Methods, systems, and products for tracking objects

ABSTRACT

Methods, systems, and products are disclosed for tracking an object. An identification signal is received that identifies an identification tag associated with the object to be tracked. The identification signal is stored in memory of a cellular phone. When an incoming call is received at the cellular phone, then the information associated with the identification signal is uploaded to a network database. When an outgoing call is placed from the cellular phone, then the information associated with the identification signal may also be uploaded to the network database.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/122,342, filed May 5, 2005 and entitled “Instantaneous Mobile Accessto All Pertinent Life Events”, now issued as U.S. Pat. No. 7,274,295,which is a continuation-in-part of U.S. patent application Ser. No.10/283,099, filed Oct. 30, 2002 and entitled “Method for Monitoring andTracking Objects,” now issued as U.S. Pat. No. 6,900,731, with eachdocument incorporated herein by reference in its entirety.

NOTICE OF COPYRIGHT PROTECTION

A portion of the disclosure of this patent document and its figurescontain material subject to copyright protection. The copyright ownerhas no objection to the facsimile reproduction by anyone of the patentdocument or the patent disclosure, but otherwise reserves all copyrightswhatsoever.

BACKGROUND

According to some of the exemplary embodiments, methods and systemsenable wireless tracking and locating of devices, and methods andsystems for the use of these devices.

Products and methods have been proposed and developed in an attempt tofacilitate locating lost or misplaced items such as remote controls fortelevisions and stereos, keys, and glasses. Similarly, locating andtracking technologies have been applied to packages for shipmenttracking and in object theft prevention. Another example is locatingpeople, things, and places through technologies in communicationsdevices and positioning systems. Some of these technologies includecomplex optical scanning systems, magnetic coding, microwave systemshaving transmitters and receivers, infrared systems, line-of-sight typesystems, mechanical systems requiring physical contact with the objectto be sensed and mechanically coded interactive systems of keys incombination with the parts inside a lock.

These systems are used, for example, to locate a lost television remotein a room by causing the television remote to emit an audible signalthat can be heard in the room. Typically, such locator systems use areverse line of sight arrangement to locate the remote. Wirelesstelephone handsets that have been removed from a cradle can be locatedin a house by paging the handset to produce an audible signal that canbe heard by the person looking for the handset. Both of these locatorsystems are specific to the objects being located and merely produce anaudible signal to announce the location of the misplaced device. Theobject must be within the range of the locator, i.e. television or phonecradle, and the person looking for the device needs to be close enoughto the lost device to hear the locator signal.

Object locating and tracking systems have been developed aroundtechnologies that use tags placed on the objects to be tracked and ascanner or reader to recognize the tags and to read information storedon the tags. These tags can either be active transmitting devices orpassive devices. Examples of applications for these technologies includeproduct inventory, grocery store checkouts, and package tracking. Eachreader is generally a stand-alone, independent system capable ofmonitoring and obtaining information only on the objects that passwithin its range. Generally, this range is very small, on the order of afew feet or less. In addition, the tags used in these systems arerelatively expensive, making them suitable for expensive items but lesssuitable for inexpensive consumer items such as those purchased in agrocery store or discount store.

These types of tag and reader systems are illustrated, for example, inU.S. Pat. No. 3,859,624 that is directed to an inductively coupledtransmitter and responder arrangement having a transmitter and a passiveresponder tag that receives all power from the AC power fieldinductively coupled thereto from the power field generator of theinterrogator. The tag generates a code that is unique to the particularresponder tag, and the code itself is generally a binary notation code.The interrogator receives the detected coded signal and generates anoutput signal which can be stored on magnetic tape for utilization inthe computer, presented in a visual display, or transmitted elsewherefor subsequent utilization.

Similarly, U.S. Pat. No. 5,012,236 is directed to an electromagneticenergy transmission and detection apparatus which can simultaneouslytransmit a high intensity magnetic field and detect a localized lowintensity magnetic field for greater distances between a reader and apassive identification tag. The reader includes a transmitter coil fortransmitting a high intensity electromagnetic field to the passiveidentification tag and to receiver coils for receiving the low intensityelectromagnetic field retransmitted by the passive identification tag tothe reader. The passive identification tag includes a transponder whichis capable of retransmitting a very low intensity electromagnetic fieldof a highly localized nature when exposed to an electromagnetic fieldtransmitted by the transmitter coil of the reader.

U.S. Pat. No. 5,952,935 is directed to an improved programmable channelsearch reader that includes a field programmable serial port which maybe linked to a computer by either hardware, radio frequency or the liketo edit or enhance the software of the reader and if so programmed forexternal data logging and storage.

U.S. Pat. No. 6,184,777 discloses a passive integrated transponder taginterrogation system that is connected to a control unit that isconnected to a computer through a data communication cable. The computeris a general purpose computer used to provide control to the unit, andthe data communication cables include RS232 type DB 25 cables, EIA 485metallic cables, and fiber optic cables. Wireless communicationmethodology utilizing digital or analog radio signals and infraredsignals may also be deployed for the communication cable.

Applications for the use of reader and tag systems are illustrated, forexample, in U.S. Pat. No. 3,732,465 that is directed to an electronicsensing and actuator system having a sensor and a key. The key includesinterconnected passive electronic components including an electricalfield sensitive circuit or circuits having a selected resident frequencyor frequencies of a value within the range of frequencies of theoscillator and located in the sensor such that when the key is broughtinto a sensing zone, the energy of the variable frequency oscillator andthe sensor is changed and that change is detected by the sensor. Thisapparatus has applications to door locks, and the key can also beattached to objects and used in a machine for purposes of counting orsorting objects carrying the key.

