radio” wherever that term appears in this disclosure. LocationA group of Wireless Radio, Sound and/or Light-based Cluster Beaconswhich as a group are utilized in connection with all members of thegroup in the determination of a customer's location. The locationcluster can consist of one or more beacons, clustered together utilizingthe same or different beacon technologies such as NFC, Bluetooth, WiFi,IR, etc.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of certain non-limiting components of thedisclosed access control and location tracking system and alsoillustrating the steps/communications generally involved in theregistration of a member device;

FIG. 2 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in sending an access key to aguest device;

FIG. 3 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining access rights;

FIG. 4 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining authorizedlocations;

FIG. 5 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining arrival atauthorized locations;

FIG. 6 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in determining location andnavigational support;

FIG. 7 is a block diagram and process flow for access control and thenotification rules engines for the disclosed access control and locationtracking system;

FIG. 8 is block diagram and process flow for the storage of electronickeys in the keychain database in connection with the disclosed accesscontrol and location tracking system;

FIG. 9 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in sending electronic keys froman electronic device to the access control and location tracking system;

FIG. 10 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in auto-prompting for selectingan electronic key for sending from an electronic device to the accesscontrol and location tracking system;

FIG. 11 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in auto-prompting and electronickey selection for sending from an electronic device to the accesscontrol and location tracking system;

FIG. 12 is a block diagram of certain non-limiting components of theaccess control and location tracking system and also illustrating thesteps/communications generally involved in a guest requesting anelectronic key from a member in connection with the access control andlocation tracking system;

FIG. 13 is a block diagram of certain non-limiting components fordetermining presence at a specific location and also illustrating thesteps/communications generally involved in selecting the appropriatedigital key for the specific location;

FIG. 14 is a block diagram of certain non-limiting components fordetermining presence at a specific location and also illustratinganother embodiment of the steps/communications generally involved inselecting the appropriate digital key for the specific location;

FIG. 15 is a process flow and block diagram illustrating theregistration of a customer/user's device in accordance with oneembodiment for the disclosed system and method;

FIG. 16 is a process flow and block diagram illustrating theregistration of a beacon or cluster of beacons location in accordancewith one embodiment for the disclosed system and method;

FIG. 17 is a process flow and block diagram illustrating a firstembodiment for determining a customer's presence at location by thedisclosed system and method;

FIG. 18 is a process flow and block diagram illustrating anotherembodiment for determining a customer's presence at location by thedisclosed system and method;

FIG. 19 is a process flow and block diagram of a location rules enginein accordance with one embodiment for the disclosed system and method;

FIG. 20 is a process flow and block diagram illustrating a user/customeropt-out of tracking/monitoring by a company/facility in accordance withone embodiment for the disclosed system and method;

FIG. 21 illustrates a non-limiting sample of a customer presencedetermination using beacon clustering at a location in accordance withone embodiment for the disclosed system and method;

FIG. 22 is a process flow and block diagram illustrating a furtherembodiment for determining a customer's presence at location by thedisclosed system and method; and

FIG. 23 is a process flow and block diagram illustrating an additionalembodiment for determining a customer's presence at location by thedisclosed system and method.

DETAILED DESCRIPTION

FIG. 1 shows one method for allowing a member to register their computersystem or electronic device with the disclosed access control & locationtracking system. This initial registration process preferably allows amember to electronically receive digital/electronic access keys as wellas grant a guest access to a controlled access location, andsubsequently track the guest's location within that area.

At step F1 a, a member registers their electronic computer system orelectronic device with the disclosed access control & location trackingsystem. This enables the member to use their computer system orelectronic device to access restricted locations and provide theirguests with temporary access to controlled access areas. It also allowsthe member to use their electronic device to track their guest'slocation within the controlled access area, and confirm their guest'sarrival and departure at a given permitted location. Registration can beaccomplished in a number of non-limiting ways. As one non-limitingexample, the system administrator can register the members directlythrough the programmed software using a form and then have the memberscredentials sent to the member via SMS, MMS, Email, Voice, Mail or otherdelivery methods. Alternatively, the member can download the softwareapplication (app) to their electronic device, register through a form onthe app and then the system administrator can approve or deny theregistration request. Once the software app is installed on theelectronic device and registration is accepted by the systemadministrator the members digital/electronic keys can be downloaded bythe member to the electronic device and stored in their electronickeychain database on their electronic device. The application/databasestoring the digital/electronic keys then transmits the key to the AccessControl & Location Tracking System via any of the wireless radio, lightor sound based technologies (wifi, Bluetooth, lifi, rfid, etc.)

At step F1 b, the access control & location tracking system isprogrammed to record permissions afforded to and requested by membersand retains and electronically stores those permissions in the AccessControl and Tracking Location database. The system utilizes thisdatabase's record of members, guests, access rights, locations, andpermissions to determine and then grant the level of access to a member,a guest requested by a member, and to provide the real time tracking andconfirmation of member and guest movements.

At step F1 c, the access control system administrator oversees theaccess control & location tracking system. Through the system, theadministrator can track all member and guest movements, rights, andaccess. This allows the administrator to employ the necessary level ofsecurity or emergency response to protect the safety of members andguests, should a member or guest go beyond the scope of their access.The administrator is notified of the device registration request and cangrant or revoke permission to use the registered device. Though notlimiting, in the preferred embodiment, the system can be programmed suchthat the administrator receives device registration requests from amember. The system can also be programmed such that guest registrationrequests go directly to the member they are requesting access from(though the system can also be programmed to permit the administrator tooverride, approve and/ or cancel decisions made by the member concerningthe guest's request).

At step F1 d, the access control & location tracking systemelectronically sends the member's electronic computer system orelectronic device the digital access key assigned to them. It alsoprovides the member's electronic computer system or electronic devicewith real time information on their guest's or otherassociated/authorized member's whereabouts. This allows the member toconfirm that the guest reached their destination.

At step F1 e, the digital access key is stored in the electronickeychain database on the member's electronic computer system/device. Asimilar keychain database on a guest's electronic device is created tostore any digital access key(s) granted to a guest through the system.

FIG. 2 illustrates how a member provides a guest access to thecontrolled access location. The member electronically sends the guest adigital electronic key, which provides the guest with access to acontrolled access area limited by the parameters set by the member.

At step F2 a, a member electronically sends a request to the accesscontrol computer system that a digital key be generated andelectronically sent to a guest. The member enters any limitations to beplaced on the guest's access to the controlled area in the request. Anadministrator can also be permitted to enter additional accessrestrictions for the guest. In one non-limiting embodiment, the systemcan be programmed to provide a form containing a series of checkboxesfor each location controlled by the system that the member can selectfrom. A date and time module can also be provided for allowing themember to indicate the starting date and time and ending date and timefor the guest's digital key. Further detail on the permissions andlimitations a member can place on a key for a guest is discussed inconnection with FIG. 7.

At step F2 b, the access control and location computer system recordsthe member's request and automatically enters it into the access controldatabase. This information is electronically stored and later used bythe Access Control & Location Tracking system when the guest receivestheir access key and enters the secured access location.

At step F2 c, the access control and location computer system candirectly send the guest an electronic key to their smartphone or otherelectronic device via electronic communication methods including but notlimited to direct data connection, SMS, Email, MMS and voice. Aconfirmation electronic message can be sent to the member to inform themthat their guest's key was approved and sent to the guest.Alternatively, the system can be programmed that the guest key is firstsent to the member, and the member forwards it to the guest. The key isimported to a software application, which is stored locally on theguest's device. This application acts as an electronic keychain ofaccess keys. In one non-limiting embodiment, the digital key can be anelectronic file, which is preferably encrypted. The key can beauto-imported where it is sent to person's electronic device through anapp directly that is downloaded on the electronic device or manuallyadded if the key is sent through SMS or email. For the manual method,the guest can click on the file and than have an app import the key tothe local device database. Once the guest receives the key, the guesthas all access rights, which have been granted to them by a member, asseen/discussed in step F2 a and FIG. 7. The guest can have a keyprovided by multiple members within the same Access Control & LocationTracking System location or keys for multiple locations (with separateinstances of the Access Control & Location Tracking System). As anon-limiting example, if the guest is a service provider (i.e. plumber,electrician, personal trainer, delivery person, etc.) the guest may needto have keys from multiple members at any given time. Also in someinstances a person can be a member at one location and a guest at otherlocations and may have member key(s) and guest(s) keys on his or herelectronic keychain database stored on his or her electronic device.

At step F2 d, the electronic key is electronically stored in the accesscontrol & location tracking keychain database on the guest's device.

FIG. 3 illustrates how the system grants or denies access to a member orguest based on the electronic key on their device.

At step F3 a, the member or guest attempting to enter a controlledaccess location will have an electronic key on their device, such as theelectronic key the guest receives from the steps described in FIG. 2.Through a wireless radio, sound and/or light enabled application, theirdevice will retrieve all electronic keys stored in the device's keychaindatabase and transmit them to any wireless radio, sound and/orlight-based beacons in an immediate proximity to the controlled accessarea entrance. FIG. 9 shows one non-limiting embodiment where theelectronic device can be configured for its owner to manually select thedigital key to transmit (i.e. virtual clicker), while FIG. 10 showsanother non-limiting embodiment where the electronic device can beconfigured to auto-sense that it is at a beacon and then have the usermanually select the digital key to transmit to the beacon and FIG. 11shows a further non-limiting embodiment where the electronic device canbe configured to automatically sense that it is at a beacon and thenautomatically send the digital key(s) to the beacon. The member or guestcan also choose which specific key to transmit if so configured anddesired. The key can be manually chosen via a user interface provided bythe software installed on the member's or guest's electronic device orit can also just send all keys available on the users keychain to thesystem and it will continue to check each key on the keychain to see ifone grants them access for the location, date and time. The system canbe programmed such that access denial is only given after all availablekeys are checked. Preferably, the built in capabilities of conventionalsmartphones/electronic devices can be used, as they currently come withWifi, Bluetooth and sometimes NFC radios or InfraRed sensors, and somealso have ultrasonic capable microphones or lifi built in. If notprovided, these technologies can be provided or later acquired by theelectronic device. The Access Control and Location Tracking system,through instructions provided by the programmed software, accesses theradios and other communication hardware available on the electronicdevice and uses them as needed.

