US20150254606A1 - Long-distance, automated event detection - Google Patents
Long-distance, automated event detection Download PDFInfo
- Publication number
- US20150254606A1 US20150254606A1 US14/639,983 US201514639983A US2015254606A1 US 20150254606 A1 US20150254606 A1 US 20150254606A1 US 201514639983 A US201514639983 A US 201514639983A US 2015254606 A1 US2015254606 A1 US 2015254606A1
- Authority
- US
- United States
- Prior art keywords
- article
- package
- communication system
- event detection
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 140
- 238000000034 method Methods 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 144
- 230000003993 interaction Effects 0.000 claims description 41
- 230000008878 coupling Effects 0.000 claims description 7
- 238000010168 coupling process Methods 0.000 claims description 7
- 238000005859 coupling reaction Methods 0.000 claims description 7
- 239000003990 capacitor Substances 0.000 claims description 4
- 238000002372 labelling Methods 0.000 claims 1
- 238000003860 storage Methods 0.000 abstract description 9
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 94
- 238000012384 transportation and delivery Methods 0.000 description 20
- 230000001413 cellular effect Effects 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 11
- 230000004044 response Effects 0.000 description 11
- 239000000123 paper Substances 0.000 description 9
- 239000000758 substrate Substances 0.000 description 8
- 239000003814 drug Substances 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000012937 correction Methods 0.000 description 4
- 230000000875 corresponding effect Effects 0.000 description 4
- 239000000463 material Substances 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 230000010267 cellular communication Effects 0.000 description 3
- 235000013305 food Nutrition 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 235000013550 pizza Nutrition 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000002596 correlated effect Effects 0.000 description 2
- 229940079593 drug Drugs 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000007788 liquid Substances 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 208000032953 Device battery issue Diseases 0.000 description 1
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 230000001464 adherent effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000023077 detection of light stimulus Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000004146 energy storage Methods 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012432 intermediate storage Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000002096 quantum dot Substances 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0832—Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/14—Payment architectures specially adapted for billing systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/208—Input by product or record sensing, e.g. weighing or scanner processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4015—Transaction verification using location information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0605—Supply or demand aggregation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0036—Checkout procedures
- G07G1/0045—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
- G07G1/0054—Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/20—Binding and programming of remote control devices
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/60—Security, fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/23—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for mobile advertising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the present technology relates to the field of networking and consumer electronics, and more specifically, to systems and methods for enabling interactions with consumers and consumer articles, such as a package, via telecommunications networks.
- tracking events remotely involves humans manually notating that an event occurred.
- a receptionist can sign for a package and the courier can send a confirmation to the sender of the package that the package was received.
- the sender never actually knows that the package was opened.
- consumer goods e.g. medicine containers, tires, light bulbs, etc.
- More advanced systems and methods are required to detect events at remote locations.
- FIG. 1 schematically illustrates an event detection and remote communications device embedded in an article, in accordance with some embodiments of the present technology
- FIG. 2 illustrates network architecture for remote detection and operation of the article, in accordance with some embodiments of the present technology
- FIG. 3 illustrates network architecture for remote detection and operation of the article, in accordance with some embodiments of the present technology
- FIG. 4 is a flow chart for establishing communications with the article, in accordance with some embodiments of the present technology
- FIG. 5 is a flow chart for establishing communications with the article, in accordance with some embodiments of the present technology
- FIG. 6 schematically illustrates coupling between icons on an article and one or more event detection systems, in accordance with some embodiments of the present technology
- FIG. 7 schematically illustrates a device for providing digital content to a user in lieu of live streaming, in accordance with some embodiments of the present technology
- FIG. 8 is a flow chart for provisioning digital content devices, and receiving content from same, in accordance with some embodiments of the present technology
- FIG. 9 is a flow chart for assigning network identifiers to articles in accordance with some embodiments of the present technology.
- FIG. 10 is a flow chart for obtaining control of an article remotely in accordance with some embodiments of the present technology.
- the present disclosure addresses the need in the art for more advanced approaches for detecting events at remote locations.
- Systems, methods, and computer-readable media are disclosed which detect events occurring to an article at a remote location.
- the technology can involve integrating communication system within an article or package.
- the communication system can include a memory, a low-power power source, a sensor for detecting an interaction event with the article, a microcontroller coupled with the sensor, and a communication interface coupled with the microcontroller.
- the communication system can be associated with a telecommunication network (cellular network, mobile virtual network operator network (MVNO), pager network, long range radio network, ad-hoc event detection network, etc.) and can be assigned a network identifier and an article identifier.
- MVNO mobile virtual network operator network
- the communication system can send a message over the telecommunication network that includes the network identifier, the article identifier, and location information (e.g. cell tower location).
- the technology can further involve an operating server (e.g. a server operated by an interchange entity such as an MVNO) receiving the message and recording the occurrence of the event at the location it occurred.
- the interchange entity can also provision article identifiers for tracking articles and packages.
- the interchange entity can acquire bulk bandwidth for communicating over the telecommunication network and can provision articles and packages with network identifiers associated with a portion of the bandwidth to allow the telecommunication network to permit messages to be sent to the operating servers.
- FIG. 1 illustrates an event detection system 100 for providing event detection data relating to a consumer article over a network according to some embodiments of the present technology.
- the event detection system 100 can be coupled with an article 101 , such as, for example, a package.
- an article include envelopes, paper, books, magazines, shipping packages, package wrapping, gift wrapping, consumable items, price tags, price labels, theft-deterrent devices, inhalers, tires, clothing material, clothing tags, clothing labels, computing devices, consumer devices, such as an LED or other light-emitting fixture, disposables such as bottles or other containers for food products, liquids, toiletries, or other replenishables or perishables, off-the-shelf sensors such as temperature sensors or light sensors, automotive goods such as tires, batteries, and auto parts, or any portable object.
- the event detection system 100 can also include a power source 102 , a sensor 103 , a communication system 104 , an antenna 106 , a microprocessor 108 , and memory 114 .
- the event detection system 100 can also include additional power storage 112 , an actuator 110 , and other mechanisms 116 .
- the components of the event detection system 100 shown in FIG. 1 and similar components are explained in more detail below.
- the event detection system 100 may be housed on a substrate or within one or more substrates.
- the substrates can be attached to or enclosed within packages or other consumer articles.
- the substrates can be distinct from the packages and can be integrated within the packages.
- packages on which the event detection system 100 could be attached include paper-based packages such as envelopes, printed materials such as menus, or packaging such as pizza boxes.
- a variety of other packages and consumer articles can be benefit from the present technology and a number of types of packages and articles are mentioned explicitly in this disclosure. However, those with ordinary skill in the art having the benefit of this disclosure will readily appreciate that a wide variety of packages and articles can be used with the present technology.
- the event detection system 100 is implemented in one or more integrated circuits, which may include silicon-based integrated circuits, and in which the event detection system 100 may be attached to the packages via an adherent.
- the event detection system 100 can be enclosed within the package, such as, by way of illustrative example but not limitation, an envelope or pizza box.
- the electronics comprising the event detection system 100 may be deposited, in whole or in part, on the medium of the package itself. For instance, the components of the event detection system 100 may be instantiated directly on a paper-based medium, such as an envelope or cardboard box.
- the event detection system 100 is substantially visually indistinguishable from the medium in which it is embedded or attached.
- the event detection system 100 attached to or embedded in a paper envelope the event detection system 100 may be visually indistinguishable to viewers from the paper of the envelope.
- the technology can be practiced on media that are durable rather than disposable, and that in alternative embodiments of the present technology, the features of the present technology described herein are implemented in durable materials, substrates, or other non-disposable media.
- the event detection system 100 includes a power source 102 .
- the power source 102 is an ambient power source, which receives and converts energy from the surrounding environment.
- the ambient power source may be a photo-voltaic detector.
- the power source 102 may obtain energy from radio waves or other electromagnetic spectrum.
- Ambient energy sources may include inductive power sources, such as those powering RFID readers.
- some embodiments of the present technology can involve using thermal power, such as from body heat, or ambient kinetic energy, such as from the motion of a user or recipient of the package.
- thermal power such as from body heat
- ambient kinetic energy such as from the motion of a user or recipient of the package.
- Alternative forms of ambient energy that can be utilized to supply power to the event detection system 100 will be apparent to those skilled in the art.
- the power source 102 can be a lightweight battery. Certain embodiments may utilize a capacitor for energy storage. For example, a supercapacitor may be utilized. In some embodiments, the capacitors or battery may be on a separate substrate from the event detection system; in other embodiments, the capacitor or battery may be implemented within the physical medium of the event detection system, such as in paper on a paper-based package.
- the event detection system there is no battery or power storage in the event detection system, and all power is received through ambient sources.
- Some embodiments of the present technology include additional secondary power storage 112 that is separate from the original power source; in some such embodiments, the secondary power storage 112 collects power from a primary power source 102 from time-to-time, or on a periodic basis.
- the power source 102 is utilized to provide a signal of an event to the event detection system 100 , as described further in other sections of this written description.
- the power source 102 is charged prior to delivery of the event detection system 100 , so that the event detection system 100 is operable immediately without requiring power from an external source for initial communications to be conducted via the communications system 104 .
- the event detection system 100 can include a communications system 104 .
- the communications system 104 communicates over a long-distance wireless telecommunications system.
- the wireless telecommunications system can be a pager network.
- the telecommunications system does not require a SIM card or other similar local network identifier to be included in the event detection system 100 .
- the wireless telecommunications system can be a cellular network, such as a TDMA, CDMA, LTE or GSM network.
- the communications system 104 may communicate over a wireless local area network (e.g. 802.11 protocol).
- Other alternative wireless network systems that can be utilized with the present technology will be apparent to those skilled in the art.
- the communications system 104 may include systems to communicate within close proximity to other devices, such as Near Field Communications (NFC), Bluetooth, or radio frequency identification (RFID) systems; other such systems for proximate communications will be apparent to those skilled in the art.
- the communications system 104 may include an antenna 106 .
- the antenna 106 may be a strip line antenna; in certain embodiments, the antenna may be printed on the same medium as the package, such as paper.
- the communications system 104 may include a Subscriber Identity Module (SIM) circuit.
- SIM Subscriber Identity Module
- the event detection system 100 includes a low power microcontroller/microprocessor 108 , which is operable under the power provided by the power source.