U.S. Pat. No. 3,752,960 is directed to a data acquisition system forelectronically identifying and recognizing objects including systems forproduct handling, vehicle identification, locks and keys. The system isadapted to identify an object carrying an electrically passive circuitwhen the object is positioned within the effective coupling zone, butnot necessarily touching, a sensor device of the active network. Thepassive object includes a passive reactive circuit adapted to resonateat a particular frequency when excited by the electromagnetic field of asensor of the active part of the system.

U.S. Pat. No. 6,689,885 teaches an interrogator responder arrangementthat is capable of handling random orientations between the interrogatorand the responder for use in applications such as the tracking ofguards, watchmen and executives in industrial plants wherein each personcarries a small, inexpensive non-radiative passive responder.Interrogators are positioned at various fixed locations throughout theplant. In addition, this interrogator and passive responder arrangementcould be used for the handling of luggage and cargo in airport terminalsand freight terminals. In addition to a responder tag that is attachedto each individual piece of luggage at the check-in station or at theticket collection station at an airport terminal, a second responder taghaving a code generation capability that provides the same code as thefirst responder, or bears a known correspondence to that one, is givento the passenger, and the passenger can insert the second tag into thebaggage request station automatic handling equipment to detect theparticular code on the tag and locate the passenger's luggage.

Other applications are directed to the use of tag and reader systems forthe handling and tracking of livestock. U.S. Pat. No. 4,262,632 teachesan electronic livestock identification system containing a capsule orpill having an electronic transmitter which is uniquely coded tobroadcast a series of electronic pulses from each animal in which it isinternally implanted. An associated interrogator receiver unit, which ispreferably situated externally of the animal, may be used for sensingand appropriately utilizing the electronic pulses to identify theanimal. Although the capsule may include a power supply, it ispreferably a passive storage element to which power may be induced fromthe interrogator.

International Application Number PCT/US87/00415 is directed to a syringeimplantable identification transponder which is syringe implantable intoan animal and provides identification of the specific animal when thetransponder is interrogated. This transponder has particular applicationto the identification and monitoring of migratory waterfowl and othersmall animals such as fish.

Given the limitations and relatively high costs of these tracking andlocating systems, an improved method for tracking and locating objectsthat is less expensive is desired. Suitable methods would permit aconsumer to easily tag desired objects, to identify the importance ofthose objects, and to assign any necessary information related to thoseobjects. In addition, it is desired to be able to track those objectsacross greater volumes of space and not to confine the locating andtracking of those items to fixed areas where scanners are located.

SUMMARY

Exemplary embodiments of this invention are directed to systems andmethods for providing a more deterministic method of locating andtracking people, places, and things and methods and systems formonitoring people, places, and things. According to an exemplaryembodiment, a system uses a plurality of smart monitors in combinationwith a plurality of passive tags that can be inductively coupled to themonitors to pass identification signals between the two. The monitorsare also linked to a communication network, in particular a wirelesspeer-to-peer communication network, providing direct peer-to-peercommunication across the network that further includes othercommunications devices (e.g., cellular phones, satellite phones,Voice-Over Internet Protocol (VoIP) phones, personal digital assistants(PDAs), and any communications device having a digital signal processor(DSP)). The communications network further provides access to one ormore databases that contain information related to the identificationtags, the object, and/or the policies for tracking the object.Therefore, multi-network coverages and capabilities are leveraged toprovide for larger coverage areas to track and search for objects, tomake searching quicker by communicating directly with other monitors, toallow users of the system to initiate and control searches, and/or toreport tracking and/or other information about the object (and/oridentification tag) to a communications device communicating with thenetwork.

Tags are associated with objects, and the objects can be associated witha person, place, and/or thing and with one or more monitors (e.g., oneor more monitors that are typically proximate to the object). Inaddition, rules to control the tracking and locating of objects areprovided for each object and are stored in a database for reference byone or more monitors and/or by one or more communications devices. Asobjects that contain identification tags pass by monitors, the monitorsreceive signals from the identification tags and log the receipt ofthese signals and any information provided by the signal. Therefore,tracking of an object is accomplished by contacting one or more monitorsand checking for receipt of a signal from a particular identificationtag by the contacted monitors.

Alternatively, signal receipt and the information provided by theidentification signal can be forwarded to and stored in the centraldatabases accessible through the network. Any monitor having access tothe network can then access the database and look for any informationabout an identification tag and the object to which that tag isattached, integrated, or otherwise associated (e.g., a cell phoneassociated with a particular person). In addition to general informationabout tags, objects, and monitors, the database may contain a series ofpolicies associated with each tag. These policies include protocols tobe followed to search for particular tags including parameters fordetermining when an object is lost, reporting requirements for lostobjects, associated monitors to contact when searching for an object.These policies may further include protocols and instructions to befollowed to communicate a notification message to a communicationsdevice (e.g., a personal computer system, a cellular phone, aninteractive pager, a personal digital assistant (PDA), a Voice overInternet Telephony (VoIP) phone, a global positioning system (GPS), andany device having a digital signal processor (DSP) communicating withthe network).