At step F3 b, the member or guest's device will communicate throughwireless radio, sound and/or light-based beacons with the access controland location tracking system. The system will then recognize that adevice with the application is in proximity to a controlled access areaand retrieve the key(s) stored on said device. As mentioned above, thesoftware can be configured to automatically send the keys or themember/guest can choose which key to send. When the software on themember/guest's electronic device is in range of a beacon, it can receivea signal triggering it to send the keys in its keychain database to theaccess control & location tracking database.

At step F3 c, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F3 d, when a member or guest wishes to enter into a controlledaccess area, the system will determine whether the member or guest has avalid key allowing entry. If a valid key is presented, access is grantedand an electronic signal is sent to open the access barrier such as aGate, Door, Elevator or other Entryway. Additionally, notification iselectronically sent to Security Staff through a computer screen or otherelectronic device. The access control & location tracking database isupdated with details pertaining to the access event such as the keycode, date, time and location.

At step F3 e, if a valid key is not presented, then access will bedenied and notification is sent to Security Staff through a computerscreen or other electronic device. The access control & locationtracking database is updated with details pertaining to attempted accessevent including the key code, date, time and location. Optionally, theAccess Control and Location Tracking system can be programmed that wherea guest or member attempts to enter an area where they are not approved(i.e. when access denied by the system), all of some of the accesspermissions that they have been granted are suspended or terminated, topermit the administrator or other proper personnel (i.e. security) toinvestigate the denial (i.e. determine whether it was an accident orthat the member/guest has bad motives). The results of the investigationcan determine whether the previous permissions are granted again orunsuspended by the system.

FIG. 4 demonstrates how the system determines whether a member or guestis in an authorized or unauthorized location on a continuous basis.

At step F4 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area. These are arranged sothat when a member or guest with a wireless radio, sound and/or lightenabled device and the permissions application running enters the area,they are preferably constantly within range of a beacon. The member orguests access key can be automatically electronically retrieved from thekeychain database stored in their electronic device and transmitted bythe wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system preferably in continuous intervals.

At step F4 b, the access control & location tracking system receives theaccess key(s) and compares the key(s) to the access control & locationtracking database to determine the permissions afforded to each specifickey that is received.

At step F4 c, if the member or guest is in an authorized location basedon the permissions retrieved in F4 b, then the system will update thedatabase to reflect the current location of the member or guest.

At step F4 d. If the member or guest is in an unauthorized location,then the system administrator and/or security staff is notified. In thecase of a guest, the member who granted the guest access can be notifiedas well that the guest has gone beyond the parameters of theirauthorization. The alert is generated by the access control & locationtracking system and can be sent through computer, voice, email, IM, SMS,MMS, pager or other communication method. The access control & locationtracking database can also be updated with the member or guests currentlocation. Additionally, the termination or suspension of all or some ofthe guest/member's access permissions as described above can also beperformed by the Access Control & Location Tracking system.

FIG. 5 demonstrates how the system determines whether a member or guesthas arrived at their authorized location after being granted access intothe controlled access area as described in FIG. 3.

At step F5 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running enters the area, they arepreferably constantly within range of a beacon. The member or guestsaccess key can be automatically electronically retrieved from thekeychain database stored in their electronic device and transmitted bythe wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system preferably in continuous intervals.

At step F5 b, the access control & location tracking system receives theaccess key(s) as well as location of the device based on which wirelessradio, sound and/or light-based beacons received the key and comparesthe key(s)/location to the access control & location tracking database.

At step F5 c, if the access control & location tracking systemdetermines that the location of the member or guest is at the finalauthorized location based on the permissions retrieved in F5 b, then thesystem will update the database.

At step F5 d, if the access control & location tracking systemdetermines that the location of the member or guest is not at the finalauthorized location within the time allotted based on the permissionsretrieved in F5 b, then the system administrator and/or security staffis notified. In the case of a guest, the member who granted the guestaccess can be notified as well that the guest has not arrived at theirauthorized location within the time period allotted. The alert isgenerated by the access control & location tracking system and can besent through computer, voice, email, IM, SMS, MMS, pager or othercommunication method. The access control & location tracking database isalso updated with the member or guests current location.

FIG. 6 demonstrates how the system provides navigational assistance tomembers and/or guests after being granted access into the controlledaccess area as described in FIG. 3.

At step F6 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running enters the area, they arepreferably constantly within range of a beacon. The member or guestsaccess key can be automatically electronically retrieved from thekeychain database stored in their electronic device and then transmittedby the wireless radio, sound and/or light-based beacons to the accesscontrol & location tracking system in preferably continuous intervals.

At step F6 b, the access control & location tracking system receives theaccess key(s) as well as location of the device based on which wirelessradio, sound and/or light-based beacons received the key and comparesthe key(s)/location to the access control & location tracking database.

At step F6 c, if the access control & location tracking systemdetermines that the location of the member or guest is at the finalauthorized location based on the permissions retrieved in F6 b, then thesystem will update the database.

At step F6 d, if the access control & location tracking systemdetermines that the location of the member or guest is not at the finalauthorized location based on the permissions retrieved in F5 b, then itupdates the access control & location tracking database with the memberor guests current location. The system then calculates the possibleroutes to the final authorized location from the current location of themember or guest. The route information is electronically sent to themember or guests device through computer, voice, email, IM, SMS, MMS,pager or other communication method. Visual interpretation andpresentation of the route may also be provided, such as, but not limitedto through the electronic device's screen or display. Additionally, thetermination or suspension of all or some of the guest/member's accesspermissions as described above can also be performed by the AccessControl & Location Tracking system where the guest/member does not reacha specific location in the allotted or predetermined amount of time.

FIG. 7 demonstrates how a member or system administrator can create anew digital key and assign the specific permissions and notificationsfor the new digital key. This process can also be utilized to editpermissions and notifications for existing keys.

At step F7 a, the “Create New Key” function is selected within theaccess control & location tracking system by a user with key creationprivileges such as a system administrator or member. Preferably, thesystem administrator or member will have previously signed on or loggedin to the system so that their key creation privileges are recognized bythe system. Guests are preferably not allowed to create new keys, thoughsuch is not considered limiting, and the system can be programmed wherea guest could create a key or transfer his or her key to anotherkeychain in certain or limited situations (i.e. husband to wife or viceversa, etc.).

At step F7 b, the access control & location tracking systemelectronically queries the system database to determine existing keyrecipients as well as available locations, access points, and the ruleset assigned to the system administrator or member creating the new key.The user can only create new keys that they themselves have been grantedpermissions for. As a non-limiting example, if a given user is notallowed access to a specific location, said user would not be able tocreate a key granting access to that specific location. The screens andoptions available for creating a key in F7 c through F7 l are customizedbased on the granted permissions for the user creating the key.Therefore, another user who has more permissions than the user presentedwith the options in F7 c through F7 l could be presented with additionaloptions and screens not shown in F7 c through F7 l. Similarly, anotheruser who has less permissions may be presented with less than all of theoptions and screens shown in F7 c through F7 l. Additionally, the systemcan be programmed such that the options specified in F7 c through F7 lwork in conjunction with each other, so for example, if a single date isspecified along with a specific time span, the key can only be valid forthat time span on the specified date.

At step F7 c, the user enters or selects the recipient's name andcontact information from the list of available recipients retrieved inF7 b. The specific data elements entered will depend on the electronicmethod desired to send the digital key to the recipient. For example ifemail delivery is selected, then a name and email address is requiredfor the recipient but if an SMS or voice call is selected, a name andphone number for the recipient is required.

At step F7 d, the user selects the type of key recipient for this newkey. Keys can be created for Members, Guests, Administrators and/orPublic Service personnel such as Police, Fire, Utility and GovernmentAgency workers, though such is not considered limiting, and other typesof individuals based on status, employment, etc. can also be digital keyrecipients.

At step F7 e, the user specifies the number of times this digital keycan be used. Keys can be created for one-time use only, for a specificnumber of times or for an unlimited number of times.

At step F7 f, the user specifies the permissible access dates for thedigital key. Keys can be created for a single time span, multiple timespans, or without a time restriction.

At step F7 g, the user specifies the permissible access times ofday/night for the digital key. Keys can be created for a single timespan, multiple time spans, or without a time restriction.

At step F7 h, the user specifies the permissible access locations andentry points for the digital key. Keys can be created for a singlelocation/entry point, multiple locations/entry points, or all locationsand entry points.

At step F7 i, next the user can select if notifications are to be sentrelated to the usage of this digital key. This function would typicallyapply to keys generated for guests or public service personnel. If theuser does not wish to configure any notifications related to the use ofthis key, the data and entries for the specific digital key created aresaved in the electronic database and steps F7 j through F7 m areskipped. If they user wishes to create notifications related to the useof this key, then the user can preferably proceed to F7 j.

At step F7 j, the user selects the type(s) of notifications to be sent.As non-limiting examples, notifications can be sent based on the usageof the key to gain entry to a restricted location, upon arrival at apermitted location, when the key recipient does not arrive at a specificlocation or if the key recipient has navigated off course from the pointof entry to the final authorized location.

At step F7 k, the user selects the method(s) of notifications to besent. Notifications can be sent via SMS/MMS, Email, Voice, or on-screenat the access control & location tracking system or directly through theaccess control & location tracking system software on the administratoror member's electronic computer system/device.

At step F7 l, the user selects or enters the notification recipient(s).Notification recipient(s) can be selected from a list of existingadministrators and members or entered with the recipient(s) name andcontact information. For example if an email notification is selected,then a name and email address is preferably provided for the recipientbut if an SMS or voice call is selected, a name and phone number for therecipient is preferably provided.

At step F7 m, the digital key with all permission and notificationsettings is electronically saved in the system database.

