Water-borne beacon detection system for missing persons

ABSTRACT

A processor enabled method in a mobile device includes configuring a WiFi radio controller of the mobile device with a WiFi service set identifier of a search detector and configuring a Bluetooth connection configuration of a search detector. The method also includes responsive to a rescue trigger, enabling the device to exit a low power mode while awaiting a connection attempt from a Bluetooth radio via the configured Bluetooth connection configuration. The method also includes upon receiving the connection attempt, powering up the WiFi radio and attempting to connect to the configured WiFi service set identifier.

BACKGROUND

When people become lost in wilderness areas, rescue workers and emergency responders are often tasked with searching an area of difficult terrain, and possibly unfamiliar surroundings. Often, search vehicles such as helicopters, airplanes, and off-road motor vehicles may be utilized to cover more search area than would be possible by humans searching on foot. With the development of unmanned aerial vehicles (UAVs), commonly referred to as “drones”, additional resources can be applied to rescue efforts for lost individuals. One difficulty when searching on foot, or when using both manned and unmanned vehicles, is they generally depend on a visual sighting of the missing party.

SUMMARY

The technology, briefly described comprises a beacon detection system configured to locate a missing search subject.

One general aspect includes a processor enabled method in a mobile device, including: configuring a WiFi radio controller of the mobile device with a WiFi service set identifier of a search detector; configuring a Bluetooth connection configuration of a search detector. The processor also includes responsive to a rescue trigger, enabling the device to enter a low power mode while awaiting a connection attempt from a Bluetooth radio via the configured Bluetooth connection configuration. The processor also includes upon receiving the connection attempt, powering up the WiFi radio and attempting to connect to the configured WiFi service set identifier.

Implementations may include one or more of the following features. The processor enabled method where the method includes providing a user interface on a display of the mobile device and the rescue trigger is a user input directing the device to enable a rescue mode. The processor enabled method where the rescue trigger includes the mobile device being inactive for a time period. The processor enabled method where the method includes providing a user interface allowing a user control over the low power mode. The processor enabled method where the method includes providing a user interface on a display of the mobile device allowing the user to enter registration information uniquely identifying the mobile device to a rescue agency. The processor enabled method where the method includes transmitting the user registration information to the rescue agency.

Another general aspect includes a search system, including: a search beacon detector; and code configured to instruct a processor in a mobile device to execute steps of: configuring at least one of a plurality radios in the mobile device with a first connection profile associated with a search beacon detector; responsive to a rescue trigger, directing the device to enter a low power mode while awaiting a connection attempt from the at least one of the plurality of radios; and upon receiving the connection attempt, powering up at least the one and a second of the plurality of radios, the second of the plurality of radios configured with a second connection profile associated with the search beacon detector; wherein the search beacon detector adapted to detect each connection request associated with the first and second connection profiles.

Implementations may include one or more of the following features. The search system where the code is configured to instruct the processor to provide a user interface on a display of the mobile device and the rescue trigger is a user input directing the device to enable a rescue mode. The search system where the code is configured to enable the processor to enter low power mode after a period of inactivity of the mobile device. The search system where the code is configured to instruct the processor to providing a user interface allowing a user to set the time period. The search system where the code is configured to instruct the processor to providing a user interface on a display of the mobile device allowing the user to enter registration information uniquely identifying the mobile device to a rescue agency. The search system where the at least one of the plurality of radios is a Bluetooth radio and the first connection profile is a Bluetooth connection profile. The search system where the second of the plurality of radios is a WiFi radio and the second connection profile is a WiFi connection profile. The search system where the second connection profile includes at least one ssid which is unique to a rescue agency. The search system further including configuring the WiFi radio with a plurality of connection profiles including a plurality of ssids. The search system where the code is configured to instruct the processor to attempt to connect to all connection profiles using all the radios of the mobile device. The search system where the code is configured to instruct the processor to output a registration of the mobile device from the search subject to a data store of rescue agency.

Another aspect includes a search system, including: providing an application executable on a processor of a mobile device, including code configured to instruct the processor to execute steps of: configuring at least one of a plurality radios in the mobile device with a first connection profile associated with a search beacon detector; responsive to a rescue trigger, directing the device to enter a low power mode while awaiting a connection attempt from the at least one of the plurality of radios; and upon receiving the connection attempt, powering up at least the one and a second of the plurality of radios, the second of the plurality of radios configured with a second connection profile associated with the search beacon detector. The search system also includes a waterproof device container, the waterproof device container adapted to be coupled with a user of the mobile device and position the mobile device of a user at a location near the surface of water when the device and the container are in water.

Implementations may include one or more of the following features. The search system where the container is a pocket on a personal floatation device located in a position near the shoulder of a user wearing the device. The search system where the container is a pouch tethered to a personal floatation device and adapted to position the device near the surface of the water.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an overview of a search vehicle flying a search pattern over a portion of a search area.

FIG. 2 depicts a first embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 3 depicts a second embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 4 depicts a 3rd embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 5 depicts a 4th embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 6 depicts a flowchart illustrating a first embodiment of a method for detecting beacons in a search area.

FIG. 7 illustrates a method of performing a survey over a defined area.

FIG. 8 illustrates a first embodiment of a method for acquiring signal data and determining a possible sighting of a beacon in survey data.

FIG. 9 illustrates a second embodiment of a method for acquiring signal data and determining a possible sighting of a beacon within the survey data

FIG. 10 illustrates a method of providing a search identifier application to a user of a beacon such as a wireless mobile device.

FIG. 11 illustrates an embodiment of the technology utilizing an RFID tag in accordance with the present technology.

FIG. 12 illustrates a mobile device incorporating a search identifier application therein.

FIG. 13 illustrates a fifth embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 14 illustrates a method providing an application and search method in accordance with the technology.

FIG. 15 illustrates another embodiment of a method for acquiring signal data and determining a possible sighting of a beacon in survey data.

FIG. 16 illustrates a sixth embodiment of a search vehicle and a beacon detection system in accordance with the present technology.

FIG. 17 illustrates another embodiment of a method for acquiring signal data and determining a possible sighting of a beacon in survey data using the device of FIG. 16.

FIG. 18 illustrates a water rescue application of the present technology.

FIG. 19A illustrates a first personal flotation device (PFD) mobile device holder suitable for use with the present technology.

FIG. 19B illustrates a second PFD mobile device holder suitable for use with the present technology.

FIG. 20 illustrates a retractable pocket PFD mobile device holder suitable for use with the present technology.

FIG. 21A illustrates a tethered waterproof pouch suitable for use with the present technology.

FIG. 21B is an end view of another embodiment of the tethered waterproof pouch suitable for use with the present technology.

FIG. 21C is an end view of another embodiment of the tethered waterproof pouch suitable for use with the present technology.

FIG. 22 illustrates a solar enabled PFD mobile device holder suitable for use with the present technology.

FIG. 23 illustrates an auxiliary antenna enabled mobile device holder suitable for use with the present technology.

FIG. 24 illustrates the increasing effectiveness of the search system relative to height.

DETAILED DESCRIPTION

The technology described herein provides a beacon detection system allowing searchers to more reliably and efficiently search for people associated with the beacon. This detection is useful in search and rescue operations especially in terrain that is difficult to access or see through. In the context of this application, a beacon is any detectable wireless signal which can be generated from any number of different sources. In the context of this application, a beacon will be described with respect to a wireless signal from a personal mobile device, such as a Wi-Fi enabled cellular device, and a radio frequency (RF) signal such as that which may be generated by a mobile device, or a such as that which may be generated by a specific RFID tag or another single-purpose hardware device.