- the microcontroller 108 may constitute an 8-bit microcontroller; however, in other cases, higher-bit microcontrollers may be utilized.
- the microcontroller 108 will be operable at a power and voltage that can be supplied by the power source 102 .
- the microcontroller 108 is in communication with solid state, low-power non-volatile memory 114 that can be embedded on the substrate, and that is operable at the power and voltage that can be supplied by the power source 102 .
- the non-volatile memory 114 may in embodiments, be readable, programmable, or read/writeable.
- non-volatile memory 114 Suitable forms of non-volatile memory 114 will be apparent to those skilled in the art.
- the digital components of the event detection system 100 are coupled over one or more communications buses; in some such embodiments, such one or more communications buses may be embedded in a common substrate with other components of the event detection system 100 .
- the microcontroller 108 will also be configured to operate the communications system 104 , in response to events detected by the event detection system 100 .
- the power source 102 also serves as a sensor that detects events which are reported to the microcontroller 108 .
- the microcontroller 108 may be programmed to detect when a photo detector acts as a power source 102 in the event detection system 100 and receives light at a certain luminosity, and may be configured to send a signal via the telecommunications system 104 in response.
- the event detection system 100 includes a sensor 103 that is separate from the power source 102 , wherein the sensor 103 is in communication with the microcontroller/microprocessor 108 , and the microcontroller/microprocessor 108 is operative to poll and respond events detected at the sensor 103 .
- the event detection system 100 includes an on-board actuator 110 in communication with the microcontroller/microprocessor 108 , to drive other mechanisms 116 that are coupled to the actuator 110 , in response to commands received from the microcontroller/microprocessor 108 .
- the actuator 110 may be coupled to and operate an LED 116 attached to the event detection system 100 .
- the LED can be Organic LEDs (OLEDs) or quantum dots.
- OLEDs Organic LEDs
- Other examples of actuators that can be used in embodiments of the present technology will be apparent to those skilled in the art.
- the mechanism 116 may be a small, lightweight display, such as a liquid crystal display.
- the display 116 may be utilized to display a code, such as a QR code.
- the mechanism 116 may be a speaker.
- the speaker may be utilized to issue an audible or inaudible sound that identifies the event detection system 100 or package 101 .
- the actuator 110 and output mechanism 116 may also act as sensors 103 ; in some such embodiments, a speaker 116 may also be utilized as a microphone that provides input to the sensor 103 / 110 , which translates the analog signal of the microphone into a digital signal for the microcontroller 108 .
- Other mechanisms 116 attached to the packaged that maybe operated by the actuator 110 will be apparent to those skilled in the art.
- the event detection system includes an actuator 110 , but no sensor 103 ; in some such embodiments, the actuator 110 is responsive to signals received by the microprocessor/microcontroller 108 via the communication system 104 .
- FIGS. 2 and 3 illustrate examples of communications networks used for remote interaction with articles containing event detection systems according to some embodiments of the present technology.
- multiple articles 299 containing event detection systems can communicate over long-distances over a long-range wireless communications system 200 .
- the wireless communications system 200 can be a pager network, a cellular network, or other wireless communications system, which is communicable via a lower power system, as discussed above.
- the wireless communications system 200 can include two or more wireless networks from different telecommunications services providers. For example, different telecommunications services providers and networks may be utilized for communications with the article 299 if the article 299 moves in and out of coverage, roams between networks, etc.
- an article 299 can communicate with one or more communications servers 202 .
- the communications servers 202 are configured to identify one or more network identifiers associated with the article 299 via a device identification database 204 coupled locally to the communications servers 202 .
- the identification database 204 is remote from the communications servers 202 .
- the communications servers 202 include protocol gateways for transforming messages received via the wireless communications system 200 to a packet based protocol for further distribution over the wide area network 208 , as described below.
- Embodiments of the present technology include one or more operating servers 206 for interacting with the articles 299 ; such interactions may include monitoring and/or operating the articles 299 .
- the operating servers 206 are in communication with the communications servers 202 via a wide area network 208 , such as the Internet.
- communications between the operating servers 206 and the articles 299 can be sent over a packet-switched protocol, such as or TCP/IP or UDP.
- the packet-switched protocol is IPv4 or IPv6.
- Other packet-switched protocols that may be utilized for communications between the articles 299 and the operating services 206 shall be apparent to those skilled in the art.
- the one or more operating servers 206 are in direct communication with the device identification database 204 .
- the communications system 104 associated with an article is configured not to search for cellular towers at periodic intervals; rather, the communications system 104 can be configured to send a burst communication to reach multiple cellular towers upon the occurrence of an interaction event upon which an individual message is to be sent. Also, the communications system 104 can be configured so that a message is held by the processor 108 and only sent by the communications system 104 once sufficient power is received/stored at the power source 102 to enable a one-time delivery of the message to the communications server 202 via the communications system 200 .
- an article is associated with one or more network identifiers.
- the network identifiers can include an identifier on the telecommunications network 200 , such as a telephone number.
- the one or more network identifiers may include an identifier such as an IP address (such as an IPv4 or IPv6 address), a MAC address, or a universally unique identifier (UUID).
- IP address such as an IPv4 or IPv6 address
- MAC address such as an IPv4 or IPv6 address
- UUID universally unique identifier
- a single article may include more than one event detection system 100 and each of the one or more event detection systems 100 shares one or more of the network identifiers.
- an envelope may have two or more event detection systems 100 , each of which has the same phone number.
- the event detection systems 100 are authenticated to the communications server 202 only if all event detection systems 100 on the device report the same identifier.
- the identification database 204 maps the network identifiers to the one or more articles. In some embodiments, the identification database also records one or more individuals associated with an article. In embodiments, other personally identifying information may be included in the identification database 204 , such as a postal address for the user, or to which a package is sent. Other examples of user or article information that may be stored in the identification database 204 shall be apparent to those skilled in the art.
- the identification database can be an SQL database, a flat file, a CSV, or, distributed file system, etc.
- the identification database stores records in encrypted format.
- the encrypted records are only accessible by a user associated with the article.
- the user may access the identification database 204 via a web browser or other client application 210 in communication with the identification database 204 via the wide area network 208 .
- the client application 210 may be a mobile application that operates on a smartphone, tablet, or other mobile computing device.
- communication between the client 210 and the identification database 204 is over a secure protocol, such as, by way of example but not limitation, Secure Socket Layer; other suitable secure protocols will be readily apparent to those skilled in the art.
- the identification database 204 and client 210 are configured to allow the user to set up a password unique to the user, which is required for operating the articles remotely.
- the network identifier of an article includes several more bits than necessary to uniquely identify the article, for purposes of security and/or error correction.
- the bits in the network identifier are randomized.
- a plurality of event detection systems 100 on a single package include a common string in the network identifier, to indicate that such event detection systems 100 belong on a single package.
- the network identifier includes error correction, such as forward error correction, Hamming codes, or Reed-Solomon codes. Other methods of error correction or redundancy that may be applied to the network identifiers shall be readily apparent to those skilled in the art.
- the event detection system 100 may be communicated with by the operating server 206 via email, SMS, Twitter, or other text-based messaging systems.
- the event detection system 100 is associated with a public key, for encrypting and authenticating keys.
- FIG. 4 illustrates an example for authenticating packages or other articles containing communication systems according to some embodiments of the present technology.
- the method 400 can involve a communication system 100 detecting an event (e.g. interaction event) at an article 402 .
- the event may be an initial detection that a threshold of energy has been received at the power source 102 , or that another event has been detected at a sensor 103 separate from the power source 102 .
- the power source 102 may be a photo-diode
- the microcontroller 108 may be initially configured in a sleep state, and subsequently enclosed or embedded in an enclosed package, such as an envelope or cardboard box.
- the microcontroller 108 may be configured to wake when a power source 102 reaches a certain threshold of energy, such as, by way of example but not limitation, a certain luminosity arriving at the photo-diode by virtue of the enclosure being opened by an end user, or a certain current or voltage threshold being received or produced at the power source 102 .
- a certain threshold of energy such as, by way of example but not limitation, a certain luminosity arriving at the photo-diode by virtue of the enclosure being opened by an end user, or a certain current or voltage threshold being received or produced at the power source 102 .
- the event detection system 100 may be charged initially with power, and may be configured to periodically poll one or more ports or sensors 103 in order to determine if an event has occurred, such as the breaking of a circuit.
- an event detection system 100 could be enclosed in a package such as an envelope or box, and the event could be the breaking of a circuit, for example, when the enclosure is opened. Other examples of such triggering events will be apparent to those skilled in the art.
- the method 400 also involves the article communicating 404 with the communication server 202 in response to the event, e.g. via a telecommunications system.
- bandwidth may be purchased from the providers of a telecommunications service, in order to allow the article communicate via the telecommunications service 200 automatically, for a minimum or perpetual subscription period.
- connectivity may be purchased from the providers of the telecommunications service 200 in batches, allowing communication from the packages for limited periods of time.
- the method 400 involves, upon receipt of communication from the event detection system containing an identifier for the article, the communications server checking the identifier 406 against a local article identification database 204 to authenticate the identification of the article, and establish communication 408 with the article. If the article identifier is not authenticated 410 , the communication is dropped. For example, if the identifier is not authenticated, such identifier may be placed on a blacklist in the local article identification database 204 , so that future communications are not received from such article identifier.
- FIG. 5 illustrates an exemplary method 500 for authenticating an article with an article identification database 204 using an operating server 206 according to some embodiments of the present technology.
- the article after the triggering event is detected 502 at the article, the article establishes communication 504 with the communications server via the communications network.
- the communications server then encapsulates one or more identifiers received from the article in one or more packet payloads 506 .
- the communications server forwards the encapsulated packets to the operating server via the packet-switched network 508 .
- the encapsulated packet is forwarded to the operating server in an encrypted or secure form.
- such communications are conducted using a Secure Socket Layer protocol, and/or by use of the IPSec protocol suite; other alternative security protocols that can be utilized for communications between the communications server and the operating server will be apparent to those skilled in the art.
- the operating server On receipt, the operating server de-encapsulates the article identifier, and authenticates 510 the article identifier against the article identifier database. Upon authentication, the operating server establishes 512 a session with the article (or alternatively, is now configured to accept and exchange asynchronous messages with the article) over a packet switched protocol, with such messages routed to the article via the communications server 202 and the telecommunications network.