At step F7 n, the access control & location tracking systemelectronically delivers the newly created (or modified) key to therecipient according to the contact information obtained in F7 c.

FIG. 8 demonstrates how a member, guest, system administrator or publicservice personnel can receive digital keys from multiple access control& location tracking systems and store those keys in an electronickeychain database on their electronic computer system or device. Themultiple systems can be associated with multiple locations. In onenon-limiting example, one location can be residential community 1, thenext location condo building 2, the next location a commercial officebuilding. In some instances, the beacons can be used in multiple systems(i.e. lobby of a commercial office building where multiple systems areinstalled in the building for different companies that have office spacein the building, etc.)

At step F8 a, one or more access control & location tracking systemsgenerates digital key(s) for a member, guest, administrator or publicservice personnel as described above. The digital keys areelectronically sent to a computer system or device belonging to themember, guest, administrator or public service personnel.

At step F8 b, the digital keys sent to the member/guest's electroniccomputer system or device are electronically stored in the keychaindatabase also stored on the device.

The system can operate similar for members as it does for guests, withthe exception that a member can be permitted to create and provideelectronic guest keys to others, granting no more than the member's ownlevel of privileges and/or access. Guest can preferably only use theelectronic key provided by a member or another authorized user of thesystem, but preferably cannot create electronic guest keys for otherguests or permit another electronic device to use the electronic guestkey they were provided with (i.e. cannot forward the electronic guestkey to another guest). However, the system can also be programmed topermit a guest to transfer their electronic guest key to anotherauthorized guest already listed in the system (i.e. husband to wife orvice versa, parent to child, etc.), such as where only one guest key iscreated.

FIG. 9 illustrates how a member or guest would manually choose a keyfrom their device's keychain database to transmit to an access control &location tracking system.

At step F9 a, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe member's/guest's electronic device. The member or guest opens theAccess Control & Location Tracking system application on theirelectronic device and selects the option to manually transmit a key. Theapplication on the device queries the keychain database on said deviceto determine which keys are stored and available for transmission.

At step F9 b, if no access key has been selected for transmission, theapplication on the member or guests electronic device will continue towait for authorization to transmit a selected key.

At step F9 c, f the member or guest selects a key and authorizes itstransmission, the device will retrieve the selected electronic keysstored in the device's keychain database and transmit it to any wirelessradio, sound and/or light-based beacons in an immediate proximity to thecontrolled access area entrance. Preferably, the built in capabilitiesof conventional smartphones/electronic devices can be used, as theycurrently come with Wifi, Bluetooth and sometimes NFC radios or InfraRedsensors, and some also have ultrasonic capable microphones or lifi builtin. If not provided, these technologies can be provided to, downloadedor later acquired by the electronic device. The Access Control andLocation Tracking system, through instructions provided by theprogrammed software, accesses the radios and other communicationhardware available on the electronic device and uses them as needed. Thesoftware can use any communication hardware (i.e. WiFi radios, Bluetoothradios, NFC radios, LiFi, IR, etc.) that is installed on the electronicdevice and can use the various hardware as needed to perform thefunctions of the software.

At step F9 d, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F9 e, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F9 f, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F9 g, the application on the member or guest's electronic deviceupdates the access control & location tracking keychain databaseindicating the usage of the key.

At step F9 h, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and asking the member or guest to select a newkey to transmit.

At step F9 i, the application on the member or guests' electronic devicequeries the access control & location tracking system keychain databasefor any other available keys and the process begins again at F9(b). Ifno other keys are available, the member or guest can then take steps torequest a key as described in FIG. 1 or 12.

FIG. 10 illustrates how a member or guest would manually choose a keyfrom their device's keychain database to transmit to an access control &location tracking system after prompting by a wireless radio, soundand/or light based beacon.

At step F10 a, wireless radio, sound and/or light based beacon(s)transmit a signal that is received by the member or guests electronicdevice. The application installed and running on the member or guests'electronic device will receive the signal from the beacon(s) and prompt,preferably automatically, the member or guest that they are in theproximity of the beacon(s) and to select a key for transmission to thebeacon(s).

At step F10 b, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe device. The member or guest opens the Access Control & LocationTracking system application on their electronic device and selects theoption to manually transmit a key. The application on the device queriesthe keychain database on the device to determine which keys are storedand available for transmission.

At step F10 c, if no access key has been selected for transmission, theapplication on the member or guest's electronic device will continue towait for authorization to transmit a selected key.

At step F10 d, if the member or guest selects a key and authorizes itstransmission, the device will retrieve the selected electronic keysstored in the device's keychain database and transmit it to any wirelessradio, sound and/or light-based beacons in an immediate proximity to thecontrolled access area entrance. Preferably, the built-in capabilitiesof conventional smartphones/electronic devices can be used, as theycurrently come with Wifi, Bluetooth and sometimes NFC radios or InfraRedsensors, and some also have ultrasonic capable microphones or lifi builtin. If not provided, these technologies can be provided or lateracquired by the electronic device. The Access Control and LocationTracking system, through instructions provided by the programmedsoftware that can be similar to those instructions referenced for FIG.9, accesses the radios and other communication hardware available on theelectronic device and uses them as needed. The software can use anycommunication hardware (i.e. WiFi radios, Bluetooth radios, NFC radios,LiFi, IR, etc.) that is installed on the electronic device and can usethe various hardware as needed to perform the functions of the software.

At step F10 e, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F10 f, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F10 g, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F10 h, the application on the member or guest's electronicdevice updates the access control & location tracking keychain databaseindicating the usage of the key.

At step F10 i, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and asking the member or guest to select a newkey.

At step F10 j, the application on the member or guests' electronicdevice queries the access control & location tracking system keychaindatabase for any other available keys as in F10(b) and the processrepeats from that point. If no other keys are available, the member orguest can then take steps to request a key as described in FIG. 1 or 12.

FIG. 11 illustrates how a key from a member or guests' electronic devicekeychain database is automatically transmitted to an access control &location tracking system after prompting by a wireless radio, soundand/or light based beacon.

At step F11 a, wireless radio, sound and/or light based beacon(s)transmit a signal that is received by the member or guests electronicdevice. The application installed and running on the member or guests'electronic device will receive the signal from the beacon(s) and beginto search for a key to transmit. Each beacon in the system can send outa signal that the application on the electronic device can read. Thatsignal can contain information such as, but not limited to, the name ofthe beacon, the organization it belongs to and location of the beacon.This same location information can be stored in the keys that aregenerated.

At step F11 b, the member or guest attempting to enter a controlledaccess location will have an electronic key(s) on their device, such asthe electronic key(s) the guest receives from the steps described inFIG. 2. The electronic key(s) will be stored in the keychain database onthe device. The member or guest opens or has running, the Access Control& Location Tracking system application on their electronic device andsaid application is or has previously been configured to automaticallytransmit a key(s). The application on the device queries the keychaindatabase on said device to determine which keys are stored and availablefor transmission.

At step F11 c, if no access key exists in the database for thislocation, the member or guest is notified through the access control &location tracking application installed and running on their electronicdevice. The member or guest can then take steps to request a key asdescribed in FIG. 1 or 12.

At step F11 d, if the access control & location tracking systemapplication on the member or guests' electronic device locates a key forthe location, it will retrieve the selected electronic key stored in thedevice's keychain database and transmit it to any wireless radio, soundand/or light-based beacons in an immediate proximity to the controlledaccess area entrance. In one embodiment for locating the key, thesoftware can compare the location and other information it received fromthe beacon to search the keychain database. Preferably, the built incapabilities of conventional smartphones/electronic devices can be used,as they currently come with Wifi, Bluetooth and sometimes NFC radios orInfraRed sensors, and some also have ultrasonic capable microphones orlifi built in. If not provided, these technologies can be provided orlater acquired by the electronic device. The Access Control and LocationTracking system, through instructions provided by the programmedsoftware that can be similar to the those instructions referenced forFIG. 9, accesses the radios and other communication hardware availableon the electronic device and uses them as needed. The software can useany communication hardware (i.e. WiFi radios, Bluetooth radios, NFCradios, LiFi, IR, etc.) that is installed on the electronic device andcan use the various hardware as needed to perform the functions of thesoftware.

At step F11 e, the member or guest's transmitted key is received throughwireless radio, sound and/or light-based beacons and sent to the accesscontrol and location tracking system.

At step F11 f, the access control & location tracking systemautomatically searches though the access control & location trackingdatabase for permissions granted to the member or guest from theprovided key. The member or guest will be permitted to enter areas basedon these permissions.

At step F11 g, if a valid key is presented, an electronic notificationcan be sent back to the member or guest's electronic device through thewireless radio, sound and/or light-based beacon indicating the key wasvalidated and used.

At step F11 h, the application on the member or guest's electronicdevice updates the access control & location tracking keychain databaseindicating the usage of the key.

At step F11 i, if a valid key is not presented, an electronicnotification can be sent back to the member or guests' electronic devicethrough the wireless radio, sound and/or light-based beacon indicatingthe key was not validated and prompting the access control & locationtracking system application to select a new key to transmit.

At step F11 j, the application on the member or guests' electronicdevice queries the access control & location tracking system keychaindatabase for any other available keys as in F11(b) and the processrepeats from that point.

FIG. 12 shows one method for allowing a guest to request a key from amember.

At step F12 a, a guest opens the access control & location trackingsystem application on their electronic device. Preferably the softwareapp is previously downloaded electronic device and can be used atvarious different locations where the system is installed. Furthermore,if the person has used the app in the past for access, the app willalready be on their electronic device for subsequent uses whether at theprevious location or other locations where the system is installed.Through the application, the guest selects or enters the memberinformation for which the guest would like to request a key from. Theguest then selects a button to request a key and a key request istransmitted to the access control & location tracking system through anyavailable form of electronic communication and data transfer includingbut not limited to through a wireless radio, sound or light enabledbeacon, wired or wireless internet connection, voice call, SMS, Email orMMS. Furthermore, other non-limiting examples of ways a guest canrequest a key from a member include, but are not limited to, through amember name directory similar to a call box a community allows a personto scroll through the names of the residents and a method to contactthem. The members' address, phone numbers, email addresses and otherinformation does not need to be shown to the guests in order for theguests to use the system to facilitate communication. The system canalso be configured so that the directory can be turned off if desired,or the directed limited to those who are at the same location as theguest. Also, the software can be provided with an address bookfunctionality to store member and guests names for future use, which canbe useful for a member who needs to frequently issues keys to the sameperson or a guest who frequently requests access from specific people.

