Method and system for an emergency location information service (E-LIS)

ABSTRACT

A method and system for determining and verifying a location of mobile and non-mobile devices in emergency situations. The method and system provide a current physical geographic location for a mobile or non-mobile device (e.g., building address, a building floor, a room on a building floor, campus, enterprise, city, state, region, country, continent, etc.) with and without translation of location coordinates, in an emergency situation such as an accident, fire, terrorist attack, military incident, kidnapping, etc.

CROSS REFERENCES TO RELATED APPLICATIONS

This is a Continuation-In-Part (CIP) of U.S. utility patent applicationSer. No. 11/803,671, filed May 15, 2007, which is an application claimspriority to U.S. Provisional patent applications 60/800,774, 60/800,775,60/800,776, and 60/800,777, all filed May 16, 2006, U.S. utility patentapplication Ser. No. 11/803,671, issued as U.S. Pat. No. 7,937,067, onMay 3, 2011, the contents of all of these cited applications and issuedpatent are incorporated herein by reference.

FIELD OF INVENTION

This application relates to automatic processing of locationinformation. More specifically, it relates to a method and system for anemergency location information service.

BACKGROUND OF THE INVENTION

In many emergency situations it is of great importance to be able toquickly and accurately locate individuals within a large building. Forexample, in the event of a fire, public safety personnel may need tooperate within an unfamiliar building on short notice, in conditions ofpoor visibility due to smoke or flame. Accurate location information isvital to coordinate rescue operations and ensure the safety offirefighters. Police or military personnel may be faced with similarcircumstances, in which accurate and timely location information canhelp avoid friendly-fire incidents and coordinate action against acriminal or enemy force.

Individuals faced with an emergency involving immediate danger to lifeor health of themselves or a colleague need to be able to accuratelyprovide their location to emergency/rescue personnel, preferably withouthuman intervention to enable rescue in the case where the individual inneed is incapacitated, or all attention must be devoted to his/herprotection. In all these circumstances, rapid and automated acquisitionof the location of an individual to within a few meters within a largebuilding can be critical in saving lives.

Prior art methods of accomplishing such location do not simultaneouslymeet the requirements of rapid location determination, automation, andaccuracy. Navigation employing conventional maps and visual observationor dead reckoning are not readily automated and thus require time andattention by a human observer. Manual navigation may be vitiated in thecase where visibility is impacted by flame or smoke, or where personnelare under hostile fire and unable to establish their location by patientobservation.

Enhanced 911, (E911) is a location technology that enables mobile, orcellular phones and other mobile device such personal digital/dataassistants (PDAs) to process 911 emergency calls and enable emergencyservices to locate a physical geographic position of the device and thusthe caller. When a person makes a 911 call using a traditional phonewith wires, the call is routed to the nearest public safety answeringpoint (PSAP) that then distributes the emergency call to the properemergency services. The PSAP receives the caller's phone number and theexact location of the phone from which the call was made. Prior to 1996,911 callers using a mobile phone would have to access their serviceproviders in order to get verification of subscription service beforethe call was routed to a PSAP. In 1996 the Federal CommunicationsCommission (FCC) ruled that a 911 call must go directly to the PSAPwithout receiving verification of service from a specific cellularservice provider. The call must be handled by any available servicecarrier even if it is not the cellular phone customer's specificcarrier.

The FCC has rolled out E911 in two phases. In 1998, Phase I requiredthat mobile phone carriers identify the originating call's phone numberand the location of the signal tower, or cell, accurate to within amile. In 2001, Phase II required that each mobile phone company doingbusiness in the United States must offer either handset- ornetwork-based location detection capability so that the caller'slocation is determined by the geographic location of the cellular phonewithin 100 meter accuracy and not the location of the tower that istransmitting its signal. The FCC refers to this as Automatic LocationIdentification (ALI).

There are many problems associated with determining a location of deviceand a caller who needs to place an E911 call in an emergency. On problemis that many E911 calls a misrouted to the wrong PSAP. This can delaythe dispatch of emergencies services to the caller. Another problem isthat existing mobile technology makes its difficult to accurately locatemobile devices.

Another problem is that triangulation based on time of arrival atmultiple mobile-communications base stations (TDOA) has inadequatecoverage and is insufficiently accurate unless supplemented by signalsprovided by local radios placed outside the facility by public safetypersonnel.

Another problem is that conventional radio-frequency-based locationmethods do a poor job of providing topological location within abuilding: that is, location relative to walls, doors, partitions,stairways, and other features whose spatial extent is small but whosesignificance to a person's ability to move is great.

Another problem is that many mobile devices are not “location-aware.”Location-aware devices are aware of their current geographic location.Mobile telephones and Global Positioning System (“GPS”) devices may beaware of their current geographic location. GPS devices typicallydetermine their current geographic location by communicating withsatellites. However, mobile telephones may only determine their currentgeographic location by communicating with a particular mobile phoneinterface or telephony switch that provides coverage to a geographiclocation such as a telephony “cell” but not an exact current geographiclocation within the cell.

Thus, there exists a critical need for a method of locating individualsmaking an E911 call that is rapid, automated, accurate, simple andinexpensive to employ, and does not require manual intervention from theperson to be located.

SUMMARY OF THE INVENTION

In accordance with preferred embodiments of the invention, some of theproblems associated with locating E911 and other callers are overcome.

A method and system for determining and verifying a location of mobileand non-mobile devices in emergency situations is presented. The methodand system provide a current physical geographic location for a mobileor non-mobile device (e.g., building address, a building floor, a roomon a building floor, campus, enterprise, city, state, region, country,continent, etc.) with and without translation of location coordinates,in an emergency situation such as an accident, fire, terrorist attack,military incident, etc.

The foregoing and other features and advantages of preferred embodimentsof the present invention will be more readily apparent from thefollowing detailed description. The detailed description proceeds withreferences to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the present invention are described withreference to the following drawings, wherein:

FIG. 1 is a block diagram illustrating an exemplary electronicinformation processing system;

FIG. 2 is a flow diagram illustrating a method for locating a device;

FIG. 3 is a flow diagram illustrating a method for locating a device inan emergency; and

FIG. 4 is a flow diagram illustrating a method for locating a device;

FIG. 5 is a flow diagram illustrating a method for locating a deviceusing existing wireless networks;

FIG. 6 is a flow diagram illustrating a method for locating a device inan emergency; and

FIG. 7 is a flow diagram illustrating a method for locating a device inan emergency;

FIG. 8 is a flow diagram illustrating a method for locating a deviceusing existing wireless networks;

FIG. 9 is a flow diagram illustrating a method for locating a device inan emergency;

FIG. 10 is a flow diagram illustrating a method for an emergencylocation information service (E-LIS);

FIG. 11 is a flow diagram illustrating a method for an emergencylocation information system (E-LIS);

FIG. 12 is a flow diagram illustrating a method for an emergencylocation information system (E-LIS);

FIG. 13 is a flow diagram illustrating a method for an emergencylocation information system (E-LIS); and

FIG. 14 is a block diagram illustrating a location of a first mobilenetwork device determined with an emergency location information system(E-LIS).

DETAILED DESCRIPTION OF THE INVENTION

Examplery Electronic Information Message Processing System

FIG. 1 is a block diagram illustrating an exemplary communicationssystem 10. The exemplary communications system 10 includes, but is notlimited to, one or more target network devices 12, 14, 16 (only three ofwhich are illustrated) each with one or more processors. The targetnetwork devices 12, 14, 16 include, but are not limited to, mobilephones, non-mobile phones, smart phones, tablet computers, portablegaming platforms (GAMEBOY and DSI by Nintendo, PSP by Sony, etc.),non-portable gaming platforms (e.g., XBOX by Microsoft, Wii by Nintendo,PLAY STATION, by Sony, etc.) non-mobile computers, wireless devices,wired devices, game devices, laptop computers, personal informationdevices, personal digital/data assistants (PDA), hand-held devices,network appliances, Internet appliances, cable television set-top boxes,Internet television set-top boxes, satellite television boxes, two-waypagers, etc. However, the present invention is not limited to thesetarget electronic devices and more, fewer or others types of targetelectronic devices can also be used. The target network devices 12, 14,16 function as client devices in some instances and server devices inother instances. The target network devices 12, 14, 16 may be wirelessor wired as illustrated by non-mobile phone 15.

In one embodiment the target network devices 12, 14, 16 are “smart”devices. A smart device is aware of its location in (X,Y,Z) space or(X,Y,Z) geo-space. In another embodiment, the target network device 12,14, 16 are “dumb” device. A dumb device is not aware of its location ingeo-space. A dumb device is typically in contact with proxy serverdevice that is aware of the dumb device's location in geo-space.

In one specific exemplary embodiment, the one or more target networkdevices 12, 14, 16 also include smart phones such as the iPhone byApple, Inc., Blackberry Storm and other Blackberry models by Research InMotion, Inc. (RIM), Droid by Motorola, Inc. HTC, Inc. other types ofsmart phones, other types of mobile and non-mobile phones, etc. However,the present invention is not limited to such devices, and more, fewer orother types of smart phones can be used to practice the invention.

A “smart phone” is a mobile phone that offers more advanced computingability and connectivity than a contemporary basic feature phone. Smartphones and feature phones may be thought of as handheld computersintegrated with a mobile telephone, but while most feature phones areable to run applications based on platforms such as Java ME, a smartphone usually allows the user to install and run more advancedapplications. Smart phones and/or tablet computers run completeoperating system software providing a platform for applicationdevelopers assessable trough a specialized Application ProgrammingInterface (API).

The operating systems include the iPhone OS, Android, Windows, etc.iPhone OS is a proprietary operating system for the Apple iPhone.Android is an open source operating system platform backed by Google,along with major hardware and software developers (such as Intel, HTC,ARM, Motorola and Samsung, etc.), that form the Open Handset Alliance.

The one or more target network devices 12, 14, 16 also include tabletcomputers 16 such as the iPad, by Apple, Inc., the HP Tablet, by HewlettPackard, Inc., the Playbook, by RIM, Inc., the Tablet, by Sony, Inc.

In one embodiment, the one or more target network devices 12, 14, 16include an internal accelerometer. An “accelerometer” is a device thatmeasures an acceleration of the device and a change of velocity of thetarget network devices. Many smart phones, digital audio players andpersonal digital assistants contain accelerometers for user interfacecontrol; often the accelerometer is used to present landscape orportrait views of the device's screen, based on the way the device isbeing held. The accelerometer can be used to detect crash-strengthG-forces and automatically translate and provide location 3D (X,Y,Z)geo-space into a current physical location for emergency responsepersonal.

In one embodiment, the one or more target network devices 12, 14, 16include an internal hardware temperature sensor that indicates when thedevice has exceeded a certain pre-determined temperature. This internaltemperature sensor is used with a corresponding to detect emergencyevents such as fires, weather events, etc. that include a dramaticchange in temperature. In one embodiment, the temperature sensor includeand Infrared temperature sensor. However, the present invention is notlimited to such embodiments and other types of internal and externaltemperature sensors can also be used to practice the invention.

In another embodiment, the one or more target network devices 12, 14, 16include an external device that is plugged into a target network device12, 14, 16 that include an integration of a variety of motion, magnetic,pressure and temperature sensors with a processing unit and dedicatedsmart device application software to provide location information whenan emergency event is detected via the motion, magnetic, pressure and/ortemperature sensors.