Other systems, methods, and/or computer program products according toexemplary embodiments will be or become apparent to one with skill inthe art upon review of the following drawings and description. It isintended that all such additional systems, methods, and/or computerprogram products be included within and protected by this descriptionand be within the scope of this invention.

DESCRIPTION OF THE DRAWINGS

The above and other embodiments, objects, uses, advantages, and novelfeatures are more clearly understood by reference to the followingdescription taken in connection with the accompanying figures, wherein:

FIG. 1 is a schematic representation of an embodiment of a monitor andidentification tag according to some of the exemplary embodiments;

FIG. 2 is a schematic representation of an embodiment of the networktracking and monitoring system according to some of the exemplaryembodiments;

FIG. 3 is a perspective view of a first side of an identification tagaccording to some of the exemplary embodiments;

FIG. 4 is a perspective view of a second side thereof,

FIG. 5 is a flowchart illustrating an embodiment of the monitoring andtracking method according to some of the exemplary embodiments;

FIG. 6 illustrates a block diagram of exemplary details of acommunications device having a tracking and notification moduleaccording to some of the exemplary embodiments;

FIG. 7 is a simplified schematic of an operating environment accordingto some of the exemplary embodiments;

FIG. 8 depicts a more detailed schematic of the exemplary operatingenvironment of FIG. 7;

FIG. 9 illustrates another simplified schematic of another exemplaryoperating environment according to some of the exemplary embodiments;

FIG. 10 depicts a more detailed schematic of the exemplary operatingenvironment of FIG. 9; and

FIG. 11 illustrates the exemplary operating environment of FIG. 9 withalternative communications devices.

DESCRIPTION

Exemplary embodiments of this invention now will be described more fullyhereinafter with reference to the accompanying drawings, in whichexemplary embodiments are shown. This invention may, however, beembodied in many different forms and should not be construed as limitedto the embodiments set forth herein. These embodiments are provided sothat this disclosure will be thorough and complete and will fully conveythe scope of the invention to those of ordinary skill in the art.Moreover, all statements herein reciting embodiments of the invention,as well as specific examples thereof, are intended to encompass bothstructural and functional equivalents thereof. Additionally, it isintended that such equivalents include both currently known equivalentsas well as equivalents developed in the future (i.e., any elementsdeveloped that perform the same function, regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill inthe art that the diagrams, flowcharts, illustrations, and the likerepresent conceptual views or processes illustrating systems, methodsand computer program products embodying this invention. The functions ofthe various elements shown in the figures may be provided through theuse of dedicated hardware as well as hardware capable of executingassociated software. Similarly, any switches shown in the figures areconceptual only. Their function may be carried out through the operationof program logic, through dedicated logic, through the interaction ofprogram control and dedicated logic, or even manually, the particulartechnique being selectable by the entity implementing this invention.Those of ordinary skill in the art further understand that the exemplaryhardware, software, processes, methods, and/or operating systemsdescribed herein are for illustrative purposes and, thus, are notintended to be limited to any particular named manufacturer.

According to exemplary embodiments, systems and methods are used tolocate selected objects, such as people, places, and things. Furtherexemplary embodiment include systems and methods to locate and recoverlost or misplaced objects, to locate objects that are stolen orotherwise misappropriated, to track important or sensitive objects thatinclude livestock, and people, to communicate a notification messageabout the object (e.g., a coupon to use when purchasing the object),and/or to communicate the tracking data about the object.

Referring initially to FIG. 1, the object monitoring and tracking system1, according to some of the exemplary embodiments includes at least onemonitor 2 capable of receiving a transmitted signal and at least oneidentification tag 3 capable of generating an identification signal. Theidentification tag is attached to the object 4 to be monitored ortracked. The identification tag 3 transmits the generated identificationsignal within a transmission volume 5. The monitor 2 receives theidentification signal that is emitted from the identification tag 3while it is disposed within the transmission volume 5. Variousarrangements of monitors and identification tags are readily availableand known to those of skill in the art and are suitable for use in theobject monitoring and tracking system according to some of the exemplaryembodiments.

In general, the monitor 2 includes the electronics and circuitrynecessary to receive the identification signal. This circuitry includesa receiver for receiving the identification signal, a logical processorconnected to and in communication with the receiver, and a power supplyelectrically coupled to all of the electronic components and circuitryof the monitor to provide power thereto. Suitable frequencies for thereceiver include radio frequencies, and suitable logical processors canreceive and interpret the identification signal to match the signal withinformation stored in a database to identify the object to which theidentification tag is attached.

In an exemplary embodiment, the identification tag 3 generates theidentification signal in response to receipt of a signal generated andtransmitted by the monitor. In this embodiment, the monitor alsoincludes a transmitter. Suitable transmitters include radio frequencytransmitters. Preferably, the object monitoring and tracking systemincludes a plurality of monitors that are each capable of transmitting aradio frequency signal and of receiving the identification signaltransmitted by the identification tag. Each monitor may also include amemory for storing the received identification signals.

The monitors 2 are preferably incorporated into other electronicdevices. Suitable electronic devices include cellular phones, wire linephones, pagers, personal digital assistants, computers, alarms or othergeneral monitoring systems, electronic watches, stereos, televisions,video cameras, smoke alarms, cameras, radar equipment, andphoto-copiers. These electronic devices are selected and deployed asmonitors to create both a plurality of stationary monitors and aplurality of mobile monitors. The stationary monitors are associatedwith a known fixed location such as a physical street address. Themobile monitors are associated with moving or non-stationary items suchas a person, animal, automobile, airplane, boat, robot, satellite andcombinations thereof.

