System and method of alternative tracking upon disabling of monitoring device

ABSTRACT

A method and system for locating a fugitive with a disabled personal monitoring device is provided. The method includes: providing a monitored individual with a personal monitoring device being: (a) secured to the monitored individual, (b) configured to determine a location of the personal monitoring device at particular times, and (c) configured to upload the determined location of the personal monitoring device at the particular times; storing the uploaded location data to thereby create a movement history of the monitored individual; cross referencing at least a portion of the movement history with a record of detected probe signals emitted by wireless devices to thereby identify wireless devices that the personal monitoring device has encountered; selecting, based on at least one predetermined rule, a wireless device identified by the cross referencing; determining a relevant location of the wireless device; and notifying a supervising authority of the relevant location.

FIELD OF THE INVENTION

Various embodiments described herein relate generally to locating amonitored person who has disabled their tracking device. Moreparticularly, various embodiments herein relate to identifying wirelessdevices that have been proximate to the monitored person andinvestigating a location of those identified wireless devices as apossible location of the monitored person or someone who may haveinformation about the monitored person.

BACKGROUND

The monitoring of movements of monitored individuals involves a varietyof sectors, including parolees and home confinement. The technology hasits roots in the home arrest systems of the 1980's, in which a userwearable component—typically a “beacon” anklet that was locked to themonitored individual—would communicate wirelessly with a stationary baseunit. The range was limited to a few feet of the radio frequencytransmitter and receiver. The base unit included a telephone connectionfor communicating with the authorities. If the monitored individual leftthe short range allowed by the equipment, the tag and the base unitwould lose contact and the base unit would respond by sending an alertto the authorities. False alarms for minor deviations from the shortrange and/or an inability to confirm false from actual alarms (if theperson was where they were supposed to be when the police arrived toinvestigate) desensitized the police to such alerts, rendering thetechnology of limited application to low risk offenders.

A later generation of the technology incorporated GPS and cellulartelephone technology in a locked anklet. The device would activelyrecord the location of the monitored individual over time and transmitthe data to a central monitoring location (e.g., police or parolemonitoring services). The central location could store and analyze thedata for prohibited movements (e.g., a sex offender near a school) orcross reference the movement data with crime incident data to see if themonitored individual was near the crime at the time of the crime. U.S.Pat. Nos. 5,867,103, 6,160,481, 6,218,945, 6,512,456 and 6,703,936,incorporated herein by reference in their entireties, are each exemplaryof such a system. The technology is also used to monitor otherindividual sectors (e.g., patients, children) and objects (e.g., cars,cargo).

The modern monitoring device includes a GPS receiver that determineslocation, a memory that stores location data over time to define amovement history, and a cellular modem that communicates the movementhistory to a central location through the cell network. A commonimplementation is in the criminal justice system as an alternative toincarceration, and monitored individuals (typically parolees) havetamper resistant devices attached to their leg by a band. For ease ofdiscussion embodiments herein are directed to parolees, although theinvention is not so limited.

Often a condition of parolee is that a parolee wears a personalmonitoring device, and removal of the monitoring device (e.g., cuttingthe band that attaches it to the leg) is a parole violation that couldresult in revocation of parole and subsequent re-incarceration. In somejurisdictions the removal of the monitoring device is itself anindependent crime and can result in additional charges and jail time. Toavoid these potential consequences the overwhelming bulk of themonitored parolee population makes no effort to remove the monitoringdevice.

Nonetheless there are occasional violations. Once a parolee cuts themonitoring device and leaves it behind, options for locating the paroleeare limited. At an electronic level, in theory the supervising authoritycan obtain a warrant for the cell carrier to provide the currentlocation of the phone, but this takes time and is not useful if theparolee either does not have the phone (e.g., left it behind, switchedto a burner phone). Otherwise the supervising authority is limited tostandard police investigate procedures.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments in accordance with the present disclosure will bedescribed with reference to the drawings, in which:

FIG. 1 illustrates an embodiment of a monitoring device attached to anankle of a user.

FIG. 2 illustrates an embodiment of the internal components of themonitoring device of FIG. 1.

FIG. 3 illustrates an operating environment of the monitoring device ofFIG. 1.

FIG. 4 illustrates movement of two monitored individuals over a commonperiod of time with overlapping location.

FIG. 5A illustrates an embodiment of detecting probe signals fromwireless devices.

FIG. 5B illustrates movement of two monitored individuals in FIG. 4relative to a sensor.

FIG. 6 illustrates locations of monitored individuals relative to asensor network.

FIG. 7 illustrates locations of monitored individuals relative to asensor network at a different time than FIG. 6.

FIG. 8 is a flowchart of an embodiment of the invention.

FIG. 9 illustrates movement of a monitored individual over time relativeto the sensor network of FIG. 6.

FIGS. 10-13 illustrates detecting probe signals from wireless devicesover time relative to the sensor network of FIG. 6

FIG. 14 illustrates a logical arrangement of a set of general componentsof an example computing device that can be utilized in accordance withvarious embodiments.

DETAILED DESCRIPTION

In the following description, various embodiments will be illustrated byway of example and not by way of limitation in the figures of theaccompanying drawings. References to various embodiments in thisdisclosure are not necessarily to the same embodiment, and suchreferences mean at least one. While specific implementations and otherdetails are discussed, it is to be understood that this is done forillustrative purposes only. An individual skilled in the relevant artwill recognize that other components and configurations may be usedwithout departing from the scope and spirit of the claimed subjectmatter.

Several definitions that apply throughout this disclosure will now bepresented. The term “substantially” is defined to be essentiallyconforming to the particular dimension, shape, or other feature that theterm modifies, such that the component need not be exact. For example,“substantially cylindrical” means that the object resembles a cylinder,but can have one or more deviations from a true cylinder. The term“comprising” when utilized, means “including, but not necessarilylimited to”; it specifically indicates open-ended inclusion ormembership in the so-described combination, group, series and the like.The term “a” means “one or more” absent express indication that it islimited to the singular. “First,” “second,” etc. are labels todifferentiate like terms from each other, and does not imply any orderor numerical limitation.