At step F12 b, the access control and location computer system recordsthe guest's request and automatically enters it into the access control& location tracking system database. The Access Control & LocationTracking system also retrieves the member's information so that it mayforward the request to the member's electronic device.

At step F12 c, the Access Control & Location Tracking system transmitsthe guest key request to the member's electronic device through anyavailable form of electronic communication and data transfer includingbut not limited to through a wireless radio, sound or light enabledbeacon, wired or wireless internet connection, voice call, SMS, Email orMMS.

At step F12 d, a member receives the guest key request and proceeds toenter any limitations to be placed on guest's access to the controlledarea in the request. An administrator can also be permitted to enteradditional access restrictions for the guest. In one non-limitingembodiment, the system can be programmed to provide a form containing aseries of checkboxes for each location controlled by the system that themember can select from. A date and time module can also be provided forallowing the member to indicate the starting date and time and endingdate and time for the guest's digital key. Further detail on thepermissions and limitations a member can place on a key for a guest isdiscussed in FIG. 7.

At step F12 e, the member transmits the newly created guest key fromtheir electronic device to the Access Control & Location Tracking systemthrough any available form of electronic communication and data transferincluding but not limited to through a wireless radio, sound or lightenabled beacon, wired or wireless internet connection, voice call, SMS,Email or MMS.

At step F12 f, the Access Control & Location Tracking system receivesthe guest key and stores it in the Access Control & Location TrackingSystem Database.

At step F12 g, the access control and location computer system candirectly send the guest an electronic key to their smartphone or otherelectronic device via electronic communication methods including but notlimited to direct data connection, SMS, Email, MMS and voice. Aconfirmation electronic message can be sent to the member to inform themthat their guest's key was approved and sent to the guest.Alternatively, the system can be programmed that the guest key is firstsent to the member, and the member forwards it to the guest. The key isimported to a software application, which can be the same softwareapplication referenced in Step 12(a), which is stored locally on theguest's device. This application acts as an electronic keychain ofaccess keys. Once the guest receives the key, the guest has all accessrights, which have been granted to them by a member, as seen in F2 a,F12 d and FIG. 7. The guest can have a key provided by multiple memberswithin the same Access Control & Location Tracking System location orkeys for multiple locations (with separate instances of the AccessControl & Location Tracking System). As a non-limiting example, if theguest is a service provider (i.e. plumber, electrician, personaltrainer, delivery person, etc.) the guest may need to have keys frommultiple members at any given time. Also in some instances a person canbe a member at one location and a guest at other locations and may havemember key(s) and guest(s) keys on his or her electronic keychaindatabase stored on his or her electronic device.

At step F12 h, the electronic key is electronically stored in the accesscontrol & location tracking keychain database on the guest's device.

FIG. 13 demonstrates how the system determines presence at a location todetermine the proper digital key to utilize at a specific location andtime.

At step F13 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running on their device enters the area,they are preferably constantly within range of a beacon.

At step F13 b, the member or guests wireless radio, sound and/or lightenabled device queries the keychain database stored in their electronicdevice to determine what location the device is currently located at.This query is done based on the identification information received bythe device from the beacon. Preferably, the beacon, at a minimum,transmits a unique identifier to the device. This allows for thebeacon's specific location to be determined or known by the device suchthat the device determines the proper digital key to retrieve from thekeychain database for the specific location. Preferably, the device willalso learn or determine what the power and duration configurationsettings are for the specific location from the signal transmitted bythe beacon for the location and/or from information stored in thekeychain database associated with the specific location.

At step F13 c, the member or guests wireless radio, sound and/or lightenabled device determines what the signal strength is from the receivedsignal transmitted by the wireless radio, sound and/or light-basedbeacon(s). If the received signal strength, which can be measured inDecibels, Signal Strength Percentage or other non-limiting value, is notabove the minimum specified or preprogrammed/preconfigured threshold fora given location as determined in F13 b, the member or guests wirelessradio, sound and/or light enabled device will continue to scan forsignals or transmissions from the wireless radio, sound and/orlight-based beacon(s) and will make similar signal strengthdeterminations for subsequent signals/transmissions it receives. If thereceived signal strength is above the minimum threshold for a givenlocation, the system continues to the next step.

At step F13 d, the member or guests wireless radio, sound and/or lightenabled device begins a timer to determine the length of time that awireless radio, sound and/or light-based beacon's signal is receivedabove the minimum signal strength threshold. If the received signalstrength falls below the minimum threshold before the minimum durationhas elapsed, the member or guests wireless radio, sound and/or lightenabled device will continue to scan for signals or transmissions fromthe wireless radio, sound and/or light-based beacon(s) and will makesimilar signal strength and/or duration determinations for subsequentsignals/transmissions it receives. If the received signal strengthremains above the minimum threshold as determined in F13 b, for longerthan the minimum duration then the member or guests wireless radio,sound and/or light enabled device will transmit the key retrieved n F13b to the access control & location tracking system.

At step F13 e, the access control & location tracking system will updatethe access control & location tracking database regarding valid and/orinvalid signal determinations from steps 13 c and/or 13 d. It can thengrant or deny access based upon the configured permissions for theparticular member or guest.

FIG. 14 demonstrates another method for how the system determinespresence at a location to determine the proper digital key to utilize ata specific location and time.

At step F14 a, physical wireless radio, sound and/or light-based beaconsare placed throughout a controlled access area to determine specificlocations within the access area. These are arranged so that when amember or guest with a wireless radio, sound and/or light enabled deviceand the permissions application running on their device enters the area,they are preferably constantly within range of a beacon.

At step F14 b, the member or guests wireless radio, sound and/or lightenabled device queries the keychain database stored in their electronicdevice to determine what location the device is currently located at.This query is done based on the identification information received bythe device from the beacon. Preferably, the beacon, at a minimum,transmits a unique identifier to the device. This allows for thebeacon's specific location to be determined or known by the device suchthat the device determines the proper digital key to retrieve from thekeychain database for the specific location. Preferably, the device willalso learn or determine date and time information.

At step F14 c, the member or guests wireless radio, sound and/or lightenabled device transmits its identification, location and what thesignal strength is from the signal/transmission it received from thewireless radio, sound and/or light-based beacon(s) to the Access Control& Location Tracking System.

At step F14 d, The Access Control & Location Tracking System determineswhat the power and duration configuration settings are for the specificlocation.

At step F14 e, the Access Control & Location Tracking System comparesthe configured settings retrieved in F14 d to the received signalstrength being reported by the member or guests wireless radio, soundand/or light enabled device. If the received signal strength, which canbe measured in Decibels, Signal Strength Percentage or othernon-limiting value, is not above the minimum specified threshold for agiven location as determined above, the Access Control & LocationTracking System will continue to scan for signals or transmissions fromthe member or guests wireless radio, sound and/or light enabled deviceand will make similar signal strength determinations for subsequentsignals/transmissions it receives. If the received signal strength isabove the minimum threshold for a given location, the system continuesto the next step.

At step F14 f, the Access Control & Location Tracking System begins atimer to determine the length of time that a member or guests wirelessradio, sound and/or light enabled device is transmitting a receivedsignal strength from the wireless radio, sound and/or light-basedbeacon(s) above the minimum signal strength threshold. If the receivedsignal strength falls below the minimum threshold before the minimumduration has elapsed, the Access Control & Location Tracking System willcontinue to scan for signals or transmissions from the member or guestswireless radio, sound and/or light enabled device and will make similarsignal strength and/or duration determinations for subsequentsignals/transmissions it receives. If the received signal strength isabove the minimum threshold for a given location, the system willrequest that the digital key be sent by the member or guests wirelessradio, sound and/or light enabled device to the access control &location tracking system.

At F14 g, the member or guests wireless radio, sound and/or lightenabled device transmits the digital key to the Access Control &Location Tracking System. It can then grant or deny access based uponthe configured permissions for the particular member or guest. Theaccess control & location tracking database can also be updated by theaccess control & location tracking system regarding valid and/or invalidsignal determinations made by the access control & location trackingsystem

The system that performs the above described functions and steps forFIGS. 1 through 14 can include several components including, but notnecessarily limited to:

-   -   1. One or more Wireless Radio, Sound and/or Light-based        Beacon(s)    -   2. One or more member/guest electronic computer system or        device(s)    -   3. Access Control & Location Tracking System    -   4. Access Control & Location Tracking System Database    -   5. Access Control & Location Tracking Keychain Database    -   6. A public or private computer network to connect or        communicate the beacons and Access Control & Location tracking        system and database with each other.

The various components can be in electrical and wireless communicationwith each other.

The ability to electronically monitor guest and member access tocontrolled areas will provide significant administrative and financialbenefits incident to operators of controlled access locations. Withoutlimitation, these include the following benefits:

-   1. Provide members with the ability to remotely allow guests entry,    rather than necessitating the transfer of a physical object such as    a keycard or conventional mechanical key.-   2. Provide guests with real-time mapping and navigation in buildings    and neighborhoods.-   3. Allow members to confirm their guests have arrived and departed.-   4. Reduce security costs by allowing increased automation of    security systems.-   5. Increase safety in controlled access locations by providing    real-time data on the presence of unauthorized persons.-   6. Provide public safety personnel with access to controlled    locations in emergency or other necessary situations.

FIG. 15 shows one method for allowing a user to register their computersystem or device with the electronic location identification andtracking system of or associated with a particular location, company orbusiness. This initial process allows a user to be electronically andautomatically tracked within the location, utilize navigation services,order services delivered to their location and receive advertising andother location pertinent and/or aware messaging among other possibleuses.