As is shown in FIG. 2, in order to expand and to maximize the area orvolume covered by the object monitoring and tracking system according tosome of the exemplary embodiments, the monitors are in communicationwith at least one communications network. Preferably, the monitors arein communication with a plurality of communications networks. Anynetwork capable of permitting communication among the monitors issuitable for use with the exemplary embodiments of this inventionincluding wireline and wireless communications networks. In an exemplaryembodiment, the communications network is a wireless type network. Inanother exemplary embodiment embodiment, the communications network is apeer-to-peer type network.

As illustrated, a plurality of stationary monitors 6 and a plurality ofmobile monitors 7 are associated with a first wireless peer-to-peernetwork 8 and a second wireless peer-to-peer communications network 9respectively. These wireless communications networks can be associatedwith one or more telephone networks such as an Advance IntelligentNetwork (AIN), Public Switched Telephone Network (PSTN), MobileSwitching Telephone Office (MSTO), and others. In an exemplaryembodiment, the first wireless network 8 is associated with a firsttelephone network 10, and the second wireless peer-to-peer network 9 isassociated with a second telephone network 11. The first and secondtelephone networks can be in communication through a direct data link12. The telephone networks may be linked to one or more computer and/ordata networks 13 through separate network interface data lines 14. Forexample, the computer and/or data network 13 may be a local area networkor a wide area network, such as the Internet. All of the computernetworks 13 are in communication with each other, and any monitor cancommunicate directly with any other monitor across these networks. Inaddition, the computer network 13 includes a plurality of additionalcomputers 15, and may also include either stationary or mobile monitors17 directly link thereto.

The object monitoring and tracking system also utilizes one or moredatabases 16. Although these databases 16 can be in direct communicationwith the wireless networks or telephone networks, the databases 16 arepreferably associated with the computer network 13. The databases 16 areused to store information about the identification tags, the objects towhich the identification tags are attached, and the owners of theseobjects. This information includes an association between a specificidentification tag and the object to which that tag is attached andprofile information about the registered owner of that object. Alsoincluded in this information is a description of the object (e.g., aphysical description), a purchase price of the object and any applicablecoupons or discounts available with the purchase of the object, apurchase date for the object and any applicable expiration dates of thecoupons or discounts, a value for the object, a date of manufacture, anexpiration date, a profile of a registered owner of the object, aprofile of a registered user of the object, a merchant providing aservice for the object, a merchant providing a product related to theobject, a calendar associated with the object, or combinations thereof.Input of this information by the owner or by a user is facilitatedthrough the computer network 13. The information can be input using anycomputer 15 (or alternate communications device) in communication withthe network 13. Alternatively, the owner or the user may upload theinformation using either any stationary monitor 6 or any mobile monitor7 that is in communication with the computer network 15.

The monitors may be passive devices that record the identificationsignals of any and all objects carrying identification tags that passclose enough so that the monitor falls within the transmission volume ofthat transmission tag. Alternatively, the monitors are actually activedevices that proactively search for specific identification tags. Themonitors may also include monitor identification tags that are similarto the object identification tags and that permit each monitor to trackor to log the other stationary and mobile monitors over time in which itcomes into contact.

According to some of the exemplary embodiments, the systems and methodsof this invention leverage existing peer-to-peer communication networks,such as peer-to-peer wireless telephone networks, to create a moreexpansive area for tracking objects and/or for communicating informationabout a tracked object. In order to leverage these network capacities,each monitor provides the information that it receives to the networkfor storage in the database. The other monitors can then query thedatabase regarding specific information signals. In addition, a customer(e.g., an owner or a user) can log on to the computer network and reportan object missing. The network will check the database for occurrencesof the associated identification tags and monitors and will conduct asystematic search for that particular object by checking with theappropriate monitors. Monitors may also contact each other directlyacross the peer-to-peer network. As illustrated in FIG. 2, a firstmonitor 18 may contact a second monitor 19 to see if a particular object4 has been tracked by the second monitor 19. Therefore, a customer canuse one monitor in the peer-to-peer network to track a particular objectthroughout the network using other monitors in the network directly.

The tracking information received by the monitors can be uploadedcontinuously to the database or can be uploaded only when a particularmonitor accesses the network. In some of the embodiments, informationabout a tracked identification tag is communicated across the network tosee if any monitors (or, alternatively a capable communications devicethat can operate as a monitor) are receptive to or searching for thatidentification signal. If no other monitors are currently looking forthat tag information, then the information is directed to the databaseto wait for a request for that particular identification tag. Accordingto additional embodiments, the methods and systems of this inventionalso make use of interspersed peer-to-peer wireless communicationnetworks to provide increased coverage for searching and tracking withinan area and/or for communicating information about the object ortracking data to a communications device.

The identification tags may be passive devices having no power suppliesor internal smarts, that is the identification tags may receive energyfrom the monitor through methods such as inductive coupling to generatea unique identification signal. In order to facilitate inductivecoupling with the monitors, each identification tag includes electroniccircuitry, such as an induction coil. Suitable electronic circuits forcoupling to the monitors and for emission of an identification signalupon exposure to a radio frequency signal are known in the art. Uponinductive coupling, each identification tag generates and transmits itsunique identification signal within the transmission volume. Thetransmission volume can extend from the identification tag for distancesof from less than a foot up to approximately several hundred feet. Forsecurity purposes, the identification signal may transmit a uniquealpha-numeric code, a graphic field, or an alternate identifier of thetag in order to identify the object.

