Proximity-based communication system applied to earthquake detection

ABSTRACT

The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security techniques to maintain control over data that is personal, proprietary or restricted. This disclosure enables a geo-proximity security and privacy system for assuring control and non-repudiation for wireless-enabled devices by relying upon location and trusted network relationships among a set of wireless-enabled devices, where one or more devices may act as a control or master key. Security in a digital society may be benefitted by the establishment of digital walls that are as flexible as the world of cyberspace to be erected whenever and wherever wireless-enabled technology is in use. The security protocol may be configured to secure a protected device or the data they contain from loss, theft, abuse or misuse.

RELATED CASE

This application is a non-provisional of U.S. Provisional ApplicationNo. 62/407,417 filed Oct. 12, 2016 and incorporated herein by thisreference.

COPYRIGHT NOTICE

© 2016-2017 Lillie Coney. A portion of the disclosure of this embodimentdocument contains material, which is subject to copyright protection. Aportion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction by anyone of the patent documentor the patent disclosure, as it appears in the Patent and TrademarkOffice patent file or records, but otherwise reserves all copyrightrights whatsoever. 37 CFR § 1.71(d).

TECHNICAL FIELD

This invention pertains to controlling access to secured locations orinformation based on locations of linked, wireless-enabled devices, andleveraging the linked devices for earthquake detection.

BACKGROUND

The proliferation of digital devices and the desire to prevent theft,abuse or misuse of information accessible by a device has imposed apassword management regime upon consumers that is challenging theirability to develop and maintain control over wireless-enabled, networkedtechnology. Social and economic dependence upon complex passwordmanagement by individual consumers who are faced with an exponentiallyexpanding number of consumer wireless-enabled devices is unsustainable.

The next technology wave is fast approaching in the form of the“Internet of things” or “IoT” where the lives ofconsumers/workers/citizens will be delinked from fixed geographiclocations. The power of digital devices has made work, learning, play,and healthcare services available at any location where a person withthe right technology is present. Due to advances in RFID technology, theadoption of Internet Protocol version 6 (“IPV6”), the development ofnear field communication, continued miniaturization of computingtechnology, broad and sustained adoption of mobile wireless technology(means of supporting wireless communication), innovations in microchiptechnology, and software engineering, many consumer and commercialproducts, appliances and equipment have a unique Internet Protocoladdress, whereby one device is distinguishable from another. Indeed,IPV6 arises by necessity as the sheer number of addresses outstrips theIPV4 protocol. This proliferation of nodes compounds the securitychallenges.

SUMMARY

The following is a summary of the present disclosure to provide a basicunderstanding of some aspects of the disclosure. The summary is notintended to identify key/critical elements of the disclosure ordelineate the scope of the disclosure. Its sole purpose is to presentsome concepts of the disclosure in a simplified form as a prelude to themore detailed description that is presented later.

This disclosure describes methods and apparatuses of a security systemfor protecting wireless-enabled devices and/or associated data fromtheft, loss, misuse, and abuse. This goal may be achieved through, butnot limited to, the creation of an ad hoc relationship between or amongdevices through a link, where the relationship may be associated withthe physical proximity of the devices to each other. The methods andapparatuses described may comprise, but are not limited to, the use of acentral programming device located within physical proximity of awireless-enabled device or devices. The central programming device maybe utilized to enroll devices and assign relationships between thedevices, as well as assign levels of security and correspondingprotocol(s) to the devices to be utilized in the case that one or moreof the enrolled devices become separated from other enrolled deviceswithin the same linked group.

The central programming device may act as a controller of enrolleddevices, which means it can assign links among devices (for example,using Classless Inter-Domain Routing or CIDR) such that the linkeddevices share a unique access security protocol. The central programmingdevice may be able to, but is not limited to: establishing parametersfor device access and use; assigning levels of functionality to linkeddevices; setting proximity distances that linked devices may beseparated from each other without activating the security protocol; andfacilitating escalation of the levels of response if distance parametersexceed the set proximity distances. In some examples, the centralprogramming device may be limited to operation at a location where thecentral programming device was initialized. This limiting of operationprovides an additional layer of security to better manage access, use,and functionality of wireless-enabled technology located in a home,office or elsewhere.

In some embodiments, the central programming device may communicate withlinked devices that incorporate vibration sensors, and leverage thelinked network of devices for earthquake detection. In some embodiments,one or more linked devices may incorporate or be coupled to varioussensors that may detect signs of life. This signs-of-life detectioninformation can be acquired by the central programming device and usedto guide search and rescue operations.

In some embodiments, the central programming device may implement asecure home area network, functioning as a proprietary GPS system thatmay monitor the presence, condition, and location of linked devices. Thecentral programming device may be configured to allow a user to enrolllinked devices, establish proximity relationships, and manageinformation related to changes in proximity relationships between thelinked devices to facilitate a user being able to locate an item. Thismay assist users by helping them to locate and retrieve items, as wellas determine that a linked device exceeded the bounds of its proximityrelationship.

The central programming device may comprise or have access to a storageunit for storing information related to each linked device, and it maysecurely transmit stored information based on owner establishedprotocols. The protocols may cause the central programming device toperform actions, including sending information to linked devices toalert an owner or controller of the device, a home/business securityservice, a friend or a family member, or contact 911 emergency servicesin response to one or more enrolled device(s) violating proximityrelationships or other operational rules. The central programming devicemay also assign or delegate controlling functions to a linked device,which configures the linked device to perform specified operations inresponse to a violation of security protocols. The central programmingdevice may be integrated with home or office security systems, enableautomated enrollment and/or generate a log of devices that enter thecommunicable area (within wireless communication range) of the centralprogramming device. The central programming device may be configured tooperate with bar-coded devices readers and other IP enabled technologyin appliances or office equipment.

The central programming device may generate white noise in the form ofFalse RFID or simulated wireless communication signals to mask theactive communication or presence of wireless-enabled devices within itsrange. The central programming device may be able to generate, orsimulate, wireless communication to a degree necessary to preventinterception of the wireless communication through electroniceavesdropping, thereby supporting privacy and security.

Electronic communications among authorized, linked devices may beenabled when the linked devices are within a physical proximity to thecentral programming device. In some examples, communicationrelationships may be established for linked devices even though at leastone of the devices is outside the physical proximity to the centralprogramming device or is violating another rule assigned to the linkeddevices.

The wireless-enabled devices may be managed and monitored securely whenoutside of the physical proximity of the central programming device. Insome examples, the central programming device may communicate with thelinked devices while they are outside of the physical proximity.

The central programming device may be able to identify, track, andmanage non-wireless-enabled items by tracking an RFID tag, or similarlyoperating technology, attached to the items. The non-wireless-enableditems may be linked to other items and wireless-enabled devices, and mayoperate similarly to wireless-enabled devices that have been linked toother wireless-enabled devices.

The central programming device may utilize RFID, internet protocol (IP),near field communication, wi-fi, or any other type of wirelesscommunication now known or later developed to perform the disclosedoperations. Further, the central programming device may alternatebetween communication protocols for communication with devices thatrequire a particular type of communication protocol. For example, if onedevice requires RFID communication and a second device requires IPcommunication, the central programming device may be able to utilize thecorresponding communication protocol to communicate with both devices.

Additional aspects and advantages of this disclosure will be apparentfrom the following detailed description, which proceeds with referenceto the accompanying drawings.

BRIEF DESCRIPTIONS OF THE DRAWINGS

FIG. 1 illustrates an example network comprising a central programmingdevice.

FIG. 2 illustrates an example network comprising defining objectsforming a geo-proximity fence.

FIG. 3 illustrates an example network comprising linked devices.

FIG. 4 illustrates an example network comprising a first token and asecond token.

FIG. 5 illustrates an example network tracking objects entering ageo-proximity fence associated with a token.

FIG. 6 is a flow chart illustrating a process for linking devices.