The phrase “monitored population” refers to a group of individualsand/or objects that have issued monitoring devices and are subject tocommon electronic location monitoring by an oversight system. The phrase“monitored individual” refers to a particular individual in themonitored population.

The phrase “unmonitored individual” refers to a particular individualthat is not within a particular monitored population. An unmonitoredindividual may be under no monitoring at all, or may be a monitoredindividual within a different monitored population. By way ofnon-limiting example, jurisdictions often run their own monitoringprograms based on equipment from competitors that do not shareinformation with each other. Thus California may have an oversightsystem and corresponding monitored population for California residents,while Texas may have its own oversight system and correspondingmonitored population for Texas residents. If the systems are notcompatible or otherwise are not sharing data, then they are twodifferent monitored populations. A monitored individual withinCalifornia's system would thus be a monitored individual within theCalifornia monitored population, but an unmonitored individual withinTexas' system because Texas is not monitoring that particularindividual.

The phrase “general population” refers to people generally, and mayinclude monitored and unmonitored individuals.

An “authorized individual” or “supervising authority” would be any oneor more people having some type of supervisory responsibility and/ordecision making relative to the monitored population or monitoredindividual therein. By way of non-limiting example, a parole officerwould be the authorized individual relative to a parolee. Othernon-limiting examples include parent/child, patient/medical supervisor,etc. Security and/or police could be considered a supervising authorityrelative to a population of monitored individuals to the extent theemergency level intervention is necessary. For sake of brevity,discussion herein is confined to parolee/parole officer relationship,although the invention is not so limited. The invention also applies toobjects that can be monitored, such as cars or cargo.

In the concept of devices, a “mobile” device refers to wireless deviceswith wireless connectively that are designed to be routinely carried byindividuals without access to utility power; non-limiting examplesinclude cellular phones, tablets, PDAs and laptops. A common feature ofa mobile device is an internal battery that allows for extended periodsof use while away from utility electrical power. A “stationary” devicerefers to devices that are designed to be located for extended periodsof time in a single location while operating off of utility power;non-limiting examples include desktop PC's, servers and routers. Acommon feature of a stationary device is either the lack of an internalbattery with corresponding full reliance on utility electrical power, orthe presence of a battery (internal or external) for limited backuppurposes in the case of loss of utility power. Mobile devices may attimes be used as stationary devices (e.g., a laptop may be connected toutility power for an extended period of time and used at a singlelocation), and stationary devices may at times act as mobile devices (inthat at least any device can be relocated and at least for a briefperiod be run off of a backup power), but this does not change theirclassification as mobile or stationary.

In the concept of technologically determining a geographic position of aperson or object, the term “location” refers to the position that thetechnology identifies the person or object to be, as opposed to theactual physical location of the person or object. All such trackingtechnologies have some degree of margin of error such that anytechnologically determined location will not be an exact location of theperson or object. For example, under certain conditions GPS has a knownmargin of error within 1-5 meters, and thus the location determined fora person using GPS under those conditions may differ from their actualposition by 1-5 meters. Any such technological determinations ofposition are thus approximate based on the underlying accuracy of thetracking technology and margin of error. Any use of “location” in thespecification or claims is to be considered modified by “approximate” toaccount for such variation whether expressly stated or not.

“Bracelet gone” is a term of art in the parole tracking art that refersto a condition where the tracking device is not reporting location dataas expected. This may be because of the device tampering (e.g., cuttingthe band, cracking the device casing, jamming the device), devicemalfunction and/or natural conditions (e.g., a cell dead zone where thedevice cannot report over its cellular modem) such that the device iseither not reporting at all or reporting faulty data.

“Fugitive” refers to a monitored person who has disabled theirmonitoring device, such as by cutting the band.

“Probe signal” refers to a short range signal (on the order of hundredsof feet in range) emitted by a device with wireless connectivitymethodologies that is effective to announce the device's presence andwhich is detectable by other wireless devices. Such signals may be topropagate the availability of the device and/or to establish aconnection with another device. Non-limiting examples of wirelessconnectivity methodologies that utilize probe signals include Wi-Fi(which emit, e.g., “probe requests” to discover 802.11 networks withinits proximity) and Bluetooth via its discovery mode (which emit, e.g.,the ID of the device and a request to connect). Probe signals may beemitted by the device spontaneously or in response to outside stimulus.The invention is not limited to the any wireless connection methodology,the timing and/or contents of the signal.

Various embodiments herein relate to leveraging existing services thatdetect the presence of wireless devices (e.g., smartphones, tablets,hands free, laptops) and store that data for future use. These databasescan be cross referenced with prior location data from the trackingdevice to see what wireless devices were proximate to the trackingdevice at particular times. For example, a wireless device which isconsistently proximate to the tracking device may be the monitoredperson's own phone. The service can then be used to identify a locationfor that wireless device so that authorities can be dispatched to thatlocation.

Tracking Devices

FIG. 1 shows a block diagram of a personal monitoring device 102according to an embodiment of the invention. Personal monitoring device102 can determine its location, such as through the Global PositioningSatellite, cell towers, LORAN, wireless local access points, or otherknown methodologies; for sake of brevity discussion herein is confinedto GPS, although the invention is not so limited. Monitoring device 102is shown as a one-piece unit, although multiple pieces as known in theart could also be used.

A band 104 secures monitoring device 102 to a limb of the user,typically the ankle, via a locking mechanism that preferably can only be(legally) opened by an authorized individual. An ankle is shown in FIG.1, although the invention is not limited thereto. Monitoring device 102and band 104 preferably have tamper detection capabilities as is knownin the art and not discussed further herein. The invention is notlimited to any particular securing and/or tamper detection methodology.