In accordance with the technology, the beacon detection system may be mounted on any type of vehicle, including but not limited to a human being, all-terrain motor vehicle, a manned aircraft and an unmanned aircraft (UAV). The vehicle carrying the detection system is caused to search a specific search area, or a sub region of the search area, in order to search for and detect beacons which can then lead rescue workers to the missing individual(s). The technology provides for a beacon detection system, which may be integrated into or mounted as a retrofit to a UAV or any other search vehicle or person. It should be recognized that the beacon detection system in accordance with the present technology may not be utilized solely with a UAV, the can likewise be utilized with a manned aerial vehicle, or a ground vehicle, or any number of different combinations thereof, all of which comprise “search vehicles”. It should be further recognized that the beacon detection system may be mounted on a plurality of search vehicles operated simultaneously over a given search region.

FIG. 1 illustrates an unmanned aerial vehicle (UAV) (search vehicle) 50 flying a search pattern 52 over a search region or sub region 54. In one context, the vehicle 50 is searching for a beacon associated with a lost search subject 60. In the context of FIG. 1, the unmanned aerial vehicle 50 flies a defined search pattern over a particular search area. The unmanned aerial vehicle 50 includes, as described below, a GPS unit which tracks the position of the UAV 50 in relation to time while the vehicle covers the search pattern. A beacon detector records signal information relative to the position of the vehicle 50 and the search pattern for later analysis to determine the presence of a beacon which may be associated with the search subject 60. It will be understood that the beacon system may be directly connected to the GPS or may match up entries via common clock, and as well that this process may be done in real-time or for later analysis, with the former having the option for real-time communication of results to the operator. It will be understood that the term “search subject” may refer to an individual or multiple individuals.

Although FIG. 1 illustrates one type of search pattern performed by a UAV, in the context of this technology, the search may be conducted by human hikers over terrain in a plotted search pattern, or by manned or unmanned motorized land travel vehicles, or by manned aircraft.

FIG. 2 illustrates a first embodiment of a beacon detection system 100 mounted to an unmanned aerial vehicle 50. In FIGS. 2 through 5, the unmanned aerial vehicle comprises a quad-copter unmanned aerial vehicle, examples of which include DJI Phantom class of drones and 3DR Solo class of drones, although many different types of unmanned air vehicles may be utilized in accordance with the present technology. The beacon detection system 100 is mounted on or constructed to be integrated with the unmanned aerial vehicle 50. The system 100 may be contained in a housing 101 which may be integrated into the vehicle or attached to the vehicle. In one embodiment, the beacon detection system 100 includes a processor capable of executing code to instruct the detection system 100 to perform aspects of the beacon detection technology described herein. The system 100 includes a processor accessible memory 104 which may be utilized by the processor 100 in the context of executing the code including instructions to the processor to perform such functions. Memory 104 is commonly referred to as random access memory (RAM). System 100 further includes a GPS radio 106 which is in operable communication with the processor to provide positioning and timing information associated with detection data as described below. The GPS radio 106 is illustrated as part of the system 100 but in operation may be positioned on an upper surface of the search vehicle to allow the best possible communication between the radio and any GPS satellites. A program memory 108 stores program code executable by the processor 110 and data storage 110 to perform the functions described herein.

In the context of this application, a search agent is an individual or group of individuals coordinating a search over a search area, such a search area 54.

Beacon detection system 100 includes a beacon detector 120 and antenna system 140. Various embodiments of the beacon detector 120 and antenna system 140 are described with respect to FIGS. 3 through 5. In this context, the beacon detector 120 includes electronics and/or processing instructions configured to detect a Wi-Fi connection or connection attempt, or an RFID signal from an RFID tag beacon. Beacon detector 120 is illustrated herein in the context of the aforesaid RF and Wi-Fi embodiments. The examples herein are merely exemplary, and numerous variations of the technology will be apparent to one of average skill in the art.

While the antenna system will be illustrated as a particular antenna configuration, it be understood that many different types of antenna configurations may be utilized in accordance with the present technology. One with average skill in the art will recognize that antenna selection and positioning is important to maximize sensitivity.

In one embodiment, the processor 102, memory 104, program memory 108, and data storage 110 may be implemented by, for example, a Raspberry Pi—a credit card sized, single board computer developed by the Raspberry Pi foundation and commercially available through a number of sources. However, any suitable processor and memory may be utilized, including a custom built processor and memory configuration. It will be understood that the detector system 100 may be integrated into a single board device, a single chip, or may be composed of individual components arranged in any number of suitable physical arrangements to accomplish the task described herein.

FIGS. 3 through 5 illustrate various embodiments of the beacon detection system and antenna systems. It should be understood that each of the components having like reference numbers are equivalent components in the respective embodiments.

FIG. 3 illustrates a first embodiment of a beacon detection system 100 a, which is designed to search for and detect RFID beacon signals. The RFID beacon signals may be provided by an RFID tag, which is distributed to individuals prior to, for example, the individual venturing into a wilderness area. System 100 b includes the processor 102, memory 104, GPS 106, program memory 108, data storage 110 of the first embodiment In FIGS. 3-5 corresponding portions to those of the system 100 of FIG. 2 provided with the same reference numbers as those of the embodiment of FIG. 1, and hence explanations of the corresponding elements are omitted.

Radio-frequency identification (RFID) is a technology uses electromagnetic fields to automatically identify and track signal emitting tags which may be attached to objects. The tags contain electronically stored information. This is important to be able to distinguish the locations of desired individuals from individuals not of interest to the search at hand. Passive tags collect energy from a nearby RFID reader interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader.

In accordance with the technology, the RFID tag searched for by the beacon detection system 100 is generally comprised of an active RFID tag. The RFID tag may take any general shape or configuration, but may, for example, be attached to a piece of clothing or backpack of an individual before the individual ventures out into a wilderness area.

The beacon detection system 100 a illustrated in FIG. 3 includes a RFID detector system 310 which may include a match filter 312, a detector radio 320, and directional antenna 322. Directional antenna 322 may be a yagi-uda antenna, moxon, or antenna array, or any other type of suitable directional antenna having an appropriate field of view. As discussed below, the antenna field of view may be utilized to compute a search pattern for the search vehicle 50 in the search region. Detector radio 320 may be a passive reader, which receives radio signals from active tags, or may be an active reader which transmits interrogator signals and receives authentication replies from RFID tags. Detector radio 320 may therefore comprise a broadcast radio and a beacon signal receiver, or just a beacon signal receiver. RFID systems may operate in the 433 MHz range. Thus, in this example, detector radio 320 is capable of detecting RFID tags in this spectrum and directional antennas 322 are optimized for detection around this frequency. The RFID detector system 310 can be a system capable of discriminating the RFI signal from an RFID tag. In one embodiment, the RFID detector system 310 includes a matched filter 312. The matched filter is utilized in accordance with the present technology to detect identifiable signals from the RFID tag. In one embodiment, the RFID detector system may comprise a software defined radio provided as code executed by processor 110 or as an embedded system used in conjunction with the processor and memory of system 100 a. A method for detecting the RFID signals is discussed below.

A beacon detector 150 a is provided in program memory 108. The beacon detector is operable to perform the functions described in, for example, the various embodiments of steps 520 and 530 which are associated with detecting RFID signals.