The network devices 12, 14, 16 include an application 26. In oneembodiment, the application 26 is a software application. However, thepresent invention is not limited to this embodiment and the application26 can firmware, hardware or a combination thereof. In one embodiment,the application 26 exists only on the target network devices 12, 14, 16.In another embodiment, application 26′ exists only on server networkdevices. In another embodiment, a portion of the application 26 existson the target network devices 12, 14, 16 and another portion 26′ existsone or more server network devices 20, 22, 24. However, the presentinvention is not limited to these embodiments and other embodiments andother combinations can also be used to practice the invention.

In one embodiment of the invention, the application 26 is a smartapplication for a smart phone. A smart network device applicationincludes interactions with an operating system on a smart phone. Inanother embodiment, the application 26 is a smart application for thetablet computer. The interactions for the application 26 are typicallycompleted through an Application Programming Interface (API).

The mobile network devices 12, 14, 16 are in communications with acommunications network 18. The communications network 18 includes, butis not limited to, the Internet, an intranet, a wired Local Area Network(LAN), a wireless LAN (WiLAN), a Wide Area Network (WAN), a MetropolitanArea Network (MAN), Public Switched Telephone Network (PSTN), meshnetworks and other types of wired and wireless communications networks18 providing voice, video and data communications with wired or wirelesscommunication protocols.

Plural server network devices 20, 22, 24 (only three of which areillustrated) each with one or more processors and include one or moreassociated databases 20′, 22′, 24′. The plural server network devices20, 22, 24 are in communications with the one or more target networkdevices 12, 14, 16 via the communications network 18. The plural servernetwork devices 20, 22, 24, include, but are not limited to, wireless orwired communications servers, wireless access points, proxy servers andother types of server devices.

The communications network 18 may include one or more gateways, routers,bridges, switches. As is known in the art, a gateway connects computernetworks using different network protocols and/or operating at differenttransmission capacities. A router receives transmitted messages andforwards them to their correct destinations over the most efficientavailable route. A bridge is a device that connects networks using thesame communications protocols so that information can be passed from onenetwork device to another. A switch is a device that filters andforwards packets between network segments. Switches typically operate atthe data link layer and sometimes the network layer and thereforesupport virtually any packet protocol.

In one embodiment, the target network devices 12, 14, 16 and the servernetwork devices 20, 22, 24 include a location application 26 with pluralsoftware modules. The multiple software modules may be implemented infirmware, hardware or any combination thereof. In one embodiment, thetarget network devices 12, 14, 16 may include a plug-in 28 for a browserwith plural software modules. In another embodiment, the plural targetnetwork devices 12, 14, 16 and plural server devices 20, 22, 24 do notinclude a location application or browser plug-in.

The communications network 18 may also include one or more servers oraccess points (AP) including wired and wireless access points (WiAP)(e.g., 20).

The communications network 18 includes data networks using theTransmission Control Protocol (TCP), User Datagram Protocol (UDP),Internet Protocol (IP) and other data protocols.

The communications network 18 may also include wired interfacesconnecting portions of a PSTN or cable television network that connectthe target network devices 12, 14, 16 via the Public Switched TelephoneNetwork (PSTN) or a cable television network (CATV) including highdefinition television (HDTV) that connect the target network devices 12,14, 16 via one or more twisted pairs of copper wires, digital subscriberlines (e.g. DSL, ADSL, VDSL, etc.) coaxial cable, fiber optic cable,other connection media or other connection interfaces. The PSTN is anypublic switched telephone network provided by AT&T, GTE, Sprint, MCI,SBC, Verizon and others.

The communications network 18 may also include digital and analogcellular services, Commercial Mobile Radio Services (CMRS), including,mobile radio, paging and other wireless services. The communicationsnetwork 18 includes a cellular telephone network, PersonalCommunications Services network (“PCS”), Packet Cellular Network(“PCN”), Global System for Mobile Communications, (“GSM”), GenericPacket Radio Services (“GPRS”), Cellular Digital Packet Data (“CDPD”).The communications network 18 includes a Wireless Application Protocol(“WAP”) or Digital Audio Broadcasting (“DAB”), 802.xx.xx, GlobalPositioning System (“GPS”) and GPS map, Digital GPS (“DGPS”) or othertype of wireless network.

The wireless network includes, but is not limited to Code DivisionMultiple Access (“CDMA”), Time Division Multiple Access (“TDMA”), orother switched wireless technologies.

As is known in the art, PCS networks include network that cover a rangeof wireless, digital communications technologies and services, includingcordless phones, mobile phones, voice mail, paging, faxing, mobilepersonal PDAs, etc. PCS devices are typically divided into narrowbandand broadband categories.

Narrowband devices which operate in the 900 MHz band of frequencies,typically provide paging, data messaging, faxing, and one- and two-wayelectronic messaging capabilities. Broadband devices, which operate inthe 1850 MHz to 1990 MHz range typically provide two-way voice, data,and video communications. Other wireless technologies such as GSM, CDMAand TDMA are typically included in the PCS category.

As is known in the art, GSM is another type of digital wirelesstechnology widely used throughout Europe, in Australia, India, Africa,Asia, and the Middle East. GSM use is growing in the U.S. GSM is awireless platform based on TDMA to digitize data. GSM includes not onlytelephony and Short Message Services (“SMS”) but also voice mail, callforwarding, fax, caller ID, Internet access, and e-mail. As is known inthe art, SMS is type of communications service that enables a user toallow private message communications with another user. GSM typicallyoperates at three frequency ranges: 900 MHz (GSM 900) in Europe, Asiaand most of the rest of the world; 1800 MHz (GSM 1800 or DCS 1800 orDCS) in a few European countries; and 1900 MHz (GSM 1900 also called PCS1900 or PCS) in the United States. GSM also operates in a dual-band modeincluding 900/1800 Mhz and a tri-band mode include 900/1800/1900 Mhz.

As is known in the art, GPRS is a standard for wireless communications,which runs at speeds up to 150 kilo-bits-per-second (“kbit/s”). GPRS,which supports a wide range of bandwidths is an efficient use of limitedbandwidth and is particularly suited for sending and receiving smallbursts of data such as e-mail and Web browsing, as well as large volumesof data.

As is known in the art, CDPD is a wireless standard providing two-way,19.2-Kbps or higher packet data transmission over existing cellulartelephone channels. As is known in the art, a Packet Cellular Network(“PCN”) includes various types of packetized cellular data.

The communications network 18 may also include a “mesh network” or a“mesh sensor network.” A mesh network is a self-organizing networksbuilt from plural nodes that may spontaneously create an impromptunetwork, assemble the network themselves, dynamically adapt to devicefailure and degradation, manage movement of nodes, and react to changesin task and network requirements. The plural nodes are reconfigurablesmart sensor nodes that are self-aware, self-reconfigurable andautonomous.

A mesh network is a network that employs one of two connectionarrangements, full mesh topology or partial mesh topology. In the fullmesh topology, each node is connected directly to each of the others. Inthe partial mesh topology, nodes are connected to only some, not all, ofthe other nodes. A mesh network is a network where the nodes are inclose proximity (e.g., about few feet to about 100 feet, or about 1meter to about 30 meters, etc.).

Preferred embodiments of the present invention include network devicesand interfaces that are compliant with all or part of standards proposedby the Institute of Electrical and Electronic Engineers (IEEE),International Telecommunications Union-Telecommunication StandardizationSector (ITU), European Telecommunications Standards Institute (ETSI),Internet Engineering Task Force (IETF), U.S. National Institute ofSecurity Technology (NIST), American National Standard Institute (ANSI),Wireless Application Protocol (WAP) Forum, Data Over Cable ServiceInterface Specification (DOCSIS) Forum, Bluetooth Forum, the ADSL Forum,the Federal Communications Commission (FCC), the 3rd GenerationPartnership Project (3GPP), and 3GPP Project 2, (3GPP2) and Open MobileAlliance (OMA). However, network devices based on other standards couldalso be used.

IEEE standards can be found on the World Wide Web at the UniversalResource Locator (URL) “www.ieee.org.” The ITU, (formerly known as theCCITT) standards can be found at the URL “www.itu.ch.” ETSI standardscan be found at the URL “www.etsi.org.” IETF standards can be found atthe URL “www.ietf.org.” The NIST standards can be found at the URL“www.nist.gov.” The ANSI standards can be found at the URL“www.ansi.org.” The DOCSIS standard can be found at the URL“www.cablemodem.com.” Bluetooth Forum documents can be found at the URL“www.bluetooth.com.” WAP Forum documents can be found at the URL“www.wapforum.org.” ADSL Forum documents can be found at the URL“www.adsl.com.” FCC E911 can be found at the URL“www.fcc.gov/911/enhanced.” 3GPP and 3GPP documents can be found at theURL “www.3gpp.org.” The OMA documents can be found at the URL“www.openmobilealliance.org.”

An operating environment for network devices and interfaces of thepresent invention include a processing system with one or more highspeed Central Processing Unit(s) (“CPU”) or other types of processorsand a memory. In accordance with the practices of persons skilled in theart of computer programming, the present invention is described belowwith reference to acts and symbolic representations of operations orinstructions that are performed by the processing system, unlessindicated otherwise. Such acts and operations or instructions arereferred to as being “computer-executed,” “CPU executed” or “processorexecuted.”

It will be appreciated that acts and symbolically represented operationsor instructions include the manipulation of electrical signals by theCPU. An electrical system represents data bits which cause a resultingtransformation or reduction of the electrical signals, and themaintenance of data bits at memory locations in a memory system tothereby reconfigure or otherwise alter the CPU's operation, as well asother processing of signals. The memory locations where data bits aremaintained are physical locations that have particular electrical,magnetic, optical, or organic properties corresponding to the data bits.

The data bits may also be maintained on a computer readable mediumincluding magnetic disks, optical disks, organic memory, and any othervolatile (e.g., Random Access Memory (“RAM”)) or non-volatile (e.g.,Read-Only Memory (“ROM”)) mass storage system readable by the CPU. Thecomputer readable medium includes cooperating or interconnected computerreadable medium, which exist exclusively on the processing system or bedistributed among multiple interconnected processing systems that may belocal or remote to the processing system.

As is known in the art, the Open Systems Interconnection (“OSI”)reference model is a layered architecture that standardizes levels ofservice and types of interaction for network devices exchanginginformation through a communications network. The OSI reference modelseparates network device-to-network device communications into sevenprotocol layers, or levels, each building- and relying-upon thestandards contained in the levels below it. The OSI reference modelincludes from lowest-to-highest, a physical, data-link, network,transport, session, presentation and application layer. The lowest ofthe seven layers deals solely with hardware links; the highest dealswith software interactions at the application-program level.

As is known in the art, the Internet Protocol reference model is alayered architecture that standardizes levels of service for theInternet Protocol suite of protocols. The Internet Protocol referencemodel comprises in general from lowest-to-highest, a link, network,transport and application layer.