The identification tags are arranged to be easily attachable to objectsand include fasteners or adhesives to facilitate the attachment.Suitable adhesives include glues and hook and loop type fasteners. In anexemplary embodiment, the tracking tags are removable and reattachable.The identification tags can be fashioned in any desired shape and caneven be constructed to be part of the object to which they are attached.The tracking tags may be constructed to be inexpensive and easilyprovided so that a person may purchase multiple identification tags forplacement onto the object(s) to be tracked. In the exemplary embodimentsof FIGS. 3 and 4, the identification tag is made out of a sheet ofmaterial having a first side 20 and a second side 21 opposite the firstside 20. The first side 20 contains the electronic circuitry capable ofgenerating the identification signal and of transmitting that signalwithin the transmission volume. The electronic circuitry may be printedon the first side of the identification tag by a dot-matrix typeprinting process. In an exemplary embodiment, the dot-matrix typeprinting process may be an inkjet or laserjet type process. The secondside opposite the first side contains an adhesive for attachment to theobject. The first side of the identification tag, in addition tocontaining the electronic circuitry, may be blank or may containprinting such as a UPC, product information, advertisements orcombinations thereof. Alternatively the identification tab can includecamouflaging or other markings so that the identification tag will blendwith the background of the object to which it is attached. According tostill other exemplary embodiments, the identification tag may beintegrated into the object (e.g., circuitry of the object providing aMAC address or other identifier (e.g., UPC) to be used for the tag andto associate with the object).

Referring to the exemplary embodiment of FIG. 5, in order to use thetracking system, an owner, or any other person having a need or desireto monitor or track an object, selects an object to be monitored ortracked 23. Alternatively, the owner (or other person) selects aplurality of objects to monitored or tracked. The owner (or otherperson) than places an identification tag on each selected object 24. Inone embodiment, the identification tags come in pre-printedself-adhesive sheets. The identification tags are placed on the objectsusing the adhesive.

Since the unique identification signal transmitted by each tag is arandom alpha-numeric code or alternate identifier, correspondence isneeded between the identification tag and the object to which it isattached. In addition, this correspondence information may be needed bymore than one monitor. Therefore, the owner (or other person) of theobject, uses either a monitor (or alternate communications device)connected to the peer-to-peer network or a computer or othercommunications device connected to the computer network, stores thecorrespondence information in the database using conventional methods ofnetwork and computer interfaces and data loading 25. The owner (or otherperson) may also store any other information about the object in thedatabase 25.

In addition to storing information about the object the owner, user, orother authorized person can store in the database policies regarding therules used by the network and the monitors on the network in trackingand reporting the tracking information of each object 26. These policiesinclude the identification of categorization of a general category intowhich an object is placed, for example, package, jewelry, animal, orfood, and the definition of when an object bearing the identificationtag is lost such as when the tag is not within the range of a particularmonitor or monitors. The policies also include instructions for routinetracking of the object such as making routine communications and datatransfers from specific monitors or sweeping specified volumes coveredby monitors. The owner, user, or authorized person may also storeinstructions for reporting information about the object and trackingdata of the object, such as instruction for reporting information whenan object is lost, for example, by phone or e-mail to a selectedcommunications device, and instructions on what actions to take shouldan item become lost. One such policy could instruct monitors toautomatically look for an object if it should be determined that theobject is lost. An alternative policy would notify an owner, user,and/or authorized person when an object is lost or outside a monitoredarea and wait for instructions before searching for the object.

In an exemplary embodiment, the policies contain protocols for searchingfor a lost object include where to search first, which monitors tosearch, and which monitors not to search. Specifically, in one example,a monitor is contacted to see if it has come into contact with thecorresponding identification tag and at what time it came into contactwith that tag. That monitor also provides information about othermonitors with which it has been in contact. This provides for expandingor extending the tracking objects to other monitors. A continuous orreal time tracking of objects is thus facilitated by contacting asuccession of monitors.

Policies may be stored that place limits on the monitors that can trackor otherwise communicate with an object. In an exemplary embodiment, thepolicies identify monitors or volumes within which an item will functionor volumes and monitors within which an object will self destruct. In anembodiment for inventory and restocking, a policy can be provided toreport when a particular object is out of stock or of a low amount sothat restocking or purchasing of that item can take place. In anotherembodiment, an owner, user, or authorized person can register personalinformation such as allergies and the person will be notified when thatperson is close to an object to which the person is allergic or when theperson (or other person) purchases an object that contains ingredientsto which the person is allergic. In still further embodiments, theowner, user, or authorized person may store additional information, suchas a profile of a registered user of the object (e.g., when the ownergive a cell phone to a child to use, inputting information about thechild), a merchant providing a service for the object (e.g., a serviceprovider may input information associated service areas, pricing,competitive information, discounts available for redemption when theservice is purchased or ordered, and so on), a merchant providing aproduct related to the object (e.g., a distributor for a product mayinput information associated with a store authorized to sell and marketthe product, coupons available for redemption when the product ispurchased, and so on), and a calendar associated with the object. Anyone or multiple combinations of these policies can be provided in thedatabase for each selected object.