FIG. 7 is a flow chart illustrating the process of monitoring a group oflinked devices.

FIG. 8 illustrates an example network comprising a central programmingdevice and linked devices having vibration sensors.

DETAILED DESCRIPTION

The systems and methods disclosed utilize an application of technologyand security protocols to provide security for wireless-enabled devicesamong home, office, public, and other settings. One advantage of thisnew approach of the disclosed systems and methods is a reduction in thequantity of passwords and personal identification numbers (PINs) thatare required for users to access the wireless-enabled devices includedwithin the systems and methods. The systems and methods disclosed mayensure that only users with authorization can access, use, or controlthe devices within the system or method.

FIG. 1 illustrates an example network comprising a central programmingdevice 104. Central programming device 104 may be either fixed at alocation or mobile, allowing the central programming device 104 to bemoved to a desired location of operation of the example network. Inexamples where the central programming device 104 is mobile, the centralprogramming device 104 may be configured only to operate within an area,such as within geo-proximity fence 102.

Central programming device 104 may be wireless-enabled, allowing thecentral programming device 104 to communicate with otherwireless-enabled devices and allowing tracking of the devices andobjects that are within the central programming device's 104 range ofcommunication. Central programming device 104 may communicate with otherwireless-enabled devices using multiple diverse types of wirelesscommunication, including any of IP, RFID, Wi-Fi, Bluetooth, near fieldcommunication, and similar communication protocols. The centralprogramming device may further be able to determine locations ofwireless-enabled devices through use of GPS, location determiningsystems set up within structures, RFID, Wi-Fi, Bluetooth, near fieldcommunication, or a combination thereof.

In some examples, devices that are not wireless-enabled may be convertedinto a wireless-enabled device through use of geo-proximity plugs. Thegeo-proximity plugs may be a device or object that can be connected to adevice that is not wireless-enabled and, thereby, allowing the device tocommunicate or be recognized by the central programming device 104 andother wireless-enabled devices. The geo-proximity plugs may be discreteand not easily removed. In some examples, removal of the geo-proximityplugs may require authorization, such as through entry of a pass code,biometric certification, authorized access to the central programmingdevice 104 to generate a removal request, or similar authorizationtechniques. An alert may be generated in response to unauthorizedremoval of a geo-proximity plug, allowing for correction of theunauthorized removal.

One example of a geo-proximity plug is by placement of an RFID tag onthe device or object that is not wireless-enabled. The centralprogramming device 104 may be configured to read RFID tags, allowing thecentral programming device 104 to identify any object that enters thecentral programming device's 104 range of communication. The RFIDtechnology may be either encrypted or unencrypted technology.

Central programming device 104 may be configured to generate relationallinks between wireless-enabled devices and define rules associated withthe relational links. The relational links and associated rules maydefine how the central programming device 104 and the linked devicesoperate in certain situations. In some embodiments, a relationaldatabase may be utilized, wherein the relational database stores all ofthe relational links and associated rules within a network.

In some examples, the relational links may be generated by a userinteracting with the central programming device 104 to create arelational link between a plurality of wireless-enabled devices, such asfirst linked device 106 and second linked device 108. The rulesassociated with the relational link among the devices may be generatedby the central programming device 104, the first linked device 106 orthe second linked device 108, or any combination thereof. The rules maybe editable by an authorized user.

In some examples, the central programming device 104 will be able togenerate relational links automatically. For example, uponinitialization the central programming device 104 may detect allwireless-enabled devices within its communication area and dynamicallygenerate rules based on tracking the locations and operations of thedetected devices. The central programming device 104 may be configuredto track the locations and operations of the wireless-enabled devicesfor a selected period of time and then generate relational links andassociated rules corresponding with the results of the tracking duringthat time period.

Further, relational links among the central programming device 104 andother linked devices may be generated based on default designationsstored on one or more of the linked devices, such as first linked device106 and second linked device 108, indicating that a relational linkshould be generated. The first linked device 106 may store a designationindicating that the first linked device 106 should be relationallylinked to the second linked device 108. The designation may be placed onthe first linked device 106 by a manufacturer of the first linked device106, by software operating on the first linked device 106, by anoperating system operating on the first linked device 106, through anetwork connection with the first linked device 106, or any combinationthereof.

In response to the central programming device 104 detecting the firstlinked device 106 with the stored designation, the central programmingdevice 104 may automatically generate a relational link between thefirst linked device 106 and the second linked device 108 based on thedesignation. In other examples, in response to detecting the firstlinked device 106 with the stored designation, the central programmingdevice 104 may trigger a prompt querying whether the user wants therelational link indicated by the stored designation to be generated. Thecentral programming device 104 will either generate the relational linkof the designation or suppress the generation of the relational link ofthe designation based on the response of the user.

As devices are assigned relational links, the central programming device104 may collect information regarding the devices being assigned therelational links. Some of the information that may be collectedregarding the devices being assigned the relational links may includedescription, designation, name, intended location, current location,communication originating from the devices, or any combination thereof.This information may allow the central programming device 104 toidentify the linked devices. In response to being assigned a relationallink, the linked devices may each be assigned a distinct token address,enabling identification and communication with a specific linked device.The central programming device 104 may continue to collect informationassociated with the linked devices while they reside in thecommunication area of the central programming device 104. Thisinformation may be added to the database mentioned above.

Once relational links are generated, a group of linked devices, such asfirst linked device 106 and second linked device 108, and the centralprogramming device 104 may be configured to communicate among eachother, as illustrated by communication lines 112, 114, and 116. Forexample, the first linked device 106 may be configured to access datastored on the central programming device 104, the second linked device108, or both.

Non-linked devices, such a non-linked device 110, may be prevented fromcommunicating with the central programming device 104 and the group oflinked devices. In some examples, the central programming device 104 andthe group of linked devices may embed communication among themselveswith additional, random bits, thereby preventing identification of theembedded communication without the receiving device having properdecoding information. The group of linked devices may be provided withthe proper decoding information for identifying the embeddedcommunication, whereas the non-linked device 110 may not be providedproper decoding information.

Central programming device 104 may further be configured to prevent thenon-linked device 110 from recognizing that the group of linked devicesand the central programming device 104 exist or that the centralprogramming device 104 and the group of linked devices are communicatingamong themselves. In some examples, an alert may be generated inresponse to the non-linked device 110 entering the geo-proximity fence102.

The central programming device 104 may generate a plurality ofrelational links, where each relational link may be associated withvarious groups of devices with each relational link having rulesassociated with the relational link. For example, the first linkeddevice 106 may belong to a group of linked devices that, in response toviolating an associated rule, will cause the first linked device 106 tolimit access to certain functionality of the device, whereas the secondlinked device 108 may belong to a second group of linked devices that,in response to violating an associated rule, will lock all functionalityof the device and prevent all users from accessing the device.

The rules associated with the relational links may be requested by auser of the proximity-based system or by default designations stored onone or more of the linked devices, such as first linked device 106 andsecond linked device 108. The user may generate a request for the ruleon the central programming device 104, on any of the linked device, orany combination thereof.

The designations may indicate a rule should be associated with one ormore of the linked devices. For example, the first linked device 106 mayhave a stored designation indicating that a rule should be defined wherethe first linked device 106 should be within a certain distance of thesecond linked device 108. The central programming device 104 may definethe rule in response either to detecting the first linked device 106 orin response to detecting a relational link being generated between thefirst linked device 106 and the second linked device 108. In someexamples, the central programming device 104 may query a user todetermine whether the rule should be defined. The central programmingdevice 104 would either define the rule or not define the rule based onthe response of the user to the query.

The central programming device 104 may define rules based on trackingselected wireless-enabled devices associated by a relational link. Thecentral programming device 104 may track the locations and operations ofthe selected devices and define a rule for the group of selected devicescorresponding to the results of the tracking. The central programmingdevice 104 may be configured to identify when the selected devices haveviolated a defined rule and determine whether to alter the rule or takeremedial action, such as generating an alert, based on any of thetracking data the central programming device 104 has acquired or theseverity of the violation.