- a packet switched protocol such as a Secure Socket Layer protocol, IPSec, etc.
- secure communications sessions are established between the article and the device operating server 206 , so that such communications are not transparent to the communications servers 202 .
- the operating server 206 collects and generates reports and/or performs analytics on data received from and about the article. In some embodiments, the operating server 206 sends commands to the article to operate the article. In some embodiments, the reports are delivered by the operating server 206 to the client application 210 . In some embodiments, the client application 210 may also provide instructions to operate the article via the operating server 206 . In some embodiments, a user of the article may be authenticated and authorized to operate the article and/or receive data from the article via the client 210 .
- one or more articles including an event detection system may be sent by or on behalf of one or more issuers to the end users.
- An issuer may utilize an interchange entity, such as for example, a telecommunications network provider, Mobile Virtual Network Operator (MVNO), a legacy network, such as a pager communication network, postal service, mail courier, retailer (storefront or online), delivery service, and the like for functions associated with the articles.
- MVNO Mobile Virtual Network Operator
- the interchange is responsible for operating the operation servers 206 .
- the interchange creates, operates and maintains the article identification databases 204 .
- the interchange is responsible for the procurement of bandwidth from one or more telecommunications services providers of the telecommunications systems 200 . e.g. when the communications servers are operated by the telecommunications services providers.
- the article identifier database 204 is operated by the telecommunications services provider.
- the article identifier database 204 is operated by the interchange, as shown in FIG. 3 . Identifiers for the applicable issuer and interchange may be included in the communications system 104 .
- the interchange utilized for a package 101 is responsible for routing communications from an article to the appropriate issuers via the network identifier of the article.
- the interchange upon receiving or exchanging messages from or with an article, the interchange updates billing records associated with the issuer, or accounts payable to the telecommunications services provider.
- the operation servers 206 may be operated or accessed by the issuer, and communications between the issuer and the articles are routed by the interchange to the appropriate telecommunications services provider by reference to the article/network identifiers.
- an issuer may utilize different interchanges for communications with different articles or different types of articles.
- an issuer may communicate with articles via different interchanges which are selected or determined based upon the geographical destination of the article or location of the intended user/consumer.
- interchanges may be selected or determined based on the bandwidth required for communication with the applicable article, the type of communications to be conducted with the articles, or the applications supported by the articles.
- the network identifier for an article is loaded on to the communications system 104 at the time the article or package is provisioned.
- the identifier may be loaded in a SIM circuit in the communications system 104 .
- the telecommunications provider can route traffic between the article and the article operating servers 206 that are operated by or on behalf of the issuer of the article or package, based on the network identifier for the article. When communications between the operating server 206 and the event detection system 100 are held over secure communication sessions, such communications will not be transparent to the telecommunications services provider.
- the article identification database 204 is populated at the time the article and/or packages are provisioned.
- the package is sent 900 through an automated process whereby information printed on the package is read 902 .
- a reader reads such printed information via optical scanning
- the printed information may be a name of an intended recipient of the package and a delivery address for the package.
- the articles that are enclosed in or attached to the package are detected 904 .
- the article is read to see if it has an identifier encoded 908 .
- an article identifier is selected from a pool of available identifiers and scanned onto the article 910 . If there is an identifier on the article, that identifier is retrieved 912 and stored in the article identification database 204 along with the associated name and location of the intended package recipient 914 .
- the steps in the foregoing process may be conducted concurrently or in alternative orders.
- the article may be detected initially, with the label/delivery address placed on the package based on the identifier of the article.
- the article is not scanned, but the article identifier may be known by virtue of an order in which the package was sent through the process.
- the package may be initiated through the process without an identifier for the article or a package label, and both may be assigned to the article and its applicable package concurrently.
- Other variants will be apparent to those skilled in the art.
- the articles described herein can constitute a consumer device, such as an LED or other light bulb or fixture, disposables such as bottles or other containers for food products, liquids, toiletries, or other replenishables or perishables, off-the-shelf sensors such as temperature sensors or light sensors, automotive goods such as tires, batteries, or auto parts; additional examples are too numerous to mention, but will be readily apparent to those skilled in the art.
- Certain such media, or goods have states to be monitored by either the user via a client 210 , or by a vendor or other entity in communication with the article and event detection system 100 via an operating server 206 .
- an article or package is monitored automatically and remotely via an operating server, without requiring provisioning or other manual intervention by the user.
- an article may be a medicine bottle that is delivered to a user, whereby an event corresponds to detection of an amount of medicine remaining in the bottle.
- the bottle may be configured such that multiple measurements, such as weight measurements, or detection of fluid levels, are taken by the event detection system 100 , in order to determine robustly that an amount of medication has fallen below a defined threshold, with the multiple measurements taken in order to minimize false-positive results.
- a delivery of refills for the medication is dispatched to the location of the bottle upon when notification of the threshold is received at the operating server, and a determination is made by the operating server that the result is robust and the medicine has definitively fallen below a designated threshold.
- the medicine may be an inhaler
- the triggering event may be a determination of pressure in the inhaler, or detection of a certain gas mixture in the inhaler, indicating a need for replenishment.
- the foregoing information may also be correlated and stored with other medical records of the applicable users. Other examples of such replenishables shall be readily apparent to those skilled in the art.
- the event detection system 100 may be used in conjunction with an automobile tire, and a triggering event can correspond, for example, to a dramatic pressure drop, and a message is sent by the event detection system 100 to an operating server indicating the drop in tire pressure and a geolocation of the automobile.
- the power source 102 of the event detection system 100 is a separate power source from the car battery.
- the power source may derive from heat sources or kinetic sources in the car, or from alternative redundant power sources in the car.
- the geolocation of the event detection system is separate from geolocation systems in the car or otherwise.
- the geolocation data may be inferred from telecommunications networks 200 by which the event detection system 100 communicates.
- an operating server upon detecting a catastrophic failure of the tire and receiving the geolocation of the automobile, an operating server can automatically dispatch service to the location of the event detection system 100 .
- the present technology can be similarly utilized for event detection system 100 included in an automobile battery, where the triggering event corresponds to a voltage indicating a battery failure.
- Other examples will be readily apparent to those skilled in the art.
- an article, package, and system are also remotely operable, by the user via the client 210 , or by a third party via an operating server 206 , as further depicted in the flowchart in FIG. 10
- a package may be a light source, such as an LED, whereby the light source is provisioned, prior to delivery to the user, with sufficient call-time to exchange messages via a wireless telecommunications network for the expected life of the product.
- the event detection system is bound by an identifier that is provided to the user.
- the identifier may be included in packaging for the product.
- the product may be configured to communicate with a mobile device of the user via a near field protocol, such as NFC, and to be bound by an identifier set by the user.
- a near field protocol such as NFC
- the user may enter 1002 the article identifier/credentials included in the package into the client device.
- the user is then authenticated by an article operating server 206 by use of the credentials 1004 . If the user is authenticated 1006 , the user is then granted authorization 1008 to control the article or package, including rights to receive data from sensors 103 and control actuators 110 .
- the user is granted authority to remotely monitor and operate the article via the client 210 .
- the user may transfer authority 1010 to operate the article to a third party.
- a third party login/authorization system such as, by way of example but not limitation, Facebook Connect; other alternatives will be readily apparent to those skilled in the art
- the article identifier database 204 is updated with the credentials for the third party 1012 .
- the user may reduce a luminosity of the device remotely via a client.
- the package may be a thermostat, and the user may obtain authorization to obtain data from the thermostat and operate the thermostat remotely after authentication using codes on the package that are submitted to the article operating server by the user.
- Other examples/embodiments of such remote authentication and operation of article and packages will be readily apparent to those skilled in the art.
- the article can be wearable by a user.
- an article may constitute a button embedded into clothing or jewelry, whereby, by pressing the button, a call is immediately placed to an emergency number.
- the user may communicate with the emergency responders audibly, through a microphone/speaker in communication with the event detection system.
- the call is placed directly via the cellular network 200 .
- a call center talks to the emergency responders based on data delivered from the article.
- the event detection system 100 is embedded/attached to a mobile device, such as a cellular phone, laptop, tablet, etc.
- the event detection system 100 can embedded on such device in a manner that is inconspicuous, or that cannot be detached physically from the device without destruction/mutilation of the device.
- the event detection system 100 communicates over a wireless telecommunications system 200 that is separate from the antenna and communications system of the mobile device.
- the event detection system 100 has an ambient power source separate from that of the mobile device, so that the phone periodically reports its location to the operating server 206 , separately from the mobile device itself, so that its location can continue to be tracked in case the mobile device itself is wiped or runs out of power.
- the event detection system 100 is attached to consumer good articles at the time of production, prior to delivery to stores, as a means of theft detection.
- the event detection system 100 may be attached to a consumer article, such as an article of clothing, at the time of manufacture, and provisioned with sufficient bandwidth/“talk-time minutes” on a telecommunications network to send its location to the operating server 206 for a period of time that is substantially longer than the expected sales cycle for the consumer good.
- the operating server can check a database to determine whether or not the article has been sold. If the article has not been sold, a theft alert is generated.
- Alternative data flows for fraud detection will be apparent to those skilled in the art.
- an event detection system 100 is provisioned by one or more separate devices/machines prior to delivery of a package to the end user.
- the one or more separate devices scan an address on the package at the time it is provisioned. This may include scanning a printed address via optical character recognition, scanning a bar code, QR code, or other such printed code on the package, and/or detection of the event detection system 100 via electronic communication, such as, by way of example but not limitation, via Near Field Communication.
- the machines update the article identifier database to couple the postal/physical delivery address on the package 101 (or other such identification of the package 101 as may be printed on the package 101 or indicated in the bar code, QR code, or other such code) with an article and/or user identifier in an article identifier database.
- Other mechanisms for correlating printed information on the package 101 with article identifiers or other information regarding the user or article will be apparent to those skilled in the art.
- such separate articles may be operable to adhere and/or enclose the event detection system 100 particular positions on a package, for conformance with design specifications for the package, or to place articles in communication with corresponding icons on the package.
- the event detection system 100 is utilized to measure and track the interaction of the user with an article or package.
- the event 402 is a proxy indicating an interaction of the user with the article or package.