In one embodiment of the present invention, the wireless interfaces usedfor the plural target network devices 12, 14, 16 include but are notlimited to, an IEEE 802.11a, 802.11b, 802.11g, 802.11n, “WirelessFidelity” (“Wi-Fi”), “Worldwide Interoperability for Microwave Access”(“WiMAX”), ETSI High Performance Radio Metropolitan Area Network(HIPERMAN), “RF Home” Zigbee, Bluetooth, Infrared, Industrial,Scientific and Medical (ISM), a Radio Frequency Identifier (RFID) orother long range or short range wireless interfaces may be used topractice the invention.

As is known in the art, 802.11b defines a short-range wireless networkinterface. The IEEE 802.11b standard defines wireless interfaces thatprovide up to 11 Mbps wireless data transmission to and from wirelessdevices over short ranges. 802.11a is an extension of the 802.11b andcan deliver speeds up to 54 Mbps. 802.11g deliver speeds on par with802.11a. However, other 802.11xx interfaces can also be used and thepresent invention is not limited to the 802.11 protocols defined. TheIEEE 802.11a, 802.11b and 802.11g standards are incorporated herein byreference.

As is known in the art, Wi-Fi is another type of 802.11xx interface,whether 802.11b, 802.11a, dual-band, etc. Wi-Fi devices include an RFinterfaces such as 2.4 GHz for 802.11b or 802.11g and 5 GHz for 802.11a.More information on Wi-Fi can be found at the URL “www.weca.net.”

As is known in the art, WiMAX is an industry trade organization formedby communications component and equipment companies to promote andcertify compatibility and interoperability of broadband wireless accessequipment that conforms to the IEEE 802.16xx and ETSI HIPERMAN. HIPERMANis the European standard for MANs.

The IEEE The 802.16a, 802.16c, 802.16d 802.16e and 802.16g standards arewireless MAN technology standard that provides a wireless alternative tocable, DSL and T1/E1 for last mile broadband access. It is also used ascomplimentary technology to connect IEEE 802.11xx hot spots to theInternet.

The IEEE 802.16a standard for 2-11 GHz is a wireless MAN technology thatprovides broadband wireless connectivity to fixed, portable and nomadicdevices. It provides up to 50-kilometers of service area range, allowsusers to get broadband connectivity without needing direct line of sightwith the base station, and provides total data rates of up to 280 Mbpsper base station, which is enough bandwidth to simultaneously supporthundreds of businesses with T1/E1-type connectivity and thousands ofhomes with DSL-type connectivity with a single base station. The IEEE802.16g provides up to 100 Mbps.

The IEEE 802.16e standard is an extension to the approved IEEE802.16/16a/16g standard. The purpose of 802.16e is to add limitedmobility to the current standard which is designed for fixed operation.

The ESTI HIPERMAN standard is an interoperable broadband fixed wirelessaccess standard for systems operating at radio frequencies between 2 GHzand 11 GHz.

The IEEE 802.16a, 802.16d, 802.16e and 802.16g standards areincorporated herein by reference. More information on WiMAX can be foundat the URL “www.wimaxforum.org.” WiMAX can be used to provide a wirelesslocal loop (WLP).

The ETSI HIPERMAN standards TR 101 031, TR 101 475, TR 101 493-1 throughTR 101 493-3, TR 101 761-1 through TR 101 761-4, TR 101 762, TR 101763-1 through TR 101 763-3 and TR 101 957 are incorporated herein byreference. More information on ETSI standards can be found at the URL“www.etsi.org.”

As is known in the art, IEEE 802.15.4 (Zigbee) is low data rate networkstandard used for mesh network devices such as sensors, interactivetoys, smart badges, remote controls, and home automation. The 802.15.4standard provides data rates of 250 kbps, 40 kbps, and 20 kbps., twoaddressing modes; 16-bit short and 64-bit IEEE addressing, support forcritical latency devices, such as joysticks, Carrier Sense MultipleAccess/Collision Avoidance, (CSMA-CA) channel access, automatic networkestablishment by a coordinator, fully handshaked protocol for transferreliability, power management to ensure low power consumption formulti-month to multi-year battery usage and up to16 channels in the 2.4GHz ISM band (Worldwide), 10 channels in the 915 MHz (US) and onechannel in the 868 MHz band (Europe). The IEEE 802.15.4-2003 standard isincorporated herein by reference. More information on 802.15.4 andZigBee can be found at the URL “www.ieee802.org” and “www.zigbee.org”respectively.

As is known in the art, Bluetooth (IEEE 802.15.1 a) is a short-rangeradio frequency technology aimed at simplifying communications amongnetwork devices and between network devices. Bluetooth wirelesstechnology supports both short-range point-to-point andpoint-to-multipoint connections. The Bluetooth Specification, GL 11r02,March 2005, prepared by the Bluetooth SIG, Inc. and the IEEE 802.15.1 astandard are incorporated herein by reference.

As is known in the art, Infra data association (IrDA) is a short-rangeradio wireless Bluetooth or wireless infrared communications. As isknown in the art, Industrial, Scientific and Medical (ISM) areshort-range radio wireless communications interfaces operating at 400MHz, 800 MHz, and 900 Mhz. ISM sensors may be used to provide wirelessinformation to practice the invention.

As is known in the art, an RFID is an automatic identification method,relying on storing and remotely retrieving data using devices calledRFID tags or transponders. An RFID tag is a small object that can beattached to or incorporated into a product, animal, or person. RFID tagscontain antennas to enable them to receive and respond toradio-frequency queries from an RFID transceiver. Passive tags requireno internal power source, whereas active tags require a power source.RFID sensors and/or RFID tags are used to provide wireless informationto practice the invention.

Passive tags are powered by received radiation from a reading device andrequire no internal source of power; thus, they can be manufactured atvery low cost and require no ongoing maintenance as long as they are notremoved or physically damaged. Passive tags can only be read by a readerdevice in close proximity to the tag, which is an advantage inRFID-based in-building location services.

RFID Passive tags can be manufactured in a sticker-like form factor andheld in place by adhesive, providing very low installation cost;however, such an arrangement is not heat-resistant, and conventionalmechanical mounting employing screws or cover plates is advisable for atleast a minimal subset of all installed tags.

RFID Passive tags are typically capable of providing a 96-bit number toa tag reader: 96 bits allow 2⁹⁶=10²⁹ (100 billion billion billion)possible codes, ample to allow unique identification of everysignificant location within a building.

RFID Active tags may also be employed for location awareness. Activetags have longer range and can include more sophisticated functionality.In the context of this invention, active tags may be programmed tovalidate their location from time to time, either by reference to GlobalPositioning System (GPS) signals using very long integration times, orby interrogation of other RFID tags in their vicinity.

A RFID tag which finds itself in an incorrect or unverified location isprogrammed to turn itself off, thus avoiding spurious location databeing provided to a user; responses to incorrect location may alsoinclude emitting a distress signal which can be detected by a readerduring building maintenance, or contacting a central location by directwireless communications or mesh networking employing the multiplicity ofcompanion ID tags, in order to induce maintenance personnel to diagnoseand repair the problem with the subject tag.

RFID Active tags are also deployed in a mesh network that would allowinformation to pass from tag to tag. This type of network would allowtag and reader information to be passed from location to location andpossibly from floor to floor to move the information to a centrallocation or to the building wall ultimately making it easier to access.Active tag networks have significant functional advantages, but arerelatively expensive and maintenance-intensive compared to passive tags.

In one embodiment, the physical location information includes GlobalPositioning System (GPS) information, street address information,two-dimensional (2D) geo-space (e.g., X,Y) (e.g., building, floor),three-dimensional (3D) (X, Y, Z) (e.g., building, floor, floor location(e.g., room, office, desk, etc.)) or other physical location information(e.g., longitude, latitude, street address, etc.).

The Global Positioning System (GPS) is a space-based global navigationsatellite system (GNSS) that provides reliable location and timeinformation in all weather and at all times and anywhere on or near theEarth. A GPS receiver calculates its position by precisely timingsignals sent by GPS satellites. A GPS receiver uses the messages itreceives to determine a transit time of each message and computes adistance to each GPS satellite 168. These distances along with thesatellites' locations are used with the possible aid of triangulation,depending on which algorithm is used, to compute a current physicalposition of the GPS receiver. This position is then displayed, perhapswith a moving map display (e.g., at a street level, etc.) and/orlatitude and longitude and/or elevation and/or speed and/or accelerationinformation may also be included. Many GPS units also show derivedinformation such as travel direction and speed, calculated from positionchanges. The GPS coordinates include standard GPS, GPS map, Digital GPS(DGPS) and/or other types of GPS information.

The target network devices 12, 14, 16 include a protocol stack withmultiple layers based on the Internet Protocol or OSI reference model.The protocol stack is used for, but not limited to, data networking. Theprotocol stack includes, but is not limited to, TCP, UDP, IP, HypertextTransfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), PostOffice Protocol version 3 (POP3), Internet Mail Access Protocol (IMAP),Voice-Over-IP (VoIP), Session Initiation Protocol (SIP), ServiceLocation Protocol (SLP), Session Description Protocol (SDP), Real-timeProtocol (RTP), H.323, H.324, Domain Name System (DNS), AuthenticationAuthorization and Accounting (AAA), instant-messaging (IM) and otherprotocols.

TCP provides a connection-oriented, end-to-end reliable protocoldesigned to fit into a layered hierarchy of protocols that supportmulti-network applications. For more information on TCP 58 see RFC-793,incorporated herein by reference.

UDP provides a connectionless mode of communications with datagrams inan interconnected set of networks. For more information on UDP see ITEFRFC-768, incorporated herein by reference.

IP is an addressing protocol designed to route traffic within a networkor between networks. For more information on IP 54 see IETF RFC-791,incorporated herein by reference. An IP address includes four sets ofnumbers divided by period (e.g., x.x.x.x) in the range of zero to 255.An IP address is a unique string of numbers that identifies a device onan IP based network.

HTTP is a standard protocol for communications on the World Wide Web.For more information on HTTP, see IETF RFC-2616, incorporated herein byreference.

SMTP is a protocol for sending e-mail messages between devices includinge-mail servers. For more information on SMTP, see IETF RFC-821 andRFC-2821, incorporated herein by reference.

POP3 is a protocol for a protocol used to retrieve e-mail from a mailserver. For more information on POP3, see IETF RFC-1939, incorporatedherein by reference.

IMAP is a protocol for retrieving e-mail messages from a server. Formore information on IMAP, see IETF RFC-1730, incorporated herein byreference.

Media Access Control (MAC) is a data link layer protocol. A MAC addressis a physical address of a device connected to a communications network,expressed as a 48-bit hexadecimal number. A MAC address is permanentlyassigned to each unit of most types of networking hardware, such asnetwork interface cards (NICs) (e.g., Ethernet cards, etc.) bymanufacturers at the factory.

VoIP is a set of facilities for managing the delivery of voiceinformation using IP 28 packets. In general, VoIP is used to send voiceinformation in digital form in discrete data packets (i.e., IP 28packets) over data networks 18 rather than using traditionalcircuit-switched protocols used on the PSTN. VoIP is used on bothwireless and wired data networks.

VoIP typically comprises several applications (e.g., SIP, SLP, SDP,H.323, H.324, DNS, AAA, etc.) that convert a voice signal into a streamof packets (e.g., IP 28 packets) on a packet network and back again.VoIP allows voice signals to travel over a stream of data packets over acommunications network 18.