Referring now to FIG. 2, a non-limiting example of monitoring device 102includes a dedicated circuit for determining its location, such as a GPSreceiver 202. A cellular modem 204 preferably provided with a SIM cardallows the monitoring device 102 to communicate through the cellularnetwork with a central monitoring location 310 (FIG. 3). A short rangewireless modem 206 (e.g., 915 MHz or 802.11 compatible Wi-Fi orBluetooth) allows the monitoring device 102 to communicate locally withother wireless devices within the short range as is known in the art forsuch devices. Modems 204 and 206 may be the same modem operable tocommunicate on different frequencies. A substance detector 208 may beprovided to monitor the presence of prohibited substances in themonitored individual, such as through a sensor in contact with the skin;the configuration of substance detectors within a portable monitoreddevice are known by those of skill in the art and not further discussedherein. Tamper detection mechanism 210 monitors for tamper detection asis known in the art.

Monitoring device 102 may also include a wireless access point detector220 that detects short range (e.g., maximum range on order of less thanhundreds of feet) wireless access points (or “WAP”) within range andrecords information about the detected wireless access points in thememory. By way of non-limiting example, wireless access points may beIEEE 802.11 compatible Wi-Fi hotspots that provide Internet access tonetwork devices as are commonly known in the art of mobile phones andtablets, and the wireless access point detector 220 may be an IEEE802.11 compatible Wi-Fi finder. In another non-limiting example, devicesthat communicate via Bluetooth could be wireless access points. Acellular tower is a long range point of access (maximum range on theorder of miles) and would not be a short range wireless access point asunderstood herein.

Batteries, a power port, memory, I/O interface, wired communicationaccess and other supporting computer hardware and software as is knownin the art are also preferably provided and not discussed furtherherein. Monitoring device 102 may be integrated into a single unit ormultiple units as is known in the art. The invention is not limited tothe details of the architecture of monitoring device 102.

Referring now to FIG. 3, monitoring device 102 is shown in an operatingenvironment. Multiple satellites 302 provide the GPS timestamps that GPSreceiver 202 in monitoring device 102 converts into locationinformation. The location information represents the approximateposition of the monitoring device 102, and by extension the approximateposition for the monitored individual, at a particular time. Monitoringdevice 102 can transmit that information as location data in near realtime, and/or can store the location information as location data inmemory and batch transfer collected location data as dictated by theneed of the system (e.g., on a fixed and/or random schedule, or inresponse to an event or specific instruction to do so). If substancedetection capability is present, then information relating toscreening(s) may be similarly stored, transmitted in near real time orbatch transmitted collectively, either with or separately from thelocation data.

Monitoring device 102 preferably has at least two options for remotecommunications, including data transfer. The first is through the shortrange modem 206 with a trusted home monitoring device 304 when withinthe range (e.g., <300 feet, more particularly about 50-100 feet) of theshort range modem 206. The second is through the cell/long range modem204 (potentially miles) to a cell tower 306 when the monitoring deviceis out of range of the home monitoring device 304. A third option isshort range wireless modem 206 with a wireless access point 308.Preferably cell tower 306, wireless access point 308 and/or homemonitoring device 304 connect to central monitoring location 310 and/oran authorized individual 312, whether directly or through interveningequipment (e.g. cell network, Internet) as known in the art.

Wireless access point detector 220 is shown in FIG. 2 as separate frommodems 204 and 206, but may be part of those modems or other components.By way of non-limiting example, modem 204 could be a cellular modem,modem 206 could be a separate RF modem, and wireless access pointdetector 220 could be a distinct Wi-Fi modem and/or Wi-Fi findercomponent. In yet another example, modem 206 is a Wi-Fi network adaptorthat includes Wi-Fi finder hardware and/or software, such that thewireless access point detector 220 is part of modem 206. In still yetanother example, modem 204 could be a cellular modem, modem 206 could bea separate RF modem, and wireless access point detector 220 could be adistinct Wi-Fi network adaptor. The invention is not limited to theparticular organization or components that define the wireless accesspoint detector 220.

Central monitoring location 310 is “central” in the sense that it servesone or more monitoring devices 102. It may be a single location,multiple locations operating independently, or a distributedarrangement. At a most basic level the central monitoring location 310is no more than a computer (e.g., a server) having a memory, processor,modem, input/output, and other supporting computer hardware and softwareas is known in the art, although in practice they may be largefacilities with distributed computers and human handlers. Functionalityattributed herein to central monitoring location 310 is preferablyimplemented by software programmed onto electronic computer hardware.The invention is not limited to the architecture or layout of thecentral monitoring location 310.

A non-limiting example of a monitoring individual's movement and relatedinformation that can be derived from corresponding movement datareported by personal monitoring device 102 is shown with respect to amap 400 in FIG. 4. In FIG. 4, a monitored individual A moves along aroute 402 between 9 AM and LOAM, including a stop at a restaurant(McDonalds) for breakfast. A monitored individual B moves along a route404 between 9 AM and 10 AM, and also stops at the same restaurant. Thecorresponding movement data would be recorded by their individualmonitoring devices 102 and uploaded to central location 310 as describedabove. The corresponding data could be visually displayed at centralmonitoring location 310, similar in the manner to which it is shown inFIG. 4 (although more likely shown by dots representing location data atscheduled times taken along the paths).

General Population Tracking Databases

Wireless devices have the ability to wirelessly connect with otherdevices and access points, by way of non-limiting example, throughBluetooth, Wi-Fi access, hotspot, etc. For example, the IPHONE hasoptions under its setting tabs to turn ON/OFF its Wi-Fi connectivity,its Bluetooth connectivity, and its personal hotspot connectivity. Whenany of these are in active (ON) states these wireless connectivitymethodologies are periodically transmitting probe signals announcingtheir presence that are detectable by other wireless devices and accesspoints. Devices of particular interest from a deployment perspective aremobile devices such as cell phones, although the invention is notlimited to mobile devices or any particular type of wireless device.