FIG. 4 shows another embodiment of a beacon detection system 100 b, which is designed to detect a Wi-Fi signal from a mobile device, such as a mobile cellular phone. One advantage of the system of FIG. 4 is that no active involvement by the missing person or beacon, such as attaching the RFID tag to the person before heading out into the wilderness, is needed. Generally, the proliferation of mobile devices with Wi-Fi capability means that many missing individuals will be already carrying a mobile device with Wi-Fi capabilities. The system of FIG. 4 takes advantage of this using any of a number of different techniques to detect a mobile device within a search area. In one embodiment, the detection system 100 b generates an access point with a one or more SSIDs to which a mobile device can connect, and detects a connection or an attempted connection by a mobile device as a beacon which can be associated with a particular individual.

As used herein, a “mobile device” includes any personal device associated with a user including but not limited to a cellular enabled personal device such as a cell phone, a tablet, notebook, or any other general-purpose computing environment which is associated with an individual and which may be carried with the individual. It may also include a device meant to be carried by a person, which implements the Wi-Fi, RFID, or other communications protocol described herein.

Wi-Fi is generally defined as wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards. Wi-Fi is generically used to refer to the 2.4 GHz 802.11b standard, or any type of network or WLAN product based on any of the 802.11 standards, including 802.11b, 802.11a, dual-band, and so on.

Detection system 100 b includes one or more Wi-Fi radios 410, each of which may be coupled one or more non-directional, or directional antennas (or antenna arrays) 422. In an alternative embodiment, only one Wi-Fi radio (such as radio 410) is used. In another embodiment, one Wi-Fi radio is used for broadcasting SSID(s) and another Wi-Fi radio or radios are used to listen for SSIDs. In a further alternative embodiment, multiple Wi-Fi radios are connected to one processing device in order to search for multiple people or cover multiple fields of view or even the same field of view multiple times. In the context of detecting a beacon, Wi-Fi radio 410 acts as a typical Wi-Fi access point, transmitting a SSID (which may be known to the mobile device or unknown to the mobile device) to provide an access point connection to allow the mobile device to connect to the system 100 b. In this embodiment, radio 412 monitors for attempted connections to the broadcast SSIDs transmitted by radio(s) 410 and may be utilized by the system 100 b to monitor received signal strength and other characteristics of received connection attempts to determine if an attempted connection is made by a mobile device of a search subject. That is, Wi-Fi radio(s) 410 broadcasts one or more SSIDs and acts as a regular connection point for any Wi-Fi radio attempting to make a connection to it. If a connection is made, the system 100 b may complete the connection, assign a DHCP address, and attempt to maintain the connection between the beacon (the connecting radio) and the radio 410, or may use information associated with a connection attempt to provide search agents with a location fix on the search subject. In other cases, where a beacon radio cannot connect, Wi-Fi radio 412 monitors connection signals and packets which may or may not make a connection with the first Wi-Fi radio 410 and may determine the signal strength and other characteristics of the connecting signal. In alternative embodiments, the radio 410 may broadcast the SSID but not respond with DHCP, since a single packet from the beacon is all that is required to localize the desired individual. This information may be utilized by the search agent to determine that additional searching in the geographic location where the detection occurred is needed. In this embodiment, the Wi-Fi radios may look for a connection to a specific SSID and the other radio may look for the signal strength of the incoming connection. Each of the Wi-Fi radios 410 may therefore comprise a broadcast radio and a beacon signal receiver, or just a beacon signal receiver.

Multiple directional antennas 422 may be provided. Each directional antenna may be separately coupled to one of the Wi-Fi radios, or may be configured as an antenna array having a known field of view. In this embodiment, the antennas 422 and 424 are optimized to detect signals operable in the 2.4 GHz range to detect Wi-Fi connections from a beacon source. It will be understood that, in some contexts, unidirectional or other antennae will be most appropriate.

A beacon detector 150 b is provided in program memory 108. The beacon detector is operable to perform the functions described in, for example, the various embodiments of steps 520 and 530 which are associated with detecting Wi-Fi signals.

FIG. 5 illustrates another embodiment of the detection system 100 c. In the embodiment shown in FIG. 5, both an RF detector and a Wi-Fi detector are jointly utilized. One advantage of the system of FIG. 5 is that it can be utilized with either an RFID tag or a Wi-Fi Beacon. Another advantage of the system of FIG. 5 is that the Software Defined Radio (SDR) can be utilized to further analyze Wi-Fi signals which may be detected by the Wi-Fi system. This includes performing a signal analysis similar to that described below which is performed in the RFID embodiment to determine aspects of a Wi-Fi connecting signal which may not be apparent using one or more Wi-Fi radios (eg. radio(s) 410). For example, the RF detector system 310 may be utilized to search for the Wi-Fi frequency (in conjunction with the RF signal) so that in cases where an incomplete Wi-Fi packet or no Wi-Fi packets are actually detected, the Wi-Fi signal can still be detected by the RF detection technology. As illustrated in FIG. 5, system 100 c includes the detector system 310 and detector radio 320 of the embodiment of FIG. 3, as well as the Wi-Fi radio(s) 410 from the embodiment of FIG. 4. In an alternate embodiment, multiple SDRs are used to build a custom beamforming Wi-Fi radio.

Multiple beacon detectors 150 a and 150 b, equivalent to those set forth above, are provided in program memory.

FIG. 6 is a flowchart illustrating one method for implementing the present technology. Each of the methods illustrated in FIGS. 6-11 may be performed by hardware only, or hardware and software (executing for example on processor 102).

FIG. 6 is a flowchart illustrating a method which takes advantage of the present technology to detect beacons which may be associated with a person or entity for which a search is underway. At 510, a survey for a defined area is performed. FIG. 1 illustrates a UAV surveying a defined area or subregion of an area. At 515, signal data associated with locations are acquired during a search performed in the search area. Embodiments for acquiring signal data are discussed below. At 520, the survey data is accessed by a search agent or a processing device to determine whether one or more indicators of a search subject are present. Indicators may include an RF signal detection or a Wi-Fi connection or connection attempt.

FIG. 7 illustrates one embodiment for performing a defined survey at 510. Generally, the survey includes determining a search area 610, defining the search area into search area subregions based on a flight time and the antenna's field of view at 620, and piloting a search vehicle over each of the subregions or multiple search vehicles and parallel over multiple subregions until all subregions search area are complete at 630.

At 610, because each of the antennas has a known field of view for a given flight height of a search vehicle, and each search vehicle generally has a known maximum flight time over the search area (including time to travel to and from the search area to a search agent base of operations), a search agent can, for a given search area, develop known search subregions and flight patterns over the search subregions. Because generally the search area which is required when looking for a missing individual is quite large, a search area will be broken down into several subregions. Following a flight over particular subregion 630, a search vehicle will return to the search agent to be outfitted for another search of a particular subregion. As discussed herein, multiple search vehicles each with a beacon detection system may be operated together to cover the entire search area.

Likewise, multiple search agents in land vehicles or hiking may carry detection systems as described herein to cover a search area on the ground.

Returning to FIG. 6, at 515, signal data is acquired during the survey at 510. Acquiring signal data includes monitoring radio signals in the area for either a Wi-Fi connection attempt, or for particular patterns within a RF signal. Note that particular patterns within a Wi-Fi signal can also be monitored when the system detector 100 is utilizing the RF radio technology. In accordance with the technology, acquisition of signal data at 515 includes acquiring a plurality of samples, (on the order of, hundreds, thousands, or millions of samples per second) with each sample having at least associated signal data, GPS location data, and a timestamp. In this manner, the location of the survey vehicle when it acquired the particular signal data can be determined, and this information utilized to perform further actions on the data.