As is known in the art, SIP supports user mobility by proxying andre-directing requests to a mobile node's current location. Mobile nodescan register their current location. SIP is not tied to any particularconference control protocol. SIP is designed to be independent of alower-layer transport protocol and can be extended. For more informationon SIP, see IETF RFC-2543 and IETF 3261, the contents of both of whichare incorporated herein by reference.

As is known in the art, SLP provides a scalable framework for thediscovery and selection of network services. Using SLP, network devicesusing the Internet need little or no static configuration of networkservices for network based applications. For more information on SLP seeIETF RFC-2608, incorporated herein by reference.

As is known in the art, SDP is a protocol for describing multimediasessions for the purposes of session announcement, session invitation,and other forms of multimedia session initiation. For more informationon SDP, see IETF RFC-2327, incorporated herein by reference

As is known in the art, RTP is a protocol for end-to-end networktransport functions suitable for applications transmitting real-timedata, such as audio, video or simulation data, over multicast or unicastnetwork services. For more information on RTP, see IETF RFC-1889,incorporated herein by reference.

As is known in the art, H.323 is one of main family of videoconferencing recommendations for IP networks. The ITU-T H.323 standardsentitled “Packet-based multimedia communications systems” dated February1998, September 1999, November 2000 and July 2003 are incorporatedherein by reference.

As is known in the art, H.324 is a video conferencing recommendationusing Plain Old Telephone Service (POTS) lines. The ITU-T H.324standards entitled “Terminal for low bit-rate multimedia communication”dated February 1098 and March 2002 are incorporated herein by reference.

As is known in the art, a Domain Name System (DNS) provides replicateddistributed secure hierarchical databases that hierarchically storeresource records under domain names. For more information on the DNS seeIETF RFC-1034, RFC-1035, RFC-1591, RFC-2606 and RFC-2929, the contentsof all of which are incorporated herein by reference.

As is known in the art, Authentication Authorization and Accounting(AAA) includes a classification scheme and exchange format foraccounting data records (e.g., for call billing, etc.). For moreinformation on AAA applications, see, IETF RFC-2924, the contents ofwhich are incorporated herein by reference.

VoIP services typically need to be able to connect to traditionalcircuit-switched voice networks such as those provided by the PSTN.Thus, VoIP is typically used with the H.323 protocol and othermultimedia protocols. H.323 and H.324 terminals such as multimediacomputers, handheld devices, PDAs or other devices such as non-mobileand mobile phones connect to existing wired and wireless communicationsnetworks 18 as well as private wired and wireless networks.

H.323 and H.324 terminals implement voice transmission functions andtypically include at least one voice codec (e.g., ITU-T CODECS, G.711,G.723, G.726, G.728, G.729, GSM, etc.) that sends and receivespacketized voice data and typically at least one video codec (e.g.,MPEG, etc.) that sends and receives packetized video data).

An Instant Message (IM) is a “short,” real-time or near-real-timemessage that is sent between two or more end user devices such(computers, personal digital/data assistants (PDAs) mobile phones, etc.)running IM client applications. An IM is typically a short textualmessage. Examples of IM messages include America Online's Instant (AIM)messaging service, Microsoft Network (MSN) Messenger, Yahoo Messenger,and Lycos ICQ Instant Messenger, IM services provided by telecomproviders such as T-Mobile, Verizon, Sprint, and others that provide IMservices via the Internet and other wired and wireless communicationsnetworks. In one embodiment of the present invention, the IM protocolsused meet the requirements of Internet Engineering Task Force (IETF)Request For Comments (RFC)-2779, entitled “Instant Messaging/PresenceProtocol Requirements.” However, the present invention is not limited tosuch an embodiment and other IM protocols not compliant with IETF RFC2779 may also be used.

Security and Encryption

Devices and interfaces of the present invention may include security andencryption for secure communications. Wireless Encryption Protocol (WEP)(also called “Wired Equivalent Privacy) is a security protocol forWiLANs defined in the IEEE 802.11b standard. WEP is cryptographicprivacy algorithm, based on the Rivest Cipher 4 (RC4) encryption engine,used to provide confidentiality for 802.11b wireless data.

As is known in the art, RC4 is cipher designed by RSA Data Security,Inc. of Bedford, Mass., which can accept encryption keys of arbitrarylength, and is essentially a pseudo random number generator with anoutput of the generator being XORed with a data stream to produceencrypted data.

One problem with WEP is that it is used at the two lowest layers of theOSI model, the physical layer and the data link layer, therefore, itdoes not offer end-to-end security. One another problem with WEP is thatits encryption keys are static rather than dynamic. To update WEPencryption keys, an individual has to manually update a WEP key. WEPalso typically uses 40-bit static keys for encryption and thus provides“weak encryption,” making a WEP device a target of hackers.

The IEEE 802.11 Working Group is working on a security upgrade for the802.11 standard called “802.11i.” This supplemental draft standard isintended to improve WiLAN security. It describes the encryptedtransmission of data between systems 802.11X WiLANs. It also defines newencryption key protocols including the Temporal Key Integrity Protocol(TKIP). The IEEE 802.11i draft standard, version 4, completed Jun. 6,2003, is incorporated herein by reference.

The 802.11i is based on 802.1x port-based authentication for user anddevice authentication. The 802.11i standard includes two maindevelopments: Wi-Fi Protected Access (WPA) and Robust Security Network(RSN).

WPA uses the same RC4 underlying encryption algorithm as WEP. However,WPA uses TKIP to improve security of keys used with WEP. WPA keys arederived and rotated more often than WEP keys and thus provide additionalsecurity. WPA also adds a message-integrity-check function to preventpacket forgeries.

RSN uses dynamic negotiation of authentication and selectable encryptionalgorithms between wireless access points and wireless devices. Theauthentication schemes proposed in the draft standard include ExtensibleAuthentication Protocol (EAP). One proposed encryption algorithm is anAdvanced Encryption Standard (AES) encryption algorithm.

Dynamic negotiation of authentication and encryption algorithms lets RSNevolve with the state of the art in security, adding algorithms toaddress new threats and continuing to provide the security necessary toprotect information that WiLANs carry.

The NIST developed a new encryption standard, the Advanced EncryptionStandard (AES) to keep government information secure. AES is intended tobe a stronger, more efficient successor to Triple Data EncryptionStandard (3DES). More information on NIST AES can be found at the URL“www.nist.gov/aes.”

As is known in the art, DES is a popular symmetric-key encryption methoddeveloped in 1975 and standardized by ANSI in 1981 as ANSI X.3.92, thecontents of which are incorporated herein by reference. As is known inthe art, 3DES is the encrypt-decrypt-encrypt (EDE) mode of the DEScipher algorithm. 3DES is defined in the ANSI standard, ANSI X9.52-1998,the contents of which are incorporated herein by reference. DES modes ofoperation are used in conjunction with the NIST Federal InformationProcessing Standard (FIPS) for data encryption (FIPS 46-3, October1999), the contents of which are incorporated herein by reference.

The NIST approved a FIPS for the AES, FIPS-197. This standard specified“Rijndael” encryption as a FIPS-approved symmetric encryption algorithmthat may be used by U.S. Government organizations (and others) toprotect sensitive information. The NIST FIPS-197 standard (AES FIPS PUB197, November 2001) is incorporated herein by reference.

The NIST approved a FIPS for U.S. Federal Government requirements forinformation technology products for sensitive but unclassified (SBU)communications. The NIST FIPS Security Requirements for CryptographicModules (FIPS PUB 140-2, May 2001) is incorporated herein by reference.

As is known in the art, RSA is a public key encryption system which canbe used both for encrypting messages and making digital signatures. Theletters RSA stand for the names of the inventors: Rivest, Shamir andAdleman. For more information on RSA, see U.S. Pat. No. 4,405,829, nowexpired, incorporated herein by reference.

As is known in the art, “hashing” is the transformation of a string ofcharacters into a usually shorter fixed-length value or key thatrepresents the original string. Hashing is used to index and retrieveitems in a database because it is faster to find the item using theshorter hashed key than to find it using the original value. It is alsoused in many encryption algorithms.

Secure Hash Algorithm (SHA), is used for computing a secure condensedrepresentation of a data message or a data file. When a message of anylength <2⁶⁴ bits is input, the SHA-1 produces a 160-bit output called a“message digest.” The message digest can then be input to other securitytechniques such as encryption, a Digital Signature Algorithm (DSA) andothers which generates or verifies a security mechanism for the message.SHA-512 outputs a 512-bit message digest. The Secure Hash Standard, FIPSPUB 180-1, Apr. 17, 1995, is incorporated herein by reference.

Message Digest-5 (MD-5) takes as input a message of arbitrary length andproduces as output a 128-bit “message digest” of the input. The MD5algorithm is intended for digital signature applications, where a largefile must be “compressed” in a secure manner before being encrypted witha private (secret) key under a public-key cryptosystem such as RSA. TheIETF RFC-1321, entitled “The MD5 Message-Digest Algorithm” isincorporated here by reference.

As is known in the art, providing a way to check the integrity ofinformation transmitted over or stored in an unreliable medium such as awireless network is a prime necessity in the world of open computing andcommunications. Mechanisms that provide such integrity check based on asecret key are called “message authentication codes” (MAC). Typically,message authentication codes are used between two parties that share asecret key in order to validate information transmitted between theseparties.

Keyed Hashing for Message Authentication Codes (HMAC), is a mechanismfor message authentication using cryptographic hash functions. HMAC isused with any iterative cryptographic hash function, e.g., MD5, SHA-1,SHA-512, etc. in combination with a secret shared key. The cryptographicstrength of HMAC depends on the properties of the underlying hashfunction. The IETF RFC-2101, entitled “HMAC: Keyed-Hashing for MessageAuthentication” is incorporated here by reference.

As is known in the art, an Electronic Code Book (ECB) is a mode ofoperation for a “block cipher,” with the characteristic that eachpossible block of plaintext has a defined corresponding cipher textvalue and vice versa. In other words, the same plaintext value willalways result in the same cipher text value. Electronic Code Book isused when a volume of plaintext is separated into several blocks ofdata, each of which is then encrypted independently of other blocks. TheElectronic Code Book has the ability to support a separate encryptionkey for each block type.

As is known in the art, Diffie and Hellman (DH) describe severaldifferent group methods for two parties to agree upon a shared secret insuch a way that the secret will be unavailable to eavesdroppers. Thissecret is then converted into various types of cryptographic keys. Alarge number of the variants of the DH method exist including ANSIX9.42. The IETF RFC-2631, entitled “Diffie-Hellman Key Agreement Method”is incorporated here by reference.

However, the present invention is not limited to the security orencryption techniques described and other security or encryptiontechniques can also be used.

As is known in the art, the HyperText Transport Protocol (HTTP) Secure(HTTPs), is a standard for encrypted communications on the World WideWeb. HTTPs is actually just HTTP over a Secure Sockets Layer (SSL). Formore information on HTTP, see IETF RFC-2616 incorporated herein byreference.

As is known in the art, the SSL protocol is a protocol layer which maybe placed between a reliable connection-oriented network layer protocol(e.g. TCP/IP) and the application protocol layer (e.g. HTTP). SSLprovides for secure communication between a source and destination byallowing mutual authentication, the use of digital signatures forintegrity, and encryption for privacy.