A probe signal includes some type of unique device identifier for thedevice (e.g., its MAC ID) so that any particular wireless device isdistinguishable from other wireless devices, although typically theidentifier does not contain personal information that would allow thecarrier/owner of the wireless device to be identified from the signal. Aprobe signal may also contain location information identifying thelocation of the mobile device, e.g., coordinates from a GPS receiver inthe wireless device.

A recognized habit of the consuming public is to default at least someof these wireless device settings to active state for the convenience ofseamlessly connecting to different devices and access points (e.g., linkto home Wi-Fi at home, and then automatically link to office Wi-Fi whenat work). As such most consumer devices are constantly transmittingprobe signals.

Various services have emerged to monitor the presence of probe signalsand collect this data for advertising purposes. A non-limiting exampleof such a service is provided by LIBELIUM. The services detect the probesignals transmitted by the various wireless devices to a local wirelessaccess point, which acts a sensor. The process provides at least somedegree of location of the wireless device, in that either the wirelessdevice knows and reports its own location (e.g., internal GPScoordinates as may be transmitted with the probe signals) and/or thelocation that the wireless access point is known at least generally (dueits deployment at a known location or internal location circuitry, suchthat the location of the wireless device is known to be within a certainrange of the wireless access point). The process also provides a timestamp for when the wireless device was detected. Detection of a wirelessdevice thus provides a device identifier at an at least approximatelocation at a particular time.

A non-limiting example of the components of such a service is shown inFIGS. 5A-B and 6. In FIG. 5A, sensors 502A receive paring signals fromwireless devices that they detect. Each sensor 502 may utilize anywireless method(s) for communication (e.g., Bluetooth, Wi-Fi, etc.).Sensors 502 report the devices that they detect to a monitoring locationwith a database 506 through supporting communication infrastructureshown generally at 504.

FIG. 5B shows a sensor range 504 for a sensor 502 located at therestaurant at which the monitored persons A and B from FIG. 4 met. Thesensor 502 detects any probe signals from the wireless devices that themonitored persons may be carrying, as well as any probe signals from anyother wireless devices, and reports the same to database 506. By way ofnon-limiting example, the wireless devices may be the monitored person'scell phones, or any other cell phones in the area. If the monitoringdevices 102 have the capability to emit probe signals, then those wouldalso be detected and reported.

FIG. 6 shows sensors 502A-D deployed in particular areas of interest.Each sensor 502 has a range 602 that sensor 502 can detect probe signalsin. Wireless devices 604 (shown as a square), 606 (shown as a circle)and 608 (shown as a pentagon) emit probe signals within range 602 suchthat sensor 502 will detect them, whereas wireless device 610 (shown asa triangle) is outside of range 602 of any sensor 502 and would not bedetected.

Sensors 502 report the detection of wireless devices 604, 606 and 608 toa remote location where it is stored in a database 506. The reportingpreferably includes, and the database 506 preferably stores, thereceived identifier of the wireless devices (e.g., MAC address), and anapproximate time of the detection. Sensor 502 could also bundle times,such as report every probe signal provided in the last two minutes, suchthat the records may reflect approximate times of the probe signalsrather than actual times. The invention is not limited to the nature orcontext of the time data or identification provided by sensors 502.

Database 506 also preferably stores location data giving some referenceto location of the detected wireless device. Non-limiting examplesinclude a location as provided by the wireless device (e.g., a GPS pointas may be provided by the wireless device itself), a location of thesensor 502 (e.g. GPS data as provided by the sensor 502 when thewireless device was detected, or pre-established from an earlier time,such that the wireless device would be located within a detection rangeof the sensor 502), or even an identifier of the particular sensor 502that can be correlated a with location as may be stored in otherrecords.

The database 506 thus stores a record of a wireless device identifier, atime reference of an at least approximate time at which a probe signalfrom the wireless device was detected, and a location reference of an atleast approximate position of the wireless device at the time ofdetection.

By way of non-limiting example, if the wireless devices in FIG. 6 emit aprobe signal every five minutes, then at 1/18 at noon the database wouldreflect the following:

Device ID Time Location ID for square 604 1/18 12:00 PM Sensor 502C IDfor circle 606 1/18 12:00 PM Sensor 502B ID for pentagon 608 1/18 12:00PM Sensor 502DNote in the above chart the times are the same for ease of discussion,although unless the wireless devices are synchronized to emit probesignals at the same time (unlikely) the individual times may bedifferent.

Referring now to FIG. 7, wireless device 610 at 12:02 moves into rangeof sensor 502B, and its probe signals can thus be detected. If all ofthe wireless devices emit a probe signal at 12:05 on 1/18, then database506 would reflect the following:

Device ID Time Location ID for square 604 1/18 12:00 PM Sensor 502C IDfor circle 606 1/18 12:00 PM Sensor 502B ID for pentagon 608 1/18 12:00PM Sensor 502D ID for square 604 1/18 12:05 PM Sensor 502C ID for circle606 1/18 12:05 PM Sensor 502B ID for pentagon 608 1/18 12:05 PM Sensor502D ID for triangle 610 1/18 12:05 PM Sensor 502B

The records would continue to grow over time.

Data may be stored differently from the above, such as a first recordedtime of entry and last recorded time of entry. The invention is notlimited to the nature of the records or the specific contents.

For multiple sensors 502 deployed over an area detecting wirelessdevices from the general population, these services collect massiveamounts of movement data of wireless devices of the general population.