Once the necessary information and desired policies have been stored inthe database, the objects to which the identification tags are attachedare monitored or tracked 27 in accordance with the stored policies. Themonitors can track the objects passively by logging a list of all theidentification signals received. Alternatively, the network inaccordance with a stored policy or in response to a search request froman owner or authorized person can systematically check monitors (oralternate capable communications devices) across the network for aparticular object. In a peer-to-peer type network, a first monitor cancontact a second monitor to check for a particular object. Theidentification signals received by each monitor, to further leverage thecapacity of the network, are communicated to the network 28.

In some of the embodiments, each monitor continuously passes thereceived identification signals through the network for storage in thenetwork accessible databases. In addition to just the signals,information about where, when, and by which monitor the signal wastracked is also stored. In an alternative exemplary embodiment, eachmonitor uploads the information signals every time the monitor accessesor is accessed by the network, such as when a cellular phone places orreceives a call. In another exemplary embodiment, each monitorbroadcasts (or otherwise communicates) the identification signals to allthe other monitors, computers, and associated communications devices inthe network before storing the signals in the database.

Referring now to FIG. 6, a block diagram illustrates a Tracking &Notification Module 610 residing in a communications device 600. As FIG.6 shows, the Tracking & Notification Module 610 operates within a systemmemory device. The Tracking & Notification Module 610, for example, isshown residing in a memory subsystem 614. The Tracking & NotificationModule 610, however, could also reside in flash memory or a peripheralstorage device 616. The communications device 600 also has one or morecentral processors 602 executing an operating system. The operatingsystem, as is well known in the art, has a set of instructions thatcontrol the internal functions of the communications device 600, andfurthermore has the capability to communicate a communications signalbetween the communications device 600 and a communications network(shown as reference numeral 70 in FIG. 7) and/or an alternatecommunications device (e.g., an identification tag 3 attached to anobject 4 as shown in FIG. 9, such as the UPC transmitting tag 83attached to a medicine bottle 84 shown in FIG. 10).

The system controller 608 provides a bridging function between the oneor more central processors 602, a video/graphics subsystem 606, an inputterminal 612, and an audio subsystem 618, the memory subsystem 614, aPCI (Peripheral Controller Interface) bus, and a Communications (“Comm”)Device Interface 650. The PCI bus is controlled by a Peripheral BusController 624. The Peripheral Bus Controller 624 (typically called a“Southbridge”) is an integrated circuit that serves as an input/outputhub for various peripheral ports and/or transceivers. The Peripheral BusController 624 allows for communications with connected devices and/orthe communications network. The peripheral ports allow thecommunications device 600 to communicate with a variety of devices(alternate input terminals) through networking ports (such as SCSI orEthernet, not shown) and/or transceivers that include WirelessCommunications (“Comm”) Device Transceiver 626 (for communication of anyfrequency signal in the electromagnetic spectrum, such as, for example,the 802 family of standards and Infrared) and Wired Communications(“Comm”) Device Port/Connection 624 (such as modem V90+ and compactflash slots). These peripheral ports could also include other networkingports, such as, a serial port (not shown) and/or a parallel port (notshown). The Peripheral Bus Controller 624 may further controlcommunications with the input terminal 612. Additionally, those ofordinary skill in the art understand that the program, processes,methods, and systems described in this patent are not limited to anyparticular computer system or computer hardware.

Those of ordinary skill in the art also understand the central processor602 is typically a microprocessor. Advanced Micro Devices, Inc., forexample, manufactures a full line of ATHLON™ microprocessors (ATHLON™ isa trademark of Advanced Micro Devices, Inc., One AMD Place, P.O. Box3453, Sunnyvale, Calif. 94088-3453, 408.732.2400, 800.538.8450,www.amd.com). The Intel Corporation also manufactures a family of X86and P86 microprocessors (Intel Corporation, 2200 Mission College Blvd.,Santa Clara, Calif. 95052-8119, 408.765.8080, www.intel.com). Othermanufacturers also offer microprocessors. Such other manufacturersinclude Motorola, Inc. (1303 East Algonquin Road, P.O. Box A3309Schaumburg, Ill. 60196, www.Motorola.com), International BusinessMachines Corp. (New Orchard Road, Armonk, N.Y. 10504, (914) 499-1900,www.ibm.com), and Transmeta Corp. (3940 Freedom Circle, Santa Clara,Calif. 95054, www.transmeta.com). Those skilled in the art furtherunderstand that the program, processes, methods, and systems describedin this patent are not limited to any particular central processor of amanufacturer.

The operating system may be a UNIX® operating system (UNIX® is aregistered trademark of the Open Source Group, www.opensource.org).Other UNIX-based operating systems, however, are also suitable, such asLINUX® or a RED HAT® LINUX-based system (LINUX® is a registeredtrademark of Linus Torvalds, and RED HAT® is a registered trademark ofRed Hat, Inc., Research Triangle Park, North Carolina, 1-888-733-4281,www.redhat.com). Other operating systems, however, are also suitable.Such other operating systems may include a WINDOWS-based operatingsystem (WINDOWS® is a registered trademark of Microsoft Corporation, OneMicrosoft Way, Redmond Wash. 98052-6399, 425.882.8080,www.Microsoft.com) and Mac® OS (Mac® is a registered trademark of AppleComputer, Inc., 1 Infinite Loop, Cupertino, Calif. 95014, 408.996.1010,www.apple.com). Those of ordinary skill in the art again understand thatthe program, processes, methods, and systems described in this patentare not limited to any particular operating system.