At F15 a, a customer downloads and installs the Electronic LocationIdentification Tracking System Application “App” from their computer orany app store or marketplace including, but not limited to, the AppleApp Store, Windows Store and Google Play marketplace. The App isdownloaded to the customer's electronic system or device. Alternatively,the customer's electronic device can be purchased or otherwise obtainedby the customer with the App already installed/loaded. The App can be asingle App per location/company or an App that can work across multiplecompanies/locations. As a non-limiting example, a hotel chain can have asingle app for its customers to use at all of its different locationswhile a small retail store may choose to have an app for just its singlelocation. Partnerships for multiple companies can also be implemented,where a single App can work seamlessly for all of theirstores/establishments.

At F15 b, when the App is first opened, it can prompt the user toregister their electronic computer system or device with the electroniclocation identification and tracking system/database. This enables thecustomer to use their computer system or device to be automaticallytracked within the customer's facility, communicate with the company,and order food, beverage or other products/services. Where the customeris interested in ordering food, beverage and/or other products orservices, a menu or listing of the food, beverage and otherproducts/services offered at the location can be displayed on thecustomer's electronic system or device to inform the customer of what isavailable at the location. If the user opens the App and does not wishto register the device, then the App will operate in a non-registeredmode that can also limit the services available on the device.

At F15 c, if the customer would like to register the device with theelectronic location identification and tracking system, a form willappear on the screen prompting the customer for information, which caninclude, but is not limited to, one or more of the following: theirname, birthday, mailing address, email address, phone number andpicture. The system and software can also be designed such that multipleelectronic systems and devices are associated with one account so thatthe rewards given to each electronic system or device are accumulatedwithin one account (i.e. multiple devices belong to a single user canall be used to identify and track that user such as smartphones, smartwatches, fitness bands, RFID badges, wearable beacons, wristbands,etc.). The required fields can be selected by the company and can dependon the specific company and needs of that company. The userelectronically submits the form when completed.

At F15 d, if during submission by the user, the App determines that notall required fields are filled out, it can prompt the customer for themissing information. The user can resubmit the form with the missinginformation provided.

At F15 e, once all required fields are provided and the form iselectronically submitted by the user, the data is electronically sent toand received by the electronic location identification and trackingsystem.

At F15 f, the electronic location identification and tracking systemstores the user's form submissions along with some identifyinginformation for the user's device such as, but not limited to, one ormore of the following: the device's name and/or device's owner's name, auniversally unique identifier or UUID (an identifier standard used insoftware construction and is a 128-bit value), media access controladdress or MAC address (unique identifier assigned to network interfacesfor communications on the physical network segment), IP Address, orother unique identifiers.

At F15 g, an electronic notification can be sent to the systemadministrator(s) via email, sms, mms, voice, fax or other electronicmethod of the new user registration.

At F15 h, the system administrator can access the electronic locationidentification and tracking system to view and edit the new customer'sprofile. The system administrator can assign the user to any group orlist available, or add information about the user in its profile.

At F15 i, any edits or additions to the user's profile made by thesystem administrator can be stored in the electronic locationidentification and tracking system database.

FIG. 16 illustrates how a location is registered with the electroniclocation identification and tracking system.

At F16 a, a system administrator configures either a single or clusterof wireless radio, sound and/or light-based beacon(s) with informationincluding, but not limited to, one more of the following: its name,unique identifier (MAC Address, UUID or similar), group/organization,unique number within an organization, location, wireless networks, etc.A cluster of beacons is created when two or more beacons are groupedtogether to define a single location and can include different types andtechnologies of beacons. As non-limiting examples, a beacon cluster mayconsist of 3 bluetooth beacons and a LiFi beacon in one location butconsist of 2 bluetooth beacons and an Ultrasonic beacon in anotherlocation. The system administrator can select various options withregards to what the system should do when it does not receive a signalfrom a beacon assigned to a given location cluster. Options include butare not limited to discarding this location from presence determinationif a signal from all beacons configured for the cluster is not received,assigning a default or static value for the beacon signal strength forany beacon that is assigned to this cluster but the system didn'treceive a signal from, or ignoring the beacon from consideration inpresence determination. Location determination for a cluster of beaconscan be preferably based on an average of the signal strength received bya device from all of the beacons assigned to a given cluster of alocation and subject to the options specified above for any missingsignals. Preferably, the clustering method can be designed to enablemicro-location services (i.e. be able to provide accurate location at asub-room level). In one non-limiting example, the distances of theclusters can range from about a few feet radius to about a 15 feetradius. The beacons can be placed anywhere from right next to oradjacent to each other up to a few feet apart, depending on the level ofaccuracy needed for the given use. Clusters can be defined from alogical perspective as a specific location. From a technicalperspective, the beacon clusters can, as a non limiting example, bedefined by using their UUID, Major and Minor values (identifiers). Allbeacons in a cluster preferably having the same UUID and Major value,with each beacon in the cluster having a unique minor value, though thisis not considered limiting and other value configurations can be used.

At F16 b, the configured wireless radio, sound and/or light-basedbeacon(s) are physically installed at the configured location and can betested to ensure its operability.

At F16 c, a system administrator then electronically accesses theelectronic location identification and tracking system to enter in theinstalled wireless radio, sound and/or light-based beacon(s)'configuration and location information. Beacon clusters can be definedat this point as well. When a location is created, the user inputs thenumber of beacons used to define that specific location. When a clusterof beacons is configured for a location, the system will use the averageof the received signal strengths for all beacons in a cluster indetermining location or presence at a location. As a non-limitingexample, if a location is configured for a cluster of 3 beacons, thesignal strength received from each of the beacons is averaged to createa single location signal strength value. Optionally, should a beaconsignal not be received for any given beacon assigned to a locationcluster, the system can either assign a dummy value to this beaconsignal or choose to ignore all beacons for this location. Additionalconfiguration of the beacon(s) can also be performed at this step, whichcan include, but is not limited to, configuring notification settings,signal types, signal strengths, transmission power and device presencedurations.

At F16 d, the wireless radio, sound and/or light-based beacon'sconfiguration and location information is stored in the electroniclocation identification and tracking system database.

FIG. 17 illustrates one embodiment of how the system determines thelocation of a user and their presence at any given location based ontheir registered device.

At F17 a, the wireless radio, sound and/or light-based beacons installedat various locations are preferably constantly and automaticallybroadcasting their information including, but not limited to, one ormore of the following: its name, unique identifier (MAC Address, UUID orsimilar), group/organization, unique number within an organization,location, wireless networks, etc.

At F17 b, the user's electronic system or device with the electronicidentification and location tracking system application “App” downloadedand running (either in the foreground or as a background service)receives the broadcasted information from the wireless radio, soundand/or light-based beacons including, but not limited to, one or more ofthe following: its name, unique identifier (MAC Address, UUID orsimilar), group/organization, signal type and strength. If the beaconcontains a recognized identifier as programmed into the App, it proceedsto step F17 c. Otherwise, the App will continue to monitor for knownbeacon signals and ignore any other beacons present that are notregistered or designed to be used with the system. This process repeatsat configurable intervals so that the App can be frequently receivingbeacon information.

At F17 c, when a known beacon signal is received by the App, itsdatabase is queried to determine the location properties of the knownbeacon whose signal was received. This will include but is not limitedto the type and number of beacons associated with the location assignedto the particular beacon.

At F17 d, the User/Customer's system/App (“system/App”) makes adetermination based on the information returned in F17 c if a signal wasreceived from all beacons assigned to a location or locations, ifmultiple beacons are discovered. If signals from all beacons assigned toa location are received, the system proceeds to step F17 e. If a signalwas not received from all beacons in a location cluster, the system/Appapplies the programmed and configured logic for handling the missingbeacons. This may include, but is not limited to, ignoring the locationin its entirety if all beacons are not found, using a static value forthe missing beacons or simply ignoring the missing beacons and calculatethe average using just the beacons whose signals were received.

At F17 e, if the analysis performed in F17 d indicates that the user'sdevice is near a given location, the system/App determines whether thedevice is in close enough proximity to the beacons to be consideredpresent at that specific area of a location. It does this by comparingthe average signal strength received for the beacons at the location tothe configured minimum. If the average signal strength is below theconfigured value, the system will continue to perform the average signalstrength calculations in F17 d. If the average signal strength is abovethe configured minimum value, the system proceeds to step F17 f. Thisstep can be optional and the system can be configured to simplydetermine a user's location based on the highest average signal strengthvalue from the beacon clusters.

At F17 f, the system/App begins counting to see if the user's devicewith the app running is maintaining its average signal strength forlonger then a configured duration for that location. If the averagesignal strength for the location cluster fails to remain above theconfigured minimum threshold for greater then a configured period oftime, the system will continue to perform the average signal strengthcalculations in F17 d. If the system/App determines that the averagesignal strength for a location cluster is maintained above a configuredthreshold for longer then a configured period of time, then it willnotify the Electronic Identification & Location Tracking system of theuser's confirmed presence at the given location.

At F17 g, the electronic identification & location tracking systemstores the user's location and other information in its database.

FIG. 18 illustrates another embodiment of how the system determines thelocation of a user and their presence at any given location based ontheir registered device.

At F18 a, the wireless radio, sound and/or light-based beacons installedat various locations are constantly and automatically broadcasting theirinformation including, but not limited to, one or more of the following:its name, unique identifier (MAC Address, UUID or similar),group/organization, unique number within an organization, location,wireless networks, etc.

At F18 b, the user's electronic system or device with the electronicidentification and location tracking system application “App” downloadedand running (either in the foreground or as a background service)receives the broadcasted information from the wireless radio, soundand/or light-based beacons including, but not limited to one or more ofthe following: its name, unique identifier (MAC Address, UUID orsimilar), group/organization, signal type and strength. If the beaconcontains a recognized identifier as programmed into the App, it proceedsto step F18 c. Otherwise, the App will continue to monitor for knownbeacon signals. This process repeats at configurable intervals so thatthe App can be frequently receiving beacon information.