An example of a rule that may be associated with a group of linkeddevices involves generating a geo-proximity fence 102 around the centralprogramming device 104, such as geo-proximity fence 102. Whilegeo-proximity fence 102 is illustrated as a circular area, it will beunderstood that geo-proximity fence 102 may comprise any shape and maybe defined in either or both horizontal and vertical directions. Forexample, the geo-proximity fence 102 may be configured to exist with itsborder along the perimeter of the house, such that the area inside thehouse is inside the geo-proximity fence 102 and the area outside thehouse is outside the geo-proximity fence 102. In institutional examples,such as businesses, schools, or government buildings, the geo-proximityfence 102 may be configured to have its border along the perimeter ofthe institutional building, or may be limited to a portion of theinstitutional building, thereby allowing multiple agencies or entitiesto exist in one building while still securing their information fromother agencies or entities in the same building.

Another example of a rule that may be associated with a group of linkeddevices involves defining the borders of the geo-proximity fence 102 inrelation to the group of linked devices. For example, the geo-proximityfence 102 may have a border defined as a certain distance from one ofthe linked devices, such as the first linked device 106, within thegroup. It may then be determined whether the rest of the linked deviceswithin the group are inside or outside the geo-proximity fence 102depending on the distance of the linked devices from the first linkeddevice 106.

A rule may define the borders of the geo-proximity fence 102 as acertain fixed area that may not include the central programming device104 within the borders of the geo-proximity fence 102. The geo-proximityfence 102 may then be able to define a certain area as the geo-proximityfence 102, irrespective of the current locations of the centralprogramming device 104 and the linked devices.

The borders of the geo-proximity fence 102 may be defined based on alocation identifier, such as an address of a building, a name of alocation or area, any other identifying label or characteristic, or anycombination thereof. A user may enter the location identifier into anyof the central programming device 104 or linked devices along with arequest that the borders of the geo-proximity fence 102 be defined basedon the building, location, area, or combination thereof, associated withthe location identifier. The central programming device 104 or any ofthe linked devices may access a database, such as an electronic phonebook or electronic maps, and set the borders of the geo-proximity fence102 based on spatial data retrieved from the database.

The borders of the geo-proximity fence 102 may alternatively be based ona map or floorplan illustrating the desired location of thegeo-proximity fence 102. The map or floorplan may be displayed to theuser on one or both of the central programming device 104 and the linkeddevices. The user may indicate an area on the displayed map or floorplanwhich the user desires the borders to encompass. The indication of thearea may include an indication of a room, a building, an areaencompassed by rectangle or other shape generated by the user on thedisplay of the map or floorplan, or any combination thereof. In responseto the indication, the central programming device 104 may set theborders of the geo-proximity fence 102 to encompass the indicated area.

In some examples, the border of the geo-proximity fence 102 may bedefined by physically moving the central programming device 104 todifferent locations and indicating on the central programming device 104that the current location is intended to be a border of thegeo-proximity fence 102. The border of geo-proximity fence 102 may bedefined by entering coordinates or distances from an object, such as thecentral programming device 104, in either or both of the horizontal andvertical directions at which the border of geo-proximity fence 102should be defined.

The border of the geo-proximity fence may also be defined by objects,such as defining objects 202, 204, 206, 208 illustrated in FIG. 2. Asthe defining objects 202, 204, 206, 208 move locations, the borders ofthe geo-proximity fence 210 may change correspondingly, thereby creatinga type of boundary fencing. The objects 202, 204, 206, 208 may comprisewireless-enabled devices, objects labeled with RFID tags, or otherobjects that the central programming device 104 may sense the objectposition. Further, the defining objects 202, 204, 206, 208 may comprisedevices that are not wireless-enabled, but have a geo-proximity plug, asdiscussed throughout this application, attached to the devices thatallows the central programming device 104 to determine a location of thedevices.

In some examples, a portion of the geo-proximity fence 210 may bedefined by the defining objects 202, 204, 206, 208 and another portionmay be defined in another manner. For example, the defining objects 202,204, 206, 208 may define the border of the geo-proximity fence 210 inthe horizontal direction, while the central programming device 104 maydefine the border of the geo-proximity fence 210 in the verticaldirection.

Further, certain areas within a defined border of geo-proximity fence,such as geo-proximity fence 102 (FIG. 1) or geo-proximity fence 210(FIG. 2), may be defined and labeled. For example, when the definedborder of the geo-proximity fence encompasses a house, areas encompassedby each of the rooms within the house may be defined and labeled. Thecentral programming device 104 or linked devices may define an areaencompassed by the room by accessing a floor plan of the house from adatabase or receiving spatial parameters from a user. The centralprogramming device 104 may further label the area with a label includedin the floor plan or a label provided by the user. Accordingly, an areaencompassed by a border of a geo-proximity fence may be furtherpartitioned into one or more defined areas recognized by either or bothof the central programming device 104 and the linked devices.

The central programming device 104, the linked devices within a group,or a combination of both may be configured to perform operations inresponse to violation of any of the rules associated with the relationallinks of the group. The operations may be suppressed by excusing aviolation of any or all of the rules.

In response to a violation of any of the rules, an alert may begenerated by the central programming device 104 or one of the linkeddevices in the group indicating that a rule has been violated. In someexamples, the alert may include an identification of which rule has beenviolated. The alert may be transmitted to the central programming device104, the linked devices in the group that did not violate the rule, orany combination thereof and the alert may be displayed on the device. Insome examples, the alert may be transmitted to an electronic deviceoutside of the linked devices, such as an electronic device associatedwith emergency service providers or other service providers.

The alert may be suppressed by excusing the violation of a rule eitherprior to the violation or in response to receiving an alert of theviolation. For example, the central programming device 104 may receivean indication that the first linked device 106 is being removed from thearea of the geo-proximity fence 102 and that an alert should not begenerated. Proof of authorization, such as entering of a pass code orsatisfying another relational link rule, may be required to indicatethat an alert should not be generated in response to a violation of arule.

The alert may further identify a location of the device that violatedthe rule. The identified location may help to rectify the violation. Forexample, if a linked device, such as first linked device 106, leaves thearea enclosed by geo-proximity fence 102, a user may be able to locatethe first linked device 106 and move the first linked device 106 back towithin the geo-proximity fence 102. Identification of the location mayalso assist a user in identifying theft of any of the linked devices andrecovering the stolen device.

In some examples, a linked device that violates a rule may be configuredto either lock access to the linked device or provide limitedfunctionality of the device. For example, in response to first linkeddevice 106 being outside the area of geo-proximity fence 102, firstlinked device 106 may prevent a user of the first linked device 106 fromaccessing information stored on the central programming device 104. Insome examples, a violation of a rule may lock access or provide limitedfunctionality to a portion of the linked devices, all of the linkeddevices, the central programming device 104, or any combination thereof.

In response to violation of a rule, central programming device 104 maybe configured to initiate a request to a third party or the linkeddevices to perform or not perform an action. For example, where a set ofkeys and a bank card have been assigned a relational link with a rulethat both the set of keys and bank card should be within geo-proximityfence 102 for the bank card to complete a credit charge, if the set ofkeys are not within the geo-proximity fence 102 when a credit charge isattempted with the bank charge, a request may be sent to the bank tolimit the purchases to a maximum value of twenty dollars.

In some examples, a linked device that violates a rule may be configuredto display a message on the device in response to the violation of therule. For example, the linked device may display “out of use area,”“stolen,” “lost property of ‘user's name,’” or any combination thereofin response to the violation. In some examples, a transparent decal maybe placed on the linked device, which appears transparent when thelinked device is not violating any rules and displays a message when thelinked device is violating a rule.