At 520, the survey data which is acquired at 515 is accessed. Three sub steps 522, 524 and 526 illustrate various embodiments (used alone or in combination) for accessing the data acquired at 515. In one embodiment, survey data acquired at 515 is stored in data storage 110 in each of the different beacon detection systems. In this embodiment, at 522, upon landing after each subregion is surveyed, survey data from the survey is downloaded from the data storage 110 for processing at 530. In another embodiment, survey data can be accessed by the processor 102 executing instructions in program memory 108 to analyze the data in accordance with the analytics discussed below at 526 while the survey is being conducted. This near-real time analysis allows data to be provided to searchers during the search process, and searchers may manipulate the search vehicle to further refine the location of a search subject while the search is in process.

At 530, a determination of a possible sighting of beacon in the survey area is determined. Determining a possible sighting of a beacon is described below with respect to FIGS. 8 and 9, and is dependent upon whether or not the RF embodiment, or the Wi-Fi embodiment, or a combination thereof, is in use. As noted above, the processing of data may occur at the search vehicle during the search process or at a later time. Where processing occurs at the search vehicle during the search process, optionally, at 535, search data may be streamed to a search agent. The data streamed from the beacon detector may be provided to a processing device of a search agent for output in a user interface on the processing device in a search agent application. Finally, at 550, further action on the sighting may be taken. Such further action may be a decision to return the search vehicle to a designated area, send individual searchers on foot into the area, or other similar actions.

In this respect, further action at 550 may include directing the search vehicle to return to the identified location where the signal connection was made in order to acquire additional data, either by manually flying the search vehicle to the area, or using a feedback loop to a flight controller in the vehicle to have a return to the area together data until such time as it can no longer remain aloft and safely return to the search agent.

FIGS. 8 and 9 illustrate two embodiments for performing steps 515 and 530 in FIG. 6.

In FIG. 8, detection of a Wi-Fi signal from a mobile device using a system 100 such as that in FIG. 4 or 5 is described. In the context of FIG. 8, and as described below, a mobile device may have a search identifier application installed which may work in conjunction with the detection system 100 to enhance the accuracy of the search process. In other cases, no search identifier application may be installed. A search identifier application is discussed below with respect to FIG. 11. The technology allows for detection of the mobile device of a search subject whether or not the search identifier application is installed.

At 710, one of the broadcast Wi-Fi radios broadcasts one or more Wi-Fi SSIDs from the detection system in the search vehicle. The broadcast SSIDs may be any SSID, a unique SSID for the beacon which is sought, or a unique SSID for the beacon detection system. In one configuration, the user may configure a mobile device to search for a particular SSID for a search system run by a search agent. For example, a hiker may configure a mobile device to search for the SSID “rescue” and configure the device's the Wi-Fi settings to connect to that network whenever it is seen. This “rescue” network is or may be a generic name for the rescue system operated by the system agent. In another embodiment, the mobile device may be configured to connect to a device-specific SSID. This SSID may be, for example, the users name and a hash of the MAC address of the network component of the mobile device. Alternatively, the SSID may be specific to a search agency, a search agent, or the search itself. The SSID may be a combination of the above. The SSID may identifies the search client application commercial provider to the user. In one embodiment, the SSID takes for form [Commercial provider]_[subject name]_[Random eight digits]. In the latter example, if a search subject were to see the SSID out of context, their first name is a piece of profile information that they would recognize it as personal to them, and the randomness is the best way of ensuring privacy, as a per-user secret key

In another configuration, multiple SSIDs which are common commercial SSIDs may be broadcast. For example, commonly used SSIDs of, for example, coffee house or hotel chains to which the mobile device of a search subject is likely to have connected in the past may be broadcast in order to generate an attempt from the mobile device to connect to the common commercial SSID. In some cases, one connection attempt is all that may be necessary for the search agent to gather sufficient information to locate a search subject. In another configuration, a search subject's own personal home or business Wi-Fi SSID may be broadcast as it is likely that a search subject's phone will attempt to connect to their own SSID.

The SSIDs may be broadcast from one or multiple Wi-Fi radios in the embodiment shown in FIG. 4, or FIG. 5.

In a further embodiment of the configurations of FIG. 4, or FIG. 5, the detection system may broadcast a separate administrator SSID allowing search agents to connect to and control the detection system 100 during the search process. Having the separate admin network makes it easier for the searchers to connect and to detect the mobile device of a search subject because target device packets will never connect to the admin SSID. Thus, in certain cases, any attempt to connect to any SSID other than the admin network may be considered data of relevance in finding a search subject.

At 710, in accordance with the foregoing discussion, signal samples are continuously acquired in the search area, along with the location of each event (signal record), the time of each event, and the GPS coordinates of the event. Each event is stored to the search vehicle storage (such as data storage 110) or is streamed to a search agent, or processed by processor 102 and memory 104 in accordance with instructions stored in the program memory. At 740, each of the Wi-Fi radios will listen for packets. At 750, one or more initial connection negotiation packets of a Wi-Fi connection attempt will be received. If the packet is a complete packet and a connection can be made, one of the Wi-Fi radios will complete the Wi-Fi communication protocol and allow a connection by the beacon to the one or more broadcast SSIDs. The receiving Wi-Fi radio may attempt to measure the signal strength of the connecting beacon and record this data.

At 720, a determination is made as to whether a WiFi connection is made or an attempt is made to connect to one or more of the broadcast SSID or SSIDs. Step 720 is one example of performing step 530 in FIG. 6. At 760, signal strength the packets may be determined, and if a connection is made, at 770, the system 100 attempt to keep the connection between the Wi-Fi radio on the search vehicle and the mobile device active. In this respect, this may include, for example, issuing a DHCP address to the mobile device in order to create a network connection between the search vehicle mobile device, or simply pinging the mobile device to attempt to keep the mobile device active to in order to acquire additional data which may help to localize the beacon. Optionally, at 775, data may be transmitted between the a search application on the beacon device and the search system.

At 765, in various embodiments, one or more techniques for disambiguating a mobile device from other mobile devices may be utilized. In an embodiment, information in connection negotiation packets associated with a Wi-Fi connection or DHCP lease negotiation may be utilized to disambiguate the mobile device of the search subject from other signals which may be received. For example, in a DHCP lease negotiation, a client identifier is typically supplied in the initial lease negotiation. In devices using Apple Corporations iOS, the identifier is typically the name of the device identified in the device settings. This information may be captured by the detector system 100 and utilized to identify the search subject's mobile device.

In another aspect, the mobile device's media access control address (MAC) address. A MAC address is a unique identification number which represents the device in a network. Typically, the first 3 bytes (24 bits) of a MAC address specify an OUI (Organizationally Unique Identifier) which is assigned by the IEEE Registration Authority. Using the unique identification number and the public listing of the IEEE Registration Authority, the system 100 can disambiguate device by manufacturer such that if a search subject's mobile device manufacturer is known, connection attempts made to a detection system identify likely and/or unlikely candidates for the search subject' mobile device. In a further alternative embodiment, MAC addresses are known to be subjects or non-subjects and can be appropriately highlighted or excluded.