The collected data has a degree of anonymity, in that the probe signalfrom the wireless devices that are detected do not typically containpersonal data that allows for easy identify of an individual. Forexample, these services typically do not have access to a list ofusers-MAC addresses (such data being maintained by the wireless cellularcarriers), such that the probe signals do not typically reveal theidentity of the user. Nonetheless, habits of the user as indicted bypresence or movement of the wireless device can be discerned andleveraged. For example, if a particular wireless device is detectedthree times in the same week at the same store, the corresponding usercould be classified as a frequent shopper and provided with specificdiscounts.

Tracking of Fugitives Using General Population Databases

As noted above, there are a variety of circumstances that establish amonitored person as a fugitive. A typical example is cutting the band104 known as “cut and run” which causes monitoring device 102 to issue abracelet gone alert signal to central monitoring location 310. Anotherexample is destroying the monitored device. For purpose of brevity thebelow discussion in the context of a cut band 104, although it is to beunderstood that the invention is not limited to that specificcircumstance.

In a cut and run scenario, a fugitive tends to engage in activity thatinvolves, interacts with, or is proximate to wireless devices. Forexample, the fugitive may keep a cell phone with them, such as theiroriginal phone or a “burner” phone. In another example, even if thefugitive has no wireless device, they will tend to seek support fromothers (e.g., friends, family, accomplices) who have wireless devices.Embodiments of the invention cross reference prior location data of thefugitive with the global tracking databases to identify wireless devicesthat the monitored person previously had frequent contact with. Recentor current location of such wireless devices can then be identified fromthe global tracking database, and authorities can be dispatched to thoselocations.

FIG. 8 illustrates an example flowchart for the implemented methodologyherein. The flowchart shown in FIG. 8 is provided by way of example, asthere are a variety of ways to carry out the method. Additionally, whilethe example method is illustrated with a particular order of sequences,those of ordinary skill in the art will appreciate that FIG. 8 and thesequences shown therein can be executed in any order that accomplishesthe technical advantages of the present disclosure and can include feweror more sequences than illustrated.

As discussed above, the central authority has previously issuedmonitoring devices 102 to members of a monitored population, andcollects and stores movement data for the members as reported by themonitoring devices 102 to establish a movement history of each of themonitored persons. At block 802, central monitoring location 310initiates a search for wireless devices that have been in proximity to amonitoring device 102 over time.

At block 804, the central monitoring location 310 extracts from movementhistory for a particular monitored person a subset of movement fordifferent times and locations of the monitored person. By way ofexample, the location of the monitored person every hour over the mostrecent five day period could be used. However, this may be too much datato process quickly, and thus instead the system may only look at thelocation of the monitored person at intervals, such as every two hoursover the five days. More recent data may be more relevant, and as suchmore frequent data points may be compared to older points. The inventionis not limited to the nature of the defined subset of movement data.

At block 806, the methodology cross references the subset of movementdata with databases of detected probe signals of wireless devices toidentify what wireless devices (if any) were proximate to the monitoredperson at the location/times of the subset of movement data. Thedatabases which are cross referenced may be general population trackingdatabases 506 as discussed above, however the invention is not solimited. By way of non-limiting example, the database could be specificto certain types of wireless devices. The cross reference of block 806may take a variety of forms, and may in part depend upon the content ofthe databases 506, as discussed in more detail below.

In theory all wireless devices that were identified at block 806proximate to the monitored person at the location/times may be ofinterest, but as a practical matter this may generate too many hits forauthorities to work with. It may therefore be preferable at block 808 tocull the list of all identified wireless devices to wireless devices ofmore significant interest, as these wireless devices are thus likely inthe possession of either the monitored person or an associate withinformation relevant to locating the monitored person.

At block 810, the methodology determines one or more relevant locationsfor any of the wireless devices identified in the prior blocks. Arelevant location could be a current location, a most recently detectedlocation, and/or a particular location that has attributes of interest(e.g., a frequent gathering location, known location in which criminalscongregate). The relevant location could by way of non-limiting examplebe a monitored individual's work, home, family member's home, or unknownlocation.

At block 812 the identified relevant location(s) can be provided toauthorities to dispatch police or the like to investigate. The reportingmay be by any known method, such as by way of non-limiting example,text, email, phone call, and/or report. Preferably the information isprovided in real or near real time, although the invention is not solimited.

The above blocks may be executed in a variety of ways, non-limitingexamples of set forth below in the context of an example shown in FIGS.9-14. FIG. 9 shows a route 904 taken by a monitored individual 902between 12:20-1:30 on a day relative to the sensor deployment of FIG. 6,and a bracelet gone alert is received at 1:31 PM. FIGS. 10-14 show thelocation of the monitored person relative to wireless devices asdetected by sensors 502 at particular times along route 904.

With respect to block 802, the decision to initiate the process may beperiodic and/or reactive. A periodic decision may be performed on aschedule, such as every week. A reactive decision may be in response toa specific triggering event or circumstance(s), e.g., visit to a paroleeoffice, or receipt of a bracelet gone alert signal transmitted bymonitoring device 102 in response to a cut band 104. The decision may bemade by users on consideration of all information (e.g., a monitoredperson has not reported in and other efforts to locate the monitoredperson have been ineffective) or automatically (e.g., in direct responseto the bracelet gone signal). In the example of the FIGS. 9-14, block802 is triggered by a bracelet gone alert, although the invention is notlimited to the events that lead to the initiation of the search.

With respect to block 804, the selection of which times and/or locationsfor the subset of movement data to cross reference maybe based on avariety of criteria and/or the particular database(s) that would beconsidered. For example, if sensors 502 are typically deployed in publicareas, then daytime hours may be more appropriate as it is less likelythat wireless devices would be present at such locations at night. Inanother example, sensor 502 could be part of home monitoring device 304(FIG. 3), and thus have logged wireless devices within the monitoredperson's home; in this case, the times of interest may be evenings ornights when the monitored person is more likely to be at home, such thatthe wireless devices that are detected more likely belong to themonitored person or people that the monitored person regularlyassociates with. In yet another example, the locations may be specificto areas in which there are known to be deployed sensors 502, aslocations outside of those areas would not tend to yield useful data;FIGS. 10-13 reflect such a decision, as the locations/times are selectedduring which the path overlapped with sensors 502A-D of FIG. 6. Theinvention is not limited to any particular set of criteria on which thesubset of movement data is selected.