In some examples, a rule for a group of linked devices may allow accessto information, a device, or a secured location in response to the rulebeing satisfied. For example, a user's cell phone and key may be linkedin a group and, when the linked devices satisfy a rule of being within acertain distance of each other and a vehicle, access may be granted tothe vehicle and the vehicle may be operated. In response to the rulebeing violated, access to the vehicle may be denied and the car may notbe operated. In a further example, the vehicle may be equipped with avehicle security system, such as Onstar, that may further authenticatethe operator and, in response to failed authentication, may preventoperation of the vehicle and initiate an alert to a third party, such ascustomer service of the vehicle security system or law enforcement, thatimproper access has been gained to the vehicle. A rule may grant orrestrict access to vehicles, computing systems, computing devices,telecommunications equipment, household appliances, office equipment,entry doors, elevators, operation of heavy equipment, and other areas orobjects where authorization is desired for access.

In examples where greater security is desired, an activation key code, apass code, biometric data, or any combination thereof may be added as anadditional layer of protection. The activation key code or pass code maybe desired where the information or area being accessed is highlysensitive. Examples where an activation key code or pass code may bedesired includes healthcare information, governmental information,workstations containing information vital to commercial interests, andlocations and information having great monetary value.

In some examples, the central programming device 104 may store certaininformation that may be accessible by a wireless-enabled device throughremote access without requiring the device to have a relational linkwith the central programming device. Access may be gained through proofof authority to access through such authentication techniques as entryof a pass code, biometric data, etc. This type of access may allow auser to access data related to product enrollment when shopping, therebyimproving the efficiency of the process of restocking items that areneeded and avoiding over purchasing of items already identified as beingwithin a geo-proximity fence associated with the user.

Further, the wireless-enabled device with remote access may beconfigured to request generation of relational links, request definitionof rules associated with the relational links, request modification ofany existing relational links or rules, or any combination thereof froma remote location. For example, a user on vacation may access thecentral programming device 104 through the wireless-enabled device withremote access and request a rule be modified to require higher securitymeasures for access to a secure location or to prevent access to thesecure location. This may allow a user to increase security measureswhile away from the proximity-based system.

A rule may be assigned that initiates an operation upon entry or exit ofa linked device into the geo-proximity fence 102. In some examples, therest of the linked devices and the central programming device 104 may berequired to be within the geo-proximity fence 102 for the operation toinitiate in response to the entry or exit of the linked device. Someexamples of the operations that may be initiated include calling anelevator, turning on the lights in a room, and turning off the lights ina room.

In some examples, once of a violation of a rule has been rectified suchthat no rules are being violated, the network may automaticallytransition to a state of operation associated with all the rules beingsatisfied. For example, if first linked device 106 was outsidegeo-proximity fence 102 which resulted in violation of a rule preventingaccess to the device, once the first linked device reentered thegeo-proximity fence 102 the first linked device may automatically regainfull functionality. In other examples, a pass code entry may be requiredbefore regaining full functionality after rectifying all ruleviolations.

FIG. 3 illustrates an example network comprising linked devices. In thisexample network, there may be no central programming device 104 (FIG. 1)or the central programming device 104 may not be part of the linkedgroup. In this network, one of the linked devices, such as first linkeddevice 304 may act as a token performing the operations of the centralprogramming device 104 (FIG. 1). In some examples, the token may performthe monitoring operations of the central programming device 104 (FIG. 1)and a central programming device 316 separate from the linked group mayperform the operations of assigning the web-enabled devices withrelational links, defining rules for the group of linked devices, or anycombination thereof. The token may be configured to perform any portionof the operations performed by central programming device 104 (FIG. 1)and the remainder of the operations may be performed by centralprogramming device 316.

The token may comprise an object associated with a root authorization(subnet) address that may support stationary architectures, mobilearchitectures, or both. A token assignment may be generated by thecentral programming device 316. The token may be able to collectinformation from the linked devices and store the information for lateraccess or use the information to perform operations, such as trackingthe linked devices and determining if a rule is satisfied.

Geo-proximity fence 302 may be defined in relation to the first linkeddevice 304 operating as a token. For example, the border ofgeo-proximity fence 302 may be set to a certain distance from firstlinked device 304. In the example situation, second linked device 306and third linked device 308 may be required to be within the border ofgeo-proximity fence 302 to satisfy a defined rule. In some examples, thesecond linked device 306 and the third linked device 308 may beconfigured to function minimally or not at all when the devices areoutside of geo-proximity fence 302. Upon reentry into the border ofgeo-proximity fence 302, the second linked device 306 and the thirdlinked device 308 may automatically return to normal operation or mayrequire entry of a pass code to return to normal operation upon reentry.

FIG. 4 illustrates an example network comprising a first token 412 and asecond token 422. A network may be configured to have multiple tokens.Each token may be assigned relational links to a group ofwireless-enabled devices. The group of wireless-enabled devices assignedto a token may comprise devices that are not relationally linked withany other token or the devices may share relational links with multipletokens.

Where multiple tokens have been assigned, the token and group ofassociated wireless-enabled devices may be utilized to identify a userassociated with the token. First token 412, first linked device 414, andsecond linked device 416 may comprise a first linked group associatedwith a first user 410, whereas second token 422, third linked device424, and fourth linked device 426 may comprise a second linked groupassociated with a second user 420. In examples where the linked groupmay provide access to secured data or a location, it may be determinedwhich user is gaining access based on which group of linked devices wassatisfying the rule allowing access at the time access was granted.

In some examples, central programming device 402 may determine whichuser was granted access to the secured data or location. The centralprogramming device 402 may generate a log of users who accessed thesecured data or location. The log may be reviewed later to determine whoaccessed the secured data or location at a given time and may be used todetermine who performed an unauthorized activity.

In networks configured for multiple tokens, a master account option mayexist allowing control over rules, relational links, information, or anycombination thereof associated with all, or a portion, of the tokens.The master account option may allow the central programming device 402to act as an administrator granting or denying access to a tokenassociated with a particular user.

Any of the examples disclosed may allow the central programming deviceto be physically reset. The physical reset may operate to reset therelational links, the rules associated with the relational links, theassignment of tokens, or any combination thereof. The physical reset maybe useful where a user has forgotten a pass code for access to thecentral programming device or would like to start fresh in generatingthe relational links.

In response to the physical reset, central programming device may allowa selection of several options. These options may comprise ending thegeo-proximity lock, removing the token and making the centralprogramming device the token, allowing another linked device to serve asthe token, allowing two or more devices to pair as a field that allowstheir use while outside of the geo-proximity location, or anycombination thereof.

FIG. 5 illustrates an example network tracking objects entering ageo-proximity fence 502 associated with a token 504. Token 504 may haverelational links with wireless-enabled devices, such as first linkeddevice 506 and second linked device 508. In some examples, token 504 maybe configured to track objects entering and exiting the geo-proximityfence 502 when all rules associated with group of linked objects aresatisfied and configured not to track the objects when any of the rulesare being violated.

First object 510 and second object 512 may be moved into and out of thegeo-proximity fence 502. Both the first object 510 and the second object512 may be assigned distinct token addresses upon entry into thegeo-proximity fence 502. The token addresses may be used for trackingthe first object 510 and the second object 512 while each is locatedwithin the geo-proximity fence 502.

Alerts may be generated in response to any of the objects entering orexiting the geo-proximity fence 502. For example, the first object 510enters the geo-proximity fence 502. In response to entering thegeo-proximity fence, information associated with the first object 510may be captured or recorded by the token 504 and an alert may begenerated indicating a new object has entered the geo-proximity fence502. The second object 512 exits the geo-proximity fence 502. Inresponse to exiting the geo-proximity fence 502, information associatedwith the second object may be captured or recorded and an alert may begenerated indicating the second object 512 exited the geo-proximityfence 502.