- the event 402 may indicate that the user touched an icon on the package 101 , such as, by way of illustrative example but not limitation, a printed “button” on the package 101 .
- a package 101 may have one or more printed icons/sensors 602 , 604 that are in communication with one or more event detection systems 100 embedded in the package 101 .
- an event is triggered by breaking or completing a circuit by virtue of the user interaction.
- the event detection system 100 may be configured so that, by virtue of touching the icon 602 , 604 , a circuit between the power source 102 and the remainder of the event detection system 100 .
- the event detection system 100 includes touch detection at the icon 602 , 604 .
- the event 402 corresponds to detection of light from the opening of an enclosed package, such as an envelope or box. Many alternative embodiments will be apparent to those skilled in the art.
- the operation servers receive and records an identifier for the package 101 , one or more identifiers for the event detection systems 100 on the package 101 , identifiers for an intended, expected, or authenticated recipient or user of the package 101 , the time at which the event 402 occurred, a geo-location for the package 101 at the time of the event 101 ,as identified automatically through the event detection system 100 (via location parameters determined from the communications system 200 , or, in other embodiments, a low-power geo-location system, such as a low-power Global Positing System interface, included in the event detection system 100 ), a postal address to which the package 101 was sent, purchases or other electronic transactions conducted by interaction with the icons, etc.
- such information is stored in one or more databases, which may be relational databases or other distributed
- an interchange may elect to decline facilitation of communications between an issuer and the article, based on policies.
- policies may be based on a geo-location of the device, or a volume of data intended to be transmitted to the device, etc.
- the packages 101 and icons 602 , 604 include marketing or promotional literature or materials. Some such embodiments are utilized for tracking the responses of users to marketing or advertising campaigns.
- events recorded in embodiments of the present technology include measuring the opening of envelopes or other packages in response to their contents; the opening or viewing of printed pages (e.g. views of a magazine advertisement); recording and measuring customer responses such as pushing an icon 602 604 , which may be depicted as a “button” or may otherwise indicate that part of a package was touched.
- such data may be used for real-time, or asynchronous off-line optimization of marketing campaigns.
- a geo-location of the event detection system 100 at the time of the customer interaction is determined; in some such embodiments, such geo-location data is tracked against the databases 204 to determine whether or not the interaction with the event detection system 100 was by the targeted user. Such determinations may be utilized, by way of example but not limitation, to determine or enhance the accuracy of success rates in direct mail applications.
- such information may be used to determine payments to third parties for marketing/advertising on a package, e.g. paying third parties based upon user interactions with the package or transactions conducted via the package.
- Such analytics may also include, by way of example but not limitation, determination of success rates for direct mail campaigns.
- subsets of the packages 101 may be selected to estimate the applicable statistics by statistical sampling. Other examples of analytics made possible by the present technology will be apparent to those skilled in the art.
- the event detection system 100 is operable to communicate with a user via a mobile phone application via a short-range protocol (e.g. NFC, Bluetooth, etc.).
- the event may correspond to a detection by the event detection system 100 that the user's mobile phone is within a certain proximity of the event detection system 100 .
- an event detection system 100 may be embedded in a package 100 , whereby the event detection system 100 triggers an event when the event detection system 100 detects via the NFC that a device with a specified identifier is within a distance threshold of the event detection system 100 , and the event triggers interaction between the event detection system 100 and the mobile device (e.g., communication of a message from the event detection system 100 to the mobile device via the NFC, for display on the mobile device).
- a package 101 includes two or more components that communicate via an NFC, whereby the event detection system 100 is operative to detect from the NFC signals when such two or more components are physically moved relative to one another.
- such components may be located on opposite pages of a magazine, such that an event may correspond to a page of the magazine being turned.
- one such component may be on a detachable part of the package and another component is on a non-detachable portion, whereby the event detection system 100 is operative to detect that the applicable portion of the package has been detached.
- Other such implementations of multiple short-range radio components within a package will be apparent to those skilled in the art.
- the event detection system 100 is utilized to conduct electronic commerce transactions via the event detection system 100 , i.e., the package 101 may constitute a bill or an invoice, e.g. a cable bill or a credit card bill.
- a package in the form of a bill for cable television can include an event detection system 100 sent to a user's home, and can include the icons 602 , 604 that indicate options to enable a user to select purchases of cable television packages, which are indicated by the icons 602 604 .
- the package 101 may be a credit card bill, and the icons 602 , 604 may indicate whether or not the user approves or wishes to dispute individual payments.
- an icon 602 , 604 on a credit card bill with an event detection system 100 incorporated therein may be used to indicate whether or not a credit card invoice should be deducted from a user's bank account.
- the package 101 may be an advertisement, for instance, in a publication such as a magazine, which enables the user to purchase advertised items by touching an icon 602 , 604 .
- the user's credit card information is stored on or is otherwise accessible by one or more article operating servers 206 , and purchases are allowed via the icons 602 , 604 after the user has been authenticated.
- communications between the event detection system 100 and the device operating servers 206 in connection with the transaction is conducted via encrypted protocols as described above.
- the packages 101 may be printed take-out/carry-out menus, or containers for food delivery, such as pizza boxes.
- the user may purchase an item for delivery via touching a corresponding icon 602 , 604 .
- a delivery service is reached via an operating server 206 , which receives an electronic message (e.g. an email, SMS, Twitter message, or other such electronic communication) from the event detection system 100 via the Internet.
- the event detection system 100 places a telephone call to via the communications network 200 to the vendor.
- Some such embodiments may include miniature a microphone and/or speaker that attached to or part of the event detection system 100 , and is in communication with the microcontroller 108 ; the microphone/speaker will be operable at the energies provided by the ambient power source 102 , and may be inconspicuous in or visually indistinguishable from the package 101 . Also, the microphone or speaker is used for vocal communication with the vendor via the communications network 200 . In some such embodiments, the transactions and fulfillment occur only after the postal address to which the package 101 was sent has been authenticated against one or more of the geo-location data from the event detection system 100 and/or an identifier for the user or event detection system 100 that has been authenticated in accordance with embodiments of the present technology. In some examples, the purchased item is delivered in response to event, to the authenticated/validated physical/postal address of the package 101 .
- Embodiments of the present technology support one-way, two-way, or multi-party vocal messages.
- the user may click on an icon 602 , 604 , or activate another event via the package, in order to send an audio message to a pre-determined recipient.
- the recipient may be a vendor or a customer service representative.
- a message is recorded from the user via the microphone on the package 101 .
- this message is stored at the microprocessor 108 and/or communications processor 104 until there is sufficient power from the power source 102 to send the message via the communications system 200 .
- the message is sent via the telecommunications system 200 automatically after recording.
- the event establishes direct communication with the recipient via the communications network 200 in real-time, without intermediate storage.
- the message from the user is forwarded to the recipient as an electronic message, such as an email, SMS, Twitter message, or other similar asynchronous electronic message.
- the message is forwarded telephonically.
- the communications system 104 in each of several packages 101 sent to different recipients may be pre-loaded with a call-in number of other identifier for a conference call, so that the recipients may establish and/or join the conference call via the telecommunications network 200 by clicking on the icon 602 , 604 or through another event at the package.
- charges for expected use of the telecommunications network 200 by the event detection system 100 have been pre-paid.
- an article or package is mailed to the user and the user is informed (via text on the package) that an event triggered by the user will indicate an assent by the user to a transaction.
- the text may state that the user will be charged for or will otherwise reimburse the postage or other delivery costs for the delivery of the package 101 to the user in the event of the user opening of the package, touching a corresponding icon 602 , 604 , etc.
- a message indicating that the user has assented to the charge is sent by the event detection system 100 to the operating server 206 , and the user is then charged separately.
- the user upon the occurrence of the event, the user is automatically charged for the reimbursement, for example, by a charge to a credit/debit card or other on-line account that is previously stored for the user for access by the operating server 206 .
- an article or package is physically mailed with pre-paid postal or delivery charges for return of the article or package to the sender.
- an article identifier for the event detection system 100 may be reutilized for the individual user to whom the article or package was sent, for use in subsequent deliveries to that user.
- the article identifier can be decommissioned for the original user, and may be returned to a pool of available article identifiers.
- the user may indicate, via interaction with an icon 602 604 or other event, that they are to receive a financial credit or reward on return of the article or package.
- the user can indicate, via the icon 602 604 or other event at the package, that the package is to be collected, and a messenger may be dispatched to the user's location or postal address to collect the package 101 in response.
- a messenger may be dispatched to the user's location or postal address to collect the package 101 in response.
- Embodiments of the present technology comprise a storage device that includes a high-speed wireless cellular connection, whereby the storage device is preloaded with user content, and the device is configured to release the user content by way of the cellular connection.
- a storage device that includes a high-speed wireless cellular connection, whereby the storage device is preloaded with user content, and the device is configured to release the user content by way of the cellular connection.
- the device 700 may be in a small form factor, such as a key fob or memory stick; other suitable form factors will be apparent to those skilled in the art.
- the device 700 includes one or more high capacity storage media 702 , such as, by way of example but not limitation, flash memory.
- Some embodiments of the present technology include a port 704 , which may be utilized for receiving power for the device 700 , and/or for transfer of the content resident in the storage media 702 to another device; by way of example but not limitation, the port may be a USB port.
- the device further includes a cellular communications system 706 .
- the cellular communications system 706 may, by way of example but not limitation, be a 4G system, such as LTE or Mobile WiMax; other alternatives will be apparent to those skilled in the art.
- the device 700 is configured to release content to an individual user, by virtue of one or more identifiers associated with the user.
- a user may have content released from the device 700 by provisioning the applicable identifier to the device 700 .
- An example of the provisioning and utilization of the device 700 in accordance with such embodiments is depicted in FIG. 8 .
- the device is loaded with one or more pieces of content 800 .
- Such content may be, by way of example but not limitation, movies or other video, songs, books, software, or other digital content that is generally streamed to an end user; other such content which can be delivered to a user by use of the device 700 will be readily apparent to those skilled in the art.
- remote authentication steps described herein may alternatively be conducted locally on the device 700 .
- each such piece of content is associated with an identifier that is unique to the user, the content, and/or the device 802 , i.e. public keys.
- the device, content, and user identifiers are stored in a database 804 .