With respect to block 806, the cross referencing will look for entriesin the database 506 that are proximate in time and location to thesubset of monitored data. Thus, FIG. 10 shows that monitored person 902was within range of sensor 502A at 12:20 PM, the cross reference willsearch database 506 for wireless devices that were recorded as emittinga probe signal at that approximate location at that approximate time;wireless device 604 (square) is identified in that area at that time.

FIG. 11 shows monitored person 902 within range of sensor 502B at 12:40PM, for which the cross reference identifies wireless devices 604(square), 606 (circle), and 610 (triangle). FIG. 12 shows monitoredperson 902 within range of sensor 502C at 1 PM, for which the crossreference identifies wireless devices 604 (square) and 610 (triangle).FIG. 13 shows the monitored person 902 within range of sensor 502D at1:30 PM, for which the cross reference identifies wireless device 608(pentagon).

The above cross reference thus generates a list of wireless devices thatwere proximate to the monitored person over time, with wireless device604 being present in three of the four checked locations. Any of thesewireless devices may belong to the monitored person and/or theirassociates.

Nonetheless the list—which may represent all detected wireless devicesthat the monitored person encountered—is likely to be significantly overinclusive. Block 808 thus applies one or more predetermined rules toselect wireless devices of with a higher probability of leading to themonitored person. A non-limiting example of a rule is how often theportable monitoring device encountered a particular wireless device. Inthe example of FIGS. 9-14, wireless device 604 (square) was consistentlypresent with the monitored person; there is thus a high probability thatthe wireless device 604 is the fugitive's own mobile phone, or the phoneof an associate who spends a considerable amount of time with thefugitive. Significant correlation between the selected movement data andwireless devices in the corresponding locations at the relevant times,such as 75% or higher, may thus be considered high priority.

In the same example, wireless device 610 (triangle) was encountered intwo of the four cross references. This may indicate frequent contactwith a particular person, but not the fugitive themselves or someonethat they are typically with. Such moderate correlation, such as 30-75%,may be considered a medium priority.

In the same example, wireless devices 606 (circle) was encountered onlyonce, and is thus likely to be an unaffiliated person coincidentally inthe same geographic area; this minimum interaction could be eitherdiscounted or designated as low priority.

In the same example, wireless device 608 (pentagon) was encountered onlyonce, and depending on the rules could similarly be discounted ordesignated a low priority as was the case with wireless device 606.However, this was the last detected wireless probe signal before thebracelet gone alert, and thus could represent a burner phone. Thus awireless device detected closer in time to a specific event may havehigher priority than a detection of a more remote time.

Another non-limiting example of a predetermined rule could be time ofencounter. For example, a wireless device proximate to the personalmonitoring device at 3 AM may be more likely to belong to the monitoredperson of a close associate who lives with the monitored person (e.g.,significant other, family member, roommate). Another example of a rulemay be extended periods of contact for individual encounters, or acombination of time over several encounters, if a wireless device isproximate to the personal monitoring device overnight it may alsoindicate it may be the fugitive's device or belong to an associate.

Another non-limiting example of a rule may be disregarding the detectedwireless device if it is stationary. A device can be determined mobileif the records show it is in different places at different times,whereas a stationary device is consistently at the same location. Whileboth yield useful data, information for stationary devices may beduplicative from what could be learned from the portable monitoringdevice's own reporting of its location data.

Another non-limiting example of a rule is the frequency of detection ofa wireless, and/or the time of a connection with a wireless device. Awireless device that is detected more often than another and/or longperiods of connection with a wireless device may be indicia of arelevant wireless device.

The rules may include weighting of particular factors. For example, anencounter at 3 AM may be given more weight than 3 PM, as daytimeencounters may be coincidental whereas nighttime encounters may beconsistent with living situations.

The above culling methodologies are provided by way of non-limitingexample. The invention is not limited to the manner in which themethodology limits/prioritizes encountered wireless devices.

With respect to block 810, once wireless devices are identified as ofinterest (either from the results of block 806, or as culled for morerelevant results in block 808), the methodology identifies one or morerelevant locations where the monitored person or an associate(potentially with relevant information pertaining to the location of themonitored person) may be found.

A non-limiting example would be to search database 506 for the mostrecent detection of a probe signal for the identifier of the wirelessdevice, which would generate a most recently known location. In anotherexample, database 506 could be searched for a pattern of movement, whichmay yield clues for possible locations to investigate; for example ifthe wireless device is frequently present at a particular location, thenauthorities may want to investigate that location. Block 812 providesthe relevant location(s) to authorities for investigation.

As discussed above the process beginning at block 802 may be periodic orreactive. If reactive, then then blocks 802-812 may occur at aparticular time. If periodic, then the methodology may occur in parts,with a first part of data gathering (e.g., blocks 802-808) and thesecond part being reactive to fugitive or other status (e.g. blocks810-812); in this context the first part may be run repeatedly overtime, and the second part would only be used when needed.

The above methodology leverages a degree of anonymity in that wirelessdevice identifiers do not directly identify the registered owner of thewireless device; between that and the public broadcast of the probesignals, the collection of data within database 506 does not raiseprivacy considerations as would be the case with the mobile carriers.The data is thus accessible (either openly or contractually with theprovider) without need for a warrant. This leads to significantlyimproved response time in identifying relevant locations at block 810.However, the invention is not so limited, and in theory block 810 mayinclude obtaining a current location of a wireless device from the localcarrier.