While in the geo-proximity fence 502, the first object 510 and thesecond object 512 may be tracked. A record of the objects within thegeo-proximity fence 502 may be maintained and accessed. One examplewhere the record may be useful is when a user is trying to determinewhether a particular bathroom, enabled with a geo-proximity fence 502,has hand soap and the amount of hand soap that is present. Information,such as location, state, or any combination thereof of an object, may begathered while the object is within the geo-proximity fence 502. Thisdata may be stored in a database.

In some examples, information about an object may be provided by a thirdparty, such as retailers, wholesalers, and manufacturers. For example, aretailer may provide an expiration date associated with a carton ofmilk. Upon entry of the carton of milk into the geo-proximity fence, areminder may be generated for the expiration date and an alert may begenerated if the carton of milk remains in the geo-proximity fence 502past the expiration date.

Further, the information about the object may include a purpose or afunction of the object. A user may also be able to define the purpose orfunction of the object if not included in the information, or may alterthe purpose or function of the object acquired from the information.

The proximity-based system may determine an expected location of theobject based on the purpose or function of the object. For example, theobject may be toothpaste, which has a defined function of being used forbrushing teeth, and, accordingly will have an expected location of beingwithin a defined bathroom partition of the geo-proximity fence 502associated with a user brushing his teeth.

In some examples, the user may define an expected location correspondingto the purpose or function of the object. The proximity-based system maythen be able to determine the expected location of the object based onthe purpose or function of the object and the user-defined expectedlocation corresponding to the purpose or function.

In response to detecting that an object is outside of its expectedlocation, the proximity-based system may generate an alert on any, or acombination, of the central processing device, token, or linked devicesindicating the object should be returned to its expected location. Auser may then return the object to the expected position causing thealert to cease or the user may excuse the alert, thereby ceasing thealert.

In some examples, the user may request indication of a location of acertain object. The user may input a label associated with the certainobject into any, or a combination, of the central processing device orlinked devices and request from the proximity-based system an indicationof the location of the certain object. In response, the proximity-basedsystem may return the location of the certain object based on trackingof the object by the proximity-based system. In examples where theproximity-based system has not been tracking or is unable to accesstracking information concerning the object for some reason, theproximity-based system may return the expected location based on thepurpose or function of the object. The location may then be displayed tothe user on the device generating the request for the indication of thelocation.

One method of tracking objects is through passive radio frequencyidentification (RFID) technology. The central programming device, token,or both may incorporate RFID tag reading capability. RFID tags may beplaced on objects, thereby allowing identification of the object. Anyobject labeled with an RFID tag may perform some of the same functionsas the wireless-enabled devices discussed throughout this specification.The RFID tags may contain information regarding the object, which may beread by the central programming device or the token. The centralprogramming device, the token, or both may be configured to link withcommercially available RFID readers to allow upload of data to thecentral programming device or the token.

RFID tags may allow objects brought into the geo-proximity fence 502 tohave their locations mapped. Information associated with an object maybe communicated by the RFID tags. The information may include when anobject is discarded or when expiration dates are exceeded. An alert maybe generated in response to the discarding or the expiration date beingexceeded.

The RFID tag may contain information allowing the object to be matchedwith objects within a directory of RFID consumer product information,making the process or enrollment of the object when entering thegeo-proximity fence 502 easier. In some examples, a directory ofmanufacturer skew codes may be stored or accessible by a centralprogramming device also simplifying the process or enrollment of anobject entering the geo-proximity fence 502.

The network, when linked to items such as the RFID and SKU codes onwrappers, containers for food or appliances, may manage product use andconsumption life cycle of an object. Reports may be generated from themeasured product use and consumption life cycle of an object. Further,it may be pre-determined which object would be of such importance thatreminders are required to be sent to prompt for replacement of thediscarded object.

The central programming device or token may be configured to gather andstore all information and data obtained during operation, includinginformation and data related to the linked devices and the objects. Theinformation and data may be analyzed and used to generate reports thatmay be used for such things as determining consumption of the objects,use of the linked devices and the objects, and movement of the linkeddevices and the objects. In some examples, the central programmingdevice or token may be configured to analyze a selected portion of thegathered information and data. The gathering and storing of theinformation and data may be beneficial in accounting of consumablegoods, determining depreciation of equipment, and determining whatequipment is used, how often the equipment is used, how the equipment isused, and where the equipment is used. Routines may be identified fromthe analyzed information and data, and the network configuration may beoptimized based on the identified routines.

In some examples, the stored information and data regarding enrollment,removal of items, and changes in token status or assignments may beretained unless an authorized request is received. The authorizedrequest may be required to be initiated by a particular centralprogramming device or token, or by a user with an authorized pass code.The request may indicate which portions of the stored information anddata should be erased, while the non-indicated information and data isretained. This indication may be beneficial in managing consumables,such as food, cleaning supplies, equipment, and clothing, while allowinga user to erase sensitive, personal or proprietary information.

FIG. 6 is a flow chart illustrating the process of generating a group oflinked devices. Step 602 begins by enrolling a wireless-enabled device.The process of enrolling a device may comprise communicating with thewireless-enabled device and assigning the wireless-enabled device aunique address, such as a unique IPV6 address.

Step 604 generates a relational link between the enrolledwireless-enabled device and a group of one or more other devices. Step606 checks if there are more wireless-enabled devices to be enrolled andrepeats steps 602 and 604 for the new device. Once enrolling of thedevices has been completed, one or more rules may be assigned to eachgroup of linked devices in step 608. Step 608 may include the process ofgenerating a geo-proximity fence if necessary to enforce the rule. Everyrelational link within a group of devices is dynamic such that a newwireless-enabled device can be added to a group of linked devices byrepeating the process at any time.

Some additional illustrative examples of rules may include thefollowing. Rules Type 1 for Secure Access Control:

In this example, access to a particular work computer is controlled. Forthis purpose, multiple wireless-enabled devices may be linked. Forexample, a company-issued mobile device like a smartphone may associatedwith the work computer. In addition, a user's company-issuedwireless-enabled ID Badge (NFC, BT, pin-chip, etc.) may be associatedwith the work computer.

The computer to be secured may be linked to the smartphone; conversely,the smartphone may be assigned to that specific computer. Rules may beimplemented in various combinations. In one example, the computer is thecontrol device for the smartphone, and the smartphone is the control forthe ID Badge. In other cases, the ID Badge may be enabled or operableonly while within a predetermined physical proximity of the smartphone.Any device may be required to be present to enable any other device. Twoor more devices may be grouped as described so than each one is lockedwithout the other(s) present (within proximity range). A range of accesspurposes for an office can be enabled using the smartphone and ID Badgewhen paired with another device or item. For example, a Rule may Controlaccess to a copier while also assigning the copies made to a log.

Another Rule may limit the distance that one device can physically befrom the other for the two to function as a component of a key. Forexample, my ID Badge, only while sufficiently close to my smartphone,may enable unlocking or operating a motor vehicle.

Rules Type 2 Mapping an area for tracking items.

Step 1—Create a virtual boundary using programmable tags that areassigned to a central programming unit.

Step 2—Tags are assigned a name that could be an area: living room, den,bedroom master, bedroom children, bathroom etc.

Step 3—place tags—tags with the same address e.g. master bedroom.

Step 4—items in proximity of the addressed tags are catalogued as beingin that address location.

Step 5—Items in each location can be tagged with unique information.

Finding keys with an existing item identifier or one created by theuser. The keyring is logged by the programming unit.

The user asks the system where the keys are. Based on the address spacesin the area and the tag nearest the keyring the information is provided.“Couch living room.”

Rules Type—3—The “one foot rule” for small, tagged items linked to amobile device. An umbrella is linked to a mobile digital device. Therule is 1 foot and if broken the sound of thunder communicates that theumbrella is outside of the rule. In other words, the user is about toleave the umbrella in the restaurant or elsewhere. Loss is prevented.

If the control device is a smartphone and it was being left, it cantrigger a “please don't leave me” message in the user's pre-recordedvoice.