At F18 c, when a known beacon signal is received by the system/App, itsends the information received from the beacon including but not limitedto, one or more of the following: its name, unique identifier (MACAddress, UUID or similar), group/organization, signal type and strengthto the electronic identification and location tracking system. Theelectronic identification and location tracking system queries itsdatabase to determine the location properties of the known beacon whosesignal was received. This can include, but is not limited to, the typeand number of beacons associated with the location assigned to theparticular beacon and the configured logic for what to do when thesystem doesn't receive a signal from one or more beacons (or type ofbeacons) in a location cluster.

At F18 d, the electronic identification and location tracking systemmakes a determination based on the information returned in F18 c if asignal was received from all beacons assigned to a location orlocations, if multiple beacons are discovered. If signals from allbeacons assigned to a location are received, the system proceeds to stepF18 e. If a signal was not received from all beacons in a locationcluster, the system applies the programmed and configured logic forhandling the missing beacons. This may include, but is not limited to,ignoring the location in its entirety if all beacons are not found,using a static value for the missing beacons or simply ignoring themissing beacons and calculate the average using just the beacons whosesignals were received.

At F18 e, if the analysis performed in F18 d indicates that the user'sdevice is near a given location, the system/App determines whether thedevice is in close enough proximity to the beacons to be consideredpresent at that specific area of a location. It does this by comparingthe average signal strength received for the beacons at the location tothe configured minimum. If the average signal strength is below theconfigured value, the system will continue to perform the average signalstrength calculations in F18 d. If the average signal strength is abovethe configured minimum value, the system proceeds to step F18 f. Thisstep can be optional and the system can be configured to simplydetermine a user's location based on the highest average signal strengthvalue from the beacon clusters.

At F18 f, the system/App begins counting to see if the user's devicewith the app running is maintaining its average signal strength forlonger then a configured duration for that location. If the averagesignal strength for the location cluster fails to remain above theconfigured minimum threshold for greater then a configured period oftime, the system will continue to perform the average signal strengthcalculations in F18 d. If the system determines that the average signalstrength for a location cluster is maintained above a configuredthreshold for longer then a configured period of time, then it willnotify the Electronic Identification & Location Tracking system of theuser's confirmed presence at the given location.

At F18 g, the electronic identification & location tracking systemstored the user's location and other information its database.

FIG. 19 demonstrates how a user's presence at a location is determinedand configured within the electronic identification & location trackingsystem. This process can also be utilized to edit presence determinationconfigurations already stored in the database.

At F19 a, the electronic identification & location tracking systemqueries the electronic identification & location tracking systemdatabase for a list of available locations. Available locations can beones that are entered into the system database as described above.Configuring refers to setting parameters for a location to assign abeacon or beacon cluster to a particular location as well as to aid inthe determination of a customer/user's presence at that location basedon signal strength and duration. This function can be typically reservedfor a system administrator.

At F19 b, the electronic identification & location tracking systemdisplays a listing of available locations to configure. The systemadministrator can then select the location to configure or edit theconfiguration of. Reconfiguring the location can be for a variety ofreasons, such as, but not limited to, adding additional beacons to alocation cluster for better accuracy, replace a beacon that is faulty,or changing the presence determination criteria to make the system moreor less sensitive/accurate. The system administrator may also elect toconfigure a new location in the manner.

At F19 c, once the location is selected, the system administrator maynow specify the number and type of beacons assigned to this particularlocation. A location can consist of one or more beacons, clusteredtogether (i.e. where more than one beacon designated for the location)utilizing the same or different technologies. As a non-limiting example,a beacon cluster can consist of three beacons made up of IR, Bluetoothand Ultrasonic beacons that work in conjunction.

At F19 d, next, the system administrator may now specify the UniqueIdentifiers for the beacons to be identified with this location. As anon-limiting example, if three beacons are configured for this locationcluster, then 3 beacon identifiers should be selected to belong to thislocation cluster. If only a single beacon is selected then a singleunique identifier is assigned to this location. Locations can beidentified by using matching identifiers on the beacons with only asingle differentiator. In one non-limiting embodiment, 3 identifyingfields can be used for each beacon, UUID, Major Value and Minor Value.Each beacon can have values assigned to each of those 3 fields. As anon-limiting example, a 3 beacon cluster could have each beacon with aUUID of 121324-34235-342345-34423 and a major id value of 12345. Thenbeacon 1 in the cluster ccould have a minor value of 1, beacon 2 ccouldhave a minor value of 2 and beacon 3 ccould have a minor value of 3. Thenext cluster could have 3 beacons with the same UUID as above but with adifferent major value and a similar minor value structure as theprevious location.

At F19 e, next, the system administrator may now select what the systemshould do when it does not receive a signal from a beacon assigned to agiven location cluster. Options can include, but are not limited to,discarding this location from presence determination if a signal fromall beacons configured for the cluster is not received, assigning adefault or static value for the beacon signal strength for any beaconthat is assigned to this cluster but didn't receive a signal, orignoring the beacon from consideration in presence determination.

At F19 f, next, the system administrator may now specify the minimumsignal strength threshold for a user to be considered present at thisparticular location. This signal strength is the measure of the strengthof a known wireless radio, sound and/or light-based beacons transmittedsignal strength as received by the customer's electronic system ordevice. As a non-limiting example, the signal strength can be measuredand calculated on a scale of 0 to 100% where the minimum signal strengththreshold is set to 80%. This means that unless the customer's devicereceives a signal from the wireless radio, sound and/or light-basedbeacons greater then the 80% strength threshold, they will not beconsidered present at a location. Though it is preferred that thebeacons are of the same type for a particular cluster, it is within thescope of the disclosure to have a location cluster made up beacons ofdiffering types (i.e. Bluetooth beacon, a light-based beacon and a soundbased beacon). The signal strength measurement is intended toapproximate the distance between the user's electronic system or deviceand the wireless radio, sound and/or light-based beacons and can alsoinclude strength indicators including but not limited to RSSI (relativesignal strength indicator) values. This setting can be optional.

At F19 g, once the minimum presence signal strength threshold has beenentered, the system administrator has the option of specifying theminimum presence duration for that location. The minimum presenceduration can be a time value and can be expressed in any known andacceptable time format including but not limited to milliseconds,seconds, minutes and hours. As a non-limiting example, the systemadministrator can configure the value to 20 seconds. In this instancethe user's electronic system or device must report to the electronicidentification & location tracking system a signal strength above theminimum threshold specified in F5 f for a period of at least 20consecutive seconds in order to consider the user's electronic system ordevice present at that location. This setting can be optional.

At F19 h, next the system administrator may now specify the signalstrength threshold for a user to be considered to have departed fromthis particular location. This signal strength is the measure of thestrength of a known wireless radio, sound and/or light-based beaconstransmitted signal strength as received by the customer's electronicsystem or device. As a non-limiting example, the signal strength can bemeasured and calculated on a scale of 0 to 100% where the maximum signalstrength threshold is set to 40%. This means that once the customer'sdevice receives a signal from the wireless radio, sound and/orlight-based beacons lower then the 40% strength threshold, they will notbe considered present at a location. The signal strength measurement isintended to approximate the distance between the users electronic systemor device and the wireless radio, sound and/or light-based beacons andcan also include strength indicators including but not limited to RSSI(relative signal strength indicator) values. This setting can beoptional. As a non-limiting example, signal strength can be measured interms of decibels or RSSI. For decibels, the receiving device (phone,tablet, etc.) can simply measure the signal strength in db. Also, afixed value can be configured for the transmit power strength of thebeacons and that power level (in db) can be used in the calculation ofthe RSSI which is an industry standard measurement algorithm thatfactors in the received signal strength in db and compares it againstthe known transmit power. Other potential forms of signal strengthmeasurement that can be used include, but are not limited to Lux (lightlevels for light-based beacons), decibels in terms of volume (soundbased-beacons) and magnetic fields strength.

At F19 i, once the departure signal strength threshold has been crossed,the system administrator has the option of specifying the minimumdeparture duration for that location. The minimum departure duration isa time value and can be expressed in any known and acceptable timeformat including, but not limited to, milliseconds, seconds, minutes andhours. As a non-limiting example, the system administrator can configurethe value to 20 seconds. In this instance the user's electronic systemor device reports to the electronic identification & location trackingsystem a signal strength below the threshold specified in F5 h for aperiod of at least 20 consecutive seconds in order to consider theuser's electronic system or device to have departed that location. Thissetting can be optional.

At F19 j, the locations presence determination configuration profile canbe updated in the electronic identification & location tracking systemdatabase.

FIG. 20 demonstrates how a customer is able to opt-out of beingtracked/monitored from within the electronic identification & locationtracking system application on the user's electronic system or device.

At F20 a, when the electronic identification & location tracking systemmakes a determination that a user's electronic system or device ispresent at a given location as described in FIGS. 3 and/or 4, anotification can be sent to the user's electronic system or device viathe electronic identification & location tracking system application“App” indicating that their presence has been detected at a givenlocation by the electronic identification & location tracking system.The notification can be made through a variety of methods including butnot limited to Email, SMS, MMS, On Screen and Voice.

At F20 b, the customer through the App running on their electronicsystem or device is presented with or can select a menu item to opt-outof being tracked/monitored by the facility. If the customer does notmake an affirmative selection to opt-out of being tracked/monitored ormakes an affirmative selection to allow tracking/monitoring, then theelectronic identification & location tracking system is electronicallynotified so that user tracking/monitoring can continue.

At F20 c, if the user makes an affirmative selection to Opt-Out of beingtracked/monitored, then the electronic identification & locationtracking system is electronically notified of such selection.

At F20 d, the electronic identification & location tracking systemupdates the electronic identification & location tracking systemdatabase of the users' selection in F20 b or F20 c.

FIG. 21 demonstrates one non-limiting embodiment/example of how acluster of beacons can be assigned to a location and used for locationdetermination within the electronic identification & location trackingsystem.