FIG. 9 illustrates a second implementation of steps 515 and 530 where an RF embodiment is utilized. At 810, RF data is captured for example by the antenna 322 and detector radio 320, over a series of samples in the search region or sub region. At 815, the location, time, and signal data is stored in search vehicle data storage 110, or streamed to a search agent. Alternatively, as discussed above, the operations of step 530 described herein at 820, 830 and 840 can be performed by the processor 102 in real time by the system 100. At 820, the in-phase and quadrature data is converted to magnitude. The magnitude data is useful in this context in applying the received data to a match filter. The match filter output is analyzed and at 830, a process looks for the area of the square wave (in both positive and negative amplitudes) which matches a particular pattern. This can be the pattern of the RFID tag, or a pattern of a Wi-Fi packet, or only a part of either. In one embodiment, the pattern includes nine associated peaks and valleys (positive and negative amplitudes) which identify the received signal as that of a particular RFID tag which is being sought. Hence, at 830, the system looks for recognized waveforms in the data utilizing the match filter. At 840, the detected wave form and position output to search vehicle storage or the search agent for processing in accordance with step 550.

FIG. 10 is a method illustrating one embodiment for configuring a mobile device. In one aspect, discussed above, a user may configure a mobile device to look for a particular SSID of a Wi-Fi network. In another embodiment, illustrated in FIG. 9, a user may be provided with an application which configures multiple aspects of a mobile device. At 910, a search identifier application is provided to the user of the mobile device. The search identifier application may be downloaded utilizing any of a number of known application stores associated with known mobile devices. At 920, the search identifier application operates programmatically to configure the mobile device to look for a specific SSID or connection activity. As noted above, this may include providing a unique SSID for each device, known to the search agent. At 940, the application can operate programmatically to configure the mobile device to enter power saver mode when either specifically initiated by user, or when the device leaves a mobile device service area. Alternatively, it may instruct the user on how to perform these functions themselves. For example, when the mobile device leaves a cellular service area, the device and automatically enter a mode where it becomes detectable by the beacon detection system 100, but conserves power. In such a mode, the device may enter a so-called “airplane” mode, which places all of the services of a particular mobile device in suspension, but the application may likewise enable Wi-Fi to allow the Wi-Fi beacon detection of the present technology to occur.

As discussed herein, the search identifier application is configured to control certain aspects of a mobile device to improve the ability of a search system to find a mobile device. The ability of such an application to configure and control a mobile device may vary with the type of operating system used by the mobile device.

FIG. 11 illustrates a method of configuring RFID tags with an association to a user or individual. At 1010, RFID tags having known or unique signal signatures are distributed to users. At 1020, a search identifier application or interface is provided to the user of one such RFID tag. The application may be a mobile device application or provided, for example, via a web-browser, allowing a user to register an RFID tag to a particular user. In this context, RFID tags may be distributed to a user, and the user may be prompted to configure the RFID tag to associate the RFID tag with the user such that if the user embarks on an activity with the possibility of being lost, carrying the RFID tag will provide a unique signature which can be sought by the beacon detection system 100 when searching for the user. This allows the beacon detection system 310 (and match filter 312) to be specifically tuned to the particular RFID signal. At 1030, user registration information can be received by the application or the interface and at 1040, an association between user and the tag can be stored for future reference in future searches. A hybrid of this process could also occur for a Wi-Fi tag which may be hardware independent of cell phone or other general-purpose computing device where the Wi-Fi tag is designed for the specific purpose of being located when lost.

FIG. 12 illustrates components of a mobile device application such as a search identifier application provided in a mobile device 1200. The mobile device application 1240 may be executed by the processor of a mobile device 1200. The application includes a user interface 1242, a user profile transmitter 1244, a SSID connector 1246, and a power manager 1248. The user interface 1242 may include various screens and input/output prompts guiding the user through a configuration process which makes the mobile device easier to detect to the detection system 100. In one embodiment, this can include a registration process whereby a user of the mobile device provides information to the application which identifies the user, certain aspects of the mobile device and user information to be stored in a registered individual database (e.g. a “registry”) for use by the detection system when an individual goes missing. This information can include the mobile device type, MAC address and configuration information of the mobile device. The user profile transmitter 1244 allows that the mobile device to provide user-specific registration information to a registry. The SSID connector configures the mobile device to attempt to connect to a specific SSID (examples of which are discussed above) of a detection system which may uniquely identify the search subject. A power manager may be enabled to control or detect and give feedback on various aspects of the mobile device 1200 to conserve battery life in a search situation. Many devices have low-battery power-saving modes. The power manager enhances the ability of the beacon to maintain power and hence respond to searches longer.

FIG. 12 includes a depiction of an example of typical architecture for a mobile device. The mobile device 1200 has memory 1210, processor 1240, an input/output (I/O) controller 1290, a cellular radio channel and WLAN/WMAN data channel 1260, and power controller 1270. Each of these components may connected through a system bus (now shown).

Memory 1210 includes the mobile device's operating system 1212, and one or more applications, including search identifier application 1250 and comprises volatile and non-volatile storage. The operating system 1212 handles the different operations of the mobile device 1200 and may contain user interfaces for operations, such as placing and receiving phone calls, text messaging, checking voicemail, and the like.

The operating system 1212 manages the hardware of the mobile device 1200, including hardware such as the display 1252, speaker 1254, keyboard 1256, and camera 1258. The operating system 1212 also manages software (i.e. applications) on the mobile device 1200 for performing tasks requested by the user and handling incoming data, for example. The power controller 1270 of the mobile device 1200 allocates power from the mobile device's power supply 1272 to the circuitry for different mobile device components used to operate the mobile device 1200 and its different features.

The mobile device 1200 also contains a cellular radio channel and WLAN/WMAN data channel 1260 for receiving and transmitting data, such as phone calls, text messages, email, webpage data, and the like. Cellular radio communication can occur through any of the standard network protocols of mobile device communication (i.e. GSM, PCS, D-AMPS, UMTS, and the like). The mobile device 1200 may also contain additional communication channels 1262, such as Wi-fi, Bluetooth, and the like, for receiving and transmitting data as well. The mobile device 1200 may have additional functional elements for communication 1264, such as GPS. Each of the described communication mediums is accessed via the antenna 1266 on the mobile device 1200. The communication mediums for operations of the mobile device 1200 are not limited to the mediums described and can include any other communication mediums known in the art.

In a further aspect, multiple-input and multiple-output, or MIMO techniques may be used to provide directional bearing information of a search subject. If the WIFI radios with MIMO functionality are used, such radios may be accessed programmatically. Each detection event provides sufficient information to estimate directional bearing information.

In still other embodiments, the detection system 100 may be provided with an audio and/or visual indicator of the detection of a beacon. For example, a beeper or flashing visual light may indicate to searchers that a detection event has occurred. This would allow searchers on foot to more be made aware of the possible proximity of a search subject without concentrating on an operator's console, which may be separate hardware or software.

Search agents may likewise be provided with a control device, which may be a mobile device such as that illustrated in FIG. 12, which may include an application allowing users to analyze and visualize search data or invoke such functionality from other applications on the device, in accordance with the discussion herein. For example, the analysis described in FIGS. 8 and 9 may be performed on the device in cases where data is downloaded after a search of a search area is performed or streamed to the search agent's device during the search process. The application may allow for visualization of the search data by plotting detection events on a computer-generated map using GPS coordinate data associated with the event. Multiple detection events may be clustered to provide additional visibility relative to data associated with the event. For example, multiple detection events may be clustered by signal strength in a user interface, allowing a search agent to determine best-likely search areas for search subjects.