The SSL protocol is designed to support a range of choices for specificsecurity methods used for cryptography, message digests, and digitalsignatures. The security method are negotiated between the source anddestination at the start of establishing a protocol session. The SSL 2.0protocol specification, by Kipp E. B. Hickman, 1995 is incorporatedherein by reference. More information on SSL is available at the URL See“netscape.com/eng/security/SSL_(—)2.html.”

As is known in the art, Transport Layer Security (TLS) providescommunications privacy over the Internet. The protocol allowsclient/server applications to communicate over a transport layer (e.g.,TCP) in a way that is designed to prevent eavesdropping, tampering, ormessage forgery. For more information on TLS see IETF RFC-2246,incorporated herein by reference.

Device Based Location

FIG. 2 is a flow diagram illustrating a Method 30 for locating a device.At Step 32, plural outbound signals are sent from a first mobile networkdevice to a plural other network devices via a communications network.At Step 34, the first mobile network device receives plural inboundwireless signals from the plural other network devices. The pluralinbound wireless signals include a location for the first mobile networkdevice in a set of pre-determined coordinates. At Step 36, thepre-determined coordinates are translated into a physical geographiclocation for the first mobile network device.

Method 30 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 32, plural outbound signals aresent from a first mobile network device 12, 14, 16 to a plural othernetwork devices 20, 22, 24 via a communications network 18. In oneembodiment, the plural outbound signals are plural outbound wirelesssignals. In one embodiment the plural outbound signals include SIPmessages with geo-location headers and/or message bodies which mayinclude SDP messages.

At Step 34, the first mobile network device 12, 14, 16 receives pluralinbound wireless signals from the plurality of other network devices 20,22, 24. In one embodiment the plural inbound wireless signals includeSIP or SDP protocol messages with a geo-location information.

The plural inbound wireless signals include a location for the firstmobile network device 12, 14, 16 in a set of pre-determined coordinates.In one embodiment, the set of pre-determined coordinates are (X,Y,Z)space coordinates, which are also called “geo-coordinates.”

At Step 36, the pre-determined coordinates are translated into aphysical geographic location for the first mobile network deviceincluding, but not limited to, a desk and/or cubicle in a room on abuilding floor, a building floor in a building, a building on a street,enterprise, campus, village, town, city, state, country or continent orother global region, etc. As described herein, the physical geographicaddress is not a physical or data link layer address, but instead alocation-based address.

In one embodiment, the location information is constantly updated inreal-time (e.g., milliseconds, seconds, etc.) In another embodiment, thelocation information is updated in non-real-time time frames (e.g.,hours, days, etc.). If the first mobile network device moves, anotification is sent to the other network devices 20, 22, 24 via thecommunications network.

Thus, the target device 12, 14, 16 always knows it's geo-location. Ifthe target device 12, 14, 16 is a dumb device, a location server 20, 22,24 acts a proxy for the dumb device and the location server, 22, 22, 24always know the geo-location of the dumb device even though the dumbdevice may not know its own location.

In one embodiment, the first mobile network device 12, 14 includesapplication 26 as software on a Universal Serial Bus (USB) device thatis plugged into the device. In one embodiment, the USB device includes awireless radio transceiver chip. In another embodiment, the first mobilenetwork device 12, 14 may already include a wireless radio transceiver.In such an embodiment, the USB device may only include application 26.

In one embodiment, The USB port provides the power to the transceiverchip. The transceiver chip uses low power “heartbeat” communicationswith wireless transceivers that are strategic located throughout anenterprise, building, campus, village, town, city, state, country orcontinent or other global region. Software application 26 in the USBdevice processes the return signals from the other wireless transceiversin such way as to determine the location of the first mobile networkdevice 12, 14 in geo-space.

Emergency Device Based Location

FIG. 3 is a flow diagram illustrating a Method 38 for locating a devicein an emergency. At Step 40, a set of pre-determined coordinatesreceived from plural other network devices are translated into a currentphysical geographic location for a first mobile network device. At Step42, the physical geographical location is added to a message used toinitiate an emergency communication. At Step 44, the emergencycommunication is initiated from the first mobile network device usingthe message including the physical geographic location of the firstmobile network device.

Method 38 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 40, a set of coordinates ingeo-space received from plural other network devices 20, 22, 24 aretranslated into a current physical geographic location for a firstmobile network device, 12, 14 16.

In one embodiment, the current physical geographic location for thefirst mobile network device 12, 14, 16, includes, but not limited to, aroom on a building floor, a building floor in a building, a building ona street, enterprise, campus, village, town, city, state, country orcontinent or other global region, etc.

At Step 42, the current physical geographical location is added to a SIPgeo-location header and/or message body used to initiate an E911emergency communication.

As is known in the art, E911 stands for “Enhanced 911” which is anemergency event that provides a data event (i.e., including locationinformation) along with the voice event (i.e., an emergency voice call).

At Step 44, the E911 emergency communication is initiated from the firstmobile network device 12, 14, 16 using the SIP geo-location headerand/or message body including the physical geographic location of thefirst mobile network device 12, 14, 16.

FIG. 4 is a flow diagram illustrating a Method 46 for locating a device.At Step 48, a first mobile network device periodically sends a set ofpre-determined coordinates received from plural other network devices toa network server via a communications network. At Step 50, the networkserver translates the set of pre-determined coordinates into a currentphysical geographic location for a first mobile network device. At Step52, the network server receives an emergency message from the firstmobile network device indicating an emergency has occurred. At Step 54,the network server returns the current physical geographic location forthe first mobile network device in a message.

Method 46 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 48, a first mobile networkdevice 12, 14, 16 periodically sends a set of coordinates geo-spacereceived from plural other network devices 20, 22 to a network server 24via the communications network 18.

For example, the first mobile network device 12, 14, 16 periodicallyupdates, either on a scheduled basis or on an event basis (e.g.,physical movement of the device) its r geo-coordinates to a centralizedlocation tracing management system 24 using HTTP, IP, cellular, RFID,802.xx.xx, or other wireless or other data transmission protocols.

At Step 50, the network server 24 translates the set of geo-spacecoordinates into a current physical geographic location for a firstmobile network device 12, 14, 16.

The centralized management tracing system 24 translates the geo-spacecoordinates into a current physical geographic location that can beresponded to by emergency responders such a police, fire, military, etc.The centralized management tracing system 24 also provides access tocurrent physical geographic location information via the communicationsnetwork 18 with a web-interface or other interface usable by emergencypersonnel.

At Step 52, the network server 24 receives an emergency message from thefirst mobile network device 12, 14, 16 indicating an emergency event hasoccurred.

In one embodiment, at Step 54, the network server 24 returns the currentphysical geographic location for the first mobile network device 12, 14,16 in a SIP geo-location header and/or message body that can be used toinitiate an E911 emergency call from the first mobile network device 12,14, 16.

In another embodiment, upon an emergency call, the centralizedmanagement tracing system 24 provides the current physical geographiclocation of the first network device 12, 14, 16 back to the first mobilenetwork device in a message other than a SIP geolocation header and/ormessage body (e.g., IP, IM, cellular, 802.xx.xx, RFID, etc.).

In another embodiment, the centralized management tracing system 24 alsoprovides the current physical geographic location of the first mobilenetwork device 12, 14, 16 to emergency personnel using a variety ofmethods including, but not limited to those illustrated in Table 1.

TABLE 1 a. Providing a SIP messages to initiate an E911 communicationsto communications network 18 for the first mobile network device 12, 14,16, that describes the physical location of the first mobile networkdevice 12, 14, 16; or b. Updating tables in call servers and networkedge devices on the communications network 18 used by the E911 system toprocess an E911 communications from a mobile network device to allow thefirst mobile network device 12, 14, 16, to be located when it initiatesan E911 communications.Locating a Device Using Existing Wireless Networks

FIG. 5 is a flow diagram illustrating a Method 56 for locating a deviceusing existing wireless networks. At Step 58, a first mobile networkdevice periodically sends plural outbound wireless signals to pluralother network devices on one or more wireless communications networks.At Step 60, the first mobile network device periodically receives pluralinbound wireless signals from the plural other network devices on theone or more wireless communications networks. At Step 62, the pluralinbound wireless signals are used to determine a pre-determined set ofcoordinates for the first mobile network device.

Method 56 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 58, a first mobile networkdevice 12, 14, 16 periodically sends plural outbound wireless signals toplural other network devices 20, 22, 24 on one or more wirelesscommunications networks 18.

At Step 60, the first mobile network device 12, 14, 16 periodicallyreceives plural inbound wireless signals from the plural other networkdevices 20, 22, 24 on the one or more wireless communications networks18.

At Step 62, the plural inbound wireless signals are used to determine aset of coordinates in geo-space for the first mobile network device 12,14, 16.

In one embodiment, a transceiver chip in the first mobile network device12, 14, 16, is used to poll existing WiFi, WiMax, 802.xx.xx, cellular,RFID, mesh and other wireless networks to determine its geo-space. Theapplication 26 uses a variety of methods to determine location ingeo-space including triangulation, signal strength, orthogonal, etc. Thelocation is constantly updated and the first mobile network device 12,14, 16 always knows its geo-location.

In one embodiment, the plural inbound wireless signals are used forPeer-to-Peer location determination of other network devices on thecommunications network.

FIG. 6 is a flow diagram illustrating a Method 64 for locating a devicein an emergency. At Step 66, a set of pre-determined coordinatesdetermined from plural received inbound wireless signals are translatedinto a current physical geographic location for a first mobile networkdevice. At Step 68, the physical geographical location is added to amessage used to initiate an emergency communication. At Step 70, theemergency communication is initiated from the first mobile networkdevice using the message including the physical geographic location ofthe first mobile network device.

Method 64 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 66 a set of coordinates ingeo-space is determined from plural received inbound wireless signalsare translated into a current physical geographic location for a firstmobile network device 12, 14, 16.

At Step 68, the physical geographical location is added to a SIPgeolocation header and/or message body used to initiate an emergencyE911 communication.

At Step 70, the E911 emergency communication is initiated from the firstmobile network device 12, 14, 16 using the SIP geo-location headerand/or message body including the physical geographic location of thefirst mobile network device 12, 14, 16.

FIG. 7 is a flow diagram illustrating a Method 72 for locating a devicein a emergency. At Step 74, a first mobile network device periodicallysends a set of pre-determined coordinates derived from one or more otherwireless networks to a network server via a communications network. AtStep 76, the network server translates the set of pre-determinedcoordinates into a current physical geographic location for a firstmobile network device. At Step 78, the network server receives anemergency message from the first mobile network device indicating anemergency has occurred. At Step 80, the network server returns thecurrent physical geographic location for the first mobile network devicein a message.

Method 72 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 74, a first mobile networkdevice 12, 14, 16 periodically sends a set of coordinates in geo-spacederived from one or more other wireless communications networks 18.

For example, the first mobile network device 12, 14, 16 periodicallyupdates, either on a scheduled basis or on an event basis (e.g.,physical movement of the device) its geo-coordinates to a centralizedlocation tracing management system 24 using HTTP, IP, SIP, SDP, or otherwireless or other data transmission protocols.