- the device is then physically shipped to the user 806 , associated with a user at the time of purchase or delivery of the device 700 to the user, etc.
- the association, or binding, of the identifiers with the device may be conducted via an application running on a user's smartphone, whereby the instance of the application on the user has previously been authenticated.
- association/binding of the identifiers with the device 700 occurs at the point of sale, via a point of sale device in communication with the database 204 via the Internet 208 .
- the user may unlock the content on the device by providing the key for the applicable content to the device 810 .
- the key is automatically provided to the device 700 by another device; by way of illustration but not limitation, the ID may be provided by a television in communication with the device via the port 704 or the telecommunications system 706 .
- the key is sent by the device to a central server via the telecommunications system 812 .
- the key is authenticated by a central server 814 , and upon authentication, the central server grants a permission to the device 700 to release the applicable content to the user 816 .
- contents are continually updated to the device by the central servers via the cellular system 706 , for potential later retrieval by a user.
- the communications system 706 may be a low-bandwidth cellular communications system; in some such embodiments, the communications system is not utilized to update content to the device.
- the devices are physically returned by the user to receive new content, whether loaded on the same device 700 or sent to the user in a new device 700 .
- Embodiments of the present technology include additional security measures for accessing or releasing content from a device 700 .
- the geo-location of the device in addition to authentication of the user/device/content identifiers, the geo-location of the device is determined, and the content is only released if the geo-location is approved for such device/content.
- such geolocation authentication is conducted at the remote database 204 ; in alternative embodiments, the geo-location authentication is performed locally on the device 700 . In some embodiments, the geo-location is performed using telecommunications system on the device 700 .
- the geo-location or alternative authentication utilizes short-range radio communications to a user's mobile device; examples of short-range radio protocols that may be used for such location include, by way of example but not limitation NFC, Bluetooth, RFIDs, beacons; etc.
- the supplemental security measure may include biometric identification of the user by the device 700 .
- one or more devices 700 are utilized as a virtual local area network.
- each device constitutes a modem that can be attached to, or constitutes part of, hardware that would otherwise be connected to a local area network, such as a server, laptop computer, printer, router, desktop PC, etc.
- all communications amongst such machines, via a local networking protocol such as IEEE 802, or communications between such machines and the Internet, are conducted through the cellular system 708 ; in some such embodiments, the local communication packets are encapsulated in the communications via the cellular system 710 .
- the devices may also be coupled via a local mesh or other local network, where such local network is utilized solely for communications within the nodes on the network, and not for Internet communications.
- Embodiments of the present technology utilize the information collected from a user via an article or package 101 to personalize on-line, Internet and mobile-based content to such user; such customization may be conducted off-line or in real-time with the data received via the package 101 .
- an online identifier of the user which identifies the user's activities on the World Wide Web or elsewhere on the Internet (such as a persistent identifier stored in a cookie, login usernames for on-line services, mobile phone numbers, or other such on-line identifiers as will be apparent to those skilled in the art) may be correlated with identification of the package in the device identification database 204 .
- Web-based content may be customized for the user based on the data recorded about such user from a triggering event and their other interaction with the event detection system 100 .
- advertisements or other web-based or mobile content may be selected or customized for the user based on magazine contents that have been viewed by the user, as detected by the event detection system 100 and reported to the operating server 206 .
- emails, texts, Twitter messages, or other such electronic messages may be sent to a user based on their interaction with the article or package, as detected and communicated by the event detection system 100 .
- a user may be sent a thank you note following interaction with the event detection system 100 .
- the package 101 may also be used by the end user (actively or passively) to update other records and workflows.
- health or insurance records of a user could be updated by way of the user's interaction with the event detection system 100 .
- analytics may be conducted on data sets contained in the database 204 which combine data from the users' on-line activities (e.g., their Web usage) with data regarding such users' interactions with article or packages.
- the fees charged to advertisers may be based upon delivery or response to Web or mobile based ads served to users as well as response rates from such users to paper-based advertising, as the latter is detected and reported by the event detection system 100 .
- Other examples of integration of feedback of the event detection system 100 with user interactions via separate electronic media will be apparent to those skilled in the art.
- the actuator 110 may be coupled to mechanisms 116 such as a camera that is operable at the power provided by the supply 102 .
- the event detection system 100 is operable to take a picture of the user via the camera 116 when the user opens the package, and then transmit the picture over a wireless network 200 .
- the picture is at a low-resolution, transmittable over low-baud rate networks.
- the picture may be utilized to authenticate the user, or provide proof that the individual opened the package. For example, for confirmation of service of process. Other uses and variants of such a camera will be readily apparent to those skilled in the art.
- Some embodiments of the present technology include mechanisms for wirelessly detecting the presence of an article in the vicinity of the detection mechanism, in order to detect the presence of such a mechanism.
- the wireless detector checks for signature wireless transmissions in the vicinity that confirm the presence of an article or package. Such detection may be used by an individual to elect to dispose or destroy an article or package, or to open a package in an area that cannot transmit wireless signals (e.g., a Faraday cage).
- an application programming interface that allow interactions with the event detection system 100 to be programmed or re-programmed.
- the API may allow the interactions from icons 602 604 to be programmed or reprogrammed, and result in different workflows.
- the API may be utilized to program the event detection system 100 such that differing sequences of interactions with the icons 602 , 604 result in different work flows being determined by the device operating servers 206 .
- the icons 602 , 604 may have the visual effect of numbers on a keypad, and the API may be utilized in a first instance to allow the entry of certain numbers to lock or unlock a remote device that is in communication with the operating servers 206 ; the API may subsequently utilized in an alternative program/instruction set that may be uploaded to the event detection system 100 via the telecommunications network 200 , whereby the revised instructions allow the user to operate an alternative device via the telecommunications network 200 .
- Many other examples of work flows that may be programmed by use of the API in accordance with the present technology will be readily apparent to those skilled in the art.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application claims priority under 35 U.S.C. §119(e) to U.S. Provisional Patent Application No. 61/949,935, “SYSTEMS AND METHODS FOR FACILITATING LONG-DISTANCE, AUTOMATED INTERACTION WITH CONSUMABLES,” filed Mar. 7, 2014 and to U.S. Provisional Patent Application No. 62/040,966, “SYSTEMS AND METHODS FOR FACILITATING LONG-DISTANCE, AUTOMATED INTERACTION WITH CONSUMABLES,” filed Aug. 22, 2014, both of which are incorporated by reference herein in their entireties.
- 1. Technical Field
- The present technology relates to the field of networking and consumer electronics, and more specifically, to systems and methods for enabling interactions with consumers and consumer articles, such as a package, via telecommunications networks.
- 2. Introduction
- Presently, tracking events remotely involves humans manually notating that an event occurred. For example, a receptionist can sign for a package and the courier can send a confirmation to the sender of the package that the package was received. However, the sender never actually knows that the package was opened. Likewise, consumer goods (e.g. medicine containers, tires, light bulbs, etc.) are passive and require a human to report that they need replacement or servicing. More advanced systems and methods are required to detect events at remote locations.
- In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 schematically illustrates an event detection and remote communications device embedded in an article, in accordance with some embodiments of the present technology; -
FIG. 2 illustrates network architecture for remote detection and operation of the article, in accordance with some embodiments of the present technology; -
FIG. 3 illustrates network architecture for remote detection and operation of the article, in accordance with some embodiments of the present technology; -
FIG. 4 is a flow chart for establishing communications with the article, in accordance with some embodiments of the present technology; -
FIG. 5 is a flow chart for establishing communications with the article, in accordance with some embodiments of the present technology; -
FIG. 6 schematically illustrates coupling between icons on an article and one or more event detection systems, in accordance with some embodiments of the present technology; -
FIG. 7 schematically illustrates a device for providing digital content to a user in lieu of live streaming, in accordance with some embodiments of the present technology; -
FIG. 8 is a flow chart for provisioning digital content devices, and receiving content from same, in accordance with some embodiments of the present technology; -
FIG. 9 is a flow chart for assigning network identifiers to articles in accordance with some embodiments of the present technology; and -
FIG. 10 is a flow chart for obtaining control of an article remotely in accordance with some embodiments of the present technology. - Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.
- The present disclosure addresses the need in the art for more advanced approaches for detecting events at remote locations. Systems, methods, and computer-readable media are disclosed which detect events occurring to an article at a remote location. The technology can involve integrating communication system within an article or package. The communication system can include a memory, a low-power power source, a sensor for detecting an interaction event with the article, a microcontroller coupled with the sensor, and a communication interface coupled with the microcontroller. The communication system can be associated with a telecommunication network (cellular network, mobile virtual network operator network (MVNO), pager network, long range radio network, ad-hoc event detection network, etc.) and can be assigned a network identifier and an article identifier.
- When the article or package is sent to a remote location and the sensor detects a predetermined event (opening the package, detecting a threshold luminosity, detecting a threshold pressure) the communication system can send a message over the telecommunication network that includes the network identifier, the article identifier, and location information (e.g. cell tower location).
- The technology can further involve an operating server (e.g. a server operated by an interchange entity such as an MVNO) receiving the message and recording the occurrence of the event at the location it occurred. The interchange entity can also provision article identifiers for tracking articles and packages. Similarly, the interchange entity can acquire bulk bandwidth for communicating over the telecommunication network and can provision articles and packages with network identifiers associated with a portion of the bandwidth to allow the telecommunication network to permit messages to be sent to the operating servers.
- In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present technology. It will be apparent, however, that the present technology may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present technology.