FIG. 13 illustrates another embodiment of a beacon detection system 100 d, which is designed to detect a Wi-Fi signal from a mobile device and wake a sleeping phone utilizing a Bluetooth transmitter. Mobile devices utilizing operating systems such as iOS and Android will, after a period of time-for example ten minutes—may go into a power saving mode. The beacon detection system of 100 d includes a Bluetooth transmitter/receiver 1310. As discussed below, the system 100 d performed data acquisition by transmitting a Bluetooth signal which has been found to “wake up” a sleeping phone. In one embodiment, the Bluetooth transmitter/receiver 1310 provided with a selected power output that matches the range of the WiFi radio 410. This ensures that the Bluetooth signal from the system 100 d does not wake a mobile device until the device is in range of the WiFi radio.

FIG. 14 illustrates another method for configuring a mobile device and illustrating device operation after configuration. At 1410, a search identifier application installs on a mobile device. As noted herein, the search identifier application is configured to control certain aspects of a mobile device and can access varying aspects of the device based on the OS in use. At 1420, the search identifier application configures a mobile device with specific SSID settings which the device will attempt to connect to when the search system is within range. At 1430, optionally, the search identifier application configures the device to be receptive to specific Bluetooth signal(s).

After some period of time, the device enters its sleep mode at 1440. At 1450, when a device receives a Bluetooth signal from a search system, the device will awaken from the sleep mode at 1450. At 1460, the search identifier application will cause the mobile device to initiate a passive or active WiFi scan. iOS devices occasionally perform passive WiFi scanning without initiation, but given the proximity of a search system, a scan is initiated to ensure the greatest chance of detection by the search system.

FIG. 15 illustrates another method of performing step 515 which the search system 100 d and the above search identifier application are utilized. As noted herein, in this embodiment, the search system continually broadcasts a Bluetooth signal at a range matching or nearly matching its Wi-Fi sibling a broadcast range of a WiFi signal at 1510. At 1520, Broadcast WIFI SSID(s) from the search are broadcast during the search of a search area. At 1540, the Wi-Fi radio(s) will listen for packets. At 1550, one or more initial connection negotiation packets of a Wi-Fi connection attempt will be received. Steps 1510, 1520, 1540 and 1550 are in one embodiment performed simultaneously, and either one or both of 1510 and 1520 may be used.

In addition to location and communication that can be provided over a Wi-Fi link, the presence of an application on a mobile device can be used to provide additional functionality for those leaving or operating on the fringe of cell phone connectivity. Weather reports and alerts, trail maps, safety and first-aid tips, contact info for emergency services, notification of personal emergency contacts in the case of a failure to return or check in on time. This functionality could be made available directly to consumers via a “first party” app or added to third party applications via a software development kit (SDK). The data could be received via cellular networks, fixed special-purpose Wi-Fi networks that either gather the data themselves (e.g. weather) or relay it from another type of link, or peer to peer transmission that takes advantage of the movement and/or connectivity of individuals in the network.

Again because of the great software and hardware capabilities of modern mobile phones, another embodiment involves user phones, rather than specialized hardware, to search for victims. This is advantageous because search and rescue teams would have essentially free access to search equipment or, in a less remote search environment, other users of the system could opt in to automatically and silently becoming part of the search team as they move about the world. The latter has great potential for locating kidnapped children, for instance.

It should be noted that, particularly with Wi-Fi's general use and availability, the ability to be located could be misused, whether to simply violate its users' privacy or worse. A practical scheme to effectively prevent misappropriation of the system is to assign each user a unique Wi-Fi network ID (known as SSID) such that it could not be predicted in advance or brute forced in real-time and cause the phone to respond and give away its presence and location. This unique ID system could be as simple as a keyed hash of the user ID, personal information, or system generated per-user information.

In all embodiments of RF-based technologies, additional embodiments may use direction finding antennae and techniques to augment the information gained from a detection event. This is in addition to an RF receiver system, for example, by using multiple receivers and adding them together with various phase delays. Newer Wi-Fi standards apply similar techniques to form beams and gain sensitivity, range, and bandwidth. The present technology can take advantage of such advances implicitly or perhaps even explicitly with sufficient API access or replication of standard protocols.

FIG. 16 illustrates another embodiment of a beacon detection system 100 e, which is designed to detect a Bluetooth signal from a mobile device after (optionally) waking a sleeping phone utilizing a Bluetooth transmitter. In the embodiment of FIG. 16, the system is designed to detect mobile devices which will, after a period of time enter a power saving mode. The beacon detection system of 100 e includes a Bluetooth transmitter/receiver 1310. The system 100 e performs data acquisition by transmitting a Bluetooth signal which has been found to “wake up” a sleeping phone and then detects a Bluetooth connection. In one embodiment, the Bluetooth transmitter/receiver 1310 provided with transmission characteristics that are maximized relative to available technology to ensure maximum search range. This ensures that the Bluetooth signal from the system 100 d does not wake a mobile device until the device is in range of the WiFi radio.

FIG. 17 illustrates another method of performing step 515 using the search system 100 e and the above-described search identifier application. In the search system 100 e, a Bluetooth signal is broadcast at 1730 in a manner similar to search system 100 d in FIG. 14. At 1730, the search system continually broadcasts a Bluetooth signal at a known range. At 1540, the system 100 e maintains a wait state, listening for Bluetooth transmissions from beacons in the search area. At 1750, one or more initial connection by a Bluetooth connection radio will be received. Steps 1730, 1740 and 1750 are, in one embodiment, performed simultaneously.

A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions. One general aspect includes a beacon detection system configured to locate a missing search subject, including: a personal device wakeup signal generator; a beacon signal receiver; a location position detector; and a beacon detector configured to detect a location of a broadcasting beacon signal associated with the personal device of a search subject within search data covering a geographic search area derived from a search for the search subject, the search data gathered by the beacon signal receiver and location position detector. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

Implementations may include one or more of the following features. The beacon detection system where the personal device wakeup signal generator is a Bluetooth radio. The beacon detection system where the beacon signal receiver is a Wi-Fi radio and the broadcasting beacon signal is a Wi-Fi signal from the personal device. The beacon detection system where the Wi-Fi radio has a range and the Bluetooth radio has a range closely matching the range of the wife radio. The beacon detection system where the beacon signal receiver is a Bluetooth radio and the broadcasting beacon signal is a Bluetooth signal from the personal device. The beacon detection system where the system is as provided on an unmanned aerial vehicle. The beacon detection system further including a processor, storage memory and code instructing the processor to detect the broadcasting beacon signal from the data which is stored in the storage memory. The beacon detection system where the signal generator, beacon signal receiver, location position detector; and beacon detector are provided in a single housing. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.

One general aspect includes a search system configured to operate on a search vehicle, including: a Bluetooth radio; a Wi-Fi radio capable of broadcasting one or more ssids and receiving connection requests for the one or more ssids; a location position detector; and a beacon detector responsive to the signal receiver, the beacon detector configured to detect at least a location of a Wi-Fi connection attempt to the one or more ssids within search data covering a geographic search area derived from a search for a search subject and gathered by the Wi-Fi radio and location position detector, the connection attempt made by a mobile device associated with the search subject. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

Implementations may include one or more of the following features. The search system where the Wi-Fi radio has a range and the Bluetooth radio has a range closely matching the range of the wife radio. The beacon detection system where the detector is configured to determine the signal strength of the beacon signal and determine from the signal strength a possible location for the search subject. The beacon detection system where the system is contained in a housing provided on an unmanned aerial vehicle. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.