At Step 76, the network server 24 translates the set of geo-spacecoordinates into a current physical geographic location for a firstmobile network device 12, 14, 16.

The centralized management tracing system 24 translates the X,Y and Zcoordinates into a current physical geographic location that can beresponded to by emergency responders such a police, fire, military, etc.The centralized management tracing system 24 also provides access tocurrent physical geographic location information via the communicationsnetwork 18 with a web-interface or other interface usable by emergencypersonnel.

At Step 78, the network server 24 receives an emergency message from thefirst mobile network device 12, 14, 16 indicating an emergency hasoccurred.

In one embodiment, at Step 80, the network server 24 returns the currentphysical geographic location for the first mobile network device 12, 14,16 in a SIP geo-location header and/or message body that can be used toinitiate an E911 emergency call from the first mobile network device 12,14, 16.

In another embodiment, upon an emergency call, the centralizedmanagement tracing system 24 provides the current physical geographiclocation of the first network device 12, 14, 16 back to the first mobilenetwork device in a message other than a SIP message (e.g., IP, etc.).

In another embodiment, the centralized management tracing system 24 alsoprovides the current physical geographic location of the first mobilenetwork device 12, 14, 16 to emergency personnel using a variety ofmethods including, but not limited to those illustrated in Table 2.

TABLE 2 a. Providing a SIP geo-location header and/or message bodies toinitiate an E911 communications to communications network 18 for thefirst mobile network device 12, 14, 16, that describes the physicallocation of the first mobile network device 12, 14, 16; or b. Updatingtables in call servers and network edge devices on the communicationsnetwork 18 used by the E911 system to process an E911 communicationsfrom a mobile network device to allow the first mobile network device12, 14, 16, to be located when it initiates an E911 communications.Emergency Location Information Service (E-LIS)

FIG. 8 is a flow diagram illustrating a Method 82 for locating a deviceusing existing wireless networks. At Step 84, a wireless access pointsends plural outbound signals to plural wireless network devicesconnected to a wireless communications network. At Step 86, the wirelessaccess point receives plural inbound signals from the plural wirelessnetwork devices. At Step 88, the wireless access point determines a setof pre-determined coordinates for the plural wireless network devices.At Step 90, the wireless access point determines a set of physicalgeographic locations using the determined set of pre-determinedcoordinates for the plural wireless network devices. The plural physicallocations are used to locate the plural wireless network devices when anemergency event occurs.

In one embodiment, Method 82 further includes Step 91. At Step 91, thewireless access point sends the set plural physical locations for theplural network networks to a server device to allow a physicalgeographic location to be determined for the plural network devices.However, Method 82 can be practice with or without Step 91.

Method 82 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 84, a wireless access point 24sends plural outbound signals to plural wireless network devices 12, 14,16 connected to a wireless communications network 18.

In one embodiment the plural outbound signals include plural SIPgeo-location header and/or message bodies or other protocol messages.

In one embodiment the wireless access point 24 includes a server device.In another embodiment, the wireless access point 24 does not include aserver device. In such an embodiment the wireless access point 24comprises a proxy for dumb devices.

In one embodiment, the plural wireless network devices 12, 14, 16include unique identifiers. (e.g., IP and MAC address, MAC address, URI,etc.). At Step 86, the wireless access points sends out the pluraloutbound signals to “ping” the plural network devices device and thenmeasures a return signal strength, a return time delay, a returnorthogonal to determine the geo-coordinates of the plural wire networkdevices. In such an embodiment, the plural wireless network devicesperiodically send out an electronic heartbeat with a timestamp to thewireless access point via the communications network 18. However, thepresent invention is not limited to this embodiment and otherembodiments can also be used to practice the invention.

At Step 86, the wireless access point 24 receives plural inbound signalsfrom the plural wireless network devices 12, 14, 16.

In one embodiment, the plural inbound signals and plural outboundsignals include, but are not limited to, SIP, SDP, IP, MAC, CMRS,cellular telephone, PCS, PCN, GSM, GPRS, CDPD, WAP DAB, Wi-Fi, WiMAX,IEEE 802.11xx, GPS, GPS map, DGPS, IM, SMS, RFID or Zigbee signals.However, the present invention is not limited to this embodiment andother inbound and outbound signals can be used to practice theinvention.

However, the present invention is not limited to this embodiment andother inbound and outbound signals can be used to practice theinvention.

In one embodiment at Step 90, the wireless access point 24 determines aset of geo-coordinates and an identifier including an IP address and aMAC address for the plural wireless network devices 12, 14, 16.

In another embodiment, at Step 90, the wireless access point 24determines a set of geo-coordinates using a unique identifierpre-assigned to the plural wireless network devices 12, 14, 16. Thisunique identifier does not include an IP address or a MAC address. Inone embodiment the unique identifier is included in an E-LocationObject.

In one embodiment, the E-Location Object includes an Extensible MarkupLanguage (XML) object extension to a Presence Information Data Format(e.g., PIDF-LO) as defined in RFC-4119, the information used in currentpresence-based systems, like IM (or SMS). For more information see IETFRFC-4119, incorporated by reference.

In another embodiment, the unique identifier includes a Uniform ResourceIdentifier (URI). As is known in the art, a URI is a unique address of anetwork resource that is unique across the whole network it is used on.A URI is the unique identifier used to access the resource on a network.

In one embodiment a URI used herein for a network device 12, 14, 16 isunique across all wired and wireless communication networks the networkdevice is used on.

In another embodiment, the unique identifier includes a specializedE911-based unique identifier. However, the present invention is notlimited to these unique identifier and other identifiers can also beused to practice the invention.

At Step 90, the wireless access point 24 determines a set of physicalgeographic locations for the plural wireless network devices 12, 14, 16.The plural physical geographic locations are used to locate the pluralwireless network devices when an emergency event occurs, such as an E911call. In another embodiment, the plural physical geographic locationsare used to locate the plural wireless network devices 12, 14, 16 duringnon-emergency situations.

In one embodiment, at Step 91, the wireless access point 20 sends a setof geo-coordinates and an identifier including an IP address and a MACaddress for the plural network devices 12, 14, 16 to a server device 24to allow a physical geographic location to be determined for the pluralnetwork devices 12, 14, 16 on the server device 24.

In another embodiment at Step 91, the wireless access point 20 sends theunique identifier for the plural network devices 12, 14, 16 to a serverdevice 24 to allow a physical geographic location to be determined forthe plural network devices 12, 14, 16 on the server device 24.

In such embodiments, both the wireless access point 20 and the serverdevice 24 have physical geographic location of the plural networkdevices 12, 14, 16.

In another embodiment, Method 82 is practiced with wired devices, awired access point and a wired communications network 18. In anotherembodiment, Method 82 is practiced with a combination of wireless andwired devices and wired and wireless communications networks.

In another embodiment, a geo-coordinates in (X, Y and/or Z) space isused in place of the physical geographic location. In such anembodiment, the geo-coordinates may be further translated or used byother devices to determine a device location.

FIG. 9 is a flow diagram illustrating a Method 92 for locating a devicein an emergency. At Step 94, a network server receives an emergencymessage from a first mobile network device via a communications networkindicating an emergency event has occurred. At Step 96, the networkserver information translates information from the emergency messageinto a current physical geographic location for a first mobile networkdevice. The emergency message includes a unique identifier for the firstmobile network device and the unique identifier is used to accessinformation about the first mobile network device. At Step 98, thenetwork server returns the current physical geographic location for thefirst mobile network device in a signal via the communications network.

Method 92 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment at Step 94, a network server 24 receivesan emergency message from a first mobile network device (e.g., 12) viathe communications network 18 indicating an emergency event (e.g., fire,accident, injury, criminal event, etc.) has occurred.

In one embodiment, the emergency message is an E911 communication event.In another embodiment, the emergency message is an non-emergencymessage.

In one embodiment the emergency message includes a SIP geo-locationheader and/or message body with a geo-location header. The geo-locationheader includes a PIDF-LO extension (i.e., RFC-4119) for the device.When a PIDF-LO is present, the header will indicate to SIP proxies alongthe call path where in the message body the PIDF-LO can be found,otherwise the geo-location header will have the SIP URI (i.e., address)of the E-LIS where the device's location is stored.

In another embodiment, the emergency message includes a SIP geo-locationheader and/or message body without a PIDF-LO extension. In anotherembodiment, the emergency message includes an E911 message.

At Step 96, the network server 24 translates information from theemergency message into a current physical geographic location for afirst mobile network device 12.

In one embodiment, the network server 24 translates a set of coordinatesin geo-space in the emergency message or retrieves from database 24′ aset of previously stored coordinates for the first mobile network device12 and the unique identifier includes an IP address and MAC address intoa current physical geographic location for the first mobile networkdevice 12, and writes this information back to the first mobile networkdevice 12 in a management data message or management data stream overthe wireless communications network 18.

In another embodiment, the network server 24 translates the uniqueidentifier for the first mobile network device 12 into a currentphysical geographic location for the first mobile network device 12. Theunique identifier includes a URI for the first mobile network device 12.

In another embodiment, the network server 24 translates a uniqueidentifier for the first mobile network device 12 into a currentphysical geographic location for the first mobile network device 12 andthe unique identifier is used for a look-up of a ten digit emergencylocation identification number (ELIN) number that will be sent out inthe event of a E911 call for the first mobile network device 12.

In another embodiment, the network server 24 translates a set ofcoordinates in geo-space in the emergency message or retrieves fromdatabase 24′ a set of previously stored current physical geographicallocation for the first mobile network device 12 and writes thisinformation back to the first mobile network device 12 in a managementdata stream over the wireless communications network 18.

In another embodiment, the first mobile network device is a firstnon-mobile network device.

In one embodiment, the emergency message is an emergency message sentover a wireless interface. In one embodiment, the wireless interfacesinclude, but are not limited to, CMRS, cellular telephone, PCS, PCN,GSM, GPRS, CDPD, WAP DAB, Wi-Fi, WiMAX, IEEE 802.11xx, GPS, GPS map,DGPS, IM, SMS, RFID or Zigbee wireless interfaces. However, the presentinvention is not limited to this embodiment and other wirelessinterfaces can be used to practice the invention.

In another embodiment, the emergency message is an emergency messagesent over a wired interface. In another embodiment, the emergencymessage is an non-emergency message.

FIG. 10 is a flow diagram illustrating a Method 100 for an emergencylocation information service (E-LIS). At Step 102, a network serverdevice sends plural outbound signals to plural network devices connectedto a communications network. At Step 104, the network server devicereceives plural inbound signals from the plural network devices. At Step106, the network server device determines a type of device for theplural network devices. The type of device is used to determine aphysical geographic location for the plural network devices when anemergency event occurs.

Method 100 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In one embodiment, the plural inbound and outbound signals include, butare not limited to, SIP geo-location header and/or message bodies.

In one embodiment the plural outbound and plural inbound signals aresent securely to and received securely from the communications network18.

In one embodiment, plural inbound and outbound signals comprise wirelesssignals include, but are not limited to, CMRS, cellular telephone, PCS,PCN, GSM, GPRS, CDPD, WAP, DAB, Wi-Fi, WiMAX, IEEE 802.11xx, GPS, GPSmap, DGPS, IM, SMS, RFID or Zigbee wireless signals.