FIG. 7 is a flow chart illustrating the process of monitoring a group oflinked devices. At step 702, a central programming device or tokenqueries a group of linked devices for current status. The queries may becontinuously performed, performed at specified intervals, performed uponrequest, or any combination thereof. Status information may include, butis not limited to, the location of the queried device, current operationof the device, historical operation of the device, and a log ofoperators who have accessed the device.

In step 704, the central programming device or token determines whethera rule has been violated based on the status information. If no rule hasbeen violated, the flow returns to step 702 and continues querying thelinked devices. If a rule has been violated, the flow continues to step706 where the central programming device or the token determines if theviolation has been excused. If the violation has been excused, the flowreturns to step 702 and continues querying the linked devices.

If a rule has been violated and the violation has not been excused, theflow continues to step 708 where the central programming device or thetoken performs remedial operations. The remedial operations may compriseany one or a combination of the operations discussed above in responseto a violation, including generating an alert.

The flow continues to step 710 where the current status of the linkeddevices is queried. In step 712, the central programming device or thetoken determines if the violation has been rectified. If the violationhas not been rectified, the flow will return to step 706, wherein thenetwork will again check if the violation has been excused after theremedial operations have been performed. If the violation has beenrectified, the flow will continue to step 714 where the group of linkeddevices and the central programming device or token will reenter normaloperation.

Example Applications of the System

In some examples, the subject matter described herein may be used forlaw enforcement purposes. The subject matter may support transparencyand protection of service for law enforcement officers through the useof video surveillance technology in civilly protected activityfacilitated by law enforcement as well as the conduct of routine lawenforcement duties.

The video and audio recording technology may be geo-location andproximity controlled. By linking it to vehicle(s), building(s), radiusdefined area, or set of physical states of one or more devices cancontrol the operation of audio, video recording technology or othertechnology intended to document. Video and audio technology, or othertechnology, may have reinforced components as well as being water andshock/impact resistant. The video and audio technology may have lens andaudio data compression optimization as well as lens rotation being 180degrees. The video technology may capture images with a field of view of180 degrees and may begin capturing the images in response to specificphysical states and/or changes in the physical state of vehicle(s),building(s), one or more devices, or some combination thereof. In someexamples, the video technology may begin capturing the images inresponse to detecting motion, specific objects, devices, linked devices,or some combination thereof, within a radius defined area. In someexamples, the audio technology may include audio optimization technologyto allow to the greatest extent possible voice identification and speechrecognition.

Use of video and audio recording technology for law enforcement may bemanaged by actions, wearer's or user's physical condition and/orlocation of individual assigned the technology. Unique identifiers maybe established by geo-location and proximity to linked law enforcementequipment assigned to an officer or vehicle.

In some examples, the video and audio recording technology may be usedfor body biometric and health monitoring tech on the condition of theofficer.

Body and/or dash camera(s) may be activated should perspiration, heartand respiratory rate increase to a defined threshold that indicatesexertion, or distress. Equipment, clothing, or some combination thereof,worn by the officer may include sensors to measure the perspiration, theheart rate, the respiratory rate, or some combination thereof, of theofficer. The measurements may be transmitted to the body camera(s), thedash camera(s), the CPD, a linked device, or some combination thereof,which may determine if the measurements exceed the defined threshold andactivate the body camera(s) and the dash camera(s).

The body camera may activate recording features when the door of a carlinked to the technology is opened, firearm, taser, baton, mace,handcuffs, or other equipment used in defense or for the purposes ofrestraining a suspect is removed from its holster as well as whenphysical condition of officer indicates distress or exertion. The doorof the car, the firearm, the taser, the baton, the mace, the handcuffs,or other similar equipment (collectively, ‘equipment’) may be equippedwith a token, a geo-proximity plug, or some combination thereof, thatmay be used to detect a position of equipment. The body camera and/ordash camera may be activated in response to detecting the position ofthe equipment is not within a default position, such as within aholster. In some examples, a sensor may be affixed to the equipment or aholder of the equipment that may detect when the equipment is removedfrom the default position. The body camera and/or dash camera may beactivated in response to detecting that the equipment that is removedfrom the default position. Further, in some examples, the token,geo-proximity plug, sensor, or some combination thereof may detectmotion of the equipment and determine that the equipment is not in thedefault position based on the movement.

Audio recording may be on a 20 second loop and if one of theaforementioned triggering conditions occur the audio recordingtechnology may transition to record mode picking up sound starting at 20seconds prior to triggering event.

Live video feed may be up linked to remote server. Server may sendalerts on the geo-location, physical condition of the officer todesignated personnel. Feeds may be downloaded as public record routinelyfor auditing purposes, training and oversight management functions.

Hand cuffs or restraints, when engaged, may record and transmit physicalstate of person on which they are placed. The hand cuffs and/orrestraints may include one or more sensors that may measure the physicalstate of the person on which they are placed, including perspiration,heart rate, pulse rate, respiratory rate, or some combination thereof.

Taser may record discharge, position of person, data associated with thedischarge (such as a voltage level and/or current of the discharge, andduration of the discharge), or some combination thereof. The taser maybe wireless-enabled and may be linked to another linked device, the CPD,a communication system in a vehicle (such as a police vehicle), or somecombination thereof. The taser may transmit an indication that the taserhas been discharged, the position of the person that the taser was usedupon, and/or the data associated with the discharge to the linkeddevice, the CPD, a communication system in a vehicle (such as a policevehicle), or some combination thereof, which may record the indicationand/or position of the person.

Further, in some examples, the taser may include a memory device thatmay store indications of when the taser has been discharged, thelocation of the person that the taser was used upon, and/or the dataassociated with the discharge. In these examples, the taser may not bewireless-enabled.

Further, the hand cuffs, restraints, and/or taser may reduce chafe ifprone and reaction indicate diminished physical condition. Handcuffstension and contact with skin may generate alerts tooffer/officer/transport communication system. An additional, piece ofequipment could include a bib vest that can be placed on the personbeing restrained to collect physiological data for the record of thearrest or detention to report on the persons general condition duringthe time of custody. The bib vest may include one or more sensors tosense the physiological data to be stored by a memory device.

In some examples, the subject matter disclosed herein may be used forcourt-ordered home incarceration, for non-violent offenders, or somecombination thereof. The system my identify the geographic locationwhere a person is to remain and the conditions for movement within andoutside of the structure to assure compliance with sentencing. Thecentral programming device may be installed with the parameters of andlength of time for the court-ordered supervision. The device may provideuplinks of data to the incarceration system and routine reports to thecourts on the progress of the incarceration.

For example, a person may be sentenced to serve 10 weeks of homeincarceration. They may be fitted with a device that cannot be removedwithout approval and the correct technology to establish theiridentification and primary geographic fixed location. The court canestablish condition that set the dates and times of day the person maybe within the proximity of the device and establish a second location ofoperation should the person be allowed to continue employment. Further,the system may establish certain days or dates for activities, such asshopping; community service; pick up children, run errands or carryoutnecessary tasks of personal maintenance. While away from the main placeof confinement, data may be collected on the locations where the persontravels; and may report departure and rerun data including conditionsrelated to weather, traffic or physical conditions of travel that mayimpact travel time. At the end of the enrollment/confinement period thedevice may deactivate and a retrieve message may be sent to its issuinghome base unit.

In some examples, a Proximity-Based System that Secure Linked IP EnabledDevices Control may allow for viewing of sensitive information or mayrestrict access to data should an unauthorized person come intoproximity of the device.

For example, a person working at a computer screen in the workplace onsensitive information is approached by someone with an employee badgewith a wireless sensor that does not have the appropriate credentialsthat would allow the holder to view the data on the screen. The screenmay automatically dim slowly to darken based upon how close the personis to the screen. The changes being made in a graduated way may allowthe user to be made aware that the data is sensitive and the personapproaching is not approved to see the information. This may reinforcedata security protocols.