According to an embodiment, the system memory device (shown as memorysubsystem 614 and/or peripheral storage device 616) contains theTracking & Notification Module 610 that cooperates with the operatingsystem and with other input/output devices (e.g., the graphics subsystem606, the input terminal 612, and/or the audio subsystem 618) to providea graphical user interface (GUI). The graphical user interface providesa convenient visual and/or audible interface with the communicationsdevice 600. For example, the Tracking & Notification Module 610 mayprovide a GUI that enables the user to access, modify, create, and/orotherwise manage information about the object to be tracked.

As shown in FIG. 7, a tracking and notification operating environment700 includes the monitor 2, the object 4 with the attached or otherwiseintegrated tag 4, tracking data 72, a communications network 70, anotification message and/or tracking data 76, and the communicationsdevice 600 having the Tracking & Notification Module 610. As earlierdescribed, the monitor 2 communicates tracking data 72 with thecommunications network 70. For example, the communications network 72may communicate instructions to the monitor 2 to search for the object 4with the tag 3. The monitor 2 then transmits a signal within a selectedtransmission volume to search for the object 4 having the tag 3. If thetag is disposed within the transmission volume, then the tag returns anidentification signal to the monitor 2 and the monitor 2 communicatesthe tracking information to the communications network 72.Communications protocols or policies may then instruct thecommunications network 70 to send the notification message and/ortracking data 76 to the communications device 600. FIG. 8 illustrates anexemplary embodiment of simplified embodiment shown in FIG. 7. Accordingto FIG. 8, a medicine bottle 84 has an identification tag 83 affixed tothe bottle. As show, the identification tag 83 is camouflaged as the UPCsymbol on the medicine bottle 84. An in-store, checkout monitor 82receives the identification signal from the tag 83 and communicates withthe communications network 70. The communications network 70 thenretrieves an available coupon of $1 off 86 and communicates the couponto a point of sale terminal at the checkout counter 87 to redeem thecoupon with the purchase. Thereafter, the point of sale terminal 87 maycommunicate the availability of the coupon to a user's communicationsdevice shown as cellular phone 88. The user may select to redeem thecoupon with the purchase and communicate authorization to redeem thecoupon back to the point of sale terminal. According to furtherembodiments, the coupon 86 may remain in the memory of the cell phone 88and may be redeemed for future purchases of the same medicine or forother products provided by the manufacturer or distributor of themedicine 84.

As shown in FIG. 9, a tracking and notification operating environment900 includes the communications network 70, the notification messageand/or tracking data 76, the communications device 600 having theTracking & Notification Module 610, and the object 4 with the tag 3. Thecommunications device 600 operates similar to the monitor 2 described inFIG. 7 to receive the identification signal from the tag 3 attached tothe object 4. FIG. 10 illustrates an exemplary embodiment of using theoperating environment 900 of FIG. 9. According to FIG. 9, the user'scellular phone 88 acts as a monitor to transmit a search signal within atransmission volume and/or to receive the identification signal from thetag 83 within the transmission volume. Thereafter, the cellular phone 88communicates the identification signal with the communications network70. The communications network 70 then retrieves the available coupon of$1 off 86 and communicates the coupon to the cellular phone 88.Thereafter, the user of the cellular phone may select to redeem thecoupon with the purchase and communicate authorization to redeem thecoupon to a point of sale terminal or may store the coupon to redeemlater (such as by uploading coupons to a website to retrieve a credit toa financial account).

FIG. 11 illustrates another tracking and notification operatingenvironment 1100 similar to the tracking and notification operatingenvironment of FIG. 9. However, the operating environment 1100 of FIG.11 illustrates communications devices 600 that include a wide range ofalternative communications devices including a cellular phone 1101, aninteractive pager 1102, a personal digital assistant (PDA) 1103, a Voiceover Internet Telephony (VoIP) phone 1104, a computer system 1105, aglobal positioning system (GPS) 1106, and any device having a digitalsignal processor (DSP) 1107. Still further, the communications device600 may include a watch, a radio, vehicle electronics, a clock, aprinter, a gateway, and/or another apparatus and system. And, becausethe communications device 600 may have limited capabilities, thecommunications device 600 may only receive a portion of the notificationmessage and/or tracking data 76 from the communications network 70. TheTracking & Notification Module 610 of the communications device 600enables a user to access, create, modify, and/or otherwise manageinformation about the object, tracking information, and communicationswith the object 4 via the communications network 70.

Examples for applications of the system and method according to some ofthe exemplary embodiments include applying identification tags topersonal property, in particular, personal property that is regularlylost including keys, glasses, pagers, watches, cameras, video cameras,credit cards, and other items. Another application includes trackingpackages by a shipping company. The low cost and ease of use of thesystem also permit the customer or authorized user to track mail byapplying to envelopes and packages stamps that have the electroniccircuitry printed on them. This provides a relatively inexpensive andeasy way to track a letter sent, for example, through the United StatesPostal Service that was previously extremely difficult to impossible totrack. Monitors could be provided in mailboxes and throughout the postaldistribution system. This also could be particularly useful as ananti-terrorist mechanism providing greater tracking of mail for thepurposes of identifying the source of a package containing bombs orother hazardous materials.