To the extent that the above embodiments are discussed in terms ofindividual items or results (e.g., a personal monitoring device, arelevant location), this is for illustrative purposes only. It is to beunderstood that multiple items and/or results can be addressedsimultaneously. For example, personal monitoring devices for the entiredeployed population could be searched as discussed herein, and multiplerelevant locations may be revealed and investigated.

According to another embodiment of the invention, the personalmonitoring device 102 may itself incorporate the functionality of sensor502 as part of short range modem 206, WAP detector 220, a dedicatedcomponent, and/or part of some other component. This methodology wouldreport to central monitoring location 310 any detected probe signalsalong within range with location and time data, and central monitoringlocation would store that information. Central monitoring location couldthus search its own records as part of at least blocks 802-808 of FIG.8, such records likely being more complete than those of database 506(as the personal monitoring device would have more accurate locationinformation, and there would be no gaps in physical coverage as mayexist between sensors 502). Block 810 could also at least in part beperformed by central monitoring location 310 by using its deployedpopulation of personal monitored devices 102 as an active sensornetwork, although as a practical matter the coverage may not besufficient for meaningful results such that consultation with database506 may still be desirable.

FIG. 14 illustrates a logical arrangement of a set of general componentsof an example computing device 1400 as could be used for the computerelements of monitoring device 102, database 506 and/or centralmonitoring location 310. In this example, the device includes aprocessor 1402 for executing instructions that can be stored in a memorydevice or element 1404. As would be apparent to one of ordinary skill inthe art, the device can include many types of memory, data storage, ornon-transitory computer-readable storage media, such as a first datastorage for program instructions for execution by the processor 1402, aseparate storage for images or data, a removable memory for sharinginformation with other devices, etc. The device typically will includesome type of display element 1406, such as a touch screen or liquidcrystal display (LCD), although devices such as portable media playersmight convey information via other means, such as through audiospeakers. As discussed, the device in many embodiments will include atleast one input element 1412 able to receive conventional input from auser. This conventional input can include, for example, a push button,touch pad, touch screen, keyboard, mouse, keypad, or any other suchdevice or element whereby a user can input a command to the device. Insome embodiments, the computing device 1400 of FIG. 14 can include oneor more network interface elements 1408 for communicating over variousnetworks, such as a Wi-Fi, Bluetooth, RF, wired, or wirelesscommunication systems. The device in many embodiments can communicatewith a network, such as the Internet, and may be able to communicatewith other such devices.

Each computing device typically will include an operating system thatprovides executable program instructions for the general administrationand operation of that device and typically will includecomputer-readable medium storing instructions that, when executed by aprocessor of the server, allow the computing device to perform itsintended functions. Suitable implementations for the operating systemand general functionality of the servers are known or commerciallyavailable and are readily implemented by individuals having ordinaryskill in the art, particularly in light of the disclosure herein.

Various embodiments discussed or suggested herein can be implemented ina wide variety of operating environments, which in some cases caninclude one or more user computers, computing devices, or processingdevices which can be used to operate any of a number of applications.User or client devices can include any of a number of general purposeindividual computers, such as desktop or laptop computers running astandard operating system, as well as cellular, wireless, and handhelddevices running mobile software and capable of supporting a number ofnetworking and messaging protocols. Such a system also can include anumber of workstations running any of a variety ofcommercially-available operating systems and other known applicationsfor purposes such as development and database management. These devicesalso can include other electronic devices, such as dummy terminals,thin-clients, gaming systems, and other devices capable of communicatingvia a network.

Most embodiments utilize at least one network that would be familiar tothose skilled in the art for supporting communications using any of avariety of commercially-available protocols, such as TCP/IP, OSI, FTP,UPnP, NFS, CIFS, and AppleTalk. The network can be, for example, a localarea network, a wide-area network, a virtual private network, theInternet, an intranet, an extranet, a public switched telephone network,an infrared network, a wireless network, and any combination thereof.

In embodiments where the computing device includes a Web server, the Webserver can run any of a variety of server or mid-tier applications,including HTTP servers, FTP servers, CGI servers, data servers, Javaservers, and business application servers. The server(s) also may becapable of executing programs or scripts in response requests from userdevices, such as by executing one or more Web applications that may beimplemented as one or more scripts or programs written in anyprogramming language, such as Java®, C, C# or C++, or any scriptinglanguage, such as Perl, Python, or TCL, as well as combinations thereof.The server(s) may also include database servers, including withoutlimitation those commercially available from Oracle®, Microsoft®,Sybase®, and IBM®.

The environment can include a variety of data stores and other memoryand storage media as discussed above. These can reside in a variety oflocations, such as on a storage medium local to (and/or resident in) oneor more of the computers or remote from any or all of the computersacross the network. In a particular set of embodiments, the informationmay reside in a storage-area network (“SAN”) familiar to those skilledin the art. Similarly, any necessary files for performing the functionsattributed to the computers, servers, or other network devices may bestored locally and/or remotely, as appropriate. Where a system includescomputerized devices, each such device can include hardware elementsthat may be electrically coupled via a bus, the elements including, forexample, at least one central processing unit (CPU), at least one inputdevice (e.g., a mouse, keyboard, controller, touch screen, or keypad),and at least one output device (e.g., a display device, printer, orspeaker). Such a system may also include one or more storage devices,such as disk drives, optical storage devices, and solid-state storagedevices such as random access memory (“RAM”) or read-only memory(“ROM”), as well as removable media devices, memory cards, flash cards,etc.

