Tracking device systems

ABSTRACT

In a tracking device system, a networked smart device is enabled to cause execution of an executable function if a trigger condition of a conditional rule is satisfied. The conditional rules are customizable on a user interface of the smart device. The trigger condition may be any information received in a signal from a tracking device, for example, sensor data, location, a time, a date, a button press, a proximity, and more generally a trigger condition can be any condition that has a truth value by which an IF/THEN conditional rule can be evaluated and either is satisfied or is not. Executable functions for use in conditional rules may be selected from functions of a smart device, but also may include any function of a remote machine, network or system. Bluetooth radiotag devices may also include a cellular radio modem for global networking. Network systems may include software for tracking groups of radiotags and for autoprovisioning location and tracking services.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation-in-Part of U.S. patent applicationSer. No. 16/747,458, filed 20 Jan. 2020, which is a Continuation-in-Partof U.S. patent application Ser. No. 14/301,236, filed 10 Jun. 2014, nowU.S. patent Ser. No. 10/580,281. This application is aContinuation-in-Part of U.S. patent application Ser. No. 16/207,192filed 2018 Dec. 3, which is a Continuation-in-Part of U.S. patentapplication Ser. No. 15/853,917, filed 25 Dec. 2017, now U.S. Pat. No.10,424,189, which is a Continuation of U.S. patent application Ser. No.14/301,250, filed 10 Jun. 2014, now U.S. Pat. No. 9,892,626.

This application is further related to U.S. patent application Ser. No.14/820,475 filed 6 Aug. 2015, now U.S. Pat. No. 9,392,404; to U.S.patent application Ser. No. 14/301,213, filed 10 Jun. 2014, now U.S.Pat. No. 9,564,774; to U.S. patent application Ser. No. 16/575,315,filed 18 Sep. 2019, now U.S. patent Ser. No. 10/546,228; to U.S. patentapplication Ser. No. 15/180,080 filed 12 Jun. 2016, now U.S. Pat. No.9,961,523; to U.S. patent application Ser. No. 15/924,248 filed 18 Mar.2018, now U.S. Pat. No. 10,638,401; to U.S. patent application Ser. No.14/967,339 filed 13 Dec. 2015, now U.S. Pat. No. 9,774,410; to U.S.patent application Ser. No. 15/681,806 filed 21 Aug. 2017, now U.S. Pat.No. 9,900,119; to U.S. patent application Ser. No. 15/863,731 filed 5Jan. 2018, now U.S. Pat. No. 10,063,331; to U.S. patent application Ser.No. 15/959,249, filed 22 Apr. 2019, now U.S. Pat. No. 10,361,800; toU.S. patent application Ser. No. 15/959,250 filed 22 Apr. 2018, now U.S.patent Ser. No. 10/937,286; to U.S. patent application Ser. No.16/575,315, filed 18 Sep. 2019; to U.S. patent application Ser. No.16/950,666, filed 17 Nov. 2020; and to U.S. patent application Ser. No.17/163,403, filed 30 Jan. 2021. All said related applications areincorporated in full herein by reference for all that they teach.

BACKGROUND

This invention is in the field of wireless electronic radiotags andnetworks.

There are wireless devices and systems for tracking objects, pets andindividuals. For example, radio frequency identification (RFID) tagshave long been used to track objects, pets, cattle, and hospitalpatients. A reader generates an electromagnetic field in the tag andthat field powers a small transmitter in the tag that emits a signalwith the identity of the tag. The reader picks up the tag's radio wavesand interprets the frequencies as meaningful data. RFID tags requireclose proximity between the reader and the tag and such systems areoften limited to generating only identity information and do not provideinformation about the motion, heading, time, temperature or otherenvironmental characteristics in the vicinity of the tag.

There are systems with sensors attached to clothing or objects formonitoring the physical activity of those wearing the clothing of themotion of the object. See, for example, Pub. No. US 2013/0274587. It hassensor and transmitter to send information about the motion of theobject and the temperature sensed by the object. A base station uses GPSor triangulation to identify the location of the object. Although themonitoring system may have one or more alerts, no alerts are provided onthe sensors on the clothing of the users.

Other tracking systems use tracking sensors with built-in GPS systemsand transceivers for establishing wireless communication with a network.One such system is found in U.S. Pat. No. 8,665,784. However, the powerrequired to operate a GPS system often rapidly drains the battery ofsuch tracking sensors or requires the sensors to have a relatively largepackage, which is not readily attached to small objects, pets or people.

The prior art solutions do not address the problem of finding small,lost objects in within a room or house as well as at a distance. Knownsolutions are not compatible or cost effective for individuals. Largesensors that require recharging many batteries impose too high a levelof maintenance on an individual. None of the above solutions will find asmall sensor that may be hidden in drawer or under a pillow. They do notprovide control apparatus for commanding the sensor to emit an audibleor visual alert. The prior art shown above is silent regarding theproblems of pairing sensors with location, remote controlling a sensor,and using a sensor to remote control a sensor control device over anetwork, for example.

SUMMARY

This summary is provided to introduce a selection of concepts that arethen further described in the Detailed Description. This summary is notintended to be used as an aid in determining the scope of the claimablesubject matter.

Embodiments of the “tracking devices” (also termed “radiotags”) of theinvention are configurable by an individual user to help track or findlost objects and monitor pets and to monitor the activities of smallchildren or hospital patients as part of a lost-and-found radio system.The terms “tracking device” and “radiotag” may be used interchangeablyto indicate a radio locator device that is attachable to an asset,person or pet in need of location and tracking services. The system is acomprehensive solution to locate, monitor and track missing pets,people, luggage, inventory, tools and items of interest. In someembodiments, tracking devices incorporate various sensors and controlmechanisms that make the tracking devices a versatile multi-functiondevice which can remotely control other devices such as smartphones,tablets, or computers. The device is instrumental in shaping andcreating a market for the “internet of things” by allowing a user ornetwork of users to seamlessly share sensor data while providing aregional or global picture of environmental conditions such astemperature, movement, trends in a particular area or simply acollaborative picture of all dogs active in a particular city at aspecific time. The tracking device has a speaker and a light emittingdiode. A control apparatus is associated with the tracking device. Thecontrol apparatus may command the tracking device to emit an alert,including a buzz or flashing light. If a tracked object is inside adrawer or under a pillow, the person searching for the object will hearthe buzz or see the flashing light. The control apparatus may also setits own alerts to trigger based upon the distance between the trackingdevice and the control apparatus. Alerts can be based upon pairing thelocation of the tracking device to the alert so that alerts are onlyprovided at predetermined locales and/or predetermined times.

Embodiments of the tracking devices conserve power and space. Theelectronics of the tracking device may be carried on a crescent-shapedprinted circuit board that partially encircles a battery. Encircling thebattery with the printed circuit board reduces the thickness of thetracking device. Top and bottom covers enclose the printed circuit boardand the battery. One cover has an opening to access the battery. In someembodiments the battery may be wirelessly recharged with inductive orsolar powered chargers.

The electronics include a Bluetooth low energy transmitter that hasenough computing power to control sensors and the tracking device. Aceramic antenna further conserves space. In some embodiments the sensorsinclude a multi-axis sensor such as a nine-axis motion sensor, a headingsensor with magnetic compass and multiaxis gyroscope, or a temperaturesensor. Embodiments may omit GPS sensing circuitry and rely on the GPScircuitry in control devices. Other embodiments include GPS circuitry.Using one or more programs in a control apparatus, a tracking device canbe set to trigger one or more alerts depending upon the distance betweenthe tracking device and the control apparatus.

There are multiple network embodiments for the tracking devices. In alocal network a hub communicates with local tracking devices and relaystheir sensor outputs to a cloud/internet site. Multiple hubs can form awider area network that allows the hubs to communicate with each otherand triangulate the approximate position of each tracking device. In astill wider area network, tracking devices anywhere in the world can bemonitored by position, time of day, motion and any other characteristicor parameter sensed by a tracking device.

The tracking devices are assigned to an owner-user who may grantprivileges to others for using the devices of the owner. The owner-usermay also have shared privileges with tracking devices of other users.Objects lost anywhere in the world may be located by using position dataprovided by other control devices that carry the control program and areregistered to the cloud/internet site.

The embodiments described herein provide a computer program that isinstalled on a control apparatus. The computer program enables thecontrol apparatus to detect tracking devices within range of the controlapparatus and acquire control of the tracking device unless anothercontrol apparatus already controls the device. The control apparatus mayalso release from its control one or more selected tracking devices. Thecontrol program also allows the user to keep private the information ofthe tracking device. Once set to private, only the control apparatus orother designated apparatuses or individuals will have access to datafrom the tracking device.

The control program allows the user of the user to select at least onealert. The control device or the tracking device or both may generatethe alerts. In order to trigger the alert, the tracking devicebroadcasts a beacon signal via a Bluetooth transceiver. The signalstrength of the beacon signal received by the control apparatus isrepresentative of the distance or range between the control apparatusand the tacking apparatus. The signal strength is considered a conditionfor a distance alert. If a control apparatus suddenly receives a beaconsignal of a controlled tracking device, the control apparatus mayindicate the device has returned to a location proximate the controlapparatus. Likewise, failure to detect a beacon signal of a controlledtracking device indicates the device is outside the range of the controlapparatus. The relative strength of the beacon signal is proportional tothe proximity between the control apparatus and the controlled trackingdevice.

The control apparatus or the tracking device or both may monitor otherconditions. Each other condition and combinations of two or moreconditions may be paired or otherwise associated with each other toprovide multiple conditions for triggering an alert. In addition to therange signal beacon, the tracking device may carry one or more sensorsand each sensor may output one or more signals representative of otherconditions monitored by the sensors. Other conditions include and arenot limited to motion of the sensor in any direction or in a particulardirection; temperature and other signals representative of time, thegeographic location of the tracking device or both, motion and otherphysical, biological or chemical conditions being monitored by sensors.As such, each condition monitored may be associated or paired with anyother one or more conditions to provide multiple conditions that must bemet to trigger an alert.

The beacon signal includes the identification information for thetracking device and a signal representative of the status of the chargeof the battery, and is broadcast as a bitstream containing bits infields or frames having a defined format. The program displays both therange and battery status information. As explained above, the locationof the tracking device may be detected by other control devices, whichmay assist the owner in locating a lost tracking device. Accordingly,the control apparatus, if associated with network of other controlapparatuses, may acquire information about the location of a trackingdevice remote from the other networked control apparatus. The controlprogram provides a feature for selecting a map displaying the remotelocation of each tracking device controlled by the control apparatus.

In other embodiments the control program allows the control system toremotely control operation of the tracking device or allow the trackingdevice to remotely control the control apparatus or both. The controlprogram enables the control apparatus to activate an audible or visualalarm or both by selecting a corresponding alarm button shown on adisplay of the control program. The control program allows the controlapparatus to allow one of more of its operations to be controlled by thetracking device. The control program permits the user to set themulti-function button on the tracking device to operate a camera, anemail or a text messaging system of the control apparatus. In addition,the multi-function button may be programmed with the control program toactivate an audible alarm on the control apparatus. For example,pressing the multi-function button may cause a smartphone controlapparatus to emit a distinctive sound.

In yet other instances, the control program may be configured to allowthe user to define groups of objects (each having a tracking device) andto find or track those objects as a group. In selected instances, thecontrol program may be configured to track objects leaving a geofencedarea with other users. And in some instances the message traffic may berepurposed for orientation purposes.

The embodiments described herein provide a computer program that isinstalled on a cloud host. The cloud host is a server or servers havingan IP address and is accessible via a packet data environment. The cloudhost includes programs and databases designed to implementlost-and-found location and tracking services.

BRIEF DESCRIPTION OF THE DRAWINGS

The teachings of the inventive art disclosed here are more readilyunderstood by considering the drawings in conjunction with the writtendescription including the claims, in which:

FIG. 1A is a perspective view of the top of a first tracking device.

FIG. 1B is a reverse perspective view of the tracking device shown inFIG. 1A.

FIG. 1C is an exploded top-to-bottom perspective view of an assembly fora tracking device showing a covers on opposite sides of a printedcircuit board (PCB), battery next to an opening in the PCB and a batteryconnector on one of the covers.

FIG. 1D is a reverse exploded perspective view of the tracking deviceshown in FIG. 1C.

FIG. 1E is a view of an alternate battery cover.

FIG. 2A is block diagram of elements on the PCB.

FIG. 2B is a partial schematic of an alternative charging system.

FIG. 3 is a view of the basic tracking system.

FIG. 4 is a view of a single hub (hive) tracking system.

FIG. 5 is a partial view of a multi-hub tracking system.

FIG. 6 is a view of a wide area location system for finding losttracking devices or monitoring multiple sensors in tracked devices.

FIG. 7 is a view of screenshot 101 of a control program.

FIG. 8 is a view of screenshot 102 of a control program.

FIG. 9 is a view of screenshot 103 of a control program.

FIG. 10 is a view of screenshot 104 of a control program.

FIG. 11 is a view of screenshot 105 of a control program.

FIG. 12 is a view of screenshot 106 of a control program.

FIG. 13 is a view of screenshot 107 of a control program.

FIG. 14 is a view of screenshot 108 of a control program.

FIG. 15 is a view of screenshot 109 of a control program.

FIG. 16 illustrates a control device set up to track multiple objectsthat make up a user-defined group.

FIG. 17 is a view of a screenshot of a control program, the screenhaving user interactive controls for finding and tracking groups ofobjects.

FIG. 18 illustrates a group 1800 of BT radiotags that report via adedicated connection to a BT radio of a smartphone 70.

FIG. 19 illustrates a group of BT radiotags 1900 that in addition toconnecting to the BT radio of a smartphone, also are capable of forminga mesh network with each other.

FIG. 20 shows the BT mesh network as an independent network.

FIG. 21A shows BT device in a hub or star radio network.

FIG. 21B shows a true peer-to-peer mesh network.

FIG. 22 is a view of a BT tracking device with an alternate form factor.

FIG. 23 is a view of a BT radiotag with a thin credit card-like body.

FIG. 24 shows an organizer pad with stations for recharging three orfour BT tracking devices and a smartphone.

FIG. 25 diagrams the structure of a BT transmission 2500 as specified bythe BT Special Interest Group.

FIGS. 26A, 26B and 26C are sample packet structures that relate to theBT advertising and link layers.

FIG. 27 is a view of the structure of a proprietary inquiry responsepacket

FIGS. 28A and 28B are perspective views of a dual-radio “XCB” radiotagdevice with both BT and cellular radios.

FIG. 29 is a schematic of an embodiment of an XCB device.

FIGS. 30A and 30B illustrate XCB radiotags as part of groups of trackingdevices.

FIG. 31 is a view of a system in which an XCB radiotag serves as analternate link between a group of BT radiotags and a cloud host.

FIG. 32A is a screenshot showing exemplary services available usingsystems with tracking devices.

FIG. 32B provides a screenshot of a tracking program in operation on asmartphone as part of a lost-and-found system.

FIG. 33 is a view of an IP packet data message containing radio contactinformation.

FIG. 34 shows a concatenated structure of a multi-record radio contactlog useful in tracking a group of radiotags.

FIG. 35 is a view of a rolling memory stack containing radio contactrecords.

FIG. 36 is a view of a relational database for managing sequentialsnapshots of radio contacts.

FIG. 37 is an overview of system that includes a community of users, andis intended to show the basic concepts of “cloud shortcutting”.

DETAILED DESCRIPTION

While exemplary embodiments have been illustrated and described, it willbe appreciated that various changes can be made therein withoutdeparting from the spirit and scope of the invention.

One embodiment of a tracking device 10 is shown in FIGS. 1A, 1B. Thetracking device 10 is an assembly having outside covers 11, 16. Thecovers are made of glass filled acrylonitrile butadiene styrene (ABS)thermoplastic which is light in weight, can be injection molded and isresistant to impact, heat, water, acids, alkalis, alcohols and oils. Thecovers 11, 16 have circular-shaped bodies 3 a, 3 b, each with an annularwall 4 a, 4 b. The covers also form a through-hole 17 for receiving acord or chain to attach the tracking device to an object, a pet or theclothing of a person.

Turning to FIGS. 1C, 1D, the covers 11, 16 enclose a printed circuitboard (PCB) 12 and a battery 15. The PCB 12 has a crescent-shaped bodywith an outer edge 2 a having a radius of curvature slightly smallerthan the radius of curvature of the covers 11, 16 and an inner edge 2 bwith a smaller radius of curvature. Two circular arcs of differentdiameters thus define the crescent shape of the PCB 12. The PCB 12 hasan opening 13 a for receiving a circular battery 15.

The diameter of the battery 15 is smaller than the diameter of opening13 a in the PCB 12. The battery 15 has one terminal on its surface andanother terminal on its edge.

The edge of the battery engages a conductive edge connector 18 on theinner edge 2 b of the PCB 12. Another conductor has a spring-biased body19 that extends from the PCB 12 toward the middle of a surface of thebattery 15. The battery 15 is held in the opening 13 a, 13 b between thetwo covers 11, 16 and against the conductive edge connector 18 on theinner edge 2 b of the PCB 12. Cover 11 has a ripple wave design on itssurface.

Cover 16 has an opening 13 b sufficient to receive the battery 15. Athreaded battery cover 8 a, a matching threaded annular wall 8 b and anO-ring 7 secures battery 15 in the openings 13 a, 13 b. A detent 9 inthe surface of the battery cover 8 a receives an opening tool, such ascrewdriver or the edge of a coin (not shown). Inserting the tool in thedetent and rotating the cover 8 a open the cover to access the battery.In an alternate embodiment as shown in FIG. 1E, the slot 9 is replacedby two spaced-apart holes 110, 111. A key 115 has two prongs 112, 113that fit into the spaced-apart holes and allow a user to apply torque tothe cover 8 a to open it and remove the battery 15.