Another exemplary application includes maintaining and monitoring filesin an office. Similarly, the method and system according to some of theexemplary embodiments can be used to maintain and monitor library bookswithin a library and throughout the borrowing area. The method andsystem according to some of the exemplary embodiments can also be usedto monitor a person, such as a prison inmate within a prison population,on work-release or on home detention. Other exemplary embodiments ofthis invention provide for the tracking of wild animals, farm animals,and zoo animals. With respect to the monitoring of animals, the methodand system according to some of the exemplary embodiments could becombined with a tranquilizer dosing system so that if the animal is notwithin a prescribed area, the tranquilizers are dosed into the system ofthe animal and the animal can be subdued.

The method and system according to some of the exemplary embodimentscould be used to tag items in a house for insurance purposes in the caseof theft or fire, providing the benefit of lowering insurance rates andmanaging assets by permitting the owner of tagged property to easilycheck to see if current insurance rates will cover current value of allthe goods in the house. The method and system according to some of theexemplary embodiments can also be used to tag items to prevent theft outof a rental property or hotel and also to track any property that hasbeen taken from those properties.

The method and system according to some of the exemplary embodiments canbe used to provide for the activation or deactivation of an object. Forexample, a policy can be stored that provides that an object will onlyfunction when it is in proximity to a specific monitor. The method andsystem according to some of the exemplary embodiments can be used in anamusement park, a museum, a ballpark or stadium. In this applicationtags are sold to visitors as they enter the facility, and the visitorplaces the identification tags on important items such as cameras andvideo recorders. The identification tags can also be fashioned asarmbands to be placed on all the family members, in particular thechildren. The visitors could provide the information and policies thatare uploaded, specifically to a database attached to a local areanetwork for the facility. Fixed monitors are provided throughout thefacility. In addition, wireless devices that the parties carry with themcan be incorporated in as mobile monitors. The facility can also havemaps so that if a party stands close to the map, the location of all theother persons and property associated with that party will show up onthe map to provide an easy and quick way of locating family members andproperty that may become dispersed throughout the facility during thecourse of a day. The method and system according to some of theexemplary embodiments could also be used to monitor and track familymembers at home, in particular school aged children, so that a parentcan be notified when a child leaves the house, leaves the yard, leavesschool, leaves a friends yard, enters a pool deck or arrives home fromschool.

While several exemplary implementations of embodiments of this inventionare described herein, various modifications and alternate embodimentswill occur to those of ordinary skill in the art. Accordingly, thisinvention is intended to include those other variations, modifications,and alternate embodiments that adhere to the spirit and scope of thisinvention.

1. A method for tracking an object, comprising: receiving anidentification signal identifying an identification tag associated withthe object to be tracked; storing the identification signal in memory ofa cellular phone; and when an incoming call is received at the cellularphone or when an outgoing call is placed from the cellular phone, thenuploading information associated with the identification signal to anetwork database.
 2. The method according to claim 1, wherein uploadingthe information comprises sending information describing where theidentification signal was received and when the identification signalwas received.
 3. The method according to claim 1, wherein storing theidentification signal in the memory of the cellular phone comprisesstoring information describing where the identification signal wasreceived and when the identification signal was received.
 4. The methodaccording to claim 1, further comprising receiving the identificationsignal from a peer-to-peer network in which the identification signalwas received by, and forwarded from, a peer device.
 5. The methodaccording to claim 1, further comprising querying the network databasefor the information associated with the identification signal.
 6. Themethod according to claim 1, further comprising storing a parameter thatdetermines when the object is lost.
 7. The method according to claim 6,wherein when the parameter determines that the object is lost, thenfurther comprising automatically searching the network database forreceipt of the identification signal.
 8. The method according to claim7, further comprising querying the cellular phone far receipt of theidentification signal.
 9. The method according to claim 1, furthercomprising sending a notification message that describes where theidentification signal was received and when the identification signalwas received.
 10. The method according to claim 1, further comprising:receiving a report that the object is missing; and querying the networkdatabase for the information associated with the identification signal.11. The method according to claim 10, further comprising issuing a queryto the cellular phone for the information associated with theidentification signal.
 12. The method according to claim 11, furthercomprising contacting a peer device in a peer-to-peer network thatcommunicates with the cellular phone, the peer device monitoring forreceipt of the identification signal.
 13. The method according to claim1, further comprising broadcasting the information associated with theidentification signal to other monitors that monitor for theidentification signal.
 14. The method according to claim 1, furthercomprising sending the identification signal to the cellular phone. 15.The method according to claim 1, further comprising retrieving a couponassociated with the identification tag.
 16. The method according toclaim 15, further comprising sending the coupon to the cellular phone.17. The method according to claim 16, further comprising redeeming thecoupon using the cellular phone.
 18. The method according to claim 1,further comprising storing a policy that allows the object to operateonly when in the vicinity of the cellular phone.
 19. A system fortracking an object, comprising: means for receiving an identificationsignal identifying an identification tag associated with the object tobe tracked; means for storing the identification signal in memory of acellular phone; and means for uploading information associated with theidentification signal to a network database when an incoming call isreceived at the cellular phone or when an outgoing call is placed fromthe cellular phone.
 20. A computer program product storing processorexecutable instructions for performing a method of tracking an objectwhen exectued by a computer, the method comprising: receiving anidentification signal identifying an identification tag associated withthe object to be tracked; storing the identification signal in memory ofa cellular phone; and when an incoming call is received at the cellularphone or when an outgoing call is placed from the cellular phone, thenuploading information associated with the identification signal to anetwork database.