-
FIG. 1 illustrates anevent detection system 100 for providing event detection data relating to a consumer article over a network according to some embodiments of the present technology. Theevent detection system 100 can be coupled with anarticle 101, such as, for example, a package. Other examples of an article include envelopes, paper, books, magazines, shipping packages, package wrapping, gift wrapping, consumable items, price tags, price labels, theft-deterrent devices, inhalers, tires, clothing material, clothing tags, clothing labels, computing devices, consumer devices, such as an LED or other light-emitting fixture, disposables such as bottles or other containers for food products, liquids, toiletries, or other replenishables or perishables, off-the-shelf sensors such as temperature sensors or light sensors, automotive goods such as tires, batteries, and auto parts, or any portable object. - The
event detection system 100 can also include apower source 102, asensor 103, acommunication system 104, anantenna 106, amicroprocessor 108, andmemory 114. Theevent detection system 100 can also includeadditional power storage 112, anactuator 110, andother mechanisms 116. The components of theevent detection system 100 shown inFIG. 1 and similar components are explained in more detail below. - In some embodiments, the
event detection system 100 may be housed on a substrate or within one or more substrates. The substrates can be attached to or enclosed within packages or other consumer articles. The substrates can be distinct from the packages and can be integrated within the packages. Examples of packages on which theevent detection system 100 could be attached include paper-based packages such as envelopes, printed materials such as menus, or packaging such as pizza boxes. A variety of other packages and consumer articles can be benefit from the present technology and a number of types of packages and articles are mentioned explicitly in this disclosure. However, those with ordinary skill in the art having the benefit of this disclosure will readily appreciate that a wide variety of packages and articles can be used with the present technology. - In some embodiments, the
event detection system 100 is implemented in one or more integrated circuits, which may include silicon-based integrated circuits, and in which theevent detection system 100 may be attached to the packages via an adherent. Theevent detection system 100 can be enclosed within the package, such as, by way of illustrative example but not limitation, an envelope or pizza box. In some embodiments, the electronics comprising theevent detection system 100 may be deposited, in whole or in part, on the medium of the package itself. For instance, the components of theevent detection system 100 may be instantiated directly on a paper-based medium, such as an envelope or cardboard box. - In embodiments of the present technology, the
event detection system 100 is substantially visually indistinguishable from the medium in which it is embedded or attached. For example, when theevent detection system 100 attached to or embedded in a paper envelope, theevent detection system 100 may be visually indistinguishable to viewers from the paper of the envelope. It will be understood by those skilled in the art that the technology can be practiced on media that are durable rather than disposable, and that in alternative embodiments of the present technology, the features of the present technology described herein are implemented in durable materials, substrates, or other non-disposable media. - As explained above, the
event detection system 100 includes apower source 102. In embodiments of the technology, thepower source 102 is an ambient power source, which receives and converts energy from the surrounding environment. For example, the ambient power source may be a photo-voltaic detector. In other embodiments, thepower source 102 may obtain energy from radio waves or other electromagnetic spectrum. Ambient energy sources may include inductive power sources, such as those powering RFID readers. - Also some embodiments of the present technology can involve using thermal power, such as from body heat, or ambient kinetic energy, such as from the motion of a user or recipient of the package. Alternative forms of ambient energy that can be utilized to supply power to the
event detection system 100 will be apparent to those skilled in the art. - In some embodiments, the
power source 102 can be a lightweight battery. Certain embodiments may utilize a capacitor for energy storage. For example, a supercapacitor may be utilized. In some embodiments, the capacitors or battery may be on a separate substrate from the event detection system; in other embodiments, the capacitor or battery may be implemented within the physical medium of the event detection system, such as in paper on a paper-based package. - In other embodiments, there is no battery or power storage in the event detection system, and all power is received through ambient sources. Some embodiments of the present technology include additional
secondary power storage 112 that is separate from the original power source; in some such embodiments, thesecondary power storage 112 collects power from aprimary power source 102 from time-to-time, or on a periodic basis. - In embodiments of the present technology, the
power source 102 is utilized to provide a signal of an event to theevent detection system 100, as described further in other sections of this written description. In embodiments of the present technology, thepower source 102 is charged prior to delivery of theevent detection system 100, so that theevent detection system 100 is operable immediately without requiring power from an external source for initial communications to be conducted via thecommunications system 104. - As explained above, the
event detection system 100 can include acommunications system 104. In some embodiments of the present technology, thecommunications system 104 communicates over a long-distance wireless telecommunications system. For example, the wireless telecommunications system can be a pager network. In some embodiments of the present technology, the telecommunications system does not require a SIM card or other similar local network identifier to be included in theevent detection system 100. Also, the wireless telecommunications system can be a cellular network, such as a TDMA, CDMA, LTE or GSM network. Other alternative wireless telecommunications systems that can be utilized with the present technology will be apparent to those skilled in the art. Additionally, thecommunications system 104 may communicate over a wireless local area network (e.g. 802.11 protocol). Other alternative wireless network systems that can be utilized with the present technology will be apparent to those skilled in the art. - In certain embodiments, the
communications system 104 may include systems to communicate within close proximity to other devices, such as Near Field Communications (NFC), Bluetooth, or radio frequency identification (RFID) systems; other such systems for proximate communications will be apparent to those skilled in the art. Thecommunications system 104 may include anantenna 106. In certain embodiments, theantenna 106 may be a strip line antenna; in certain embodiments, the antenna may be printed on the same medium as the package, such as paper. In some embodiments, thecommunications system 104 may include a Subscriber Identity Module (SIM) circuit. Alternative implementations of thecommunications system 104 that are operable at the voltages provided by thepower source 102 will be apparent to those skilled in the art. - In embodiments, the
event detection system 100 includes a low power microcontroller/microprocessor 108, which is operable under the power provided by the power source. For example, themicrocontroller 108 may constitute an 8-bit microcontroller; however, in other cases, higher-bit microcontrollers may be utilized. Themicrocontroller 108 will be operable at a power and voltage that can be supplied by thepower source 102. In some such embodiments, themicrocontroller 108 is in communication with solid state, low-powernon-volatile memory 114 that can be embedded on the substrate, and that is operable at the power and voltage that can be supplied by thepower source 102. Thenon-volatile memory 114 may in embodiments, be readable, programmable, or read/writeable. Suitable forms ofnon-volatile memory 114 will be apparent to those skilled in the art. In embodiments of the present technology, the digital components of theevent detection system 100 are coupled over one or more communications buses; in some such embodiments, such one or more communications buses may be embedded in a common substrate with other components of theevent detection system 100. - The
microcontroller 108 will also be configured to operate thecommunications system 104, in response to events detected by theevent detection system 100. In some embodiments, thepower source 102 also serves as a sensor that detects events which are reported to themicrocontroller 108. As an illustrative, non-limiting example, themicrocontroller 108 may be programmed to detect when a photo detector acts as apower source 102 in theevent detection system 100 and receives light at a certain luminosity, and may be configured to send a signal via thetelecommunications system 104 in response. In alternative embodiments, theevent detection system 100 includes asensor 103 that is separate from thepower source 102, wherein thesensor 103 is in communication with the microcontroller/microprocessor 108, and the microcontroller/microprocessor 108 is operative to poll and respond events detected at thesensor 103. In some embodiments of the present technology, theevent detection system 100 includes an on-board actuator 110 in communication with the microcontroller/microprocessor 108, to driveother mechanisms 116 that are coupled to theactuator 110, in response to commands received from the microcontroller/microprocessor 108. For example, theactuator 110 may be coupled to and operate anLED 116 attached to theevent detection system 100. In some cases, the LED can be Organic LEDs (OLEDs) or quantum dots. Other examples of actuators that can be used in embodiments of the present technology will be apparent to those skilled in the art. - In some embodiments, the
mechanism 116 may be a small, lightweight display, such as a liquid crystal display. In some such embodiments, thedisplay 116 may be utilized to display a code, such as a QR code. In some embodiments, themechanism 116 may be a speaker. In some such embodiments, the speaker may be utilized to issue an audible or inaudible sound that identifies theevent detection system 100 orpackage 101. - In some embodiments, the
actuator 110 andoutput mechanism 116 may also act assensors 103; in some such embodiments, aspeaker 116 may also be utilized as a microphone that provides input to thesensor 103/110, which translates the analog signal of the microphone into a digital signal for themicrocontroller 108.Other mechanisms 116 attached to the packaged that maybe operated by theactuator 110 will be apparent to those skilled in the art. In some embodiments, the event detection system includes anactuator 110, but nosensor 103; in some such embodiments, theactuator 110 is responsive to signals received by the microprocessor/microcontroller 108 via thecommunication system 104. -
FIGS. 2 and 3 illustrate examples of communications networks used for remote interaction with articles containing event detection systems according to some embodiments of the present technology. As shown inFIGS. 2 and 3 , multiple articles 299 containing event detection systems can communicate over long-distances over a long-rangewireless communications system 200. For example, thewireless communications system 200 can be a pager network, a cellular network, or other wireless communications system, which is communicable via a lower power system, as discussed above. In some embodiments of the present technology, thewireless communications system 200 can include two or more wireless networks from different telecommunications services providers. For example, different telecommunications services providers and networks may be utilized for communications with the article 299 if the article 299 moves in and out of coverage, roams between networks, etc. - In some embodiments of the present technology, an article 299 can communicate with one or
more communications servers 202. In some such embodiments thecommunications servers 202 are configured to identify one or more network identifiers associated with the article 299 via adevice identification database 204 coupled locally to thecommunications servers 202. In some other embodiments, as depicted inFIG. 3 , theidentification database 204 is remote from thecommunications servers 202. - In embodiments, the
communications servers 202 include protocol gateways for transforming messages received via thewireless communications system 200 to a packet based protocol for further distribution over thewide area network 208, as described below. - Embodiments of the present technology include one or
more operating servers 206 for interacting with the articles 299; such interactions may include monitoring and/or operating the articles 299. In embodiments of the present technology, the operatingservers 206 are in communication with thecommunications servers 202 via awide area network 208, such as the Internet. Also, communications between the operatingservers 206 and the articles 299 can be sent over a packet-switched protocol, such as or TCP/IP or UDP. In some embodiments, the packet-switched protocol is IPv4 or IPv6. Other packet-switched protocols that may be utilized for communications between the articles 299 and the operatingservices 206 shall be apparent to those skilled in the art. In some embodiments, the one ormore operating servers 206 are in direct communication with thedevice identification database 204. - In some embodiments of the present technology, the
communications system 104 associated with an article is configured not to search for cellular towers at periodic intervals; rather, thecommunications system 104 can be configured to send a burst communication to reach multiple cellular towers upon the occurrence of an interaction event upon which an individual message is to be sent. Also, thecommunications system 104 can be configured so that a message is held by theprocessor 108 and only sent by thecommunications system 104 once sufficient power is received/stored at thepower source 102 to enable a one-time delivery of the message to thecommunications server 202 via thecommunications system 200. - In some embodiments of the present technology, an article is associated with one or more network identifiers. For example, the network identifiers can include an identifier on the