In some examples, a Proximity-Based System that Secure Linked IP EnabledDevices may provide for access to fleet or individual vehicles of allmakes or models from cars to heavy duty trucks as well as situationswhere access to mass transit vehicles may be controlled.

The geo-location, credentials held by the user and the enabling token,that can be given at the time, may permit live activation of a few hoursor days depending on the assignment. The token can be programmed to workfor a certain number of hours each day or to ensure set break intervalsare observed. The consumer vehicle model may allow more autonomy ondecisions regarding use and access.

For example, upon approaching the vehicle the doors may unlock, uponentering, sensors on the set may register that the weight of the personmatches the token holder, if it does not, the doors may lock and acommunication may be sent to further identify the user—a call to a cellowned by the user may be the first step to confirm identification. Uponconfirmation of identification of the vehicle may start and could beoperated without restriction.

In some examples, a Proximity-Based System that Secure Linked IP EnabledDevices may provide mapping of interior spaces to locate items and allowalerting to identify the location of an item. When seeking to locate anitem that shares a link, a location of the item may be indicated bydigital graphic display, auditory, visual, or resonance (vibration) thatmay allow a range of options for locating an item that is paired orabout to be left behind.

A user may un-enroll an item by entering a code on the controllingdevice while away from a central controlling device. The item may beremoved from the central control device to become permanentlyde-enrolled. This feature may allow for temporary use or loan of an itemthat should be returned. The process may allow for the calendaring ofthe loan, and inclusion of information on last known location, as wellas identification of the person or persons with the device and theintended date of return.

In examples, a Proximity-Based System that Secure Linked IP EnabledDevices may be used for military application. Those serving in a unitmay have the ability to link individuals and the gear they carry toidentify to whom each item belongs as well as the individuals in theunit by duty or role to be filled. The system may eliminate the need forvisual confirmation to assure security of the unit and the cohesion ofeffort.

The proximity sense may allow silent sentry to activate to alert whenconditions change that may pose a risk, such as the approach of a warmblooded person or thing over 40 pounds. Sensors may also perform thedetermination of changing weather conditions in advance to alert tochanges in preparedness to accommodate changes the environment. Thesystem may allow identification of friends and foes. The system mayinclude one or more devices (including wireless-enabled devices), tags,tokens, or some combination thereof, deployed around a circumference ofan area to be monitored. The devices may be designed to operate within arange of climates and/or terrains. The one or more devices may detectmotion or other activity within the area and transmit indications of thedetected motion or activity to the CPD or linked device(s). The CPD orlinked device(s) may initiate an alarm (such as displaying a warning onthe CPD or linked device(s) or producing a sound) in response toreceiving the indications of the detected motion or activity. Further,the devices may be distributed in an area may can work together to forman artificial surface to communicate travel over an area that collectsdata on size and mass, stride for animals or people—large or small,

Physical condition of unit members may be determined using sensors onuniforms or equipment to allow quick response to medical emergencies andadvanced notice of a threat posed to the unit because one of its membersis in distress. The system may differentiate between mortal threats androutine non-threatening data input from bio-medical reading data off ofuniforms.

The data feedback can reinforce routines to enhance or maintainreadiness by promoting physical fitness routines, and security andsafety measures while away from large numbers of military personnel.

In some examples, a Proximity-Based System that Secure Linked IP EnabledDevices may Support rescues in high risk or crisis situations. In someexamples, the system may be used in certain events when it may not bereadily known where persons who are savable may be located such as afteran earthquake. The system may include one or more devices (such aslinked devices, the CPD, or some combination thereof) that may detectthe earthquake based on vibrations of the devices. In some examples, thedevices may be incorporated into building construction, equipment foundwithin structures, or some combination thereof. The devices may includesensors to measure the vibrations of the devices and may determine thatan earthquake has occurred based on the vibrations exceeding a certainmagnitude. Further, the system may identify whether multiple deviceswithin a certain proximity of each other measured vibrations exceedingthe certain magnitude and may determine, based on the multiple devicesexceeding the certain magnitude, whether the measurement of one of thedevices was a false reading, a geographical area affected by theearthquake, or some combination thereof. FIG. 8 illustrates an examplenetwork comprising a central programming device 104 and linked devices106, 108 having vibration sensors 802, 804.

The sensor network feature may support the remote reporting of signs oflife that can determine human from animal and may help in focusingefforts where they are most beneficial. The devices within the systemmay sense sounds, movement, physiological data, or similar data thatindicate signs of life. FIG. 8 illustrates sensors 808, 810 which maycomprise one or more of the types mentioned. The devices may transmitthe sensed data to other linked devices, the CPD, or some combinationthereof, which may determine locations of the devices that have senseddata indicating signs of life and display the locations to a user. Theother linked devices and/or the CPD may be designed to detect low levelintermittent communications. The locations of the devices may be basedon triangulation to determine locations of the devices.

Further, the system may identify other wireless-enabled devices withinthe geographical area affected by the earthquake and enroll the otherwireless-enabled devices as linked devices. The system may query theother wireless-enabled devices for data that may indicate signs of lifeand the locations of the other wireless-enabled devices. Turning everycellphone, wireless device or other sensor embedded device into a singlenetwork focused on listening for human sounds either autonomic, vocal orphysiological, or biological can be used to identify where resourcesshould be concentrate for the greatest success of live rescues. Thesystem may be used in the case of a major event. All sensors, or someportion thereof, can be co-opted into a major sensor network searchingfor information in a data range associated with human life signs. Thedata may include mobility, geophysical location and may determine if theperson is in distress based on restrictions of movement such as whatoccurs in a building collapse.

The system may collect data and communicate detailed health conditiondata to first responders, medical interface technology, or trustedcommunication systems.

The system may interface with disaster response and recovery systems tofacilitate rescue, or the accurate determination of where persons may beor have been to support rescue and recovery efforts.

The system may engage in life sustaining actions that are intended toextend life such as determining the immediate environmental conditionsaround a person who may be trapped or injured and report onhospitability of the environment to sustaining life.

Drones from the smallest to the largest types may be employed to supportthe provision of assistance, such as determining if there is a source ofsafe breathable air, nearest source of drinkable water, and whensupplied of essential life saving resources of deemed to limited thesystem may determine the path through the collapsed or partiallycollapsed structure between rescuers and the victim.

A distributed system wide assessment of all collapsed, partiallycollapsed or damaged structures with persons who may be injured ortrapped may to support the triaging of rescues.

The system may communicate routes for paths to a victim and generatemapping services to guide drone technology to the victim, makeassessments related to rescue efforts, and provide life sustaining aid.

System may monitor and report on health and physical condition and maycommunicate changes that are relevant to the rescue or sustaining oflife.

System may mange the acquisition of resources for the task of rescue orprovision of life sustaining efforts.

In large scale events the system may use block chain to secure thesystem and provide a defined period of automated functions for thesystem given a set of facts that are determined to mean an event of suchsignificance that first responder response may be days or longer.

The system can be designed to send and receive information from rescueanimals and support automated engagement with animals to assist with therescue.

The system may engage in actions to mitigate the emotional andpsychological distress that a person trapped might experience.

The system may be used for care of children, mentally disabled withcognitive disabilities as well those who suffer from dementia, Alzheimerearly onset or late stage can engage in activity described as wanderingwhere they may leave a safe place and place themselves at risk forinjury or worse.

The Geo-Proximity Security system can allow the fixing of beacons onclothing or in the form of jewelry that will aid in monitoring thelocation of a person within a fixed geographic area. For example, achild who lives in a home may have places in the home deemed to beunsafe, like a kitchen. If the child moves toward an unsafe zone aroundthe kitchen the parent or guardian may be notified so that they couldintervene prior to them reaching the kitchen or area that is off limits.The beacon can also be designed to detect submersion in water orproximity to heat to also alert parents or guardians of the child'slocation and may allow them time to reach them. This feature, joinedwith the proximity guard, can enhance child safety.