The tracking device is assembled by inserting a PCB 12 with componentcircuitry on the inside surface of cover 16. The other cover 11 isplaced on top of cover 16 to define a cavity that holds the battery 15and the PCB 12. The two covers are ultrasonically sealed to resist wateror other materials from entering the device 10. A battery is insertedthrough opening 13 b in cover 16 and the battery cover 8 a engages theO-ring 7 and the threaded wall 8 b. Cover 8 a rotates in oppositedirections to close or open. By encircling the battery with the PCB 12,the PCB does not increase the thickness of the assembly that isdetermined only by the covers 11, 16 and the thickness of the battery16. Some embodiments are 5 mm thin and 40 mm in diameter. Unlike otherdevices that use batteries, the PCB does not contribute to the thicknessof the device 10 because the battery 15 does not rest on the PCB 12 butis partially encircled by the opening 13 c in the PCB 12.

A multi-function button 14 a extends from an opening defined byhalf-oval walls 14 b, 14 c in the sidewall of the junction of theannular walls 4 a, and 4 b. In one embodiment there is a singlemulti-function rubber button 14 a that extends from the edge of thedevice. Button 14 a is held in place by wall edges 14 b, 14 c thatoverlap surface 14 d to hold the rubber button 14 a inside the covers11,16. The rubber button is aligned with a mechanical button 14 e thatis attached to the PCB 12 and coupled to core device 21. The covers 11,16 and the PCB 12 have aligned openings 17 a, 17 b, 17 c that create anexternal key ring hole 17 for holding a key ring, a carrying chain orcord. As will be explained below, the component circuitry has a speakerfor sounding one or more alarms. The edge of the covers defines a keyring hole 17 that has on or more small holes that may be sealed. Inthose embodiments a removable rubber plug 5 is inserted into the hole toprevent moisture and water from entering the cavity holding thecomponent circuitry 20. As an alternative, a larger rubber plug couldfill the entire keyhole opening 17 or at least cover the annular innersurface of the keyhole.

FIG. 2A shows the component circuitry 20 of the PCB 12, including aBluetooth low energy (BTLE) core device 21. The core device 21 includesa transceiver for sending and receiving information signals and controlsignals. The core device also includes a microprocessor, read onlymemory and random access memory sufficient to enable the core device 21control the other components on the PCB 12. In a further embodiment, apermanent or removable memory device is added to the device. The memorymay be added through another side hole similar to the side hole formedby walls 14 b, 14 c that hold the rubber button 14 d in place. Thememory device could be inserted or removed through the second sidewallhole and a rubber stopper, similar to rubber button 14 a, would seal theopening second sidewall hole. The memory device may hold informationsensed by the sensors.

The core device 21 is assigned a unique identification code known to theuser and the core device broadcasts the code at periodic intervals. Themaximum range of the core device 21 is approximately 300 feet.Broadcasts are made using a ceramic antenna 22. The ceramic antennasaves space. A typical ceramic antenna may take up only 20% of the spaceoccupied by a trace antenna, thereby contributing to the overall smallsize of tracking device 10.

The core device 21 controls a speaker 23 and a light emitting diode(LED) 24. The speaker 23 and the LED 24 provide alarms for the trackingdevice 10. The cover 11 is thin enough to allow light to pass through.In alternate embodiments, a clear or highly translucent window isprovided in the cover 11 above the LED 24.

The core device 21 is connected to one or more sensors 25, 26 or anynumber of sensors 27. The sensors in some embodiments sense physicalparameters experienced by the tracking device 20, including and notlimited to displacement, motion, acceleration, electromagneticradiation, radioactivity, temperature, sound, pressure and otherphysical parameters. In some embodiments, a sensor 25 is a combined9-axis motion sensor and temperature sensor. The sensor 25 has anaccelerometer, gyroscope, and magnetometer for each axis. Theinformation output by the 9-axis sensor enables the receiver to trackthe position of the tracking device from one location to anotherlocation. The motion of the tracking device can be monitoredcontinuously as long as a receiver is close enough to record the motionoutput information of the 9-axis sensor 25. As an alternative, theinformation may be stored in the memory.

A multi-function button 14 a is operable to perform one of morefunctions described in more detail below. The single button 14 a on thetracking device 10 and one or more control programs resident on acontrol apparatus 37 (see FIG. 3) operate together to set one or morealarms, pair triggers and remotely control operations of the controlapparatus 37. Those skilled in the art understand that a controlapparatus may be any electronic device with processor, memory andcommunication ability including and not limited to a smartphone, asmartwatch, a desktop computer, a laptop or notebook computer, a tabletcomputer, a personal digital assistant, or any equivalent device thatcan store and hold programs and data, execute programs, receive and/ortransmit information and commands via wired or wireless channels ofcommunication.

Some embodiments of the invention are equipped with rechargeablebatteries that may be recharged via a wireless or wired rechargingapparatus or a solar recharging apparatus. Wireless chargers, also knownas induction chargers, typically place one coil in a charging device orpad that is connected to an AC power source and another (receiver) coilinside the device with a rechargeable battery. As shown in FIG. 2A, atransmitter module 28 a has a transmitter coil 28 b that produces atime-varying electromagnetic field that is coupled to a receiver coil 29b of a receiver module 29 a on the PCB 12. The receiver module 29 a alsoincludes circuitry to convert AC voltage and current to DC voltage andcurrent. The core device 21 controls operations of the receiver module29 a and turns it on and off to recharge the battery 15 as needed.Transmitter and receiver modules are available from a number ofintegrated device manufacturers.

Other embodiments of the invention may have wired rechargers. These arewell known devices and may be incorporated into tracking devices 10 byproviding a suitable port (not shown) to receive power from an externalpower source. However, such external ports provide openings in thecovers 11, 16 where water or other fluids may gain entry to the cavityholding the PCB 12 and its component circuitry 20.

Still other embodiments may have solar recharging systems such as shownin FIG. 2B. One such solar recharging system 120 has one or more solarcells 125, 126 located on respective covers 11, 16 and connected to abattery regulator circuit 128 and rechargeable battery 115. Core device21 is connected to the regulator circuit 128 and battery 115. The coredevice 21 uses the solar current to know whether the tracking device isin available light or not. In that way, the solar cells provide a dualrole by acting as light sensors. This allows further flexibility bypairing any other sensed parameter to the presence or absence of light.The amount of current generated by the solar cells 125, 126 indicatesthe intensity of light received by the tracking device 10.

Other embodiments of the tracking device have circuitry for harvestingRF power to charge the battery 115. Athttp://www.hindawi.com/journals/apec/2010/591640/there is described anRF harvester having a GMS antenna, one or more resonant circuits,boosters, peak detectors and an adder. The circuitry contains passivecomponents and is designed to have tuned circuits at known frequenciesof cell phone towers (960 MHz) and Bluetooth devices (2.4 GHz). Theboosters are Villard voltage multipliers. Reported test results show theRF harvester located within 500 meters of a cell tower was capable ofgenerating 158 nW and successfully operated a calculator and a lightemitting diode.

Turning to FIG. 3, an embodiment of a first system 30 is shown. Thesystem includes tracking devices TD₁ 31, TD₂ 32, . . . TD_(N) 33. Eachtracking device 10 is paired with a control apparatus 37 which may be acomputer, a tablet, a smartphone or a smartwatch, for example. Thecontrol apparatus 37 has a transceiver for establishing a wirelessconnection to the cloud/internet 35. In this patent a symbolic cloud andthe reference number 35 are metaphors for the internet itself, for localarea networks, for wide area networks and for individual sites on theinternet where users may store and retrieve programs and data. Controlapparatus 37 may create one or more alerts based upon the relativelocation between the control apparatus 37 and tracking devices 31-33 andinformation detected by the sensors 27 in the devices. The system 30 maybe used to find a lost object attached to a tracking device 10, set analert for when an object, pet or person bearing a tracking device 10moves into or out of one or more predetermined ranges, and pair alertswith locations or motions of the tracking device 10. The owner-user mayshare with others information transmitted by the tracking devices 31-33and control of devices 31-33.

Accordingly, another user with a control apparatus 38 may use the sametracking devices 31-33 to establish alerts on the control apparatus 38that are different from those of the alerts created by control apparatus37.

Remote controls for television sets are frequently lost. The system 30solves the problem of finding a lost remote control or other object 34.A tracking device 31 is attached to a remote control or object 34. Anysuitable means for attaching is acceptable including hook-and-loopfasteners or adhesives that attach to the object 34 and the trackingdevice 31. Other attachment means include a chain or cord for attachingthe object 34 via a key ring hole. The control apparatus 37 has aprogram 100 that provides a control menu associated with the trackingdevice 31. The tracking device 31 has a speaker 23 and an LED 24 thatoperate upon commands received from the control apparatus 37. Thecontrol apparatus 37 sends a suitable signal to the core device 21 tocause the speaker 23 to generate a distinctive sound, such as a buzz orring, and to operate the LED 24 in a flashing mode, or both, in order tolocate the object 34.

The system 30 may also monitor when an object, pet or person enters orleaves a predetermined range with respect to the control apparatus 37.For example, another tracking device 32 has a cord or chain 36connecting via a key ring hole to and object, a collar of a pet, to anarticle of a person's clothing, surrounding a wrist of a small child oran Alzheimer patient. The control apparatus 37 sets one or more alertsdepending upon the distance between the control apparatus 37 and thetracking device 32. If a parent were shopping with a small child, theparent may program the control apparatus 37 to issue one or more alertsdepending upon the distance between the child wearing tracking device 32and parent carrying the control apparatus 37. If the child and parentbecame separated by a first predetermined distance, such as 10-15 feet,the control apparatus would emit a first alert, such as one of the manysounds or vibration patterns that are included on a smartphone. If theseparation becomes larger, such as 30-50 feet, a second alert wouldoccur with a different sound and/or vibration. A third alert could beprovided when the tracking device 32 lost radio contact with the controlapparatus 37.

The system 30 may remind a user to take along key personal items beforeleaving a predetermined location. Tracking devices 33 could be attachedto a key ring, a laptop or tablet computer, a brief case, a purse, awallet, luggage, a backpack or other personal items. A user may carrythe tracked items during travel from one place to another. If the userdeparts a location and forgets the tracked item, an alert would sound onthe control apparatus 37 to advise the user he or she forgot the trackeditem. Such alerts may be paired to specific locations to that they areonly triggered when and where the user wants.

The core device 21 of each tracking device 31 has a clock. The beaconsignal and any signal from a sensor may include the time the signal issent. The clock also may be used to extend the life of the battery 15.The control apparatus 37 may set the tracking device to a power savingsmode where its broadcast signal is only active for a short period oftime compared to the intervals between activation. The core device alsotracks time and any alert may be paired to one or more chosen times orday, week, month or year.

The system 30 may also alert user when an item has returned. Forexample, assume the tracking device 32 is attached to an automobileoperated by another member of the user's household. When the driver ofthat automobile returns home, the tracking device will trigger an alertin the control apparatus 37 to alert the user that the automobilebearing the tracking device 32 has returned within range of the controlapparatus 37.

The tracking devices 33 may have their alerts paired to one or morelocations. For example, if a user places tracking device 32 on a briefcase or backpack, the user has little need to be warned of leaving thevicinity of the briefcase or backpack when the user is at home or atwork. Those locations may be excluded from alerts and all otherlocations could be active. This embodiment would be especially forcommuters who take a train or bus. The alarm could sound if the commutermoves more than 10 feet from the tracking device on the briefcase orbackpack.

Among the numerous options available to the user is the option to haveone or more alerts activated on the control device 37, the trackingdevice 32 or both. Recall that some embodiments include a 9-axis motionand temperature sensor 25. Sensor readings are transmitted by coredevice 21 and received and recorded by the control apparatuses 37, 38and any other control apparatus with permission to control the trackingdevice 31. So long as the tracking device 31 is within range of at leastone control apparatus, the GPS location of the apparatus and the motionof the tracking device 31 can be viewed on line in real time or at alater time by other users, such as 38. In one embodiment a trackingdevice 31 is fixed to a snowboard and the snowboarder carries a controlapparatus 37 that continuously receives the motion data from trackingdevice 31.

All travel of the snowboard, including vertical travel up ramps andacrobatic flips and turns of the snowboarder will be sensed by the9-axis sensor and sent to the first control apparatus 37. That apparatuscan be set to record the information received from the tracking device31 or to continuously transmit the information to the cloud/internet 35.

Another feature of each tracking device is the ability of the owner ofthe device to share device information or control or both with others.For example, a remote user with control apparatus 38 and with sharedprivileges may access the cloud/internet 35 and use the recorded motioninformation to drive a display showing an icon moving in accordance withthe same motion as the tracking device 31. In some embodiments theshared users are designated as “friends” of one or more tracking devicesthat are generally under the control of the owner of the trackingdevice. As will be explained later, an owner may voluntarily transfercontrol of a tracking device to another authorized user or simplyrelinquish control of a tracking device to any other authorized user whois or passes within range of the relinquished tracking device. Anauthorized user is, at a minimum, a user who has a control apparatuswith a copy of an operating program for controlling tracking devices. Inother embodiments authorized users are registered with a central usersite that may be accessed through the Internet.

Embodiments with the 9-axis motion sensor may be used to pair location,time, direction, and position, velocity and acceleration in each ofthree axes of motion. For example, a user could set an alert to showwhether the speed of a tracking device 31 exceeded a threshold of 10miles per hour in the time between 10 AM to 11 AM on Aug. 4, 2014, whenthe temperature was between 75-85° F. while traveling north)) (0-90°within the city limits of Seattle, Wash. As such, motion, time, headingand location may all be paired together or in any combination of one ormore types of sensed information to set an alert.

The pairing of tracking device 31 with a smartphone having GPS hasendless possibilities. Motion data can be configured to user-definedalerts that include activating the speaker and LED 24. For instance, ifa user was jogging and his speed dropped below a threshold, the speaker23 on the tracking device 10 would buzz. In another embodiment thetracking device 10 monitors temperature outdoors, and buzz from speaker23 could warn the user when the temperature dropped below a level thatwould harm outdoor plants. In some embodiments the 9-axis sensor enablesthe system 30 to control functions of the control apparatus 37. Acontrol program 100 installed on the control apparatus 37 records motionof the tracking device 31 and associates the recoded motion with afunction of the control apparatus 37. With the control program 100 open,control apparatus 37 records a motion or set of motions of the trackingdevice 32. The user then associates the recorded motion of set ofmotions with a function provided on the control apparatus. Suchfunctions include triggering an alert on the control apparatus 37 whenthe tracking device 32 moves in any direction, taking a picture with thecontrol apparatus 37 in response to a first predetermined motion orfirst combination of motions of the tracking device 32, placing a phonecall from the control apparatus (smartphone) 37 in response to anothermotion or another combination of motions of the tracking device 32,sending an email or text message from the control apparatus 37 inresponse to a third motion or third combination of motions of thetracking device 32. For example, the sensor 25 could be attached to adoor or a window and any movement of the door or window would set off anaudible or visual alarm on the control apparatus 37. A combination ofmotions such as shaking the tracking device 32 up and down could commandthe control apparatus 37 to take a picture. Moving the tracking device32 left and right could command the control device 37 to send a message(email or text) to one or more addressees with a predeterminedannouncement, such as, a reminder to take medication. A user may map outspecific locations, click the button and the tracking device 32 willsave the place of interest. For example, a surveyor could walk aspecific path, and mark specific points of interest such as corners of aroad, or edges of a hill. The geographic properties of each point ofinterest would be saved and mapped out. Thus, the tracking device 10 hasuses in the fields of gardening, home security, child monitoring,health/fitness, sports applications, navigation, commercial andindustrial monitoring and safety appliances.

Turning to FIG. 4, a first network 40 has tracking devices TD1-TDN,31-33 that are in wireless communication with a hub 41. The hub 41 maybe connected to a gateway system 47 that in turn is connected to thecloud/internet 35. In some embodiments of the first network 40, the hub41 is directly connected to communicate with the cloud/internet 35. Thehub 41 listens for signals from the tracking devices 31-33. The hub hasBluetooth or other wireless communication apparatus and can sense therange of each tracking device within its effective field. Upon receivingsignals from one or more tracking devices, the hub relays informationassociated with the tracking devices to the cloud/internet site 35.Likewise, the hub 41 may send control information received from thecloud/internet site 35 to each or all the tracking devices 31-33.

Each tracking device 31-33 and the cloud/internet 35 associated with thedevices has an owner and may have one or more shared users. As used inthis patent, the term “owner” applies to a user of a tracking device 10who has primary control over the tracking device 10 and thecloud/internet 35 associated with the tracking device. The embodimentenvisions local, regional, national and international networks 43-44within the scope of cloud/internet 35. It also envisions registeredowner-users of tracking devices and others register users with one ormore dedicated cloud/internet sites 35 for collecting information abouttracking devices 10. An owner-user may grant one or more privileges toothers, known as “friends”, allowing the other users some or all accessor control of the owner's tracking devices and owner's account on thecloud/internet site 35. For example, one owner-user may give a friend aprivilege to view all data on the cloud/internet site 35 or view dataonly associated with one or more tracking devices chosen by theowner-user for sharing. Even when the owner permits other users to seethe data, some data may be marked “private” and excluded from the viewof the shared user. An owner may also permit other users to control one,more, or all functions of individual tracking devices of the owner. Anowner may also allow device data to be posted publicly, so that any usercan view the data.

The friend feature solves a potential problem of locating lost trackingdevices. If a friend finds a lost item of owner, the friend maydiscretely notify the owner that the friend has found the lost trackingdevice (and the object attached to the device) by calling the owner orsending the owner an email or text message that the friend found thetracking device at a particular location and time. The email couldinclude a map with a pin showing the location.