telecommunications network 200, such as a telephone number. In some embodiments, the one or more network identifiers may include an identifier such as an IP address (such as an IPv4 or IPv6 address), a MAC address, or a universally unique identifier (UUID). Other examples of network identifiers associated with the articles will be apparent to those skilled in the art. - In embodiments of the present technology, a single article may include more than one
event detection system 100 and each of the one or moreevent detection systems 100 shares one or more of the network identifiers. For example, an envelope may have two or moreevent detection systems 100, each of which has the same phone number. In some embodiments, theevent detection systems 100 are authenticated to thecommunications server 202 only if allevent detection systems 100 on the device report the same identifier. - In embodiments of the present technology, the
identification database 204 maps the network identifiers to the one or more articles. In some embodiments, the identification database also records one or more individuals associated with an article. In embodiments, other personally identifying information may be included in theidentification database 204, such as a postal address for the user, or to which a package is sent. Other examples of user or article information that may be stored in theidentification database 204 shall be apparent to those skilled in the art. - The identification database can be an SQL database, a flat file, a CSV, or, distributed file system, etc. In certain embodiments, the identification database stores records in encrypted format. In some such embodiments, the encrypted records are only accessible by a user associated with the article. In certain embodiments, the user may access the
identification database 204 via a web browser orother client application 210 in communication with theidentification database 204 via thewide area network 208. In some embodiments, theclient application 210 may be a mobile application that operates on a smartphone, tablet, or other mobile computing device. In some such embodiments, communication between theclient 210 and theidentification database 204 is over a secure protocol, such as, by way of example but not limitation, Secure Socket Layer; other suitable secure protocols will be readily apparent to those skilled in the art. In some embodiments, theidentification database 204 andclient 210 are configured to allow the user to set up a password unique to the user, which is required for operating the articles remotely. - In certain embodiments, the network identifier of an article includes several more bits than necessary to uniquely identify the article, for purposes of security and/or error correction. In some such embodiments, the bits in the network identifier are randomized. In some embodiments, a plurality of
event detection systems 100 on a single package include a common string in the network identifier, to indicate that suchevent detection systems 100 belong on a single package. In certain embodiments, the network identifier includes error correction, such as forward error correction, Hamming codes, or Reed-Solomon codes. Other methods of error correction or redundancy that may be applied to the network identifiers shall be readily apparent to those skilled in the art. In certain embodiments, theevent detection system 100 may be communicated with by the operatingserver 206 via email, SMS, Twitter, or other text-based messaging systems. In some embodiments, theevent detection system 100 is associated with a public key, for encrypting and authenticating keys. -
FIG. 4 illustrates an example for authenticating packages or other articles containing communication systems according to some embodiments of the present technology. The method 400 can involve acommunication system 100 detecting an event (e.g. interaction event) at anarticle 402. By way of example but not limitation, the event may be an initial detection that a threshold of energy has been received at thepower source 102, or that another event has been detected at asensor 103 separate from thepower source 102. As a non-limiting example, thepower source 102 may be a photo-diode, and themicrocontroller 108 may be initially configured in a sleep state, and subsequently enclosed or embedded in an enclosed package, such as an envelope or cardboard box. Themicrocontroller 108 may be configured to wake when apower source 102 reaches a certain threshold of energy, such as, by way of example but not limitation, a certain luminosity arriving at the photo-diode by virtue of the enclosure being opened by an end user, or a certain current or voltage threshold being received or produced at thepower source 102. - Alternatively, the
event detection system 100 may be charged initially with power, and may be configured to periodically poll one or more ports orsensors 103 in order to determine if an event has occurred, such as the breaking of a circuit. As an illustrative, non-limiting example, theevent detection system 100 could be enclosed in a package such as an envelope or box, and the event could be the breaking of a circuit, for example, when the enclosure is opened. Other examples of such triggering events will be apparent to those skilled in the art. - The method 400 also involves the article communicating 404 with the
communication server 202 in response to the event, e.g. via a telecommunications system. - In some embodiments of the present technology, at the time that the article is deployed, bandwidth may be purchased from the providers of a telecommunications service, in order to allow the article communicate via the
telecommunications service 200 automatically, for a minimum or perpetual subscription period. Alternatively, such connectivity may be purchased from the providers of thetelecommunications service 200 in batches, allowing communication from the packages for limited periods of time. - Next, the method 400 involves, upon receipt of communication from the event detection system containing an identifier for the article, the communications server checking the
identifier 406 against a localarticle identification database 204 to authenticate the identification of the article, and establishcommunication 408 with the article. If the article identifier is not authenticated 410, the communication is dropped. For example, if the identifier is not authenticated, such identifier may be placed on a blacklist in the localarticle identification database 204, so that future communications are not received from such article identifier. -
FIG. 5 illustrates an exemplary method 500 for authenticating an article with anarticle identification database 204 using anoperating server 206 according to some embodiments of the present technology. In such embodiments, after the triggering event is detected 502 at the article, the article establishescommunication 504 with the communications server via the communications network. The communications server then encapsulates one or more identifiers received from the article in one ormore packet payloads 506. The communications server forwards the encapsulated packets to the operating server via the packet-switchednetwork 508. In some embodiments, the encapsulated packet is forwarded to the operating server in an encrypted or secure form. In some such embodiments, such communications are conducted using a Secure Socket Layer protocol, and/or by use of the IPSec protocol suite; other alternative security protocols that can be utilized for communications between the communications server and the operating server will be apparent to those skilled in the art. - On receipt, the operating server de-encapsulates the article identifier, and authenticates 510 the article identifier against the article identifier database. Upon authentication, the operating server establishes 512 a session with the article (or alternatively, is now configured to accept and exchange asynchronous messages with the article) over a packet switched protocol, with such messages routed to the article via the
communications server 202 and the telecommunications network. In embodiments of the present technology, subsequent communications between an operatingserver 206 and the article are conducted over a secure protocol, such as a Secure Socket Layer protocol, IPSec, etc. In some such embodiments, secure communications sessions are established between the article and thedevice operating server 206, so that such communications are not transparent to thecommunications servers 202. - In embodiments of the present technology, the operating
server 206 collects and generates reports and/or performs analytics on data received from and about the article. In some embodiments, the operatingserver 206 sends commands to the article to operate the article. In some embodiments, the reports are delivered by the operatingserver 206 to theclient application 210. In some embodiments, theclient application 210 may also provide instructions to operate the article via theoperating server 206. In some embodiments, a user of the article may be authenticated and authorized to operate the article and/or receive data from the article via theclient 210. - In embodiments of the present technology, the functions and systems described above may be performed or operated, as applicable, by different entities. For example, one or more articles including an event detection system may be sent by or on behalf of one or more issuers to the end users. An issuer may utilize an interchange entity, such as for example, a telecommunications network provider, Mobile Virtual Network Operator (MVNO), a legacy network, such as a pager communication network, postal service, mail courier, retailer (storefront or online), delivery service, and the like for functions associated with the articles. In some such embodiments, the interchange is responsible for operating the
operation servers 206. In some embodiments, the interchange creates, operates and maintains thearticle identification databases 204. In some embodiments, the interchange is responsible for the procurement of bandwidth from one or more telecommunications services providers of thetelecommunications systems 200. e.g. when the communications servers are operated by the telecommunications services providers. In some embodiments, as depicted inFIG. 2 , thearticle identifier database 204 is operated by the telecommunications services provider. Also, thearticle identifier database 204 is operated by the interchange, as shown inFIG. 3 . Identifiers for the applicable issuer and interchange may be included in thecommunications system 104. - In some such embodiments, the interchange utilized for a
package 101 is responsible for routing communications from an article to the appropriate issuers via the network identifier of the article. In some such embodiments, upon receiving or exchanging messages from or with an article, the interchange updates billing records associated with the issuer, or accounts payable to the telecommunications services provider. In some embodiments, theoperation servers 206 may be operated or accessed by the issuer, and communications between the issuer and the articles are routed by the interchange to the appropriate telecommunications services provider by reference to the article/network identifiers. In some embodiments, an issuer may utilize different interchanges for communications with different articles or different types of articles. For example, an issuer may communicate with articles via different interchanges which are selected or determined based upon the geographical destination of the article or location of the intended user/consumer. Alternatively, interchanges may be selected or determined based on the bandwidth required for communication with the applicable article, the type of communications to be conducted with the articles, or the applications supported by the articles. Those with ordinary skill in the art having the benefit of this disclosure will readily appreciate that other a wide variety of criteria can be used for selection of interchanges. - In some embodiments of the present technology, the network identifier for an article is loaded on to the
communications system 104 at the time the article or package is provisioned. For example, the identifier may be loaded in a SIM circuit in thecommunications system 104. The telecommunications provider can route traffic between the article and thearticle operating servers 206 that are operated by or on behalf of the issuer of the article or package, based on the network identifier for the article. When communications between the operatingserver 206 and theevent detection system 100 are held over secure communication sessions, such communications will not be transparent to the telecommunications services provider. - In embodiments of the present technology, the
article identification database 204 is populated at the time the article and/or packages are provisioned. In some embodiments, as depicted in the flowchart inFIG. 9 , at the time of provisioning, the package is sent 900 through an automated process whereby information printed on the package is read 902. For example, a reader reads such printed information via optical scanning The printed information may be a name of an intended recipient of the package and a delivery address for the package. Thereafter, the articles that are enclosed in or attached to the package are detected 904. For any article that has not been provisioned in anarticle identification database 906, the article is read to see if it has an identifier encoded 908. - If not, an article identifier is selected from a pool of available identifiers and scanned onto the
article 910. If there is an identifier on the article, that identifier is retrieved 912 and stored in thearticle identification database 204 along with the associated name and location of the intendedpackage recipient 914. - In alternative embodiments, as will be apparent to those skilled in the art, the steps in the foregoing process may be conducted concurrently or in alternative orders. By way of example but not limitation, the article may be detected initially, with the label/delivery address placed on the package based on the identifier of the article. In other embodiments, the article is not scanned, but the article identifier may be known by virtue of an order in which the package was sent through the process. In some embodiments, the package may be initiated through the process without an identifier for the article or a package label, and both may be assigned to the article and its applicable package concurrently. Other variants will be apparent to those skilled in the art.