One general aspect includes a computer implemented method of determining a location of a search subject, including: broadcasting a Bluetooth signal to a personal device from a search system; acquiring search data including broadcast signals and associated geographic location coordinates resulting from a geographic search area for a search subject which is gathered by a radio capable of broadcasting one or more initiation signals and receiving transmissions for the one or more of said response signals and a location position detector; determining at least a possible connection request from the beacon signals, the connection request associated with a mobile device associated with a search subject; and filtering the data to determine whether the connection request is from the mobile device associated with the search subject; and outputting search information to a search agent, the search information including a location of at least the connection request. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

Implementations may include one or more of the following features. The computer implemented method where the connection signals are wife signals. The computer implemented method where a search identifier application is provided on the mobile device, and the computer implemented method further includes: detecting one or more unique identifiers for the personal device in the search data including one or more of: a mac address associated with the mobile device; a unique SSID associated with the device; a device identifier associated with a DHCP lease request. The computer implemented method where a search identifier application is provided on the mobile device, and the computer implemented method further includes: detecting one or more unique identifiers for the personal device in the search data including one or more of: a Bluetooth connection request responsive to the connection signal. The computer implemented method further including receiving a registration of the mobile device from the search subject and storing data associating the mobile device and the search subject in a registry for use in the determining step. The computer implemented method further including associating the mac address to a manufacturer to present detected signals associated with the mobile device. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.

FIGS. 18-24 illustrate another embodiment of the beacon detector technology. The search identifier application may be implemented as mobile app and technology system for locating lost subjects within cellular range, on the edge of cellular range, and especially when fully outside of cellular coverage. The miniaturized, low-cost detector can locate subjects over 800 meters away in ideal conditions and, in field testing in all types of terrain, always detects the subject sooner than unaided humans.

The technology may be extended to 70% of Earth's surface by simply keeping the subject's mobile phone on or attached to their person, dry, and detectable above the water line.

FIG. 18 illustrates a water rescue scenario. In one embodiment, it has been found that increasing the height of the detector 1820 (of any embodiment described herein, and whether mounted on a drone 1840 (such as any described herein) or other search craft, such as a vessel 1810) can increase the effectiveness of the search in water rescue situations. The relative effectiveness of range relative to height is illustrated in FIG. 24, which shows that the detector elevation in meters versus detection range.

FIGS. 19A and 19B illustrate two exemplary shoulder pockets designed for phones and provided on a life preserver 1900. A first pocket 1910 may be formed of mesh and suitable for use with waterproof mobile devices or in combination with waterproof mobile device pouches which are commonly available. A second, waterproof pouch 1920 may be formed of a waterproof material, such as clear or opaque plastic, and secure the device in a location such that when a search subject is in the water (as illustrated in FIG. 18,) the mobile device is maintained above the waterline and accessible to the detector.

FIG. 20 illustrates another embodiment of a pocket suitable for use with the present technology. To allow the device to be detected, a Velcro or a spring-loaded tether 2015 allows the phone and/or the pocket itself to detach from the personal flotation device (PFD) 1900 and remain in the user's hands during used, and remain in the pocket and attached to the PFD when not in use. If the jacket and user are in water, the pocket can detach (using water soluble glue or thread), while remaining tethered to the jacket.

FIG. 21A illustrates a tethered waterproof pouch suitable for use with the present technology. It should be understood that the pouch may be secured to the PFD 1900 by a tether 2115. The pouch may be designed to remain apart from the jacket 1900, or may be provided in a pocket 2110, or attached to the vest by Velcro or housed in a pocket.

FIG. 21B is an end view of another embodiment of the tethered waterproof pouch suitable for use with the present technology. In any of the aforementioned embodiments of a detachable pocket or pouch, the pouch may be designed to float and orient the mobile device such that one side of the phone faces upward when in the water. This may be accomplished by providing buoyancy increasing elements 2125 (such as air pockets) on one side of the pouch, while placing a buoyancy reducing elements 2130 on a second side of the pouch. Users can be encouraged to place their device “right side up” in the pocket by making the desired “up facing” side of the device (whether the front or back) relative to a transparent portion of the pouch. If it is desired to have the back side of the device facing up when the pouch is in the water, the transparent side can include the buoyancy reducing elements 2130 and an opaque side can include the buoyancy increasing elements. This can be reversed. It is generally desirable to have the side of the device with the greatest antenna exposure “facing up” in order to provide the maximum possible signal strength to the detector. The pouch and pocket may also provide transparent windows where the camera flash would typically be located, so that the flash can be triggered, by the user or a search detector in the vicinity, to strobe (in an SOS pattern, for instance) to increase visibility.

FIG. 21C is a plan view of another embodiment of the tethered waterproof pouch suitable for use with the present technology. The pouch in FIG. 21C may orient the device so that the top of the device is adjacent to the surface of the water, while the bottom is submerged, by placing the buoyancy elements at the top and bottom of the pouch as illustrated in FIG. 21C.

FIG. 22 illustrates an embodiment where the device tether is coupled to solar panels embedded in the PFD and positioned for optimal exposure to the sun. In this embodiment, the device tether may have an electrical coupling component allowing the mobile device to electrically connect to panels 2200 and associated regulating circuitry to provide a current to the mobile device.

FIG. 23 illustrates an embodiment where the device tether is coupled an external antenna embedded in the PFD. In this embodiment, the device tether may have an electrical coupling component allowing the mobile device to electrically couple to one or more antennas 2300 and increase the range of the mobile device, while ensuring a best position for the antenna relative to the search detector.

Since the vast majority of people are on the water for pleasure, it is expected that the ability to keep phones close at hand would be very appealing. The search identifier application helps users engage or maintain a mode which is conducive to detectability, and the battery life in that mode makes it viable as a permanent configuration for the phone. Most would see a significant benefit to their convenience, happiness, and phone's safety, with some, particularly parents of teens and pre-teens, conscious of the safety benefits. Even without the search identifier application, the pocket would enable cellular forensics in many coastal scenarios.

Given the attachment so many people have to their phones today, adding a “phone caddy” to keep their device close at hand may drive significant additional usage of personal flotation devices, especially among teens 13-17 where usage plummets and phone use skyrockets.

As noted above, in one embodiment, preparation for a search solution starts with installing search identifier application and simple registration. The user possesses the search identifier application and device carrying PFD or PFD sleeve.

Once on the water, the user can quickly check the search identifier application status by opening the app. Making any necessary changes (e.g. enabling WiFi) is guided and takes just a few taps, and many users are already in the desired state 24/7. The user then easily deposits the phone into the specially designed pocket in their PFD and is now ready for a day of enjoyment or work on the water. All normal phone functions continue as before.

In case of a search, floating in the water, the shoulder pocket keeps the phone dry and at or above the water line, enabling long-distance localization of the phone. If the phone is in or enters cellular coverage after a search has been initiated, it will reply with its GPS located coordinates in seconds. Off grid, if a detector gets a strong enough connection to the phone, it will receive those same coordinates over the established WiFi link. Finally, at minimum, any packets received at all from the phone will trigger a detection, allowing direction finding or signal strength mapping, in addition to the basic but powerful confirmation that the device is within range.