In an alternative friend-based scenario, assume a user of controlapparatus 42 who was granted privileges for the lost device 32 by itsowner detects the lost device. The owner sees on the database that theuser of control apparatus 42 is close to the lost device 32 and also hasprivileges for the lost device 32. The owner may contact the user ofcontrol apparatus 42 via telephone or email and ask the user to find thelost device 32 by initiating a sound or light alert on the device 32.

Shared use has a number of advantages. For example, assume the owner ofthe device 31 is away from home and receives a call from a member of hisfamily asking for help finding a lost remote control attached totracking device 31. The owner could log into the cloud/internet and senda suitable command to the tracking device 31 to operate its speaker 23and LED 24. If the owner had shared control of the tracking device withother family members, then the shared user could send the command togenerate an alarm without contacting the owner.

The embodiment of first network 40 helps integrated multiple trackingdevices 31-33 and Bluetooth devices. A control apparatus 37 (e.g.smartphone) does not have to control the tracking devices. Instead, alltracking devices 10 for an owner are registered in the hub 41 where eachcan be securely accessed from a smartphone or other control apparatusanywhere in the world. The registered tracking devices can be used forhome security, automation, or playing games with friends across theworld.

A second, wider area network embodiment 45 is shown in FIG. 5. There area plurality of hubs H11, H12, H21, . . . H1N, HMN distributed over apredetermined area, such as a warehouse, college campus, hospital,airports, and offices. In a warehouse, tracking devices 31-33 areattached to stored items and any particular stored item can beimmediately located by triangulating its position from the range signalsdetected by the hubs. On a college campus, the tracking devices couldlocate a lost smartphone, computer or book. In hospitals and offices thetracking devices could be attached to files so that anyone could find adesired file by accessing the cloud/internet 35.

A third network embodiment 50 is shown in FIG. 6. An owner of multipletracking devices 31, 32, 33 operates a networked control apparatus 70that has two-way communication via cloud/internet 35 with the trackingdevices 31, 32, 33. A server 58 is also in two-way communication withthe cloud/internet 35. The server 58 includes one or more databases 60that keep records on owners, users and each tracking device. For user ofthe network 50, the database 60 would show the devices owned by the useror those devices for which the user had granted or received one or moreprivileges or are marked for public access, the identity 61 of eachdevice that is owned or subject to a privilege granted or received, theinformation 62, 63, 64, 65 reported by each sensor of each device,including and not limited to the time the information was received andthe location of the control apparatus that receives the information. Atany time the owner 70 of the tracking devices 31-33 may view thehistoric information on the location and sensors of each tracking deviceof the owner, including the last known location of the tracking deviceand when the last known location was recorded in the database 60.

The owner's control apparatus 70 may be beyond the range of thetransceivers in core devices 21 of the tracking devices. A number ofother control devices 71-74 may be within range of one or more of thetransceivers 21 in the tracking devices. Each tracking device uses itscore device transceiver 21 to broadcast a periodic beacon signal withinformation including the identity of the tracking device andinformation from the sensors 25-27 of the respective tracking devices.Each control apparatus 71-74 receives the beacon broadcast 68 and relaysthe information in the broadcast in a transmission to a designated hoston the cloud/internet 35, including the GPS location of the controlapparatus. The control apparatuses 71-74 do not need permission from theowner of the tracking devices to receive and forward the identity andsensor information. As long as the control program 100 for trackingdevices is running, each control apparatus will receive the beaconsignal from the tracking devices. No permission is required to receivethe beacon signal. The control apparatus may add a location and/or atime stamp, and other information, to a “record” of the transmissionfrom the tracking device before forwarding the record to the cloud host.The retransmission of beacon information by the control apparatuses71-74 imposes no hardship on them because each one likely transmits itsown beacon signal to a cellular phone network or a local or wide areanetwork.

The third network embodiment 50 may be used to locate misplaced itemsthat are beyond the range of a control apparatus. An owner may accessthe database 60 and mark one or more of the owned devices as “lost.”Assume that device 32 is owned by the operator of control apparatus 70and is attached to a tablet computer (not shown). Assume another usercarries control apparatus 73 and has no shared privileges for trackingdevice 32. Nevertheless, when control apparatus 73 passes within rangeof the beacon signal 67 from tracking device 32, the identity of thelost device 32 and its approximate GPS location will be relayed viacontrol apparatus 73 to the cloud/internet 35 and recorded on thedatabase 60. That allows the owner to know the general location of thelost device 32. The approximate location can be displayed on a suitableapplication such as Google Maps, or MapQuest to provide the owner withlocal streets or landmarks where he may physically search for the lostdevice.

The database has numerous uses. Tracking devices 33 may be distributedover a large geographic area where each tracking device is incommunication with a hub, such as shown in FIG. 5. The tracking devicesmay be located at one or more known locations or the hubs may provideGPS data. The sensors on the tracking devices could report theirtemperatures, air pressure, humidity, and other environmentalcharacteristics via the hubs to provide data for a database 60 of thevariable environmental characteristics of the geographic area.

There is a virtually unlimited number of sensors that can be used toprovide trigger signals and a similar unlimited of responses or alertsthat may be given in response to the trigger signals. Each trackingdevice has a button 14 a and may have one or more sensors 25-27. Thebutton and each sensor may generate a trigger signal. Trigger signalsmay be combined in any number of combinations and/or sequences oftrigger signals to generate particular trigger signals depending uponthe occurrence of predetermined combinations and/or sequences of triggersignals. The tracking devices and control apparatuses may also generateone or more responses or alerts upon receipt of trigger signals andcombinations thereof.

Button 14 a may be pressed one or more times to generate one or morebutton trigger signals. Two or more sequential pressings of the button14 a are an alternate trigger signal. The button switch may be held downto generate a long duration trigger signal or promptly released togenerate a short trigger signal. A combination of long and shortduration signals may also be used as a trigger signal.

For embodiments having a 9-axis sensor, any motion or combination and/orsequence of specific types of motion may be used to generate triggersignals. For example, when a tracking device 31 is used to secure a dooror a window, any motion of the sensor may be a trigger signal. In otherembodiments, specific user-defined spatial displacements are receivedand stored in the control apparatus as trigger signals for a response.For example, moving a tracking device left to right, shaking thetracking device up and down, moving the tracking device to define aletters, such as the letter “L”, or moving the tracking device to definea shape such as a circle or square, are but a few custom motions. Theshapes and letters could be paired with a click of the button 14 a toindicate the start of a motion and second click when the custom motionis completed. The control apparatus would remember the click to startand stop and the motion between clicks.

Range is another trigger for the tracking devices. On the controlapparatus the user may define one or more ranges for generatingresponses including alerts. One potential use is keeping a parentadvised of the relative location of a child while shopping in a store.Different responses or alerts could be given at different ranges as thedistance between the child and the parent varies. In the hive system ofFIGS. 4 and 5, a trigger may be given when a tracking device leaves orenters the hive.

Location is a still another trigger. In some embodiments, the trackingdevice may carry its own GPS device and broadcast its latitude andlongitude coordinates. In other embodiments, the tracking device mayrely upon the GPS coordinates of any control apparatus that participatesin systems such as shown in FIGS. 4-6 and is within range of anytracking device. In still other embodiments, the location of one controlapparatus 37 may be paired with the range of one tracking device. Forexample, in the basic system shown in FIG. 4 control apparatus 37provides the location of the control apparatus using its GPS functionand pairs that location with the range between the control apparatus 37and the tracking device 31. A user can have an alert triggered when thedistance between the control apparatus 37 and the tracking device 31exceeds a predetermined distance selected by the operator of the controlapparatus 37. A user can also set an alert that is only active at a“home” location to remind the user to take a laptop to which thetracking device 31 is fixed when the user leaves home. However, if thelocation were different from the “home” location, no alert would begiven.

Time is another trigger signal. As explained above, time of day may becombined with other trigger signals to enable or disable one or morealerts, such as enabling a motion alert during the night but disablingthe alert during the day. Date may also be used as a trigger condition.

Other trigger signals and their combinations and/or sequences arepossible with added sensors. The tracking devices of the embodiments ofthe invention may use any of a vast number of sensors including and notlimited to sensors for motion. Distance, velocity and acceleration,temperature, pressure, magnetic fields, gravity, humidity, moisture,vibration, pressure, light, electrical fields, ionizing and non-ionizingradiation, cosmic rays, and other physical aspects of the externalenvironment; analytes for chemical or biological substances includingand not limited to sensors for detecting toxic compositions such ascarbon monoxide, carbon dioxide, methane, and other hazardous orpoisonous components. The tracking devices may be worn as badges bypersonnel to detect ambient analytes and physical parameters. The datacollected by the tracking device may be sent to the data collectioncenter 58 where others can analyze it and provide responses or alerts tothe personnel wearing the tracking devices.

The control apparatus has a program (for example an “application”) thatallows the user to create custom trigger signals including combinationsand/or sequences of individual trigger signals. The control apparatus,the tracking device or both may generate one or more responses to atrigger signals or a combination of trigger signals. The trackingdevice, the control apparatus or both may give responses or alerts.

Thus with more generality, the control apparatus is enabled to createconditional rules, each conditional rule comprising two parts in“IF/THEN” logical order, in which beacon signal information can beassessed in an “IF” process and assigned a truth value, and according tothe truth value, a command associated as the “THEN” part of theconditional rule can be executed. In some instances, a simple sensoroutput broadcast from the radio tracking device will trigger executionof some control apparatus function. In other instances, the controlapparatus or an associated cloud host and network may cause a remotedevice to execute a function. In yet other instances, the controlapparatus may compare one sensor output with another sensor output andcause a function to be executed if the comparison meets or deviates froma specified value. The sensor outputs need not be parametric. Anon-parametric sensor such as a button press (“switch input”) may alsobe evaluated as part of rules-based conditional execution of functions.And in some instances, other information, such as date, time, location,and so forth, may be factored into the conditional rule. That otherinformation may be found in the control apparatus or in a host system(such as a “cloud host”) in operative communication with the controlapparatus. The functions triggerable when a conditional rule issatisfied, broadly, include alerts, notifications, and command executionof functions by any of a control apparatus, a remote device, or in someinstances, execution of a function by the tracking device, such asactuation of an alarm display by the tracking device. In anotherexample, when the conditions of a conditional rule are met byinformation contained in a radiobeacon broadcast, then a friend'scontrol apparatus may execute a display notification or sound an alarm,for example. Thus the examples provided here are for illustration, butdo not limit the possibilities achievable by the capacity to writecustomized conditional rules having a trigger condition (IF) and anexecutable (THEN) that some component of the system will execute whenthe trigger condition is recognized in a radio transmission.

The foregoing embodiments of tracking devices provide audible and visualalerts, but could also vibrate the tracking device upon receipt of acommand or trigger signal. In the embodiments described above thetracking devices and the control apparatus may establish a remotecontrol system between themselves to cause one of the system componentsto execute a function upon receipt of a predetermined command or triggersignal from the other component. For example, a custom motion triggersignal of the tracking device may remotely control the control apparatusto take a picture, send a message via email of SMS, make a phone call toa predetermined party, and combinations thereof such as take and send apicture to a predetermined party or group of predetermined recipients.

The control program 100 is shown by means of screenshots 101-109 andFIGS. 7-15. Turning to FIG. 7, screenshot 101 shows a login screen forthe control program. The login screen has a legend “Login” in banner110. Below the banner are two rows 111, 112 for a user's email addressor user name and password, respectively. In row 113, the user may signin via the indicated website pebblebee.com or, in the alternative, loginthrough Facebook using the button on row 114.

Rows 115 and 116 allow the user to set up an account or recover aforgotten password.

Turning to FIG. 8, and screenshot 102, the user is presented with animage of a hive 122 of tracking devices. A hive is a group of trackingdevices owned or controlled by a user of the program. In the top banner120, there are control buttons 124, 126, and 200, respectively, forenabling the control apparatus to receive and send Bluetoothtransmissions, release one or more of the tracking devices from thehive, and set general settings for the tracking devices. Banner 130defines columns for active devices 131, their range 132, and status 134.For example, tracking device TD1 has a range indicated by three squaresand a status showing a can 135. The can 135 indicates that the device isunder control but may be released if so desired. In the next row,another tracking device TD2 is closer as shown by the four statussquares, and it is also under control as shown by the can 135.

In the hive, there are several more devices, which are located far away.See the Far Away banner 138. Far away devices include a deviceidentified as My Wallet 139, and another device identified as cat 141.Note that My Wallet has a Y-shaped symbol 136 to indicate that thetracking device on the wallet is shared with another user. Near thebottom of the screenshot, a banner 140 shows Friends. A friend is anyother user who has some control over one or more of the trackingdevices. The symbol 142 indicates a button that may be pressed to addadditional friends. To the left of the symbol 142 are shown existingfriends.

Turning next to FIG. 9, screenshot 103 shows a particular control screenfor the tracking device TD1. Clicking or typing on one of the trackingdevices shown in screenshot 102 accesses screenshot 103. Top banner 150has a number of status symbols. Symbol 104 identifies the screen asrelating to tracking device TD1. A user returns to the prior screen 102by pressing the hive symbol 152. Symbol 156 shows the percentage chargeof the battery, symbol 157 is the release symbol, and symbol 200 is forgeneral settings.

Below banner 150 are a set of symbols for immediate alerts, pairedalerts, and locations for the tracking device. Symbol 160 when touchedwill immediately sound the audible alarm through the loudspeaker oftracking device TD1. Symbol 162, a light bulb, when touched will causethe tracking device LED to emit periodic light by blinking its LED. Ifthe tracking device is equipped with a vibrator, another symbol would beprovided to indicate the vibrator. Symbol 190 allows the user to set upalerts, which include a combination of conditions as will be explainedlater. Symbol 164 is a mapping signal, which allows the user to acquireand display a map of the current location of the tracking device TD1.

Symbol 166 corresponds to the top cover 11 of the tracking device. Theconcentric arcs radiating from the bottom of the circular coverrepresent the relative range between the control apparatus and thetracking device. On the display, the arcs within the circular image 166will bear different colors and will gradually fill in from bottom to topas the control apparatus comes in closer proximity to the trackingdevice. Below the range circle 166, the user has a number of options.The user may select symbol 168 in order to share the device with anotheruser. By selecting symbol 170 the user may designate TD1 as lost.Selecting symbol 172 marks TD1 as private and only the user may see thedata generated from TD1 as well as the location of TD1.

Symbol 174 allows the user to release all control of the tracking deviceTD1. At that point, the tracking device TD1 may be claimed andcontrolled by any other authorized user. The bottom banner 176 indicatesother users with whom the current user has shared TD1.

FIG. 10 shows a screenshot 104, which displays the general settings fortracking device TD1. By clicking on symbol 200 on screenshot 103, theuser is taken to screenshot 104 where the user may enter particularinformation about the tracking device. For purposes of illustration, theuser may enter a picture 182 of the tracking device or the object orperson tracked. In this case, the tracking device is a computer tablet.In the entry 184, the user gave the name “My Tablet” to the trackedobject. In box 186, the user may describe the object or person attachedto TD1 and pressing bar 188 saves or the Save button on the top bannersaves all settings. Pressing the Back button returns the user toscreenshot 103. Pressing the Edit Button allows the user to make changesin the settings on screen 104.

Screenshot 105 shown in FIG. 11 controls the Alert settings for thetracking device and the control apparatus. Pressing triangular symbol190 in screenshot 103 of FIG. 9 takes the user to screenshot 105 of FIG.11. In screenshot 105, the user has a number of options for settingalerts. The user may select alert settings 192 for the kind of alert(audio, light, vibration) and may also pair the alert with otherconditions. Screenshot 105 is also used to establish remote controlbetween the apparatus and TD1. As explained above, the tracking devicemay control the control apparatus 37 and vice versa. If desired, theuser may have an alert show up on a control apparatus 37 such as theuser's smart phone. In addition, the user may operate a loudspeaker onthe tracking device. The user may also ask for an alert when the batteryis low. Other alerts may be set for distance. For example, in theDistance alerts 194, the user has the option to set alerts for when thedevice leaves the hive (i.e., the range of the control apparatus), whenit is nearing the edge of the hive, when it is out of the hive, and whenit returns to the hive. Controls for the multi-function button 195 allowthe user to find the control apparatus 37 or set the multi-functionbutton 195 to operate the control apparatus, such as a smart phone, totake a picture. In other embodiments, the multi-function button may sendan email or text message to a predetermined party. Further alertsettings depend upon conditions such as location pairing 196. In thiscase, the alert is conditioned upon the tracking device being at work orat home. As shown in FIG. 11, the locations are identified by latitude198 and longitude 199.

Returning to screenshot 103, the symbol 164 is a map symbol. Touchingthe map symbol 164 changes screenshot 103 from the range image to a map167 as shown in FIG. 12 and illustrated in screenshot 106. The map 167includes a pin symbol 168 showing the approximate location of thetracking device TD1. The location of the tracking device TD1 is acquiredfrom other control apparatuses, which have acquired the beacon signal oftracking device TD1. See, for example, the system shown in FIG. 6 above.

Screenshot 107, FIG. 13, shows the general settings for the user. Inthis instance, the user's address and information and phone number areestablished in boxes 202. Sliding the slide button 204 enables cloudaccess. The user may also change the password by clicking on the box206.