At F21 a, beacons are installed and configured for six locations,Bedroom 1 (‘A’ Beacons), Bedroom 2 (‘B’ Beacons), Hall (‘C’ Beacons),Kitchen (‘D’ Beacons), Dining Room (‘E’ Beacons) and Living Room (‘F’Beacons). Though not limiting, each location has 3 beacons configured inthe cluster.

At F21 b, a user with the electronic identification & location trackingsystem application “App” on the users' electronic system or deviceenters Bedroom 2 (‘B’ Beacons) as illustrated.

At F21 c, the electronic identification & location tracking systemapplication “App” on the user's electronic system or device receivesbeacon signals from all nearby beacons and sends them to the electronicidentification & location tracking system. As a non-limiting example,the signal strength measurements for each beacon are displayed in thechart on the figure. Also seen in the chart for F21 c is the signalaverage for each location/beacon cluster calculated by the electronicidentification & location tracking system, which can be all of thebeacon signal strengths received for each location.

At F21 d, the electronic identification & location tracking system makesa determination the user's location of Bedroom 2 (‘B’ Beacons) based ona higher average signal strength received from the beacons in theBedroom 2 location cluster then the average signal strength receivedfrom the beacons in the other location clusters.

FIG. 22 illustrates a further non-limiting embodiment for thedetermination of presence at a location. As seem, the system candetermine the location of a user and their presence at any givenlocation based on their registered device.

At F22 a, the wireless radio, sound and/or light-based beacons installedat various locations are preferably constantly and automaticallybroadcasting their information including, but not limited to, one ormore of the following: its name, unique identifier (MAC Address, UUID orsimilar), group/organization, unique number within an organization,location, wireless networks, etc.

At F22 b, the user's electronic system or device with the electronicidentification and location tracking system application “App” downloaded(or otherwise installed) and running (either in the foreground or as abackground service) receives the broadcasted information from thewireless radio, sound and/or light-based beacons including, but notlimited to, one or more of the following: its name, unique identifier(MAC Address, UUID or similar), group/organization, signal type andstrength. If the beacon contains a recognized identifier as programmedinto the App, it can proceed to step F22 c. Otherwise, the App willcontinue to monitor for known beacon signals and ignore any otherbeacons present that are not registered or designed to be used with thesystem. This process can repeat at configurable intervals so that theApp can be frequently receiving beacon information.

At F22 c, when a known beacon signal is received by the App, itsdatabase can be queried to determine the location properties of theknown beacon whose signal was received. This can include, but is notlimited to, the type and minimum number of beacons associated with thelocation, group of locations, or globally all locations configuredwithin the system.

At F22 d, the User/Customer's system/App (“system/App”) makes adetermination based on the information returned in F22 c if a signal wasreceived from the minimum number of beacons assigned to a location orlocations. If signals from the minimum number of beacons assigned to alocation, group of locations or globally all locations are received, thesystem proceeds to step F22 e. If a signal was not received from theminimum number of beacons in a location cluster, the system/App appliesthe programmed and configured logic for handling the missing beacons.This may include, but is not limited to, ignoring the location in itsentirety if all beacons are not found, using a static value for themissing beacons or simply ignoring the missing beacons and calculate theaverage using just the beacons whose signals were received.

At F22 e, the system/App performs calculations for average signalstrengths for all locations it received beacons for after applying thesystem/app login in F22 d. The beacon(s) with the highest average signalstrength can then be sent to the Electronic Identification & LocationTracking System.

At F22 f, the Electronic Identification & Location Tracking Systemqueries its database to determine the identity of the locationassociated with the received beacon(s) from F22 e. At this point, thelocation can be determined and stored in the database. Optionally, theprocess may continue to F22 g to provide further options for determininglocation of the user.

At F22 g, The Electronic Identification & Location Tracking System maymake a further determination as to whether the device is in close enoughproximity to the beacons to be considered present at that specific areaof a location. It does this by comparing the average signal strengthreceived for the beacon(s) received from F22 e to the configured minimumsignal strength. If the average signal strength is below the configuredvalue, the system will determine that the user is not in close enoughproximity to the beacons to be considered present at that specificlocation and the process will begin again at F22 a. If the averagesignal strength is above the configured minimum value, the systemproceeds to step F22 h. This step can be optional and the system can beconfigured to simply determine a user's location based on the highestaverage signal strength value from the beacon clusters.

At F22 h, The Electronic Identification & Location Tracking System maymake a further determination as to whether the device is in close enoughproximity to the beacons to be considered present at that specific areaof a location. It does this by counting to see if the user's device withthe app running is maintaining its average signal strength for the givenbeacon(s) for longer than a configured duration for that location. Ifthe average signal strength for the location cluster fails to remainabove the configured minimum threshold for greater then a configuredperiod of time, the system will determine that the user is not in closeenough proximity to the beacons to be considered present at thatspecific location and the process will begin again at F22 a. If theaverage signal strength for the location cluster remains above theconfigured minimum threshold for greater then a configured period oftime, the system determines the User to be in location assigned thebeacon cluster and stores the user's location and other information inits database. This step can be optional and the system can be configuredto simply determine a user's location based on the highest averagesignal strength value from the beacon clusters.

FIG. 23 illustrates another non-limiting embodiment for thedetermination of presence at a location. As seen the system candetermine the location of a user and their presence at any givenlocation based on their registered device.

At F23 a, the wireless radio, sound and/or light-based beacons installedat various locations are preferably constantly and automaticallybroadcasting their information including, but not limited to, one ormore of the following: its name, unique identifier (MAC Address, UUID orsimilar), group/organization, unique number within an organization,location, wireless networks, etc.

At F23 b, the user's electronic system or device with the electronicidentification and location tracking system application “App” downloaded(or otherwise installed) and running (either in the foreground or as abackground service) receives the broadcasted information from thewireless radio, sound and/or light-based beacons including, but notlimited to, one or more of the following: its name, unique identifier(MAC Address, UUID or similar), group/organization, signal type andstrength. If the beacon contains a recognized identifier as programmedinto the App, it proceeds to step F23 c. Otherwise, the App willcontinue to monitor for known beacon signals and ignore any otherbeacons present that are not registered or designed to be used with thesystem. This process repeats at configurable intervals so that the Appcan be frequently receiving beacon information.

At F23 c, when a known beacon signal is received by the App, itsdatabase is queried to determine the location properties of the knownbeacon whose signal was received. This can include, but is not limitedto, the type, minimum number of beacons, minimum signal strength andminimum signal duration associated with the location, group oflocations, or globally all locations configured within the system.

At F23 d, the User/Customer's system/App (“system/App”) makes adetermination based on the information returned in F23 c if a signal wasreceived from the minimum number of beacons assigned to a location orlocations. If signals from the minimum number of beacons assigned to alocation, group of locations or globally all locations are received, thesystem can proceed to step F23 e. If a signal was not received from theminimum number of beacons in a location cluster, the system/App appliesthe programmed and configured logic for handling the missing beacons.This may include, but is not limited to, ignoring the location in itsentirety if all beacons are not found, using a static value for themissing beacons or simply ignoring the missing beacons and calculate theaverage using just the beacons whose signals were received.

At F23 e, the system/App performs calculations for average signalstrengths for all locations it received beacons for after applying thesystem/app login in F23 d. The system/App may at this point make adetermination as to its location based on the identity of the locationassociated with the received beacon(s) having the highest computedaverage signal strength with the process continuing to F23 h.Optionally, the process may continue to F23 f to provide further optionsfor determining location of the user.

At F23 f, system/App may make a further determination as to whether thedevice is in close enough proximity to the beacons to be consideredpresent at that specific area of a location. It does this by comparingthe computed average signal strength received for the beacon(s)determined in F23 e to have the highest average signal strength to theconfigured minimum signal strength for the location cluster. If theaverage signal strength is below the configured value, the system willdetermine that the user is not in close enough proximity to the beaconsto be considered present at that specific location and the process willbegin again at F23 a. If the average signal strength is above theconfigured minimum value, the system proceeds to step F23 g. This stepcan be optional and the system can be configured to simply determine auser's location based on the highest average signal strength value fromthe beacon clusters.

At F23 g, the system/App may make a further determination as to whetherthe device is in close enough proximity to the beacons to be consideredpresent at that specific area of a location. It does this by counting tosee if the user's device with the system/App running is maintaining itsaverage signal strength for the given beacon(s) for longer than aconfigured duration for that location. If the average signal strengthfor the location cluster fails to remain above the configured minimumthreshold for greater then a configured period of time, the system/Appwill determine that the user is not in close enough proximity to thebeacons to be considered present at that specific location and theprocess will begin again at F23 a. If the average signal strength forthe location cluster remains above the configured minimum threshold forgreater then a configured period of time, the system/App determines theUser to be in location assigned to the beacon cluster. This step can beoptional and the system can be configured to simply determine a user'slocation based on the highest average signal strength value from thebeacon clusters.

At F23 h, the Electronic Identification & Location Tracking System canreceive the User's information which can include, but is not limited to,the User's Id, name, location, date and time. The system can preferablystore the user's location and other information in its database.

The system that performs the above described functions and steps caninclude several components including, but not necessarily limited to,the following:

-   -   1. One or more Wireless Radio, Sound and/or Light-based        Beacon(s)    -   2. One or more user/customer electronic computer system or        device(s)    -   3. Electronic Identification & Location Tracking System    -   4. Electronic Identification & Location Tracking System        Application “App”    -   5. Electronic Identification & Location Tracking System Database    -   6. Electronic Identification & Location Tracking System        Application “App” Database    -   7. A public or private computer network to connect or        communicate the user's device, beacons and Electronic        Identification & Location Tracking System and database with each        other.

The various components can be in electrical and wireless communicationwith each other.