Cellular phones' near universal ownership means the search identifier application has great potential to reach recreational boaters and many professionals. Exceptions may possibly include be young children who don't typically have phones and professionals not permitted to carry a phone. Specializations would be required for those, like crab fisherman, likely to receive an impact to the chest, or to make the pocket compatible with manual- or automatically-inflating PFDs.

Alternatives to the water-proof pocket PFD include the use of a waterproof carrier attached to the PDF with, for example, bungee cords. In inflatable PFDs, this would allow the pocket to stay in place when deflated, yet still not interfere with inflation and buoyancy. Young children, under the age of 10, typically don't have their own phone and the size constraint of the pocket may be overly burdensome. Sailors, if not permitted to carry a phone while on duty, would require a special purpose device to emulate the required aspects of mobile phone functionality—fortunately such devices are available off-the-shelf. Workers who might take impacts to the chest in the performance of their duties, like crab fisherman, would have the pocket buried into the jacket or otherwise reinforced to prevent breaking their phones.

Workers, fishermen, recreational boaters and personal watercraft users, kayakers and whitewater rafters all derive value from keeping their devices on their person.

The potential variants on the water-borne application of the above technology include any number of combinations or variations of the above disclosures. For example, the solar panels may be provided on the dry pouch, or internal water absorbent fabric for drying and buffer in case of a first layer breach may be provided.

The search identifier application makes the phone responsive to searches via cellular, WiFi, and Bluetooth. As illustrated in FIGS. 18 and 24, the search identifier application effectively extends the searchers existing detection methods to the 2.4 GHz and cellular spectrum by piggybacking on existing search vehicles. The search identifier application detector is low cost and lightweight—the size and weight of a deck of cards—designed to be easily carried on foot, consumer-class UAS, ATV, helicopter, boat, horse, etc. It uses off-the-shelf components to achieve cost targets and capitalize on industry advancement. The antenna is swappable to ensure optimal beam patterns and mounting solutions.

The search identifier application, once setup, may educate the user on keeping the phone in the proper mode and maximizing battery life based on real-world knowledge. It alerts if they become the subject of a search and when found by a detector. It provides tools for emergencies, converting their camera flash into an SOS strobe and facilitating sending their GPS coordinates, but also offers advice for avoiding and during emergencies, and provides complete application support.

There are many possible designs including strapping an existing dry bag to the shoulder of an existing PFD. A Velcro wrap with a zippered mesh pocket for the dry bag is one alternative. This has the advantage that it can be added to any PFD and can be attached to whichever shoulder the user prefers.

The waterproof carrier for a cell phone with the search identifier application could be integrated into the PFD, so it will not come off or flap around. An easier closure mechanism than existing dry bags, such as a waterproof zipper, to ease access to the phone, may be provided. For PFDs where some immersion is expected, the ability to flip the phone to see the screen could display useful information. For limited immersion scenarios, a double pocket could enable one-hand accessibility to the phone by lining the first pocket with a hydrophilic fabric to dry the user's fingers or absorb any water that makes it past the exterior zipper.

In a further embodiment, NFC charging may be provided inside the pocket, to avoid iOS/Android plug issues as well as increase convenience. A mobile device may be secured by sandwiching it between two semi-rigid plates, allowing multiple NFC coils on both plates to charge the phone while it's being held.

Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. For example, the system described could be used to locate a wide variety of targets and in various scenarios, like first responders while they're also looking for the missing victim, fire fighters in brush fires, police serving warrants, wandering elderly, lost children, horses, or dogs. 

What is claimed is:
 1. A processor enabled method in a mobile device, comprising: configuring a WiFi radio controller of the mobile device with a WiFi service set identifier of a search detector; configuring a Bluetooth connection configuration of a search detector; responsive to a rescue trigger, directing the device to exit a low power mode upon a connection attempt from a Bluetooth radio via the configured Bluetooth connection configuration; and upon receiving the connection attempt, causing the WiFi radio to power up and attempt to connect to the configured WiFi service set identifier.
 2. The processor enabled method of claim 1 wherein the method comprises providing a user interface on a display of the mobile device and the rescue trigger is a user input directing the device to enable a rescue mode.
 3. The processor enabled method of claim 1 wherein the rescue trigger comprises the mobile device being inactive for a time period.
 4. The processor enabled method of claim 3 wherein the method comprises providing a user interface allowing a user to modify the inactivity conditions.
 5. The processor enabled method of claim 1 wherein the method comprises providing a user interface on a display of the mobile device allowing the user to enter registration information uniquely identifying the mobile device to a rescue agency.
 6. The processor enabled method of claim 5 wherein the method comprises transmitting the user registration information to the rescue agency.
 7. A search system, comprising: a search beacon detector; and code configured to instruct a processor in a mobile device to execute steps of: configuring at least one of a plurality radios in the mobile device with a first connection profile associated with a search beacon detector; responsive to a rescue trigger, directing the device to exit a low power mode upon a connection attempt from the at least one of the plurality of radios; and upon receiving the connection attempt, causing at least the one and a second of the plurality of radios to power up, the second of the plurality of radios configured with a second connection profile associated with the search beacon detector; wherein the search beacon detector adapted to detect each connection request associated with the first and second connection profiles.
 8. The search system of claim 7 wherein the code is configured to instruct the processor to provide a user interface on a display of the mobile device and the rescue trigger is a user input directing the device to enable a rescue mode.
 9. The search system of claim 7 wherein the code is configured to allow the processor to enter low power mode after a period of inactivity of the mobile device.
 10. The search system of claim 9 wherein the code is configured to instruct the processor to providing a user interface allowing a user to modify the inactivity conditions.
 11. The search system of claim 7 wherein the code is configured to instruct the processor to providing a user interface on a display of the mobile device allowing the user to enter registration information uniquely identifying the mobile device to a rescue agency.
 12. The search system of claim 7 wherein the at least one of the plurality of radios is a Bluetooth radio and the first connection profile is a Bluetooth connection profile.
 13. The search system of claim 12 wherein the second of the plurality of radios is a WiFi radio and the second connection profile is a WiFi connection profile.
 14. The search system of claim 13 wherein the second connection profile includes at least one SSID which is unique to a rescue agency.
 15. The search system of claim 13 further including configuring the WiFi radio with a plurality of connection profiles including a plurality of SSIDs
 16. The search system of claim 15 wherein the code is configured to instruct the processor to output a registration of the mobile device from the search subject to a data store of rescue agency.
 17. A search system, comprising: providing an application executable on a processor of a mobile device, including code configured to instruct the processor to execute steps of: configuring at least one of a plurality radios in the mobile device with a first connection profile associated with a search beacon detector; responsive to a rescue trigger, directing the device to enter a low power mode while awaiting a connection attempt from the at least one of the plurality of radios; and upon receiving the connection attempt, powering up at least the one and a second of the plurality of radios, the second of the plurality of radios configured with a second connection profile associated with the search beacon detector; and a waterproof device container, the waterproof device container adapted to be coupled with a user of the mobile device and position the mobile device of a user at a location near the surface of water when the device and the container are in water.
 18. The search system of claim 18 wherein the container is a pocket on a personal floatation device located in a position near the shoulder of a user wearing the device.
 19. The search system of claim 18 wherein the container is a pouch tethered to a personal floatation device and adapted to position the device near the surface of the water.
 20. The search system of claim 18 wherein the system further includes a solar charging panel and a connection allowing the mobile device to receive power from the solar charging panel. 