Screenshots 108, 109 in FIGS. 14, 15 show alternate views of screenshot103 for status of a tracking device that has a 9-axis motion sensor aswell as a temperature sensor. In an example shown in FIG. 14, thetracking device TD2 is used to monitor the temperature of a winerefrigerator. Nevertheless, it displays the 9-axis information of theTD2, including its speed 144 and direction 145, as well as its range 147and temperature 146. The temperature alert is set to 55° F. If thecondition of the temperature changes and rises above 55° F., an alert issent to the control apparatus. The alert appears on screenshot 109 inthe display of the control apparatus with the banner 149 showing thatTD2 Wine Fridge is above 55° F. Alert 149 on the control apparatusappears not only on the display, but also may trigger a vibration on thecontrol apparatus and/or an audible signal as well as a bannernotification.

FIG. 16 illustrates a control device 70 (for example a user'ssmartphone) set up to track multiple tracking device 10 attached toobjects, items or assets that make up a user-defined “group” 303. Aprogram 300 is installed and run on the control device. The controlprogram 300 is referred to generally as a “find and track group” featureand enables a user to conveniently locate items in the group by radioproximity or by using a bell and light built into each tracking device10,2200,2800 from a single screen. The group feature may be turned onand off using soft slider control 302, for example. Each object of thegroup is fitted with a tracking device or the tracking device isembedded in the object. The tracking device may take the form of acredit-card sized device (2300, FIG. 22) for use in a wallet or a brimof a hat. The tracking device may also include a cellular radio (2800,FIG. 28, see below). In this illustration, a keychain 304, wallet 305,briefcase 306, umbrella 307, and hat 308 are selected as a “group” suchas would typically be gathered up before going to work.

Using the program menu, each item on the list can be collected andcleared. In the event that any item has been misplaced, program 300offers a user interface with map and tools to assist in finding them.

FIG. 17 is a view of a screenshot 1700 of the graphical user interfacein group mode: the screen having user interactive controls for findingand tracking groups of objects. Top center includes a bullseye 1702 thatrepresents a general map of the radio field around the control device70. Each of the five objects is mapped with a map pin 1704. Soft switch1703 enables the user to switch off the group mode when not needed.

Also shown on the top banner 150 are soft buttons for “home” (152), forhive (“104”), a battery charge indicator 156, a soft button 157 used torelease control of the radiotags, as used to change ownership or changepermissions, and a menu pulldown 200 for general settings. In this view,the device tagged as KEYS 406 is highlighted so that it may be managedindividually.

In the bottom banner, the user may select symbol 168 in order to sharethe device with another user. By selecting symbol 170 the user maydesignate the device tagged as KEYS as lost. Selecting symbol 172 marksthe device as private and only the user may see the data generated fromthat device as well as its location.

Symbol 174 allows the user to release all control of the device taggedas KEYS. The bottom banner 176 indicates other users with whom thecurrent user has shared the device tagged as KEYS. Other trackingdevices can be selected in the menu list for actions.

By clicking on symbol 200 on screenshot 1700, the user is taken toscreenshot 104 (FIG. 10) where the user may enter particular informationabout a particular tracking device. In box 186, the user may describethe object or person attached to a device and pressing bar 188 saves orthe Save button on the top banner saves all settings. Pressing the Backbutton returns the user to screenshot 1700. Pressing the Edit Buttonallows the user to make changes in the settings on screen 104 (FIG. 10).

In screenshot 1700, five fields (up to seven are possible) are providedso that the user can monitor each radiotag in a group. Shown here arefields that are user-labelled as “KEYS” 406, “WALLET” 408, “BRIEFCASE”410, “UMBRELLA” 412, and “HAT” 414. These correspond to the objectsshown in FIG. 16, but any objects or assets selected by the user may beprogrammed as a group. The tracking devices may also be used withchildren and pets for example.

Icons 422 show that the corresponding BT radiobeacon signal of thetracking device(s) 10 are being received by the control device. Softbuttons 420 allow the user to generate a visual or audible alarm in anyone of the objects of the group. In this way, the user can immediatelyinventory the needed items and cause any missing item to generate analarm tone that aids in finding the missing item.

In use, radiobeacon signals are monitored by the control deviceprocessor, each signal having a unique identifier and an informationpayload. Depending on how the user sets up alerts, motion, heading,proximity, temperature, or other sensor outputs can cause the processorto execute an alert. Here, a sample ALERT: KEYS LEFT BEHIND is shown.This would occur if the group was moving, such as when the owner isleaving a room or walking on the sidewalk, but the KEYS member of thegroup was not showing corresponding motion. The alert will be shown onthe control device 70, and may be accompanied by a vibration or anaudible tone, if the group member is left behind. Similarly, an audiblealert will occur on the radiotag or radiotags if the control device 70is left behind. Thus the group uses radio proximity to ensure cohesionof the group; any fading or loss of signal from one group member resultsin a notification. Comparison of discrepancies in motion or headingsignal data are interpreted to determine which tracking device is lostor left behind.

An OUT OF RANGE alert will occur if any member of the group loses radiocontact with the control device.

A WAYWARD OBJECT may occur if the control device is moving in onedirection or at one velocity and an object is moving in anotherdirection or at another velocity. This is more likely to suggest thatthe object has been taken without permission. By actuation of the LOSTbutton 172, the user can record the object as missing and can use cloudhost resources to find and track the lost object. The WAYWARD OBJECTalert may occur in conjunction with a geofence that defines a “safezone” or a geofence that defines an “exclusion zone”.

Not all alerts relate to location. An OVER LIMIT alert can occur ifsensor data exceeds a preset threshold. Similarly, an UNDER LIMIT alertcan be preprogrammed. This is useful for example in the wine chillershown in FIG. 15.

A SEND HELP alert can occur if there is a sudden impact, a rapidincrease or decrease in accelerometry data, a sharp noise, very lowtemperatures, or sustained shaking. The user can confirm a need for helpby pressing the alert button or can preprogram the multifunction button11 of a tracking device to respond to a steady pressure or a distinctpulse sequence by causing the cloud host server to communicate apossible injury or threat to a 911 operator and provide a location ofthe radiotag.

Another alarm is a LOW BATTERY alarm. Generally this will occur indaylight hours (as determined by a photocell in the radiotag or controlapparatus), and indicates that the user should either recharge orreplace the battery supplied with the radiotag.

Other alerts can readily be programmed using basic rules-basedinstructions and one or more sensor conditions.

As for the FIND PHONE feature described earlier, the multifunction smartbutton 11 on any one of the tracking devices can also be used to roundup any of the other object/radiotags that are missing, avoiding the needto pull out the smartphone 70 and navigate to the user interface.

In some instances, as discussed earlier, the alert function (also termeda “notification”) can be accompanied or substituted by an action. Usingmotion of a tracking device to cause the control device to take anaction was an example given. Similarly, the radiotag can cause a garagedoor to go up or an email to be sent.

FIG. 18 illustrates a group 1800 of BT radiotags that report via adedicated connection to a BT radio of a smartphone 70. By providing anapplication 100 configured to recognize compatible signals from BTradiotags, signals are handled differently than in an unprogrammeddevice. In some instances the signals are simply forwarded to a cloudserver 58 for action, interpretation, or archiving. The cloud server hasgreater processing power and access to databases 59,60 for correlatinginformation and generating commands in response to the informationreceived from the tracking device group 1800. In other instances, thesignals satisfy local logic conditions for commands and actions. Thecommands or actions can be generated by the cloud server, but in otherinstances the local program operated by the smartphone 70 is enabled tomake the appropriate response. The smartphone is adapted for thispurpose by installing a program 100 that is designed to operate thetracking devices as a group. Programmable responses may be assigned bythe user by customizing or creating “conditional rules” stored in thesmartphone or stored in databases 59,60 on the cloud server inassociation with a user profile. The radio unit identifier broadcast bythe tracking device and forwarded to the cloud server ties the signal toa particular user profile. In some instances, the conditional rules forcustomization of executables are stored on the local smart device 70; inother instances the cloud server may store the rules and cause the localdevice to execute them.

FIG. 19 illustrates a group of BT radiotags 1900 that in addition toconnecting to the BT radio of a smartphone, also are capable of forminga mesh network with each other. In this instance, the connection withthe smartphone defines a piconet with smartphone 70 as central and BTradiotags as peripherals, but each BT radiotag may also participate in amesh network, peer-to-peer, whereby data is exchanged between members ofthe group without the smartphone as intermediary. Data may also beshared with server/host 58 via smartphone 70. Smartphone 70 is alsouseful in displaying a user interface for setting up the group asdescribed earlier. The smartphone is adapted for this purpose byinstalling a program 100 that is designed to operate the trackingdevices as a group. A mesh network is useful in allowing each device tomonitor other members of the group, but the cost is more energy drain onthe batteries.

In FIG. 20, the BT mesh network is shown as an independent entity 2000,in which each BT radio is able to recognize other members of the group.Generally, one member will assume the role of master, but the BTspecification allows the role of master to be alternated by a“master-slave switch command” that when executed transfers the role ofmaster of the network to another member of the group. Because the rolesof master and slave are associated with different levels of transmit andreceive activity, and hence different energy budgets, battery powersharing can be achieved by alternating the roles of the members so as todistribute the power requirement of maintaining the peer-to-peernetwork. The independent mesh network continues to operate as a piconeteven in the absence of a smart device 70.

The smartphone in this view is optional for group cohesion, meaning thatthe group members monitor cohesion of the group independently byperiodically checking for the radio signals of other members of thegroup 2000. The limitation is that the BT network is not capable ofdirectly communicating with the Internet via an IP packet data portal orwith a cellular radio network. Thus the smartphone 70 serves as anecessary intermediary for communications with cloud host 35 andserver/host 58. Each smartphone is provided with a program 100 thatenables the sharing of data from the BT group and for downlinking ofcommands, data, or program updates from the cloud host to the BT groupmembers. Absent a smartphone, at least one of the tracking devices mayhave an independent processor and memory, operating an application inPython code, for example, and may have a more complex user interface forcommunicating essential information to a user. In one embodiment, thegroup 2000 stores information and periodically uploads it via thesmartphone 70.

In FIG. 21A, the BT devices of a group 2100 are shown in a hub or starradio network in which one central device 2101 is linked to fivesatellite devices. But in FIG. 21B, all devices of a group 2110 areenabled to maintain BT radio links and share information with all otherradios in a true peer-to-peer mesh network. This open networkarrangement consumes more power than the star configuration, and isoptional.

FIG. 22 is a view of a BT device 2200 with an alternate form factor. Thedevice includes a radiolucent housing 2201 with center button sensor2202 and an RGB LED 2203 mounted edgewise on the body. The center buttonsensor is a multifunction button and results in a distinctiveradiobeacon signal when pressed. Bits in the radiobeacon signal areassigned to be read so as to communicate the number of times the buttonis pressed and the duration of the press to a smart device, for example.The signal may contain other information as well. The programming 100 inthe smart device allows the user to assign a conditional rule based onthe button press pattern or other information in the signal. The RGB-LED2203 inlaid on the wall of the housing extends in a band along about a180 degree are opposite the annulus 2204. The RGB-LED may be segmentedand may operate in a pulsatile or function specific mode to providefeedback during user setup and interactions. The annulus 2204 isprovided for attaching the radiotag to an asset such as a keychain.Inductive charging is achieved with a Qi or NFC antenna on the base ofthe device.

FIG. 23 is a view of a BT radiotag 2300 with a thin credit card-likebody 2301. The body includes a central button sensor 2302 and terminals2303 for attaching the radiotag to a charging dock. Alternatively,inductive charging may be used.

FIG. 24 shows an organizer pad 2400 built as an inductive Qi chargingpad with stations for three or four BT tracking devices. Shown here aretwo BT devices 2201, 2202, one with a keychain, and a wallet-dimensionedcard, 2300. For convenience, the charging pad also includes a chargingstation for a smartphone 70. The organizer pad has dimensions of about22×12 cm and is few millimeters thick. The pad, which is a plug-indevice that receives AC power, allows for charging of several radiotagsalong with the phone simultaneously and is for home use. The pad canalso include provision for autosynchronization of data to an externalserver via a WiFi or BT radio built into the pad. In future releases,NFC antennae having the capacity to charge the system also may be usedfor data transfer over an NFC connection while devices are on theorganizer. Data transfer is useful for example in synchronizingcalendars, contact lists, and network settings. Each NFC radio isconfigured to enable staging and provisioning of a network connection toone of the higher bandwidth radios for devices having multiple radios;for example an NFC interrogatory can trigger setup and/or activation ofa BT radio link, or a WiFi link, and thus the pad serves as a homereference hub, for example.

In this way several radiotags and a smartphone are managed as a group.When on the charging pad, data can be uploaded from the radiotags andprogram updates can be downloaded.

FIG. 25 diagrams the structure of a BT transmission 2500 as specified bythe BT Special Interest Group (SIG). The access code 2501 is used todefine relationships between radio members in piconets and todistinguish advertising transmissions directed at specific recipientsversus general advertising broadcasts. The access code may also be usedto define members of a group for purposes of radio tracking. The trailer2504 is generally a message integrity check. Messages in the BTadvertising channels will include the preamble 10101010 (2502, oneoctet). Messages in the BT data channels may have preambles of 01010101or 10101010.

BT radio signals are formatted as packets. BT devices include packetcomposers and decomposers. The message structure, starting with theleast significant bit (LSB), specifies the preamble followed by theSYNCH WORD and trailer of the ACCESS CODE 2501, and then a PDU Headerfollowed by the PAYLOAD 2503 and a CRC 2504. The synch word is designedto identify the relationship of the sender and receiver and to specify abasic synchronization sequence and clock offset for exchanging messagesin the spread spectrum. The payload can be an advertising data payloadof 0-37 Bytes or a data payload of up to 255 Bytes. The PDU header willspecify the message type, which may be selected from i) connectableundirected; ii) connectable directed, (iii) non-connectable,non-directed, (iv) scan request, (v) scan response, (vi) connectrequest, and (vii) scannable undirected. A stealth access code may alsobe used that will not be accepted by the correlator of BT radios towhich it is not addressed. In this way, the access code confers asignificant level of structure and specificity on BT radio interactions.

BT radios also include correlators with registers for sorting andidentifying received signals based on access code or service, forexample as described in US Pat. Publ. Nos. 2002/048330 and 2009/0086711,which are incorporated herein for all they teach and reference.

“Access codes” address BT radio traffic. For example, a general inquiryaccess code (GIAC) identifies traffic broadcast to any listening device,and indicates a discoverable device. Other inquiry access codes may bedirected to individual devices, such as particular members of a piconet.The access code may be derived from, but is not the radio unitidentifier of the transmitting device or the intended receiving device.

A payload may include a URL and payload unique identifiers (UIDs) thatidentify proprietary “services”, referring to the client-serverrelationship between a discovering device and a discoverable device. Thepayload may include frames or “values” containing more information. AMAC address, a partial MAC address, or a pseudo-MAC address can beinserted in the Payload. Payload information may include sub-type orlocation, advertising data, sensor output in digital form, and recordsof Bluetooth radio contacts, for example.

Service identifiers (UID) inform the radio of protocols to be followedin sending or receiving data, and allow developers to create tools thatincorporate elements of the payload as “deep intent” triggers forsoftware applications. Advertising messages may include one or moreservice UIDs, for example, that specify the kinds of interactions anddata exchanges supported by the transmitting device. Other messages maynot provide sufficient information to identify all services associatedwith a device, but a qualified BT receiver can respond to obtain moreextended information without actually connecting.

For example, identifiers in a message actuate protocols in receiving BTradios and can wake smart devices, direct a smart device to a URL, pusha notification to a remote device, or pull attachments from cloudlibrary resources, for example.

Devices also may be recognized by the services they advertise. Fordedicated peripheral devices, a client application can scan for devicesoffering services or features associated with a UID that specifies theGATT services the BT device supports, and in full CONNECTION, dataspecific to a service or feature can be transmitted across theconnection.

The payload may also include a UUID or part of a UUID. BT unique radioidentifiers (RUI) or “radio signatures”, as used here, may be a MACaddress of a BT radio device or may be a universal unique identifier(UUID) or a part of a UUID, and may include a serial identifier assignedby the Bluetooth Special Interest Group (Bluetooth SIG) as administeredthrough the IEEE Standardization group (accessible via a WHOIS-stylelookup). The RUI may also include a part number given by themanufacturer. The SIG standard also permits developers to encode a“group identifier” or “community identifier” inside an extended uniqueidentifier (EUID) issued by the manufacturer, inside the BD ADDR, orinside a Service UID. Proxy identifiers such as service UIDs link toservices associated with a discovered BT device.

A smart device can receive Bluetooth radio traffic from any Bluetoothdevice in radio proximity, and forward that traffic to an IP addressassociated with a Bluetooth group or community identifier, after addinga timestamp or a location stamp. By doing so, the smart device serves asa “hub” to transfer Bluetooth traffic radio contact records to a broaderglobal network (or vice versa), enabling a range of location-drivenservices that can be modified according to sensor data. Smart devicesinclude smartphones, for example, but may also include laptops, PDAs,Google glasses, smart wrist watches, and any generally portable devicewith Internet connectivity and onboard processing power is commonlyunderstood to be a “smart device” sensu lato. Smart devices aretypically provided with a SIM card when used in cellular telephonicradio communications. Each such device is given an IMSI identificationnumber that points to one particular unique device and more generally isreferred to as the cellular “radio unit identifier”.

Many devices broadcast their RUI or MAC address in the open, or inresponse to a SCAN REQUEST. The RUI address can be an advertisingaddress, a device address, a dedicated address of a piconet device, avirtual address, or a subscriber address, as is useful in mesh networksand for creating whitelists. Some address standards are open, others areproprietary or are obfuscated to prevent BT snooping.