The ability to electronically identify users, track user movements andidentify presence at a location can provide significant administrativeand financial benefits incident to operators of venues where traditionalGPS location services are not available. Without limitation, theseinclude the following benefits:

-   -   1. Provide venue operators the ability to identify a user and        the user's precise location within their facility.    -   2. Provide venue operators the ability to determine a user's        presence at a location through configurable parameters.    -   3. Provide venue operators with product and/or service delivery        capabilities to a user's real-time location.    -   4. Provide users with real-time mapping and navigation in        buildings and other venues.

It should be understood that the exemplary embodiments described hereinshould be considered in a descriptive sense only and not for purposes oflimitation. Descriptions of features or aspects within each embodimentshould typically be considered as available for other similar featuresor aspects in other embodiments. While one or more embodiments have beendescribed with reference to the figures, it will be understood by thoseof ordinary skill in the art that various changes in form and detailsmay be made therein without departing from their spirit and scope.

All components of the described system and their locations, electroniccommunication methods between the system components, electronic storagemechanisms, etc. discussed above or shown in the drawings, if any, aremerely by way of example and are not considered limiting and othercomponent(s) and their locations, electronic communication methods,electronic storage mechanisms, etc. can be chosen and used and all areconsidered within the scope of the disclosure.

Unless feature(s), part(s), component(s), characteristic(s) orfunction(s) described in the specification or shown in the drawings fora claim element, claim step or claim term specifically appear in theclaim with the claim element, claim step or claim term, then theinventor does not consider such feature(s), part(s), component(s),characteristic(s) or function(s) to be included for the claim element,claim step or claim term in the claim when and if the claim element,claim step or claim term is interpreted or construed. Similarly, withrespect to any “means for” elements in the claims, the inventorconsiders such language to require only the minimal amount of features,components, steps, or parts from the specification to achieve thefunction of the “means for” language and not all of the features,components, steps or parts describe in the specification that arerelated to the function of the “means for” language.

The benefits, advantages, solutions to problems, and any element(s) thatmay cause any benefit, advantage, or solution to occur or become morepronounced are not to be construed or considered as a critical,required, or essential features or elements of any or all the claims.

While the system and method has been described and disclosed in certainterms and has disclosed certain embodiments or modifications, personsskilled in the art who have acquainted themselves with the disclosure,will appreciate that it is not necessarily limited by such terms, nor tothe specific embodiments and modification disclosed herein. Thus, a widevariety of alternatives, suggested by the teachings herein, can bepracticed without departing from the spirit of the disclosure, andrights to such alternatives are particularly reserved and consideredwithin the scope of the disclosure.

What is claimed is:
 1. A method for determining a presence of a user ata particular area within a location by an electronic locationidentification and tracking system, said method comprising the steps of:a. electronically receiving one or more signals containingidentification information from at least one wireless beacon associatedwith a particular area within a location by a user's portable electronicdevice running an electronic location identification and tracking systemapplication (“App”); b. electronically determining by the App whethereach beacon signal received is from a beacon whose identifier ispreviously programmed into the App; c. for each known beacon signalreceived by the App, electronically querying a database toelectronically receive location properties for each known beacon,wherein the location properties include information on the number andidentity of beacons grouped as a particular cluster of beacons for theparticular area within the location; and d. electronically determiningby the App if a signal was received from each beacon associated with theparticular cluster of beacons.
 2. The method for determining a presenceof a user of claim 1 wherein if a signal was received from each beaconassociated with the particular cluster of beacons in step (d) furthercomprising the steps of: (e) electronically receiving a signal strengthfor each beacon signal received; (f) electronically determining anaverage signal strength from all of the signal strengths received instep (e); and (g) electronically comparing the average signal strengthto a preconfigured minimum signal strength value for the particular areaor particular cluster of beacons.
 3. The method for determining apresence of a user of claim 2 wherein if the average signal strength isabove the preconfigured minimum signal strength value the user isconsidered present at the particular area within the location associatedwith the particular cluster of beacons.
 4. The method for determining apresence of a user of claim 2 wherein where the average signal strengthis above the preconfigured minimum signal strength value furthercomprising the step of electronically determining if the average signalstrength remains above the preconfigured minimum signal strength valuefor a preconfigured period of time.
 5. The method for determining apresence of a user of claim 1 wherein if a signal was not received fromeach beacon associated with the particular cluster of beacons in step(d) further comprising the step of either (i) using a static value forthe missing beacon(s) when calculating an average signal strength forthe beacon signals of the beacons associated with the particular clusterof beacons, or (ii) calculating the average signal strength from thebeacon signals received from the beacons associated with the particularcluster of beacons.
 6. The method for determining a presence of a userof claim 3 further comprising the step of storing a determined locationfor the user in an electronic database.
 7. A method for determining apresence of a user at a particular area within a location by anelectronic location identification and tracking system, said methodcomprising the steps of: a. electronically receiving one or more signalscontaining identification information from at least one wireless beaconassociated with a particular area within a location by a user's portableelectronic device running an electronic location identification andtracking system application (“App”); b. electronically determining bythe App whether each beacon signal received is from a beacon whoseidentifier is previously programmed into the App; c. for each knownbeacon signal received by the App, electronically forwarding identifyinginformation for the beacon and signal strength information by the App toan electronic identification and location tracking system; d.electronically querying an electronic database by the electronicidentification and location tracking system to electronically receivelocation properties for each known beacon, wherein the locationproperties include information on the number and identity of beaconsgrouped as a particular cluster of beacons for the particular areawithin the location; and e. electronically determining by the electronicidentification and location tracking system if a signal was received bythe App from each beacon associated with the particular cluster ofbeacons.
 8. The method for determining a presence of a user of claim 7wherein if a signal was received from each beacon associated with theparticular cluster of beacons in step (e) further comprising the stepsof: (f) electronically receiving a signal strength for each beaconsignal received; (g) electronically determining an average signalstrength from all of the signal strengths received in step (f) by theelectronic identification and location tracking system; and (h)electronically comparing the average signal strength to a preconfiguredminimum signal strength value for the particular area or particularcluster of beacons by the electronic identification and locatingtracking system.
 9. The method for determining a presence of a user ofclaim 8 wherein if the average signal strength is above thepreconfigured minimum signal strength value the user is consideredpresent at the particular area within the location associated with theparticular cluster of beacons.
 10. The method for determining a presenceof a user of claim 8 wherein where the average signal strength is abovethe preconfigured minimum signal strength value further comprising thestep of electronically determining if the average signal strengthremains above the preconfigured minimum signal strength value for apreconfigured period of time.
 11. The method for determining a presenceof a user of claim 7 wherein if a signal was not received from eachbeacon associated with the particular cluster of beacons in step (e)further comprising the step of either (i) using a static value for themissing beacon(s) when calculating an average signal strength for thebeacon signals of the beacons associated with the particular cluster ofbeacons, or (ii) calculating the average signal strength from the beaconsignals received from the beacons associated with the particular clusterof beacons.
 12. The method for determining a presence of a user of claim9 further comprising the step of storing a determined location for theuser in an electronic database by the electronic identification andlocation tracking system.
 13. A method for registering a location foruse by an electronic location identification and tracking system todetermine the presence of an individual at the location, said methodcomprising the steps of: a. installing a plurality of wireless beaconsat a location; b. electronically selecting two or more beacons from theplurality of wireless beacons to represent a specific spot in thelocation, wherein the selected two or more beacons form a beacon clusterused for determining presence by an individual at the specific spot; b.electronically entering configuration information for each beacon in thebeacon cluster and the specific spot assigned to the beacon clusterthrough an electronic location identification and tracking system; andd. electronically storing the beacon configuration and specific spotassigned to the beacon cluster information in an electronic database incommunication with the electronic location identification and trackingsystem.
 14. The method for registering a location of claim 13 furthercomprising the steps of electronically entering information regarding aminimum signal strength threshold for each of the beacons in the beaconcluster through the electronic location identification and trackingsystem and storing the entered minimum signal strength thresholds in theelectronic database.
 15. The method for registering a location of claim14 wherein when a signal is received by an electronic device on thepossession of the individual from at least one beacon from the beaconcluster at a signal strength above the minimum signal strength thresholda presence determination is performed by the electronic locationidentification and tracking system and said method further comprisingthe steps of electronically entering instructions for handling anysignals received by the electronic device from below the minimum signalstrength threshold or lack of received signal by one or more beacons inthe beacon cluster during a presence determination through theelectronic location identification and tracking system and storing theentered instruction in the electronic database.
 16. The method forregistering a location of claim 15 wherein the instructions are selectedfrom one of the following group: (1) automatically considering that theindividual is not present at the specific spot assigned to the beaconcluster; (2) assigning a default or static value for each beacon in thebeacon cluster who did not meet the minimum signal strength threshold;or (3) discarding each beacon in the beacon cluster who did not meet theminimum signal strength threshold from any calculation performed by theelectronic location identification and tracking system for the presencedetermination at the specific spot assigned to the beacon cluster. 17.The method for registering a location of claim 13 wherein theconfiguration information for each beacon in the beacon clustercomprises a universally unique identifier (“UUID”), a major valueidentifier and a minor value identifier.
 18. The method for registeringa location of claim 17 wherein the UUID and major value identifier foreach beacon in the beacon cluster are the same and each beacon in thebeacon cluster has a unique minor value identifier in order todistinguish one beacon in the beacon cluster from the remaining beaconsin the beacon cluster.
 19. The method for registering a location ofclaim 13 wherein the step of electronically entering configurationinformation comprises the steps of entering a UUID, a major valueidentifier and a minor value identifier for each beacon in the beaconcluster through the electronic location identification and trackingsystem and storing the entered UUID, major value identifier and minorvalue identifiers in the electronic database.
 20. The method forregistering a location of claim 19 wherein the step of assigning a UUIDand major value identifier for each beacon in the beacon clustercomprises the step of assigning the same UUID and major value identifierfor each beacon in the beacon cluster and the step of assigning a uniqueminor value identifier to each beacon in the beacon cluster; wherein theunique minor value identifier is used to distinguish one beacon in thebeacon cluster from the remaining beacons in the beacon cluster by theelectronic location identification and tracking system.