In one embodiment, the plural inbound and outbound signals comprisewired signals include, but are not limited to, CATV, HDTV, DSL, ADSL,VDSL, etc., coaxial or fiber optic signals.

In such an exemplary embodiment, at Step 102 a network server device 24sends plural outbound signals to plural wired or wireless target networkdevices 12, 14, 16 connected to a wired or wireless communicationsnetwork 18.

At Step 104, the network server device 24 receives plural inboundsignals from the plural target network devices 12, 14, 16.

In one embodiment at Step 106, the network server device 24 determines adevice type for the plural wireless or wired target network devices 12,14, 16 to allow a current physical geographic location to be determinedfor the plural wireless or wired target network devices 12, 14, 16 in anemergency event situation.

In one embodiment, at Step 106, the network server device 24 determinesa device type using at least the items illustrated in Table 3.

TABLE 3 a. a location determination of IP and SIP softphone clientdevices external to an enterprise network. b. a location determinationof IP and SIP devices within an enterprise data network. c. a locationdetermination of IP and SIP devices on WiFi, WiMAX other 802.xx.xxnetworks. d. a location determination for IP and SIP devices usinglocation positioning chipsets (GPS, etc.). e. a location determinationfor geo-coordinate devices on wireless networks f. a locationdetermination for geo-coordinate devices on wired networks

In on embodiment, the device type includes a smart network device thatstores its own location information or a dumb target network device thatdoes not store its own location information. If the device type is adumb target network device, then the server network device includes aproxy server device to store location information for the dumb targetnetwork device.

In one embodiment, the emergency event is an E911 communication event.In another embodiment, the emergency message is an non-emergency event.

FIG. 11 is a flow diagram illustrating a Method 108 for a locationinformation system. At Step 110, a network server device determines atype of device for the plural target network devices. At Step 112, thenetwork server device sends the plural device types to plural otherserver network devices to allow a physical geographic location to bedetermined for the plural target network devices when an emergency eventoccurs.

Method 108 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment, at Step 110, the network server device24 determines IP based network devices and SIP based network devices forthe plural wireless or wired target network devices 12, 14, 16 to allowa current physical geographic location to be determined for the pluralwireless or wired target network devices 12, 14, 16 in an emergencysituation. However, the present invention is not limited to IP and SIPbased network devices and the network server device 24 can be used todetermine other types of target network devices.

At Step 112, the network server device 24 sends the plural device typesto plural other server network devices 20, 22 to allow a physicalgeographic location to be determined for the plural target networkdevices 12, 14, 16 when an emergency event occurs. In one embodiment,the emergency event is a E911 communication event.

In another embodiment, the network server device 24 sends the pluraldevice types to plural other server network devices 20, 22 to allow aphysical geographic location to be determined for the plural targetnetwork devices 12, 14, 16 when non-emergency event occurs.

In one embodiment, at Step 112, the network server device 24 sendsphysical geographic location data to ancillary network infrastructuredevices that may store, manage or forward physical location dataincluding, but not limited to those listed in Table 4.

TABLE 4 a. IP Private Branch Exchanges (PBXs) b. SIP servers and SIPcall servers c. Session Border Controllers d. Wireless Access Points(WiAPs) e. Wireless LAN switches f. Wireless network management softwareand systems g. LAN switches h. Routers and Bridges i. Dynamic HostConfiguration Protocol (DHCP) servers j. Other network applications thatconsolidate location data for devices k. Mobile Positing Centers l.Gateway Mobile Location Centers

The server network device 24 also includes an application 26 withsoftware to convert geo-coded location data to physical location orphysical maps.

The server network device 24 also includes an application 26 for readingand writing data to external databases, applications, systems including,but not limited to, those illustrated in Table 5.

TABLE 5 a. Automatic Location Identification (ALI) Databases that arehosted by Regional Bell Operating Companies, ILECs, CLECs b. VoIPPositioning Centers c. Mobile Positioning Centers d. Gateway MobileLocation Centers e. Selective router networks f. Master Street AddressGuide (MSAG) validation systems g. Other databases h. Provisioningdatabases and provisioning applications i. Billing Systems, applicationsand databases j. Corporate database k. Caller ID databases l. E911databases

In one embodiment, the server network device 24 also includes anapplication 26 for notification of events, scheduling of tasks, issuingreports on system logs and system performance and activity and agraphical user interface (GUIs) for softphone and device locationidentification by the end user.

FIG. 12 is a flow diagram illustrating a Method 114 for an emergencylocation information system (E-LIS). At Step 116, a wireless emergencymessage is received on a network server device with one or moreprocessors from an application on a first mobile network device with oneor more processors via a wireless communications network indicating anemergency event has occurred with the first mobile network device. AtStep 118, the network server device determines from the emergencymessage a current physical geographic location for the first mobilenetwork device. The emergency message includes a unique identifier forthe first mobile network device on the wireless communications networkand the unique identifier is used to access and verify locationinformation about the first mobile network device in current threedimensional (3D) (X,Y,Z) geo-space coordinates at the current physicalgeographic location. At Step 120, the network server device returns to adesired emergency response server with one or more processors thecurrent physical geographic location for the first mobile networkdevice.

Method 114 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment, at Step 116, a wireless emergencymessage is received on a network server device 24 with one or moreprocessors from an application 26 on a first mobile network device 12,14, 16 with one or more processors via a wireless communications network18 indicating an emergency event has occurred with the first mobilenetwork device 12, 14, 16.

At Step 118, the network server device 24 determines from the emergencymessage a current physical geographic location for the first mobilenetwork device 12, 14, 16. The emergency message includes a uniqueidentifier (e.g., URI, XML object, etc.) for the first mobile networkdevice on the wireless communications network 18 and the uniqueidentifier is used to access and verify location information about thefirst mobile network device 12, 14, 16 in current three dimensional (3D)(X,Y,Z) geo-space coordinates at the current physical geographiclocation.

At Step 120, the network server device 24 returns to a desired emergencyresponse server with one or more processors the current physicalgeographic location for the first mobile network device 12, 14, 16.

In one embodiment, the first mobile network device 12, 14, 16 includes asmart network device comprising a smart phone or a tablet computer. Inone embodiment, the application 26 includes a smart application for asmart phone or a tablet computer.

In one embodiment, the emergency event includes an accident, event, fireevent, terrorist attack event, military event or crime event.

In one embodiment, the emergency event is detected by an accelerometerand/or a temperature sensor integral and/or internal to the first mobilenetwork device 12, 14, 16. In another embodiment, the emergency event isdetected by an accelerometer and/or a temperature sensor external (e.g.,connected via USB port, not connected directly but receivingcommunications (e.g., RFID sensor, ISM sensor, etc.)) and incommunications with to the first mobile network device 12, 14, 16. Forexample, the accelerometer may detect an impact and/or the temperaturesensor may detect a fire, etc.

However, the present invention is not limited to these emergency eventsand/or sensors and more, fewer and/or other types of emergency eventsand/or sensors can be used to practice the invention.

In one embodiment, the emergency event further includes other types ofemergencies including: locating children or medical patients based on atriggering event causing communications to an intermediate serviceprovider (e.g., hospital, private nurse company, etc.) and/or anintruder in a school; locating inanimate objects based on a triggeringevent causing communications to an intermediate information receiver(e.g., material (e.g., via RFID tag, etc.), truck, trailer tools, etc.);locating sensors based on a triggering event causing communications toan intermediate information receiver (e.g., weather service, privatesecurity office, government security office, etc.) for a kidnapping,robbery, assault, missing person, a criminal subject to court orderingelectronic monitoring (e.g., a registered sex offender not allowed to benear a school, etc.). In such an embodiment, sensors such as RFIDsensors and/or ISM sensors and/or other types of sensors and/or othertypes of target network devices and/or other types server networkdevices may also be used to provide information to the target networkdevices 12, 14, 16 and/or server network devices and/or emergency servernetwork devices.

However, the present invention is not limited to these exemplaryemergency events and more, fewer and/or other types of emergency eventscan be used to practice the invention.

FIG. 13 is a flow diagram illustrating a Method 122 for an emergencylocation information system (E-LIS). At Step 124, a location requestmessage is received on a server network device to determine a currentphysical location for a first mobile network device. At Step 126,retrieve on the first mobile network device via one or more other servernetwork devices on the wireless communications network the currentphysical location of the first mobile network device. At Step 128, thecurrent physical location of the first mobile network device is verifiedby comparing the retrieved current physical location information tostored current physical location information for the first mobilenetwork device. At Step 130, the current physical location informationfor the first mobile network device is sent to the desired emergencyresponse server.

Method 122 is illustrated with one exemplary embodiment. However, thepresent invention is not limited to such an embodiment and otherembodiments can also be used to practice the invention.

In such an exemplary embodiment, at Step 124, a location request messageis received on the server network device 24 to determine a currentphysical location for a first mobile network device 12, 14, 16.

At Step 126, the first mobile network device 12, 14, 16 retrieves viaone or more other server network devices 20, 22, 24 on the wirelesscommunications network 18 the current physical location of the firstmobile network device. 12, 14, 16.

In one embodiment, Step 126 includes determining a current physicallocation of the first mobile network device 12, 14, 16. The currentphysical location is determined by pulling current physical locationcoordinates from the infrastructure of the wireless communicationsnetwork 18 rather than the first mobile network device 12, 14, 16periodically pushing its current physical location into the wirelesscommunication network 18. For example: (1) In a Public Branch Exchange(PBX) environment, the E-LIS performs a data link Layer 2 discovery onan IP network that serves the enterprise. This would correlateextensions with the coordinates for an actual physical location or areafrom where the emergency or non-emergency call was placed, fordownstream processing (e.g., by emergency response servers, othernetwork servers, etc.); (2) In a cellular (traditional, micro cell, datato cell, etc.) environment, the E-LIS queries cell site and itsneighbors serving the first mobile network device 12, 14, 16 forpresence information of the first mobile network device to requestoriginal or updated location coordinates for the current physicallocation.

In one embodiment, no translation of location coordinates are completed.In another embodiment, location information is translated in 3D (X,Y,Z)geo-space coordinates to obtain a current physical location as wasdescribed above.

In another embodiment, the automatic location request message isgenerated on the first mobile network device 12, 14, 16 when the firstmobile network device is physically shaken in a pre-determined pattern.For example, if a person was being kidnapped and still had the firstmobile network device 12, 14, 16, the device could be turned upside andshaken to automatically generate the location request message. In suchan embodiment, the accelerometer in the device is used and automaticallygenerates automatic location request message when it is activated.

In another embodiment, the automatic location request message isgenerated on the first mobile network device 12, 14, 16 when apre-determined selection input is received (e.g., typing in a numericcode on the virtual keypad, from a manual button, from a virtual button,etc.).

However, the present invention is not limited to the pre-determinepattern described and other pre-determined patterns can be used topractice the invention.

However, the present invention is not limited to the embodimentsdescribed for Step 126 and other embodiments can also be used topractice the invention.

At Step 128, the current physical location of the first mobile networkdevice 12, 14, 16 is verified by comparing the retrieved currentphysical location information to stored current physical locationinformation for the first mobile network device 12, 14, 16 on the servernetwork device 24.