In recent trends, BT signal payloads may include URLs that link thedevice to the physical web. Alternatively a community identifier istransmitted in a message as part of a header, routing address, orpayload, and when recognized by packet decomposer in a receiving device,causes the message to be forwarded to an IP Address and associated cloudhost. This approach has enabled community lost-and-found services suchas described in US Pat. Appl. Publ. No. 2016/0294493) which isincorporated in full by reference.

The radio header and payload may also include resource identifiers thatdirect communications protocols in the link layer and activate softwareapplications keyed to the resource identifiers. This approach is seenfrequently with smartphones—installed applications can react in realtime to BT transmissions. For example, a received BT transmission canwake up a sleeping device (US Pat. Appl. Publ. No. 2020/0242549), whichis incorporated here by reference. More recently, data supplied in thefields or payload of a BT transmission can cause an App to be installed,or if the App is installed and the appropriate permissions are in place,the App can be run at a particular instance in the program as mostrelevant to contextual clues in the received BT signal. This is termed“deep intent” to indicate that the App anticipates the user's thoughtprocess and causes the client smartphone to display the most relevantmaterials from a resource or takes an appropriate action in anticipationof the need. More recently the process has been extended to displayscreens, so that “walk up” computing is increasingly automated byinvisible BT radio transmissions that identify the user and guess theuser's intent from radio proximity or accelerometry data. For example,if a user picks up a shoe in a shoe store, a BT radiotag attached to theshoe will send a sensor output and a wall display screen will displaymore information about the shoe, or push that information onto theuser's smartphone.

In connected links, BT signals transmit data. Newer BT 5.0, 5.1 and 5.2standards permit multi-slot messages for sharing larger amounts ofinformation, even encoding of speech. Connectionless data sharing isalso supported in the newer protocols.

In a typical BT interaction, a first BT device in discoverable mode willsend an INQUIRY packet 128 times in 1.28 seconds. Each inquiry packet issent in 16 time slots (10 ms, 625 us each) over alternating frequencies.The INQUIRY packet is short, just an inquiry access code. A second BTdevice, operating in an unsynchronized listening mode, intercepts one ofthese transmissions by coincidence (there are 79 possible frequencies[or 40 depending on the standard], three of which are reserved asadvertising frequencies in BTLE). The Baseband protocol causes eachradio to use pseudorandom “frequency hops” to jump from frequency tofrequency over the spread spectrum (U.S. Pat. No. 2,292,387). A devicethat is in INQUIRY SCAN at some crossover hop will intercept a packetwith an inquiry access code that it recognizes, or that it chooses toaccept. The frequency hop protocol is inherent in the access code, and adevice that accepts an access code can then join the hop sequence withthe first device and can send an FHS response packet containing itshardware address and its clock so that the first device can specificallyaddress it with further instructions, if permitted. The interaction maythen rapidly be escalated to a PAGE and PAGE SCAN interaction, resultingin a CONNECTION that formally makes a piconet link in which the RUIs ofthe radios are stored in device memory for future recall. The piconetrelationship defines one of the devices as a “center” device (“master”)and the other device as a “peripheral” (“slave”) for purposes oforganizing the transmission and receive sequences. At the hardwarelevel, these roles are interchangeable and are controllable by amaster-slave switch.

A BT device can participate in two or more piconets as separated by timedivision multiplexing with millisecond separation. While more limited inthe newer BTLE standards, in one embodiment, any BT device may belong toa hierarchy of piconets, in which its participation in a second piconetis alternated with its active participation in a first piconet.

The device in the central role scans for BT radio transmissions, lookingfor advertisements and inquiry responses. The device in the peripheralrole advertises itself and offers a service. GATT server vs. GATT clientdetermines how two devices talk to each other once they've established aconnection. GATT metadata is transferred from server sensor node toclient center node, for example.

To inquire about other radio units in a receiving area, BT radios mayalso promiscuously announce their presence to other BT devices bysending a general INQUIRY access code (0x9E8B33, GIAC). An ID Packet maybe exchanged in response to a FHS packet. Access codes are classed asDAC, IAC and CAC, indicating Device Access Code, Inquiry Access Code,and Channel Access Code, respectively, the details of which relate tolink management. All packets begin with the CAC, a DAC or IAC, and aclock number segment. A correlator identifies relevant packets forprocessing. BT devices acquire information about other local BT radiosin this way.

In a piconet, using link management, devices that are parked or lose apairing connection can ignore public traffic but will “wake up” (almostinstantly) in response to a beacon signal from a familiar or“whitelisted” partner—so as to restore or recover a piconet connection.

The listening device can also partially wake up its MCU in order to logany radio contacts, while not responding further. Not all radiointerchanges result in a CONNECTION, but the listening radio can recordinformation about the transmission, and by escalating to INQUIRY SCANwithout wasting time or energy, will receive more detailed informationabout the transmitting device.

Bluetooth Core Specification, Version 5.2 and Supplement (published in2019, incorporated herein by reference) includes an “Extended InquiryResponse”. Data types may be defined for such things as local name andsupported services, information that otherwise would have to be obtainedby establishing a CONNECTION. A device that receives a RUI and a list ofsupported services in an extended inquiry response does not have toconnect to do a remote name request and service search, therebyshortening the time to useful information reception. Backchannelcommunications facilitate the connectionless mode.

FIGS. 26A, 26B and 26C are sample packet structures that relate to theBT advertising and link layers. Advertising beacon message structuresthat have standardized lengths in the range of 31 to 47 octets. They maybe proprietary formats having defined fields in the header and two tothree open fields or frames in the body of the message for non-formatcontents such as an identifier associated with the device or anadvertising service. In the case of Eddystone packets, packet typesinclude those for broadcasting URL (or shortened URL lookup) or sensordata. The shortened names tie to a look-up service so that a device thatreceives the message can be directed to further information orattachments.

The shortest packet is an INQUIRY packet 2510 as shown in FIG. 26A, witha length of 68 bits. This is an access code 2511 of an inquiry or adevice ID PACKET of a scan response. POLL 2521 and NULL packets have alength of 122 or 126 bits (FIG. 26B) and include an access code 2522 anda header 2523 that defines the packet. The FHS packet (2541, FIG. 26C)is important in exchanging identifiers and clock hopping schema as partof the connection process prior to further data exchange by pairing andis 270 bits in length. The FHS packet includes an access code 2542 foraddressing the transmission, a header 2543, and a payload 2544. Inextended connection mode and connectionless transmissions, packetlengths may span up to 5 slots. For fidelity in voice transmissions,higher numbers of repeats of short packets are used. But packets aretypically limited to a maximum payload of 258 octets (about 2 Kbits)with a total length of about 2854 bits in a 5 slot data payload,optionally with enhanced rate packet transmission with DPSK at 2 Mbps or3 Mbps. These details demonstrate the limitation of BT radio links andunderscore the utility of cellular radio as an enhancement fortransmission of larger amounts of data at greater speed. 5G tops out ata theoretical 5 Gbps, permitting greater use of broadband services.

FIG. 27 is a view of the structure of a proprietary inquiry responsepacket 2700 that includes a preamble 2502, access code 2701, payload2702 and error check bytes 2504. The payload is structured to transmitdata to a receiving device. The structure includes a series of lengthfields (designated by “L”, 2704,2708,2712 for example) that help to maskdata in the intervening fields. Field 2706 is a local name specified bythe manufacture, and may be FNDR or FND, for example, to designate abrand of tracking devices. Field 2710 is a Service UID and acts totrigger the manufacturer's application when received by a controlapparatus 70. Field 2714 is a data service filter that can containinformation that specifies how the packet is to be read, and thusterminates a header part of the payload.

In this proprietary format, the next field 2016 in the payload specifiesa 48 bit MAC Address (6 octets). The first two octets 2018 of thepayload body define a “community identifier” that “points to” adesignated server to which the data may be forwarded. The communityidentifier is shared by other devices made by the same manufacturer andis important because the power of the tracking devices rests in greatmeasure on the cloud-based system that administers the devices for acommunity of users. This is described in more detail in FIG. 37, and inU.S. patent Ser. No. 10/389,459, and related patents that are co-owned.

The remaining four octets of the MAC Address 2016 are device specificand are broadcast so that the devices can be tracked not only by theuser, but also by other devices that are community members and can runthe required software for recognizing the message structure anddecomposing the packet to parse out the MAC address. The MAC addressserves as a radio unit identifier (RUI) or short version of a UID. ThisRUI allows any compatible device in the world to report the location ofa lost tracking device to the designated cloud server 58 and allows thecloud server to pair the radio unit identifier with a user profile. Oncethe user is identified, the cloud server can generate an alert ornotification to the owner, or can cause an action in a remote machine.Each type of data in the signal is capable of acting as a flag totrigger a remote response.

The rest of the payload is divided into other fields that are particulardata types. The content of some fields can be dynamic, for example field2720 can be an action sequence specifier in which the value of the fieldspecifies a particular behavior or mode such as an alarm state. Anotherfield 2722 can indicate whether the device is bonded to a controlapparatus or is in an unbonded state available for bonding. If bonded,the device may not respond to invitations to connect from anothercontrol apparatus. A field 2724 may specify the state of themultifunction button that serves as a command when parsed by compatiblesoftware in a control apparatus. A next field 2726 may specify atemperature sensor output, for example. And field 2728 may specify aheading or a motion sensor output, and so forth. Field 2730 may specifythe transmit power of the radiobeacon signal, as is useful to thereceiving device in more accurately calculating radio proximity. Thesedata fields, and others in other signal types, contain what is referredto here as “information” that may be used to track lost items and tocause remote actions by triggering command and notification functions ina control apparatus 70 or in a cloud host 58.

The tracking device may also receive encoded data that results inexecution of a command sequence. The devices have both packet compilersand decompilers for sending and receiving encoded messages. BT devicesmay also include encryption that may be native encryption specified bythe BT SIG, or proprietary encryption utilities.

Thus the BT tracking device exhibits a significant level ofsophistication in a simple package. The primary limitation is range ofthe BTLE radio transceiver. At 2.45 GHz, a signal transmitted at 0 dBmdecays in quality within a radius of 100 yards. This is in part due tothe FSK modulation of the primary signal and the use of a spreadspectrum. In order to overcome these limitations, a next generation ofradiotags has been released that includes a PSK-modulated cellularradioset capable of more powerful transmissions. While these newerradiotags are technically different, the basic operation of thelost-and-found system (3700, FIG. 37) includes many features of theearlier systems, but with the augmentation of cellular networkconnectivity.

FIGS. 28A and 28B are perspective views of a dual-radio radiotag device2800 with both a BT and a cellular radio. The device includes aradiolucent hard case 2814, shown here with clamshell construction withupper case member 2814 a and lower case member 2814 b joined at seam2814 c. Optionally a battery access port may be provided on anundersurface of the case 2814, or in other embodiments the devices maybe sealed and may be inductively rechargeable. A USB port 2817 forrecharging and data transfer is shown at the back lower end of thedevice.

So as to distinguish these radiotags 2800 from the earlier described BTradiotags 10, the dual-radio devices are termed “XCB radiotags”, and aredescribed more fully in U.S. patent Ser. Nos. 16/575,315, 16/950,666 and17/163,403 et seq, which are co-owned at the time of this filing and areincorporated herein in full by reference. All such devices10,2800,2200,2300 are useful as tracking devices when attached orotherwise associated with an asset, person, pet or other object in needof location and tracking services.

XCB devices include a battery or mobile power supply and supportingcircuitry as will be described below. The case includes an annulet orslot 2816 (FIG. 28B) for receiving a lanyard or chain. One skilled inthe art will readily appreciate that there are various ways ofassociating a radiotag with an asset, human or animal in need oftracking or likely to get lost. Also shown is an actuator button orswitch 2815 formed on an upper surface of the case. The switch 2815 mayfunction as a “homing button” to cause the device to CALL HOME when theswitch is depressed, as will be described below. These features arerepresentative of XCB radiotags that embody aspects of the invention butare not to be construed as limitations of the inventions as claimed.

FIG. 28B is a perspective view of first XCB device 2800 with keychain orlanyard through annulet 2816. In these drawings, signals from the radiosare indicated by concentric arcs that connote electromagnetic waves,wider for cellular signals (C) and narrower for BT radio signals (B). Anattached keychain 304 illustrates one of the many possible uses of theXCB devices. XCB devices and smartphones are both examples of “cellularradio devices” as used here, but XCB devices are used as radiotags andfor relaying information to a central server, generally by amachine-to-machine (M2M) protocol.

FIG. 29 is a schematic 2900 of an embodiment of an XCB device 2800.Processor 2970 includes a BTLE radioset 2980 electronically coupled toan antenna 2981 a, including, if needed, an encoder/decoder for parsingdigital radio signals. The processor can be programmed, or otherwiseconfigured, using software resident in ROM (such as EEPROM 2985) or asfirmware, or a combination of both software and firmware. RAM 2984 isalso provided for storage of volatile data, such as for data logging ofsensor data that is transmissible by cellular or BT radio.

The MCU 2970 defaults to low power mode with clock function as adefault, but can be powered up by a signal from the BT radioset oraccording to a power management schedule that also controls the celltransceiver 2983. The power management schedule includes PSM mode fordeep sleep and eDRX mode for intermittent wake at paging windows and forTAU. Relatively simple processors with integral BT radio modems can beused, such as the Dialog DA14683 (Dialog Semiconductor, Reading UK),Texas Instruments CC2652RB (Texas Instruments, Dallas Tex.), ToshibaTC35680FSG (Toshiba, Minato, JP), Nordic nRF52840 (Nordic Semiconductor,Trondheim, Norway) and related semiconductor packages.

Cellular radio modem 2983 with cellular antenna 2983 a is configured toprovide simplified communication on a private network. In oneembodiment, the XCB device is operated as a cellular device accessibleby an IP address on a private network to find and track the whereaboutsof the device via a dedicated and secure 5G private network or gatewayVPG that is administered by a cloud-host administrative server. A SIMmodule may be installed to establish the exclusive IP address in the XCBdevice, with network access restricted to authorized parties such assmartphone 70. The cellular modem may be for example a Monarch LTE GM01Q(LTE-M/NB-IoT such as the SQN66430 SiP) or NB01Q (NB-IoT) LGA modulewith integrated SIM platform (Sequans, Paris FR), or an AeroFONEsingle-chip core from NPX (NPX Semiconductor, Eindhoven, Netherlands),for example.

In one embodiment, the cloud administrative host implements the VPG orcloud host 35 network and uses the IP address to access the XCB device.By using the VPG to wake up the XCB device in a paging window as needed,sleep modes can be increased to save power. For example, an eDRXprotocol can be overridden, or the parameters of a power saving modemodified. And by waking up the cellular modem, then more commands anddata can be transmitted to the XCB device and data can be uploaded fromthe XCB device. Once the cellular radio is on, then network-assistedlocation fixes on its transmissions may be performed automatically.

Use of private IP addresses with a VPG reduces the incidence ofinadvertent, unauthorized, and network-incidental messaging that candrain battery life. The cloud host also adds a layer of artificialintelligence.

Devices having a cellular radio may wake up periodically, get a locationfix, report the location to the cloud host, and then return to sleep sothat the battery life is months or years. In one embodiment, the VPGnetwork may use the location information to create a “trail ofwaypoints” of locations of the XCB devices over time by periodicallygenerating and logging locations obtained by AGPS in an energy efficientmanner. A motion sensor or heading sensor also improves the efficiencyof the devices. For any given time period, if accelerometric motion isdetected that is characteristic of motion, or a vectored heading, aposition fix is requested and fulfilled. For example, the position fixis not repeated unless motion is again detected. In a variant ongeofencing, XCB devices in identified “safe locations” are queried lessfrequently for location updates and not unless motion data is consistentwith an excursion that would take the XCB device outside a designatedrange of the safe location. The tempo of a walking person is one flag,the higher frequency vibration of an automobile ride is another flagthat would trip a location update command inside the XCB device. Thusonly the accelerometer needs to be monitored on battery power unless anduntil a location update command is scheduled in advance or a query isreceived from the cloud host.

The signal strength of a cellular base station can also be monitored, asis typically the case in cellular networks to monitor connections andwhen needed transfer connections from one cell to another cell.Typically, the XCB device location is updated by TAU (Tracking AreaUpdate) when a handoff is made between two cells. Depending on rules setby the cloud host that can be linked to the XCB device user's profile,to local events, time of day, and so forth, the cloud host can also benotified if the XCB device is reallocated from one cell to another.Because this can also occur when cell traffic is being levelled (i.e. bymoving users from a crowded cell base station onto an adjacent basestation having lighter traffic) the cloud host can monitor the basestation carrier channels in the network path to differentiate locationchanges that are traffic load driven versus changes driven by a changein cell initiated because the XCB device detected a stronger signal froman adjacent base station and elected to initiate a handover to the newsystem transmitter.

The device optionally includes an OLED display 2930 and display driver2929.

In some instances, the cellular radio chip 2983 will also contain a GPSposition locator. In other instances, a GPS chip 2988 and antenna 2988 awill be supplied as a separate component(s). Because GPS involves anenergy-intensive signal acquisition and calculation, triangulationmethods for determining location may instead be implemented using thecellular or BT radiosets, and such methods are satisfactory wheremultiple base stations having known locations are available, such as inmost urban environments.

USB port 2981 is intended to operate with charger 2998 to rechargebattery 2999 but may also be used to download program upgrades, forproduct qualification and troubleshooting, and for any other purpose forwhich a USB port may be utilized.

Audio codec 2990 is coupled by a LINE OUT to amplifier 2992, whichdrives speaker 2993. The speaker may be mounted on the housing ratherthan on a circuit board so as to take advantage of any resonance of thehousing shell. The XCB device may include a vibrator driver 2994 and oneor more vibrators 2995 configured to provide notification functions andmay be combined with one or more buzzers. By selecting a higher dBpiezoelectric buzzer (not shown), a FIND function can be realizedanalogous to the FIND PHONE function taught in U.S. Pat. No. 9,892,626,herein incorporated in full for all it teaches. Using the vibrator, anXCB device may be “nudged.” A nudge is useful when a user of a parentdevice wants to attract the attention of the user of the XCB device,such as when a message is sent that needs a prompt reply.