Such devices also can include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired), an infrared communication device, etc.), and working memory asdescribed above. The computer-readable storage media reader can beconnected with, or configured to receive, a computer-readable storagemedium, representing remote, local, fixed, and/or removable storagedevices as well as storage media for temporarily and/or more permanentlycontaining, storing, transmitting, and retrieving computer-readableinformation. The system and various devices also typically will includea number of software applications, modules, services, or other elementslocated within at least one working memory device, including anoperating system and application programs, such as a client applicationor Web browser. It should be appreciated that alternate embodiments mayhave numerous variations from that described above. For example,customized hardware might also be used and/or particular elements mightbe implemented in hardware, software (including portable software, suchas applets), or both. Further, connection to other computing devicessuch as network input/output devices may be employed.

Storage media and computer readable media for containing code, orportions of code, can include any appropriate media known or used in theart, including storage media and communication media, such as but notlimited to volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules, or other data, including RAM, ROM, EEPROM, flash memoryor other memory technology, CD-ROM, digital versatile disk (DVD) orother optical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed by asystem device. Based on the disclosure and teachings provided herein, anindividual of ordinary skill in the art will appreciate other waysand/or methods to implement the various embodiments.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that various modifications and changes may be made thereuntowithout departing from the broader spirit and scope of the invention asset forth in the claims.

What is claimed is:
 1. A method for locating a fugitive with a disabledpersonal monitoring device, comprising: securing a personal monitoringdevice to a monitored individual, each personal monitoring device beingconfigured to (a) determine a location of the personal monitoring deviceat particular times, and (b) upload, as location data, the determinedlocation of the personal monitoring device; receiving and storing theuploaded location data from the personal monitoring device to therebycreate a movement history of the personal monitoring device of themonitored individual; cross referencing at least a portion of themovement history of the personal monitoring device with a record ofdetected probe signals emitted by wireless devices to thereby identifyany wireless devices that emitted probe signals at a location that wasproximate to the location of personal monitoring device; selecting, fromthe results of the cross referencing, a wireless device identified bythe cross referencing that had significant contact per predefined rulesto the portable monitoring device; determining a relevant location ofthe selected wireless device; notifying a supervising authority of therelevant location.
 2. The method of claim 1, wherein the receiving is inresponse to a signal representing that the personal monitoring devicehas been disabled.
 3. The method of claim 1, wherein: the receiving,cross referencing and selecting occur on a predetermined schedule; andthe determining is in response to a signal representing that thepersonal monitoring device has been disabled.
 4. The method of claim 1,wherein the at least a portion of the movement history includes aplurality of location/time entries, and the cross referencing comprisesidentifying in the record any wireless devices that were detected foremitting probe signals within range of a sensor proximate to any of thelocation/time entries at a corresponding time.
 5. The method of claim 4,wherein the sensor is part of a deployed sensor network.
 6. The methodof claim 4, wherein the sensor is part of the personal monitoringdevice, and the personal monitoring device is configured to upload datareceived by the sensor.
 7. The method of claim 1, wherein the selectingcomprises prioritizing wireless devices for which the personalmonitoring device had more significant contact than other wirelessdevices with less contact.
 8. The method of claim 1, wherein theselecting comprises prioritizing wireless devices detected duringnighttime hours.
 9. The method of claim 1, wherein the relevant locationis a last known location of the wireless device.
 10. The method of claim1, wherein the relevant location is a last known location of thewireless device as reflected by the record of detected probe signals.11. The method of claim 1, wherein the relevant location comprises oneof: work, home, family member's home, unknown location.
 12. The methodof claim 1, wherein the wireless device is a cellular phone.
 13. Themethod of claim 12, wherein the probe signals are transmitted by thecellular phone to connect with internet access points to access theinternet.
 14. A system for locating a fugitive with a disabled personalmonitoring device, comprising: a personal monitoring device beingconfigured to (a) determine a location of the personal monitoring deviceat particular times, and (b) upload, as location data, the determinedlocation of the personal monitoring device and (c) be secured to amonitored individual; a central monitoring location programmed toperform operations comprising: receiving and storing the uploadedlocation data from the personal monitoring device to thereby create amovement history of the personal monitoring device of the monitoredindividual; cross referencing at least a portion of the movement historyof the personal monitoring device with a record of detected probesignals emitted by wireless devices to thereby identify any wirelessdevices that emitted probe signals at a location that was proximate tothe personal monitoring device; selecting, from the results of the crossreferencing, a wireless device identified by the cross referencing thathad significant contact per predefined rules to the portable monitoringdevice; determining a relevant location of the selected wireless device;notifying a supervising authority of the relevant location.
 15. Thesystem of claim 14, wherein the receiving is in response to a signalrepresenting that the personal monitoring device has been disabled. 16.The system of claim 14, wherein: the receiving, cross referencing andselecting occur on a predetermined schedule; and the determining is inresponse to a signal representing that the personal monitoring devicehas been disabled.
 17. The system of claim 14, wherein the at least aportion of the movement history includes a plurality of location/timeentries, and the cross referencing comprises identifying in the recordany wireless devices that were detected for emitting probe signalswithin range of a sensor proximate to any of the location/time entriesat a corresponding time.
 18. The system of claim 17, wherein the sensoris part of a deployed sensor network.
 19. The system of claim 17,wherein the sensor is part of the personal monitoring device, and thepersonal monitoring device is configured to upload data received by thesensor.
 20. The system of claim 14, wherein the selecting comprisesprioritizing wireless devices for which the personal monitoring devicehad more significant contact than other wireless devices with lesscontact.
 21. The system of claim 14, wherein the selecting comprisesprioritizing wireless devices detected during nighttime hours.
 22. Thesystem of claim 14, wherein the relevant location is a last knownlocation of the wireless device.
 23. The system of claim 14, wherein therelevant location is a last known location of the wireless device asreflected by the record of detected probe signals.
 24. The system ofclaim 14, wherein the relevant location comprises one of: work, home,family member's home, unknown location.
 25. The system of claim 14,wherein the wireless device is a cellular phone.
 26. The system of claim25, wherein the probe signals are transmitted by the cellular phone toconnect with internet access points with internet access points toaccess the internet.