Further, persons with cognitive disabilities, such as if they are as aresult of accident or illness, the same geo-proximity technology maydisable appliances, automobiles and other technology that if used maylead to injury.

The proximity features can allow a person to move inside and outside ofa structure, but may alert if they travel to a point deemed to be unsafeor out of bounds.

The beacons may be designed to detect weather or environmentalconditions to allow interventions based on health and safety. In casessuch as where a home is too cold or too warm or a child accidentallyleft in a car, the system may alert attention by engaging the flashinglights and horn as well as send a text to E-911 as well as call asupervising adult for help.

The many uses of this technology can make a difference between tragedyand rescue.

In some examples, the system may link mobile tags of an item andcontrolling device to map applications to facilitate navigation to wherethe tagged item is located. In some examples, the system may provide fortwo-way voice communications to support recovery if item.

In some examples, the system may be used for pet management. A petcollar may be fitted with a tag that may allow the system to identifywhere the pet is in a perimeter in doors or outdoors. The system may beable to identify where the pet is in an area geo-tags that are linked tocreate a perimeter. The system may generate an alert if pet is too farfrom a controlling device. The system may use a mapping application toidentify where the pet is and may provide directions on how to reachthem. In some examples, an additional feature may allow two way voicecommunications to support recovery or control of pet when out of visualrange.

Items tagged that are separated or break rule(s) may give notice to theuser. For example, an umbrella could be tagged with a Bluetooth tag anda smartphone app may give notice to the user that they were leaving theitem. Items could include a token or device that may detect if a wallet,purse, backpack, or other item was being left behind. Further, an itemcould be located within the group-proximity fence through the trackingand monitoring claims. For example, the location could be determined bygeo-proximity to other tokens or wireless enable devices based onpredefined rule(s).

It will be obvious to those having skill in the art that many changesmay be made to the details of the above-described embodiments withoutdeparting from the underlying principles of the invention.

The invention claimed is:
 1. A system comprising: a central programmingdevice (“CPD”); and a plurality of wireless-enabled devices each capableof wireless communication with the CPD and with one or more of the otherwireless-enabled devices, and wherein each of the wireless-enableddevices is configured to report its location by wireless communication,and wherein as least some of the wireless-enabled devices include asensor to measure vibration of the device; the CPD including aprocessing device and a memory device having instructions storedtherein, wherein the instructions, in response to execution by theprocessing device, cause the CPD, utilizing wireless communications, to:detect a plurality of wireless-enabled devices within a communicationarea of the central programming device; identify and enroll theplurality of wireless-enabled devices; acquire current locations of eachof the enrolled devices; generate a geo-proximity fence that encompassesan area defined by the current locations of at least some of theenrolled wireless-enabled devices; assign a relational link among atleast two of the enrolled wireless-enabled devices to enablecommunications among them; define an operating rule and associate therule to the assigned relational link to permit the communications onlyamong enrolled devices while their current locations are within thegeo-proximity fence; based on the assigned relational links and definedrules, configure the enrolled devices to communicate with each other,and with the CPD when it is available, to collect vibration data fromthe enrolled devices; utilizing permitted communications, acquirevibration sensor measurements from at least some of the enrolleddevices; analyze the acquired vibration sensor measurements; and take apredetermined action based on the analysis.
 2. The system of claim 1wherein the stored instructions, in response to execution by theprocessing device, further cause the CPD to initiate an alarm in a casethat the analysis of the vibration sensor measurements indicates anearthquake.
 3. The system of claim 2 wherein the alarm includes anindication of a geographical area associated with the earthquake basedon the current locations of the enrolled devices that provided vibrationsensor measurements to the CPD.
 4. The system of claim 2 wherein thestored instructions, in response to execution by the processing device,further cause the CPD to identify other wireless-enabled devices withinthe geographical area affected by the earthquake and enroll the otherwireless-enabled devices as linked devices.
 5. The system of claim 1wherein at least some of the enrolled devices that include a vibrationsensor are configured to push vibration measurement data to the CPDresponsive to the vibration measurement exceeding a predeterminedthreshold value.
 6. The system of claim 1 wherein the storedinstructions, in response to execution by the processing device, furthercause the CPD to poll the enrolled devices to collect vibrationmeasurement data.
 7. The system of claim 1 wherein the storedinstructions, in response to execution by the processing device, furthercause the CPD to compare the vibration measurements across multipleenrolled devices that are within a selected distance of each other; andbased on the comparison, exclude at least one of the measurements as afalse reading.
 8. The system of claim 1 wherein at least some of theenrolled devices are portable.
 9. The system of claim 1 wherein at leastsome of the enrolled devices are arranged to detect low levelintermittent wireless signals associated with one of the enrolleddevices and to report the detection to the CPD; and wherein the storedinstructions, in response to execution by the processing device, furthercause the CPD to utilize triangulation among the locations of detectedlow level or intermittent wireless signals to determine a location of alinked device that may be damaged or in a low-power condition.
 10. Thesystem of claim 1 wherein at least some of the enrolled devices areincorporated into building construction, so that they have fixedlocations, and the CPD is portable.
 11. The system of claim 1 wherein:at least one of the enrolled devices includes at least one sensor todetect signs of life based on one or more of sounds, movement, andphysiological data; and the stored instructions, in response toexecution by the processing device, further cause the CPD to acquiresigns-of-life indicia and current location data from at least one of theenrolled devices, and based on the acquired data, store, display and/ortransmit the indicia and location data.
 12. The system of claim 11wherein the enrolled device is associated with a user, and the CPD isconfigured to identify the associated user and report it along with thesigns-of-life indicia and location data.
 13. A method comprising:detecting a plurality of wireless-enabled devices within a communicationarea of a central programming device (“CPD”); identifying and enrollingthe plurality of wireless-enabled devices; acquiring current locationsof each of the enrolled devices; generating a geo-proximity fence thatencompasses an area defined by the current locations of at least some ofthe enrolled wireless-enabled devices; assigning a relational link amongat least two of the enrolled wireless-enabled devices to enablecommunications among them; defining a rule and associating the rule tothe assigned relational link to permit the communications only amongenrolled devices while their current locations are within thegeo-proximity fence; based on the assigned relational links and definedrules, configuring the enrolled devices to communicate with each other,and with the CPD when it is available, to collect vibration data fromthe enrolled devices; utilizing permitted communications, acquiringvibration sensor measurements from at least some of the enrolleddevices; analyzing the acquired vibration sensor measurements; andtaking a predetermined action based on the analysis.
 14. The method ofclaim 13 and further comprising initiating an alarm in a case that theanalysis of the vibration sensor measurements indicates an earthquake.15. The method of claim 14 wherein the alarm includes an indication of ageographical area associated with the earthquake based on the currentlocations of the enrolled devices that provided vibration sensormeasurements to the CPD.
 16. The method of claim 14 including, in theCPD, receiving vibration measurement data pushed to the CPD by anenrolled device responsive to a vibration measurement in the enrolleddevice exceeding a predetermined threshold value.
 17. The method ofclaim 14 including, in the CPD, polling the enrolled devices to collectvibration measurement data.
 18. The method of claim 14 including, in theCPD: comparing the vibration measurements across multiple enrolleddevices that are within a selected distance of each other; and based onthe comparison, excluding at least one of the vibration measurements asa false reading.
 19. The method of claim 14 including, in the CPD:receiving an indication of low level intermittent wireless signalsassociated with one of the enrolled devices from at least three of theother enrolled devices; and utilizing triangulation among the locationsof the detected low level or intermittent wireless signals to determinea location of a linked device that may be damaged or in a low-powercondition.
 20. The method of claim 14 including, in the CPD: identifyingother wireless-enabled devices within the geographical area affected bythe earthquake; and enrolling the other wireless-enabled devices aslinked devices.