Sensor package 2996 may include one or more sensors that are not switchsensors and are thus distinct from switches 2986 (S1, S2, S3). Variouscombinations of sensors may be provided in a sensor package. In somepreferred embodiments, a sensor is a combined 9-axis motion sensor andtemperature sensor. In one preferred device, a sensor is an integratedpackage having an accelerometer, gyroscope, and magnetometer for eachaxis. In some instances, the sensor package is incorporated into theprocessor.

As illustrated here, accelerometer or heading sensor 2997 is associatedwith processor 2970 and may be used to trigger processor functions as inmotion/heading control and left-behind notifications. Generally, an XYZthree-axis accelerometer is included but may also include a 3D gyroscopeand magnetic compass with firmware that generates a heading output tothe processor. In some instances, the accelerometer may be integratedinto the processor and has a number of uses. Input from theaccelerometer, such as a double or triple tap, can be used as a wakeupsignal as part of a power-savings sleep routine.

The device may also be equipped with a Qi charger antenna (not shown) oran NFC antenna 2933 for receiving finger taps. Each tap can beassociated with a transmission of an RFID identifier from the XCBradiotag to a device such as a smartphone equipped with an NFC readerand suitable App. On sensing a finger tap, the XCB device powers on theNFC circuit to transmit the RFID ID and causes a bootstrap routine incooperation with the smart device to initiate a BT connection or a WiFiconnection for example.

GPS chip 2988 with GPS antenna 2988 a is shown as being optional becausein some instances the GPS functionality will be built into the processoror into one of the radiosets, if present at all. Some cellular radiochips are provided with accessory GPS functionality integrated into thedie. The GPS antenna 2988 a may be separate from the cellular antenna2983 a as shown, but, in some instances, a combination package is used.GPS may be actuated at extended intervals to save power, and may besmart GPS, that is, activation occurs when there is a need, such as whenthere is motion of the wireless device or there is a situation inproximity to the wireless device (as detected from other data feeds)that necessitates, or can benefit from, closer tracking and monitoringof location. AGPS may be used to reduce power.

FIG. 30A is a view of an XCB radiotag 2800 as part of a first group 3020defined by membership of six tracking devices (including the XCBradiotag, which may be attached to a keychain, for example). The XCBradiotag is enabled to directly connect 3001 with a virtual privategateway 3000 via its cellular radio (2983, FIG. 29). Data can be relayedfrom the BT radiotags in the group (that lack a cellular radio) to acloud host 58, and conversely, the cloud host can send data, commands orprogram updates to the Bluetooth radiotags via the XCB radiotag 2800.The server/host 58 will look up the identifiers of the BT radio units ingroup 3100 and access a user profile in its databases 59,60 beforegenerating commands or notifications. Thus the XCB radiotag cancomplement or replace a smartphone in monitoring radiotag groups.

In one instance, the XCB radiotag 2800 monitors traffic from each of theBT radiotags and compares the radio unit identifiers with a whitelist.Any loss of contact with one of the units of the group is reported tothe cloud host 58 and can result in an alert to an owner of the radiotaggroup 3020, for example.

FIG. 30B is a view of an XCB radiotag 2800 as a monitor for a secondgroup 3040 of BT radiotags that includes a second XCB radiotag 2801. Thelead XCB radiotag 2800 is enabled to directly connect 3001 with avirtual private gateway 3000 via its cellular radio (FIG. 29). Data canbe relayed from the Bluetooth radiotags to a cloud host, and conversely,the cloud host can send data, commands or program updates to theBluetooth radiotags via the XCB radiotag 2800. The second XCB radiotag2801 provides a level of redundancy and has the capacity to alsodirectly connect 3011 via a cellular uplink to the server/host 58. BothXCB devices can monitor radio links to other tracking devices in thegroup and can forward commands as needed. If battery power in a firstXCB device is depleted, the second XCB device can take over managementof the piconet.

FIG. 31 is a view of a system in which an XCB radiotag 2800 serves as analternate link between a group of BT radiotags and a cloud host. The BTradios of radiotags can pair with or can advertise to either asmartphone 70 or the XCB radiotag 2800. Both the smartphone 70 and theXCB radiotags 2800 can report information to a cloud host 58 and canreceive instructions or notifications from the cloud host 58. Both arenetworkable on a cellular network and both have BT radios and can detectother BT radios. XCB radiotags do not generally have the touch-sensitivedisplay screen that is characteristic of smartphones and are notgenerally equipped to enable the user to display a user interface and tocustomize a user profile and conditional rules in a cloud host database59,60. However, in other respects XCB devices have some of thecharacteristics of a “smart device” and include a SIM card andprogramming for operation as part of a cellular network and system forlost-and-found tracking of radiotagged assets, and hence are “trackingdevices” or “radiotags” having cellular network connectivity for greaterpower in providing location and tracking services.

XCB radiotag 2800 links directly 3001 with the server/host 58 via avirtual private gateway 3000 that is operated to reduce unwantedcellular messaging that would otherwise drain the battery of theradiotag. The management of the group 3150 can be handed off to asmartphone 70 as needed, and the smartphone may communicate with thehost server 58 via a conventional cellular link 3101 managed by atelecommunications company. The smartphone and XCB radiotag can also bein communication, generally through a BT radio link 3110 but in someinstances the link between the two cellular devices can be routedthrough the VPG or through the telecomm network for exchanging M2M data,or as a virtual “walkie-talkie”. While the current generation of XCBradiotags are not built to support voice communications, future versionsmay include cellular voice messaging in duplex or partial duplexconnections.

Smartphone 70 is used extensively in setup of the XCB radiotag and theBT radiotag group, and is also used in receiving owner notifications. Anexemplary screenshot is shown in FIG. 32A.

The cloud host 58 and supporting databases 59,60 are used to providesubscription lost-and-found services. FIG. 32A is a screenshot 3200 thatindicates exemplary pet-related subscription services 3202 that may beavailable, which can include biometrics telemetry from a mammal to whichthe radiotag is secured, real time tracking, establishment of safe zonesenforced by radio tethers, tracking history, extrapolation ofdestination, detection of an escape from a geofenced area,community-supported lost asset recovery, voice interaction services, anda handy FIND PHONE utility that lets the actuation switch 2815 on theradiotag cause the owner's smartphone 70 to ring so that it can bequickly located if misplaced in the house.

For pet-related services, the XCB radiotag is attached to the pet by acollar, for example. Similar services can be provided for lost childrenor for physical assets in need of radio tracking. For example, servicesmay include directions to find a lost pet, a sharing button that letsthe user share the radiotag signal with friends and family, and a BUZZbutton that causes a piezo speaker in the radiotag to vibrate or buzzaudibly as an aid in searching at close quarters. Provision for a voiceinterface may also be offered. And a LOST PET alert (3204, Cloud GPS)can be posted with the cloud host so that any compatible device thatencounters the radio unit identifier or MAC address of the lost radiotagwill trigger a notification to the owner. Further descriptive materialis found in U.S. patent application Ser. No. 16/575,315, titled “HybridCellular Bluetooth Tracking Devices, Methods and Systems”.

Several levels of tracking services may be provided, each with adifferent expected battery life on a single charge. These are estimatesbased on balanced radio usage and latency for the cellular and/or BTradio modems. The “Dynamic Tracking” mode, which updates location at acentral server every 30 to 90 minutes, is recommended for most routineuse, but in the event of a lost smart object, the devices can beupgraded to uplink data every 4-8 min in an “Emergency Tracking” mode.Lower power tracking provides updates every 4-6 hours, and for maximumbattery life (up to 1 year), a BT only tracking regimen is supplied.Each of the cellular plans is associated with radio parameters for EDRXand PSM, and can be modified anytime the radiotag opens a cellularnetwork connection in a paging window, or is in BT communication with acommunity smart device (72, FIG. 37) having a network connection tocloud host 58. As described earlier, the BT radio and sensor package,including motion and heading sensors, can trigger a CALL HOME duringwhich the power savings parameters can be reset. Also, biometric datacan be linked to a CALL HOME. The actuator button 2815 can also cause acellular connection to be initiated, or a tap by an NFC-enabledsmartphone will actuate a network connection. The virtual fenceestablished location coordinates around a pet so that if the pet goespast the fence, an alert is sent to the owner. The virtual leash moveswith the control apparatus 70 and establishes a radio proximity leashthat if broken, results in an alert to the owner and optionally anaudible warning to the pet or child. Other features include a history oflocations and an activity tracking log.

FIG. 32B provides a screenshot 3220 of the tracking program in operationon a smartphone 70, and can show the location of one or more XCBradiotags on a map of a city. By using a combination of BT and cellular,very large areas of the planet can be scanned for a missing radiotag andthe precise position pinpointed and displayed on a map, with thecapacity to scale in and get directions for recovering the lost smartobject and for other subscription services that are administered by acloud server 58 as part of the lost-and-found system.

The XCB radiotag can also provide location information relative to otherBT radiotags of a group that are in BT radio proximity. The XCB radiotagneed not be an attachable device, but in some instances may be embeddeddirectly in a smart object and receive power from the smart object.

FIG. 33 is a view of a message structure 3300 containing radio contactinformation that is relayed via a cellular network connection from anXCB radiotag to a cloud host as IP packet data (such as can be carriedover a cellular network connection). A WiFi message is similar. In thisinstance, these packets are encoded in a packet compiler within the XCBradiotag and transmitted by the cellular radio. The payload consists ofa radio contact log record having the details (termed here“information”, 3350) of a BT radio contact received by the XCB radiotag.The information may include a current location 3358 determined by GPS,AGPS, PoLTE or other network positioning. The IP data packet 3300includes a preamble 3322, a header 3323, an IP packet address 3324 withMAC address of a host server that acts as a recipient or clearing housefor the records, a payload 3325, and CRC 3326. In this example, thepayload 3325 is a radio contact record, and includes a timestamp 3351,an ID of the host device 3352 that captured the radio contact record, anID of the transmitting device 3353 that initiated the radio signal thatwas intercepted, message type 3354 and length 3355 statistics, aproximity indication 3356 that estimates the distance between thereceiver and transmitter, any sensor data, UID, service characteristicsor URL 3357 in the payload, and a location 3358 of the host device atthe time the signal was intercepted.

FIG. 34 shows a concatenated structure of a multi-record radio contactlog useful in tracking a group of radiotags. This log is compared to theexpected content of radio contacts for the group by a competentcomputing machine such as the cloud server, and any anomalies are thebasis for a notification to an owner/user (such as a LEFT BEHIND alertas described earlier). The log of radio contacts can be compared to awhitelist, for example, or compared by homology matrix algebra to detectabnormal readings or absent readings from any of the reporting membersof the group of tracking devices.

FIG. 34 makes clear that the IP data packet 3400 can be logged andtransmitted across a cellular signal in an efficient and data intensiveway by concatenating the radio contact reports. A multi-record radiocontact payload 3401 is a log of or a “snapshot” of the radio trafficaround the host XCB device for a slice of time. Shown here are ten logrecords 3401 a, 3401 b, 3401 c, 3401 d, 3401 e, 3401 f, 3401 g, 3401 h,3401 e, 3401 j, of individual BT radio signals that were intercepted.The snapshot provides a real-time look at what kind of radioneighborhood surrounds the receiving device. The log will includemembers of a group that is being tracked if any, but also records of BTsignals that are not included in the group membership. If the device isin a familiar home office, there will be the BT printers, thesmartphone, the user's radiotags, perhaps a headset or a BT mouse, allexpected members of the radio ensemble that is characteristic of thathome location. The unique radio identifiers of each device are combinedto form a signature that indicates familiar surroundings and defines a“safe zone”. When the user leaves the front door, some of those radioidentifiers accompany him, and are picked up on the next radio snapshot.Further form home, an increasingly alien radio environment isencountered. Each radio snapshot on a journey contains information thatinforms the relative familiarity or strangeness of the surroundings.

FIG. 35 is a view of a rolling memory stack containing radio contactrecords. In this model, a continuous rolling stack of BT radio contactsnapshots is taken. Anomalies in the data are detected by machinelearning and probabilities associated with predictable outcomes are usedto design interventions. Data is acquired at intervals by periodiclistening on BT radio channels. The minimal latency in detectinganomalies and rapid identification of some lost asset issues results ina significant uptick in consumer confidence in the lost-and-foundsystem. Old data is archived by the administrative server for use inbuilding models for machine learning and is then discarded so that thememory resources inside the XCB radiotag are not overloaded. Over time,a consensus “memory record” of the expected BT topology of a place (orplaces) is stored in memory of the XCB device or host server and any newradio snapshot can be accessed to determine whether the device is whereit is supposed to be. Ultimately, this approach yields a system that canpredict a device is lost before the owner knows it is lost.

The system 3700 can also use the radio contact logs to “guess” locationsof lost items. Each time the radio tracker associated with a lost itemis detected, another location datapoint becomes accessible in a clouddatabase 59,60. Each XCB radiotag and smartphone serves a community ofusers, and the data achieves a granularity that allows a user to viewthe approximate position of a lost object on a map essentially as shownin FIG. 12.

FIG. 36 is a view of a relational database for managing sequentialsnapshots of radio contacts. The series of three radio envelopesnapshots 3600 a, 3600 b, 3600 c (bold arrows represent a time series)are each taken by intercepting radio traffic in BT advertising and datachannels for a designated interval of time. Passive listening is used soas to not consume more battery power by generating back-and-forth radiomessages. Each message includes the HOST ID 3352 of the XCB devicecollecting the snapshot, a timestamp 3351, and a geostamp 3358. In thisinstance the top ten BT signals (based on RSSI for example) interceptedat a moment of time are captured in each snapshot. A rolling stack withregisters for this purpose is illustrated in FIG. 35. Each dashed box3601 a,3601 b,3601 c contains a table with five columns corresponding tothe transmitter identification, the type of message, a length of themessage, RSSI, and any data content in the message as captured in eachof the radio contacts. Each radio contact occupies one row in the table.

At the bottom of each snapshot, a “familiarity ratio” 3712,3714,3716 iscalculated that accounts for the signals of group members as a numeratorover a denominator of the background BT radio traffic signals in asnapshot. The familiarity ratio may take fixed transceivers intoaccount, scoring device signatures that typically remain in a safe zonedifferently from device signatures that always accompany the owner.Alternatively, a homology matrix may be used to make the calculations. A“strangeness index” can also be provided that accounts for irregular orunexpected BT signatures associated with a location. By quicklyrecognizing the pattern of familiar and unfamiliar BT transmissions in alocation, the XCB device can quickly autoprovision a kit list of what tokeep track of, infer actions to be taken if there is an exception, andalso note the overall characteristic of the location as a mélange of BTradio traffic so that in the future, when that pattern is againdetected, the device can know where it is. In this way, the XCB devicecan know something is lost before the owner does, can guide the owner toa lost device, and can also know where it is without the need for GPS,AGPS, PoLTE, or other advanced, energy intensive location acquisitionmeans.

Referring to FIG. 36, the combination of a sudden decrease in proximityand a vectored impact in the data columns at 3622 (arrows) is manifestedin a summary indication 3623 that one of the radiotags has been leftbehind. This inference is made by the XCB device and is communicated tothe owner directly or via smartphone 70. The XCB device performs theanalysis autonomously. By comparing the logs of multiple radio devices,a consensus emerges and the “left behind” or “lost” alert can be issuedinstantly while the owner is still well positioned to backtrack andrecover the lost radiotag. Alternatively confirmation is obtained if XCBradiotag (host, 3352) shares the log snapshots with a system server 58,but the cost is increased latency. To speed up the analysis, the smartXCB radiotag is built with sufficient memory and processing power tohandle local processing of basic homology comparisons on the fly.

For a basic level of group tracking, the XCB radiotag can be providedwith a stack of registers sufficient to store a whitelist of trackingdevice group members and to take periodic snapshots of the BT radiotraffic received from the group members. The snapshots can be comparedwith data stored for established “safe zones”. A change in backgroundradio traffic can be detected with a latency dependent on the snapshotrate, an advance in the art over smartphone-mediated “virtual radioleashes”, which may be inactive for ten minutes or more because ofconstraints imposed by the operating system and may not be flaggedunless a signal is lost entirely.

FIG. 37 is an overview of system 3700 that includes a community ofusers, and is intended to show the basic concepts of “cloudshortcutting”. At the top of the network (above dashed line 3702) arefound the cloud hosts, servers and fixed network hardware of thebackbone of a global network. The cloud/internet 35 is an IP packet dateenvironment consisting of wired and wireless devices that make up aGlobal Area Network (GAN). The GAN may also include Virtual PrivateGateways (VPG, 3000) that define private IP channels carved out from theInternet. The cloud/internet and VPGs interface with servers(represented by server 58) that define “cloud hosts”. In this instance,the cloud host 58 is a dedicated administrative host for operating aglobal lost-and-found system 3700. Multiple servers may be used toadminister the system. As part of system 3700, cloud host 58 includesdatabases 59,60 and is linked to network resources that maintain userprofiles and track tracking device locations as was described withreference to FIG. 6 above.

Below dashed line 3702 and above dashed line 3704 are found portabledevices that make up the cellular and WiFi layer of current networkarchitecture. Implicit in this structure are the base stations of thetelecomm companies, Starlink satellites, and portals of cable companiesthat route traffic between users and cloud resources, and so forth.Below dashed line 3704 are found portable devices with limited broadcastrange, such as the BT tracking devices 31,32,33 shown here. In 5G, thislayer is expanded to include fixed installations of other kinds of radiodevices that operate in allocated 2.4 GHz, 5 GHz, 6-7 GHz, 11 GHz and 28GHz bands, for example.