At Step 130, the current physical location information for the firstmobile network device 12, 14, 16 is sent to the desired emergencyresponse server.

In one embodiment, first mobile network device 12, 14, 16 periodicallydetermines and sends the current physical location for the first mobilenetwork device 12, 14, 16 to the server network device 24 via thewireless communications network 18.

Method 122 and the other methods described herein can be applied toemergency situations where a user of the first mobile network device 12,14, 16 does not have the capability to initiate a call (e.g., partiallyincapacitated, person kidnapped person, etc.) The E-LIS could be used toinitiate the tracking or locating of the first mobile network device 12,14, 16. It follows that this same technology could be applied tonon-emergency events including stolen property location and subsequentretrieval.

However, the present invention is not limited to the embodimentsdescribed and other embodiments can also be used to practice theinvention.

FIG. 14 is a block diagram 132 illustrating a location 134 of a firstmobile network device (e.g., 12, etc.) determined with the methods andsystem of the emergency location information system (E-LIS) describedherein. A user 136 of the first mobile network device 12 can also shakethe device as described above to generate and automatic locationresponse message as was described above.

The methods and system described herein provide, but are not limited toat least: (1) location determine services for any network device in anywired and/or wireless access network (e.g., Ethernet, cable, DSL, WiFi,WiMAX, cellular, CATV, PSTN, mesh, ISM, RFID, 802.xx..xx, etc.); (2)Determines a physical geographical location if necessary, and interfacewith any and all existing location systems (e.g., GPS, networktriangulation, 3D (X, Y, Z) geo-space, other WiFi, WiMAX and otherwireless tracking systems, etc.), and stores, manipulates, secures, and“serves up” location, in a data form or XML data objects (or otheraccepted and necessary data formats), to devices capable of acceptingit, to location recipients, where the service/servers stores location onbehalf of users/devices; (3) provides current physical location servicefor any and all applications requiring it, including and especiallyemergency calling service (i.e., called E911 and 911 in North America,and other geographic regions); and (4) and provides, stores,manipulates, and secure locations in either room/building/postal address(physical geographic location) format or geo-coordinates (e.g., (X, Y,Z) etc.) referent to any generally accepted reference datum like WGS-84(GPS, etc.).

It should be understood that the architecture, programs, processes,methods and systems described herein are not related or limited to anyparticular type of computer or network system (hardware or software),unless indicated otherwise. Various types of general purpose orspecialized computer systems may be used with or perform operations inaccordance with the teachings described herein.

In view of the wide variety of embodiments to which the principles ofthe present invention can be applied, it should be understood that theillustrated embodiments are exemplary only, and should not be taken aslimiting the scope of the present invention. For example, the steps ofthe flow diagrams may be taken in sequences other than those described,and more or fewer elements may be used in the block diagrams.

While various elements of the preferred embodiments have been describedas being implemented in software, in other embodiments hardware orfirmware implementations may alternatively be used, and vice-versa.

The claims should not be read as limited to the described order orelements unless stated to that effect. In addition, use of the term“means” in any claim is intended to invoke 35 U.S.C. §112, paragraph 6,and any claim without the word “means” is not so intended.

Therefore, all embodiments that come within the scope and spirit of thefollowing claims and equivalents thereto are claimed as the invention.

We claim:
 1. A method for locating a device during an emergency,comprising: receiving on a network server device with one or moreprocessors a wireless emergency message from an application on a firstmobile network device with one or more processors via a wirelesscommunications network indicating an emergency event has occurred withthe first mobile network device, wherein the wireless emergency messageincludes a unique identifier comprising a specialized E911-based uniqueidentifier for the first mobile network device unique across allwireless and wired communications network the first mobile networkdevice connects to and a current set of three dimensional (3D) (X,Y,Z)geo-space coordinates for the first mobile network device, and whereinthe first mobile network device automatically and periodicallydetermines and stores its own current set of 3D (X,Y,Z) geo-spacecoordinates and its own current geographical physical location andperiodically and automatically sends its own current set of 3D (X,Y,Z)geo-space coordinates and its own current geographical physical locationto the network server device; determining on the network server devicewith the E911-based unique identifier and the current set of 3D (X,Y,Z)geo-space coordinates from the emergency message, a current physicalgeographic location for the first mobile network device verifying thefirst mobile network device is actually located at the determinedcurrent physical geographic location by comparing the determined currentphysical geographic location to a previously stored physical geographiclocation for the first mobile network device; and sending from thenetwork server device to a desired emergency response server with one ormore processors the determined and verified current physical geographiclocation for the first mobile network device.
 2. The method of claim 1wherein the emergency message further includes a current physicalgeographic location information in Global Positioning System (GPS)coordinates.
 3. The method of claim 1 wherein the desired emergencyresponse server is an E911 or 911 emergency response server, or a PublicSafety Answering Point (PSAP) server.
 4. The method of claim 1 whereinthe emergency message further includes a triggering event from a sensoror another network device.
 5. The method of claim 1 further comprising awired access point and the first mobile network device connected to awired communications network with a wired connection.
 6. The method ofclaim 1 wherein the current 3D (X,Y,Z) geo-space coordinates at thecurrent physical location includes current 3D (X,Y,Z) geo-spacecoordinates for a room on a building floor, building floor in abuilding, building on a street, an enterprise, campus, village, town,city, state, country or continent or global region.
 7. The method ofclaim 1 wherein the emergency message includes an E911 communication ora 911 communication message.
 8. The method of claim 1 wherein theemergency message is received over a wireless interface including:Commercial Mobile Radio Services (CMRS), cellular telephone, PersonalCommunications Services network (PCS), Packet Cellular Network (PCN),Global System for Mobile Communications, (GSM), Generic Packet RadioServices (GPRS), Cellular Digital Packet Data (CDPD), WirelessApplication Protocol (WAP) or Digital Audio Broadcasting (DAB), WirelessFidelity (Wi-Fi), Worldwide Interoperability for Microwave Access(WiMAX), IEEE 802.11xx, Global Positioning System (GPS) and GPS map,Digital GPS (DGPS), Instant Messaging (IM), Short Message Services(SMS), Radio Frequency Identifier (RFID), Industrial, Scientific andMedical (ISM), or a Zigbee wireless interface.
 9. The method of claim 1wherein the unique identifier includes a Universal Resource Identifier(URI) for the first mobile network device unique across all wireless andwired communications network the first mobile network device isconnected to.
 10. The method of claim 1 wherein the first mobile networkdevice automatically determines and stores its own current physicalgeographical location information from the communications network. 11.The method of claim 1 wherein the first mobile network device includes asmart network device comprising a smart phone or a tablet computer andwherein the application includes a smart application for the smart phoneor the tablet computer.
 12. The method of claim 1 wherein the emergencyevent includes an accident, event, fire event, terrorist attack event,military event or crime event.
 13. The method of claim 1 wherein theemergency event includes an emergency event detected by an accelerometeror a temperature sensor included on the first mobile network device. 14.The method of claim 1, further comprising: receiving a location requestmessage on the server network device to determine a current physicallocation for the first mobile network device; retrieving on the firstmobile network device via one or more other server network devices onthe wireless communications network the current physical location of thefirst mobile network device; verifying the current physical location ofthe first mobile network device by comparing the retrieved currentphysical location information to a stored current physical locationinformation for the first mobile network device; and sending to thedesired emergency response server the current physical geographiclocation for the first mobile network device.
 15. The method of claim 14wherein the sending step including sending location information aboutthe first mobile network device in current three dimensional (3D)(X,Y,Z) geo-space coordinates at the current physical geographiclocation.
 16. The method of claim 14 wherein the retrieving stepincludes retrieving the current physical geographic location for thefirst mobile network device with data link layer request using InternetProtocol (IP).
 17. The method of claim 14 where the first mobile networkdevice periodically determines and sends the current physical locationfor the first mobile network device to the server network device via thewireless communications network.
 18. The method of claim 14 receivingstep includes an automatic location request message generated on thefirst mobile network device when the first mobile network device isphysically shaken in a pre-determined pattern.
 19. A non-transitorycomputer readable medium having stored therein instructions for causingone or more processors to execute the steps of: receiving on a networkserver device with one or more processors a wireless emergency messagefrom an application on a first mobile network device with one or moreprocessors via a wireless communications network indicating an emergencyevent has occurred with the first mobile network device, wherein thewireless emergency message includes a unique identifier comprising aspecialized E911-based unique identifier for the first mobile networkdevice unique across all wireless and wired communications network thefirst mobile network device connects to and a current set of threedimensional (3D) (X,Y,Z) geo-space coordinates for the first mobilenetwork device, and wherein the first mobile network deviceautomatically and periodically determines and stores its own current setof 3D (X,Y,Z) geo-space coordinates and its own current geographicalphysical location and periodically and automatically sends its owncurrent set of 3D (X,Y,Z) geo-space coordinates and its own currentgeographical physical location to the network server device; determiningon the network server device with the E911-based unique identifier andthe current set of 3D (X,Y,Z) geo-space coordinates from the emergencymessage, a current physical geographic location for the first mobilenetwork device; verifying the first mobile network device is actuallylocated at the determined current physical geographic location bycomparing the determined current physical geographic location to apreviously stored physical geographic location for the first mobilenetwork device; and sending from the network server device to a desiredemergency response server with one or more processors the determined andverified current physical geographic location for the first mobilenetwork device.
 20. An emergency location information system (E-LIS),comprising in combination: means for receiving on a network serverdevice with one or more processors a wireless emergency message from anapplication on first mobile network device with one or more processorsvia a wireless communications network indicating an emergency event hasoccurred with the first mobile network device, wherein the wirelessemergency message includes a unique identifier comprising a specializedE911-based unique identifier for the first mobile network device uniqueacross all wireless and wired communications network the first mobilenetwork device connects to and a current set of three dimensional (3D)(X,Y,Z) geo-space coordinates for the first mobile network device, andwherein the first mobile network device automatically and periodicallydetermines and stores its own current set of 3D (X,Y,Z) geo-spacecoordinates and its own current geographical physical location andperiodically and automatically sends its own current set of 3D (X,Y,Z)geo-space coordinates and its own current geographical physical locationto the network server device; means for determining and verifying on thenetwork server device information from the emergency message into acurrent physical geographic location for the first mobile networkdevice, wherein the emergency message includes the unique identifiercomprising the specialized E911-based unique identifier and the currentset of 3D (X,Y,Z) geo-space coordinates for the first mobile networkdevice on the wireless communications network and the unique identifieris used to access information about the first mobile network device incurrent (X,Y,Z) geo-space coordinates at the determined and verifiedcurrent physical geographic location; means for returning from thenetwork server device to a desired emergency response server with one ormore processors the current physical geographic location and position in(X,Y,Z) geo-space at the current physical location for the first mobilenetwork device; means for receiving a location request message on theserver network device to determine a current physical location for thefirst mobile network device; means for retrieving from the first mobilenetwork device via the wireless communications network the currentphysical location of the first mobile network device; means forverifying the current physical location of the first mobile networkdevice by comparing the current physical location information to storedcurrent physical location information for the first mobile networkdevice stored in a computer readable medium associated with the firstmobile network device; and means for sending to the desired emergencyresponse server the current physical geographic location for the firstmobile network device obtained from the designated server networkdevice.