Information in signals from devices 31,32,33 can be relayed to the cloudlayer by use of intermediary devices 70,72,2800, which have both BT andcellular transceivers. As presently practiced, cellular and WiFi make upthe bulk of the bandwidth available for moving information and commandsbetween the bottom wireless device layer and the cloud host layer.However, rapid expansion of 5G alternatives and the Internet of Thingsis expected in this decade. As more 5G bandwidth is deployed, additionaldevice types will become available, but the principles outlined herewill remain by which a network having multiple radio types isestablished that links the cloud to local devices.

As a first illustration, devices 31,32,33 can be considered as a group(box 3751), representing devices owned by a common owner. Bold arrowsindicate wireless information links. Link 3710 connects the owner'ssmartphone 70 with the cloud host 58 via a cellular telephone network(or WiFi hotspot). Bluetooth radio data is not directly compatible withthe cellular link 3710. The smartphone 70 includes an application 700that reads BT data packets and forwards relevant information to thecloud host, and may also send or relay commands to the BT devices31,32,33.

In advertising mode, each BT tracking device 31,32,33 uses its core BTtransceiver (21, FIG. 2A) to broadcast a periodic beacon signal withinformation including the identity of the tracking device and alsoincluding any information from onboard sensors of the respectivetracking devices. A sample of a signal “payload” that includes“information” 2750 such as sensor data, radio identifiers, batteryreserve, transmission power, and piconet status, for example, is shownin FIG. 27. The BT beacon signals have a range dependent on transmissionpower, but the range can be 100 ft to 100 yards, for example.

The BT device 31,32,33 transmissions may be monitored by the smartphone70 on a regular basis. The smartphone (with an installed application100,300,700) will typically add a timestamp to a received transmissionand may also add a geostamp before forwarding any relevant informationto the cloud host. In this way, the system is able to track the BTdevices 31,32,33.

If the smartphone 70 loses track of BT device 33, the system will relyon a community smart device 72 (box 3752) to report a location where thelost device was detected. Community smart device 72 includes a BT radioand is enabled to listen for BT radio traffic and to parse out the radiounit identifier of BT device 33, using an installed program 700. When inradio proximity, community smart device 72 will receive the beaconbroadcast from the BT tracking device 33 and can relay the informationin a transmission 3720 to the designated host 58, and the transmission3730 can include a (GPS or network-assisted) location of the smartdevice 72 when the radio contact is made. The smart device 72 does notneed permission from the owner of the tracking devices 31,32,33 toreceive and forward the radio unit identity and any sensor informationbroadcast by device 33. As long as the control program 700 for trackingdevice 72 is running, the beacon signal from any of the tracking devices31,32,33 will be received and processed. The control apparatus 72 canact on the information in the signal or can forward the signal to thecloud host 58. Generally, device 72 will add a timestamp and a locationstamp. The smart device may also add other information (such as sensoroutput from sensors onboard the smart device) to a “record” of the radiocontact with the tracking device before forwarding the record to thecloud host. The retransmission of beacon information received from BTdevice 33 by smart device 72 imposes no hardship on the community memberbecause each smart device regularly transmits a signal and data to thecellular network as part of maintaining a network connection. Theforwarding of data can be handled in background as described in U.S.Pat. Nos. 9,774,410, 9,900,119, 10063331, 10371800, 10389459 and10937286, which are co-owned at the time of filing and are incorporatedin full by reference for all their teachings. The forwarding of beaconsignals may occur even if device 33 is not reported as lost by theowner. When the information is received, the cloud host will look uprecords associated with the radio unit identifier of device 33,determine the owner, determine whether the device is reported as lost,and if flagged as lost in a database 59,60, then will notify the ownerand assist in recovery of the lost device. The notification to the ownermay include an option to display a map showing the approximate locationof the lost device (for example as described in reference to FIG. 12).The system will also aggregate multiple reports of radio contacts withthe lost device and can present those as a consensus location if thedevice is stationary, or a trail of waypoints if the device is on themove.

Smartphone 70 may also be enabled to track XCB device 2800 using a BTradio link 3730, but beyond the limited range of the BT radios, thesystem will rely on the cellular radio of the XCB device 3730 forperiodic location reports. If the smartphone 70 loses track of the XCBdevice, the system will still receive periodic location data viacellular link 3740 because the XCB device is programmable to make anautonomous cellular network connection.

In fact, XCB device 2800 is able to manage a group (box 3753) withoutsmartphone 70. In this instance, the group consists of devices 31,32 and2800 under common ownership and reporting to the cloud host 58 via links3740 or 3760. The cloud host 58 tracks not only the BT tracking devices31,32 but also cellular XCB radiotags 2800. The XCB radio tag is able toreport location independently using one or more location servicesselected from GPS, AGPS, PoLTE, and so forth. The XCB radiotag 2800 islocatable both by its BT beacon signal, but also by its cellular networkconnection in a cellular network. As long as BT radio contact ismaintained within the group 3753, the approximate location of the threedevices is known to the system. If the XCB device 2800 is forwardinginformation to the cloud host from the BT devices 31,32, and thatinformation includes motion sensor output, then the system can monitorthe relative motion of the devices, and infer a left behind or a lostcondition from the data even before radio contact is lost.

Groups 3751 and 3753 may be permitted to co-exist. A bondingrelationship between the smartphone 70 and BT devices 31,32,33 iscarried in the memory of the BT devices (as peripherals) and thesmartphone (as central). The program 700 operated by the smartphonepermits sharing of BT devices with others, but in some coding scenarios,the access codes may be changed if the BT devices have already been“claimed” by smartphone 70. A flag may be inserted in the broadcast ofthe BT device that marks it as a claimed device and limits itsdiscoverability. However, the BT SIG standard does permit BT devices toparticipate in two or more piconets using time-division multiplexing, sogroups represented by boxes 3751 and 3753 can be formed and operateindependently if coded to operate as separate groups.

For example, using BT radio, XCB radiotag 2800 may monitor BT devices31,32, while smartphone 70 monitors the XCB radiotag 2800 and device 33.Interestingly, in this model, smartphone 72 may be granted privileges atthe cloud level to send commands to BT devices 31,32 via XCB radiotag2800 if smartphone 72 is operated by a friend or associate who workswith the owner of smartphone 70. As conventionally deployed, the BTdevices will change their access codes once they have bonded to anowner's control apparatus 70 and will not be detectable by passersby,but when that bonded link is broken, the devices will again begintransmitting a general advertising beacon signal with access code GIACthat can be detected by smart device 72. Using a multi-threadedprocessor, the firmware of the device 2800 and the program 700 may bemodified so that bonding in one piconet does not limit advertising oreven participating in another piconet.

At another level, all of the devices 70,72, and 2800 may be operated(i.e., may be programmed) to sweep up BT radio contacts and report themto the cloud host 58. The XCB radiotag, as it moves through a workday,may encounter and report a series of radio contacts with devices havingthe signature characteristic that marks the devices for reporting to thecloud host. While not shown, tracking devices owned by other communitymembers, and any radio signals of other BT devices such as printers andhome accessories, will be included in these sweeps. Thus the net effectof deployment of the system is to convert the middle layer of thediagram, between dashed lines 3702 and 3704 into a large machine forscanning, detecting and reporting BT radio units. These radio contactsare reported via the cellular links 3710,3720,3740,3760, but radiocontact information can also be transferred laterally as BT packet data,for example via link 3730, from the XCB radiotags to their more powerfulcousins, control apparatus 70 and (if permitted) smartphone 72. In someinstances, the system will rely on location data generated by thecommunity smartphone 72 or the owner's smartphone 70, but the XCBradiotag 2800 may also generate an autonomous location fix, so hasgreater value as a tracking device.

As a clarification of XCB device 2800, cellular network connectivity,network links 3740 and 3760 may be operated as cellular links in whichlink 3740 is managed by a VPG 3000 and link 3760 is managed by aconventional telecomm utility through a cellular base station, satellitelink, or WiFi hotspot, for example. The VPG establishes an IP addressfor XCB device 2800 and will send a packet that includes an instructionto wake up the cellular modem (2983, FIG. 29) when needed, for example,as part of power management. The VPG can also receive location updatesvia the private IP address. But link 3760, once the cellular modem isactive, can be used for general uplinks of data and downlinks ofcommands.

Use of a cellular radiotag 2800 for tracking services offers newopportunities. Tracking devices 31,32,33 and XCB radiotag 2800 maydefine a “group” having four members. The XCB radiotag 2800 has thecapacity to report its current location both to the host server 58 viacellular or directly to the owner's smartphone (via link 3730) via BTradio, and to monitor the radio proximity (and hence the approximatelocations) of the remaining radiotags 31,32,33 of the group. Whencellular is used, use of a virtual private gateway (VPG, 3000) in makingthese location reports ensures privacy and also dramatically cuts theenergy budget for cellular connectivity. As compared to thetelecommunications link 3710 to smartphone 70, a significant amount ofpower consumption for network traffic, much of which is clutter, iseliminated. Use of a VPG reduces this traffic substantially.

By adding processing power to the XCB radiotags, network traffic can befurther reduced. Local processing of received sensor data from themembers of the group permits some inferences about group cohesion to bemade locally, either by the XCB radiotag 2800 or by the smartphone 70.Similarly, an XCB radiotag can detect BT devices that define “safezones” such as a home printer or smart device with a fixed location thatbroadcasts a BT beacon signal, and by storing these device signatures inmemory, can turn off or throttle down the cellular modem when theradiotag is in the safe zone. Conversely, an XCB radiotag that leavesthe safe zone, for example a radiotag on a dog's collar when the dogjumps the backyard fence, can infer from the loss of the familiar BTsignature signal that it is no longer in the safe zone, and can activateits cellular modem to report its motion and location. Thus an XCBradiotag can become a “smart device” capable of programming to makeautonomous decisions about if and when to connect to the network usingthe more power-intensive cellular modem.

At a system level, using data forwarded to the cloud, the host server 58can assess radio proximity as measured by BT radio signal strength orheading data and can issue an alert if the signal strength or headingdirection is not copacetic between any two tracking devices, as wouldoccur if the devices are not moving with the same direction or speed.Accelerometric data is useful for this purpose, but heading sensoroutput from an integrated sensor package that corrects the headingoutput for tumbling and random motion by use of solid state gyroscopicand magnetic compass sensor output refines the capacity of the system todetect motion anomalies that are correlated with divergence of membersof the group from the owner's path, for example. Heading sensors areincreasingly integrated packages that output a true heading aftercompensating for any tumbling or rotational motions with limited powerconsumption.

Links 3710, 3720, 3730, 3740 and 3760 may also be used to send or relaycommands from the owner or the host server to any of the intermediatedevices 70,72,2800 and tracking devices 31,32,33. In some instances, thecommands are relayed over BT radio signals, and in other instances thecommands are relayed over cellular signals. WiFi radios and UWB radiosmay also be used to share data and commands.

Snapshots of radio contact data shared in a group or shared with thecloud host may be used to generate notifications or commands to asmartphone or to a remote machine for execution. Conditional logic isused to pair a trigger signal in the received information with a commandor notification to be executed. And using the user interface provided ona control apparatus 70, the executables may be programmable by users.Shared devices may be programmed to perform different actions bydifferent users, for example.

Because the owner's handset 70 has a BT radio transceiver, it cantransmit commands directly to any of the BT tracking devices to which itis linked. Similarly, the XCB radiotag can generate commands or relaycommands to the BT tracking devices to which it is linked. In one usefulapplication, a button press on the XCB radiotag can cause a location ofthe XCB radiotag to be archived on a server database associated with theuser's account. This location can be accessed by the user's smartphoneand displayed on a map if there is a need, for example, a need to returnto the spot where a car is parked. A button press on one of the trackingdevices can cause an alarm tone to sound on the owner's smartphone ifmisplaced, and conversely, the owner's smartphone can cause an alarmtone to be generated on a tracking device as an aid in finding a missingdevice when in BT radio proximity.

An advantage of including a cellular modem (2983, FIG. 29) is that therange of cellular connectivity is unlimited where cellular coverage isavailable, so the finding of missing devices that have been tagged byone of the cellular-enabled tracking devices or radiotags of theinvention extends to become a global lost-and-found system 3700 by useof these radiotags.

An “app” installed on smartphone 70 is used to set up the group oftracking devices 31,32,33 and also to set up XCB radiotag 2800, whichhas a limited user interface. Once the group is defined, the XCBradiotag can monitor and report on the group location and the cloud hostcan send relevant alerts and notifications to the owner via smartphone70 as described above with reference to FIGS. 11,12 and FIGS. 32A,32B(in which screenshots of a user interface are shown) for example. Insome embodiments, the app may be upgraded using OTA (over-the-air)methods. Similarly, an image update of firmware in any of the trackingdevices 31,32,33 or XCB radiotags 2800 can be downloaded into thedevices using OTA methods.

XCB radiotags 2800 can also be used as a standalone radio tracker whennot part of a group. For example, it may be desirable to attach one to apet or to a child's backpack or coat. The XCB radiotag can be programmedto periodically CALL HOME using a cellular connection with a virtualprivate gateway. The radiotag will report current location, and theserver will maintain an archive of chronological location data so thatthe pet or child can be tracked if needed.

While preferred embodiments of the invention have been shown anddescribed, modifications and variations may be made thereto by those ofordinary skill in the art without departing from the spirit and scope ofthe present invention. In addition, it should be understood that aspectsof the various embodiments may be interchanged either in whole or inpart. Furthermore, those of ordinary skill in the art will appreciatethat the foregoing description is by way of example only, and is notintended to limit the invention, except as further described in theappended claims. Those skilled in the art will understand that other andequivalent components and steps may be used to achieve substantially thesame results in substantially the same way as described and claimed.

Example I

Finding and Tracking of Groups of Tagged Objects: The user may find thatseveral individual objects are actually part of a cluster or “group”that he needs to keep track of together so that no one or two of theobjects of the group is misplaced or left behind. By tagging a set ofindividual objects that he wishes to track, the Finding and Trackingsubroutines and user interfaces can be simplified and the alerts becomemore self-explanatory. Thus as a matter of efficiency, the applicationcan be modified so that a single control surface allows the user to setup a rule such that all the radiotags in a group are treated asgroup-wise on a single screen on the control device. A name can be givento each group of objects that the user identifies. If there is an objectin a group that is missing or moving in the wrong direction, an alarm inthe user's smart device will indicate which group and which object ofthe group is not sending the nominal expected data. The user can thenuse a single interface to cause an alarm in the radiotag attached to theerrant object, while not causing an alarm in other members of the groupthat are all accounted for. Another working example is illustrated inFIGS. 16-17.

If multiple objects are not sending nominal data, then the user isprovided with a list and an icon for each of the objects that have losttheir place. The user can then activate an alarm in the attachedradiotag, starting with a first object and moving down the list untilall the objects have been recovered and the alarm condition ends.

In one instance, pressing a button on each radiotag will allow the userto silence an alarm for that radiotag, but not for any other radiotag.Alternatively, the mere act of picking up the object will provide theradiotag enough motion sensor information to inform the smart devicethat the object has been found.

Thus if a user has tagged a briefcase, a wallet, a keychain, a glassescase, and an umbrella, the alarm will specify which members of the groupare not providing data consistent with a first rule, for example theumbrella, and after the umbrella is recovered, the alarm will end.

Using Bluetooth radio, up to seven objects can be tied into amaster-slave relationship and the breaking of any radiolink results inan alarm. The master would be minding the radiolinks and wouldincorporate a flag in its broadcast that would notify the smart device.The Bluetooth master-slave comm protocol is sufficiently robust so thatthe individual links can be assigned to individual objects of the group(up to seven) and the alarms can be specifically associated with any oneor more missing objects from the group.

Example II

Detecting “Left Behind” Assets using “Find and Track Group” Feature:Control program 300 with “find and track group” feature is installed ina control apparatus 70. The feature enables finding and tracking byradio proximity or by using a bell and light built into each trackingdevice 10, 2800. The program monitors accelerometer output on thecontrol apparatus, and if sustained activity is detected that isconsistent with movement that would result in a change in a user'slocation, the program causes the BT radio to verify radio contact witheach of the items of the group and to interrogate the accelerometer ofeach member of the group. If any items in the group are not in motion,the program causes the screen of the control apparatus to display a menulist (FIG. 17) with a highlight on the items not in motion. Thehighlight indicates to the user that some items may be “left behind”. Ifthis is not what the user intended, the program will assist in locatingthe items. So for example, pressing button 408 on the display causes thetracking card in the wallet to sound a distinctive tone that can becleared by pressing button 2302 on the card (FIG. 23) when the userfinds the wallet in the pocket of the jacket worn yesterday. The programmay also receive a weather forecast of pending rain, and may show areminder to take the umbrella. All the items in the group are managedfrom a single screen, and the associated displays or actions are fullyprogrammable. The program will receive sensor information and otherinformation that the user can use as a “trigger condition” to cause thesystem to invoke an executable action or notification in the controlapparatus, in a tracking device, or in a remote machine. The program canalso monitor battery status of tracking devices in the group, and issuean alert if one or more of the items has a low battery. By “trackingdevice”, both the BT tracking devices 10 and the XCB radiotags may beincluded as group members, and in some instances, the XCB radiotags canshare management responsibility for monitoring the group andcommunicating any changes to the cloud host 58 or sending a notificationto an owner's control apparatus 70, for example.

The program of the control apparatus is enabled to run a counter thatintegrates motion sensor or heading sensor output in a rolling window oftime, and if there is sufficient motion to cause an expected relocationof the control apparatus, such as a smartphone, then the program willcompare motion sensor output received from the members of theradiobeacon group, and flag any inconsistencies. The smartphone can beepor vibrate as a notification, and a screen is displayed that lists themembers of the group and their relative motion(s). Permission is givento run the program in background. An override occurs if motion iscopacetic, and the counter is reset if there is a period in which thesmartphone is stationary.

The converse may also be enabled, whereby an increased motion sensoroutput from a member of the group of radiotags is inconsistent with amore stationary motion sensor output of an internal motion sensor in thecontrol apparatus and if the motion sensor output of any one or more ofthe radiotags is consistent with motion that would result in a change inlocation of the radiotag, then the program will generate an alert on thecontrol apparatus. The alert can be a vibration or a tone, and a displaymay include a listing of the radiotags and their motion status. Thecontrol apparatus may be caused to display a menu of actions ifinconsistent motion sensor output any one or more members of the groupis detected.

Similarly, the control apparatus may a menu for monitoring the relativemotion sensor outputs of a group of radiotags on a single display screenso as to reduce loss of assets, children, and pets that have beenradiotagged.

Example III

Nuisance Alert Suppression: An OS smart phone is left on a nightstandalong with a keychain and any other tagged objects. Attached to thekeychain is a Bluetooth radiotag. The radiotag will typically announceits presence every few seconds by sending a broadcast that includes itsUUID, and any frames containing data, including a sensor data payloadfrom one or more sensors in a sensor package installed in the radiotag,and normally the smart phone will parse the signal and collect the UUIDand any other data in the signal.

Over the years we have found that many customers have false alerts whileboth the phone and the radiotag are motionless and next to each other.The alert indicates that the radiotag has gone out of radio range of thephone, even though the phone and the radiotagged object were bothsitting side by side. Both phone and device were stationary, nevermoved, but the alert would still go off. This problem arises because theOS starts deactivating its Bluetooth radioset at random times to savebattery. If the phone radioset has been turned off, beacon pings fromthe Bluetooth tracking device will be missed. This results in a falseLEFT BEHIND or OUT OF RANGE alert from the processor in the phone.

A solution to the problem is to inactivate that part of the softwareapplication that generates an alert when contact with the radiotag islost. This can be done temporarily and only takes effect as long as thephone does not move. If the phone is moved, it wakes up, the alerts arere-enabled, and the phone will recognize that the radiotag is where issupposed to be.

Clearly this fix raises the possibility that a phone having gone dormantand turned off its alert routines, will fail to note that the radiotagand the attached car keys, for example, are removed from the table.Consequentially, if the device itself is moved and actually did go outof range (i.e., it walked itself away), the alert will NOT go off. So, amore satisfying signal is to use motion sensor data from the radiotagand allow a positive motion signal in the broadcast to wake up thephone. If the device moves, it sends a signal to the phone that bypassesthe disabled alert code, wakes up the phone, and triggers an alert basedon the motion data. More specifically, the processor will see adiscrepancy in motion data from the radiotag versus the smart phone andaccording to a rule, trigger an alert.

A second condition (or a third condition) may added to the rule set bythe user in the local user profile. While inactive, the smart phone willdo a rules-based interpretation of a signal containing accelerometrydata from the radiotag as evidence of motion. When this happens,additional features of the smart phone will “wake up”, so that an alertcan be issued. Similarly, the hour of the day may be a sleep period or aholiday when the owner sleeps in, so the owner can elect to disable somealerts so as not to be disturbed.

In this way, having multiple sensor feeds from the radiotag incombination with multiple programmable conditions that can be layeredonto the processing of radio signals from the tag allows the user tomore fully become comfortable integrating these devices into hislifestyle. Similarly, multiple simultaneous or sequential sensor dataconditions may be required to set off certain alerts or cause certainfeatures to be actuated.

Example IV

Cloud Shortcutting: In some situations, it may be desirable to use“cloud shortcutting” to find a particular BT radiotag using a friend'ssmartphone, for example your car keys, when you want to loan them tosomeone else and are not there to hand them over. Necessary conditionsare that (1) your smartphone is in BT radio proximity to the radiotagattached to the keys and that (2) you have “shared” the radiotagattached to your car keys with the friend (176, FIG. 9). When the friendopens the tracking program installed on their smartphone, the friendwill have access to an icon (a software button) that represents thatparticular radiotag. By querying the system, the friend can see a mappin that shows the approximate last position of the car keys known tothe system (as described in FIG. 12), but cannot directly command theradiotag to begin an audible tune while it is bonded to your smartphone.So instead the system assists. When the friend presses that icon ontheir smartphone, a command is sent to the cloud host 58, and the cloudhost relays the command to your smartphone, causing your smartphone totransmit a BT signal to the radiotag, and commanding it to begin theaudible tune. Your friend will hear the tune, and can follow the soundto its source, rather than searching everywhere. Once the radiotag isfound, the friend can press the multifunction button (14 a, FIG. 1A) onthe radiotag to stop the tune, and the system can let you know that thecar keys have been borrowed.

Example V

Virtual Safe Zones: An XCB radiotag 2800 is programmed to manage itscellular modem power consumption budget according to the location thatit is in. In one embodiment, the radiotag scans the surroundings of itslocation and identifies the presence or absence of familiar BT radiosignal(s). A familiar signal defines a “virtual safe zone”. If afamiliar radio signal is identified, the radiotag moves to a powersavings mode. If the familiar radio signal is not detected in the scan,the radio tag moves to a cellular network connection state forperiodically reporting its location to a cloud host. In this example,the owner of the radiotag uses a smartphone to scan for BT radio signalsat home, and finds a printer and a home appliance that transmit regularBT beacon signals. These are fixed location signals. The owner programsa conditional rule on a menu that defines a trigger condition as the MACaddress or service UID of the fixed location signal and an executable asa command to move to a power savings mode when the fixed location signalis detected. This conditional rule is stored in the instruction stack ofthe XCB radiotag. When a correlator of the radiotag detects the fixedlocation signal, it moves to a power savings mode because it is home andis in a safe zone where frequent location updates are not needed.

In a related embodiment, at times when the radiotag cannot detect thefixed location signal, a rule is executed whereby the radiotag moves toa cellular network connection state with more frequent location updatesto the cloud host.

Alternatively, the cloud host can analyze BT traffic using radio calllogs transmitted from the XCB radiotag to the cloud host and canidentify radio signals reliably associated with familiar locations suchas home or office, each of which may define a “safe zone”. The cloudhost can then autoprovision the XCB radiotag to toggle power to itscellular modem, activating more frequent location updates when theradiotag is not in a safe zone and reducing power to the cellular modemwhen the radiotag is in a safe zone. The correlator output is coupled toa flag in the instruction stack so that if a fixed location signal isdetected, the cellular modem will negotiate a power-savings protocolwith the cellular network provider, for example an extended eDRX or PSMpower savings mode.

Example VI (Exvi)

Pet Location And Monitoring Services: A dog is provided with a collarthat includes an XCB radiotag 2800. The cloud host autoprovisions theradiotag with one or more BT radio signatures that are reliablyassociated with a particular location, for example a back yard of ahome. The instruction stack in the radiotag is configured so that if acorrelator of the radiotag detects a trigger radio signature, then thecellular modem will operate in a power savings mode. But if uponscanning its radio environment (after the dog has jumped the fence, forexample), the radiotag scanner no longer detects the trigger radiosignature, then the instruction stack will execute commands to activatethe transmission of more frequent location updates to a cloud host.

A similar regimen can be operated using a WiFi hub to define a virtualleash around a safe zone. But the advantage of a BT virtual safezone isthat it can be defined using BT radio signatures that are “native” to aparticular location and require no point-to-point connection to serve asa trigger condition for activating a conditional rule by which an actionor a notification is effected. The BT signals used for flagging anescaped dog need not be associated with owner-provided hardware, and canbe anonymous. In short, signals from groups and crowds of beacons mayprovision and even autoprovision notifications. An escaped dognotification will be presented to the owner if there is a transition inthe BT signal environment from familiar to alien, and if the radiocollar detects a persistent alien signal environment for more than aminute or so, then it will begin generating cellular location data thatcan be sent to the owner via the system host. The owner can select thenotification sensitivity and frequency based on experience and in someinstances, the alert can be sent instantly if the dog collar detects asignal that is not expected and loses a signal that is expected, forexample, reducing the incidence of false positives. This regimen can beimplemented with a few memory registers for storing BT referencesignals, a correlator that compares the BT radio traffic with thereference signals, and a program that periodically executes a scan oflocal BT radio traffic.

In addition, other locations can be readily defined as “familiar andsafe” or “dangerous and to be avoided” without the need to install newhardware. By limiting the scans of the BT radio environment to 200 ms ata time, and selecting a latency of 1 or 2 minutes between scans, forexample, a compromise can be achieved between battery service life andsystem latency in which the dog's owner will receive a timelynotification from the cloud host if the dog has jumped the fence. Thenotification to the owner's smartphone 70 may include a map with amoving map pin that shows the dog's location in real time, for example.The cloud host 58 causes the owner's smartphone to display thenotification and map and provides other assistance in tracking the dog.A passerby who sees the dog may also receive a notification that the dogis lost if the passerby has a smartphone that operates thelost-and-found software package 700 (FIG. 37) or if the passerby pressesthe multi-function button (2815, FIG. 28A) on the device. More detailsof this system are provided in co-pending and co-owned U.S. patentapplication Ser. No. 16/950,666, which is incorporated in full byreference.

Example VII

Remote Actuation and Control: In another instance of the precedingexample (see ExVI above), the executable command paired in theconditional rule is a command to negotiate an eDRX or a PSM mode with atelecomm network, and the trigger signal is a BT signal that isnon-specific as a command parameter unless tied to a conditional ruleprogrammed by the user and stored in a user profile on cloud host 58, oris programmed by a system administrator for a community of users. Thetrigger signal may be received by the owner's smartphone or by apasserby's smartphone, and when communicated to the cloud, theinformation in the signal results in an execution of a machine action ora notification, such as a display. The effector of the command may be asmartphone, an XCB radiotag, a BT tracking device, a BT device, acellular radio device, a remote machine, a cloud server, or a networkedsystem.

1. A non-transitory computer-readable medium storing instructions that,when executed by a processor of a network-connectable smart device,cause the smart device to: a) receive from a Bluetooth radiotag, aBluetooth radio signal having information that includes a radiotag-owneridentifier; b) generate a radio message that comprises the information;c) transmit the radio message to a network server configured to: i) inresponse to the radiotag-owner identifier, associate the radio messagewith a user profile of a radiotag owner stored in an administrativedatabase; ii) in response to the information, determine a command ornotification based one or more conditional rules, wherein eachconditional rule comprises, (x) a first part defining a customizabletrigger condition comprising any one of or combination of: a radiotagowner identifier information, a radiotag sensor output information, asensor output information added by the smart device, a timestamp, aradio range proximity information, a location information, a radiotaggroup member information; (y) a second part defining one or moreexecutable functions of a remote machine (paired executable function orfunctions); such that IF a radio message received from the smart devicecontains information that satisfies the trigger condition, THEN executethe paired executable function or functions of the conditional rule. 2.The non-transitory computer-readable medium of claim 1, wherein theinstructions, when executed by the processor, causes the smart device togenerate, on a display of the smart device, a graphical user interfaceconfigured to allow customization of the user profile in theadministrative database.
 3. The non-transitory computer-readable mediumof claim 1 wherein the radio message generated by the smart deviceincludes a timestamp.
 4. The non-transitory computer-readable medium ofclaim 3 wherein the radio message generated by the smart device includesa geostamp.
 5. The non-transitory computer-readable medium of claim 1wherein the information generated by the radiotag includes a sensor datapayload.
 6. The non-transitory computer-readable medium of claim 5,wherein the sensor data payload includes motion-sensor output datagenerated by a motion sensor within the radiotag.
 7. The non-transitorycomputer-readable medium of claim 5, wherein the sensor data payloadincludes temperature-sensor output data generated by a temperaturesensor within the radiotag.
 8. The non-transitory computer-readablemedium of claim 5, wherein the sensor data payload includesbutton-press-switch-sensor output data generated by a button-pressswitch within the radiotag.
 9. The non-transitory computer-readablemedium of claim 1 wherein the information generated by the radiotagincludes a community identifier.
 10. The non-transitorycomputer-readable medium of claim 1 wherein the radio message generatedby the smart device includes a radiotag proximity measurement.
 11. Thenon-transitory computer-readable medium of claim 1, wherein theinstructions, when executed by the processor, cause the host to measurea signal strength of the radio signal from the radiotag, to generate aradio-signal-strength measurement, and to include theradio-signal-strength measurement in the information in the radiomessage.
 12. The non-transitory computer-readable medium of claim 4,wherein the instructions, when executed by the processor, cause thesmart device to send the radio message, including the timestamp, to anadministrative server configured to: in response to the information, thegeostamp, and the timestamp sent in the radio message, determine acommand or notification based on rules associated with the user profileand community policies and permissions; and, send said command ornotification to a smart device, a remote machine, or an actuationdevice.
 13. The non-transitory computer readable medium of claim 1,wherein the instructions, when executed by the processor, cause thesmart device to display the location at which the radio signal wasdetected on a graphical map.
 14. The non-transitory computer readablemedium of claim 13, wherein the display is a graphical map that shows atrack of the locations at which the radio signal was detected, whereinthe radiotag is associated with a lost or missing article, a child, apet, or a friend.
 15. The non-transitory computer readable medium ofclaim 1, wherein the instructions, when executed by the processor,causes the smart device to request, from the administrative server, areport of a location at which the radio signal was last detected. 16.The non-transitory computer readable medium of claim 1, wherein thesmart device is selected from a smart phone, a laptop, a personalassistant, or a smart watch.
 17. The non-transitory computer readablemedium of claim 1, wherein the instructions, when executed by theprocessor, causes the smart device to report a satellite location or asystem location associated with detection of the radiotag radio signalto the administrative server.
 18. The non-transitory computer readablemedium of claim 10, wherein the instructions, when executed by theprocessor, causes the smart device to use the radiotag proximitymeasurement as a trigger condition and the paired executable function ofthe conditional rule is a command to actuate an alarm apparatus of thesmart device when the trigger condition is satisfied.
 19. Thenon-transitory computer readable medium of claim 10, wherein theinstructions, when executed by the processor, causes the smart device touse any of time condition, date condition, location condition, motioninformation condition, temperature sensor condition, light sensorcondition, and radio range information condition as a trigger conditionor conditions.
 20. The non-transitory computer readable medium of claim1, wherein the instructions, when executed by the processor, causes thesmart device to define a click signal in a received radio signal as atrigger condition of a custom conditional rule.
 21. The non-transitorycomputer readable medium of claim 1, wherein the instructions, whenexecuted by the processor, causes the smart device to transmit the radiomessage to a system-designated cloud server, wherein no location ormotion information is derived by the radiotag from a GPS signal.
 22. Thenon-transitory computer readable medium of claim 1, wherein theinstructions, when executed by the processor, causes the smart device totransmit the radio message to a system-designated cloud server, whereinno location information is received from the radiotag. 23-26. (canceled)27. The non-transitory computer readable medium of claim 1, wherein theBluetooth radiotag comprises a cellular radio.
 28. The non-transitorycomputer readable medium of claim 1, wherein the network-connectablesmart device is a smartphone.
 29. The non-transitory computer readablemedium of claim 1, wherein the executable function is a command or anotification.
 30. A non-transitory computer-readable medium storinginstructions that, when executed by a processor of a network-connectablesmart device having an internal motion sensor with motion sensor output,cause the smart device to: a) for each of a plurality of Bluetoothradiotags that define a group of radiotags, receive a Bluetooth radiosignal having information that includes a radio unit identifier andmotion sensor output from a motion sensor within each radiotag; b)compare the motion sensor output of the internal motion sensor with thereceived motion sensor output of any one or more of the radiotags; c)display a notification if the motion sensor output of the internalmotion sensor is inconsistent with the motion sensor output of one ormore of the motion sensor outputs of the group of radiotags.
 31. Thenon-transitory computer readable medium of claim 30, wherein theinstructions, when executed by the processor, causes the smart device todisplay a menu for monitoring the relative motion sensor outputs of agroup of radiotags on a single display screen.
 32. A method forprogramming a virtual safe zone, which comprises: scanning, by asmartphone, any BT radio traffic at a location and identifying at leastone radio transmitter broadcasting a beacon signal, said beacon signaldefining a fixed location broadcast; displaying, by the smartphone, auser interface configured for programming a virtual safe zone, andprogramming a conditional rule by which the fixed location broadcast isa trigger condition and the trigger condition is paired to an executablecommand to be executed in response to receiving said fixed locationbroadcast that defines the virtual safe zone; storing the conditionalrule in an instruction stack of a cellular network-connectable radiotag;receiving, by the radiotag, the fixed location broadcast in the virtualsafe zone, and in response thereto, executing the executable command ofthe conditional rule.
 33. The method of claim 32, wherein the executablecommand is a power-savings command for reducing power consumption of theradiotag.
 34. The method of claim 32, wherein the executable command isa command to negotiate a power-savings protocol between a cellularnetwork and the radiotag.
 35. The method of claim 32, wherein theexecutable command is a network reconnect command.
 36. The method ofclaim 32, wherein the executable command is a command to negotiate aneDRX or a PSM mode with a telecomm network.
 37. The method of claim 32,wherein the executable command is an alert to a user, to a controlapparatus, to a smartphone, an XCB radiotag, a BT tracking device, a BTdevice, a cellular radio device, a remote machine, a cloud server, or anetworked system. 38-41. (canceled)