- As will be apparent to those skilled in the art, the articles described herein can constitute a consumer device, such as an LED or other light bulb or fixture, disposables such as bottles or other containers for food products, liquids, toiletries, or other replenishables or perishables, off-the-shelf sensors such as temperature sensors or light sensors, automotive goods such as tires, batteries, or auto parts; additional examples are too numerous to mention, but will be readily apparent to those skilled in the art. Certain such media, or goods, have states to be monitored by either the user via a
client 210, or by a vendor or other entity in communication with the article andevent detection system 100 via anoperating server 206. - In embodiments of the present technology, an article or package is monitored automatically and remotely via an operating server, without requiring provisioning or other manual intervention by the user. For example, an article may be a medicine bottle that is delivered to a user, whereby an event corresponds to detection of an amount of medicine remaining in the bottle. By way of illustration, the bottle may be configured such that multiple measurements, such as weight measurements, or detection of fluid levels, are taken by the
event detection system 100, in order to determine robustly that an amount of medication has fallen below a defined threshold, with the multiple measurements taken in order to minimize false-positive results. In embodiments of the present technology, a delivery of refills for the medication is dispatched to the location of the bottle upon when notification of the threshold is received at the operating server, and a determination is made by the operating server that the result is robust and the medicine has definitively fallen below a designated threshold. For example, the medicine may be an inhaler, and the triggering event may be a determination of pressure in the inhaler, or detection of a certain gas mixture in the inhaler, indicating a need for replenishment. The foregoing information may also be correlated and stored with other medical records of the applicable users. Other examples of such replenishables shall be readily apparent to those skilled in the art. - The
event detection system 100 may be used in conjunction with an automobile tire, and a triggering event can correspond, for example, to a dramatic pressure drop, and a message is sent by theevent detection system 100 to an operating server indicating the drop in tire pressure and a geolocation of the automobile. In embodiments of the present technology, thepower source 102 of theevent detection system 100 is a separate power source from the car battery. For example, the power source may derive from heat sources or kinetic sources in the car, or from alternative redundant power sources in the car. In some such embodiments, the geolocation of the event detection system is separate from geolocation systems in the car or otherwise. For example, the geolocation data may be inferred fromtelecommunications networks 200 by which theevent detection system 100 communicates. In embodiments of the present technology, upon detecting a catastrophic failure of the tire and receiving the geolocation of the automobile, an operating server can automatically dispatch service to the location of theevent detection system 100. As will be apparent to one skilled in the art, the present technology can be similarly utilized forevent detection system 100 included in an automobile battery, where the triggering event corresponds to a voltage indicating a battery failure. Other examples will be readily apparent to those skilled in the art. - In some embodiments of the present technology, an article, package, and system are also remotely operable, by the user via the
client 210, or by a third party via anoperating server 206, as further depicted in the flowchart inFIG. 10 For example, a package may be a light source, such as an LED, whereby the light source is provisioned, prior to delivery to the user, with sufficient call-time to exchange messages via a wireless telecommunications network for the expected life of the product. In some such embodiments, the event detection system is bound by an identifier that is provided to the user. For example, the identifier may be included in packaging for the product. Alternatively, the product may be configured to communicate with a mobile device of the user via a near field protocol, such as NFC, and to be bound by an identifier set by the user. In some such embodiments, after receipt 1000 of the package the user may enter 1002 the article identifier/credentials included in the package into the client device. The user is then authenticated by anarticle operating server 206 by use of thecredentials 1004. If the user is authenticated 1006, the user is then grantedauthorization 1008 to control the article or package, including rights to receive data fromsensors 103 andcontrol actuators 110. In some embodiments, the user is granted authority to remotely monitor and operate the article via theclient 210. In embodiments of the present technology, after authentication of the user, the user may transferauthority 1010 to operate the article to a third party. In some such embodiments, such transfer may be effectuated through a third party login/authorization system (such as, by way of example but not limitation, Facebook Connect; other alternatives will be readily apparent to those skilled in the art) and thearticle identifier database 204 is updated with the credentials for thethird party 1012. - For example, when the article is an electronic device, the user may reduce a luminosity of the device remotely via a client. As another example, the package may be a thermostat, and the user may obtain authorization to obtain data from the thermostat and operate the thermostat remotely after authentication using codes on the package that are submitted to the article operating server by the user. Other examples/embodiments of such remote authentication and operation of article and packages will be readily apparent to those skilled in the art.
- In some embodiments, the article can be wearable by a user. By way of example but not limitation, an article may constitute a button embedded into clothing or jewelry, whereby, by pressing the button, a call is immediately placed to an emergency number. In some such embodiments, the user may communicate with the emergency responders audibly, through a microphone/speaker in communication with the event detection system. In some such embodiments, the call is placed directly via the
cellular network 200. In other embodiments, a call center talks to the emergency responders based on data delivered from the article. - In an embodiment of the present technology, the
event detection system 100 is embedded/attached to a mobile device, such as a cellular phone, laptop, tablet, etc. In some such embodiments, theevent detection system 100 can embedded on such device in a manner that is inconspicuous, or that cannot be detached physically from the device without destruction/mutilation of the device. In some such examples, theevent detection system 100 communicates over awireless telecommunications system 200 that is separate from the antenna and communications system of the mobile device. In some such embodiments, theevent detection system 100 has an ambient power source separate from that of the mobile device, so that the phone periodically reports its location to theoperating server 206, separately from the mobile device itself, so that its location can continue to be tracked in case the mobile device itself is wiped or runs out of power. - In some embodiments, the
event detection system 100 is attached to consumer good articles at the time of production, prior to delivery to stores, as a means of theft detection. By way of example but not limitation, theevent detection system 100 may be attached to a consumer article, such as an article of clothing, at the time of manufacture, and provisioned with sufficient bandwidth/“talk-time minutes” on a telecommunications network to send its location to theoperating server 206 for a period of time that is substantially longer than the expected sales cycle for the consumer good. On initial receipt of a location that is outside of the permitted stores to which the consumer good can be delivered, the operating server can check a database to determine whether or not the article has been sold. If the article has not been sold, a theft alert is generated. Alternative data flows for fraud detection will be apparent to those skilled in the art. - In embodiments of the present technology, an
event detection system 100 is provisioned by one or more separate devices/machines prior to delivery of a package to the end user. In some such embodiments, the one or more separate devices scan an address on the package at the time it is provisioned. This may include scanning a printed address via optical character recognition, scanning a bar code, QR code, or other such printed code on the package, and/or detection of theevent detection system 100 via electronic communication, such as, by way of example but not limitation, via Near Field Communication. In some such embodiments, the machines update the article identifier database to couple the postal/physical delivery address on the package 101 (or other such identification of thepackage 101 as may be printed on thepackage 101 or indicated in the bar code, QR code, or other such code) with an article and/or user identifier in an article identifier database. Other mechanisms for correlating printed information on thepackage 101 with article identifiers or other information regarding the user or article will be apparent to those skilled in the art. In some embodiments, such separate articles may be operable to adhere and/or enclose theevent detection system 100 particular positions on a package, for conformance with design specifications for the package, or to place articles in communication with corresponding icons on the package. - In embodiments of the present technology, the
event detection system 100 is utilized to measure and track the interaction of the user with an article or package. In some such embodiments, theevent 402 is a proxy indicating an interaction of the user with the article or package. By way of example but not limitation, theevent 402 may indicate that the user touched an icon on thepackage 101, such as, by way of illustrative example but not limitation, a printed “button” on thepackage 101. - As depicted in
FIG. 6 , apackage 101 may have one or more printed icons/sensors event detection systems 100 embedded in thepackage 101. In some such embodiments, an event is triggered by breaking or completing a circuit by virtue of the user interaction. For example, theevent detection system 100 may be configured so that, by virtue of touching theicon power source 102 and the remainder of theevent detection system 100. In other embodiments, theevent detection system 100 includes touch detection at theicon event 402 corresponds to detection of light from the opening of an enclosed package, such as an envelope or box. Many alternative embodiments will be apparent to those skilled in the art. - In embodiments of the present technology, after the
event detection system 100 has been authenticated, the occurrence of theevent 402 is recorded at one ormore operation servers 206, and associated with an identifier of the article or package. In some such embodiments, the operation servers receive and records an identifier for thepackage 101, one or more identifiers for theevent detection systems 100 on thepackage 101, identifiers for an intended, expected, or authenticated recipient or user of thepackage 101, the time at which theevent 402 occurred, a geo-location for thepackage 101 at the time of theevent 101,as identified automatically through the event detection system 100 (via location parameters determined from thecommunications system 200, or, in other embodiments, a low-power geo-location system, such as a low-power Global Positing System interface, included in the event detection system 100), a postal address to which thepackage 101 was sent, purchases or other electronic transactions conducted by interaction with the icons, etc. In some embodiments, such information is stored in one or more databases, which may be relational databases or other distributed databases. In some such embodiments, multiple events and corresponding records are stored and identified with an individual user or physical address. - In some embodiments, following authentication of an
article 511, an interchange may elect to decline facilitation of communications between an issuer and the article, based on policies. By way of example but not limitation, such a policy may be based on a geo-location of the device, or a volume of data intended to be transmitted to the device, etc. - In some such embodiments, the
packages 101 andicons icon 602 604, which may be depicted as a “button” or may otherwise indicate that part of a package was touched. In some such embodiments, such data may be used for real-time, or asynchronous off-line optimization of marketing campaigns. In embodiments of the present technology, a geo-location of theevent detection system 100 at the time of the customer interaction is determined; in some such embodiments, such geo-location data is tracked against thedatabases 204 to determine whether or not the interaction with theevent detection system 100 was by the targeted user. Such determinations may be utilized, by way of example but not limitation, to determine or enhance the accuracy of success rates in direct mail applications. - In some embodiments, such information may be used to determine payments to third parties for marketing/advertising on a package, e.g. paying third parties based upon user interactions with the package or transactions conducted via the package. Such analytics may also include, by way of example but not limitation, determination of success rates for direct mail campaigns. In some embodiments, subsets of the
packages 101 may be selected to estimate the applicable statistics by statistical sampling. Other examples of analytics made possible by the present technology will be apparent to those skilled in the art. - In some embodiments of the present technology, the
event detection system 100 is operable to communicate with a user via a mobile phone application via a short-range protocol (e.g. NFC, Bluetooth, etc.). In some such embodiments, the event may correspond to a detection by theevent detection system 100 that the user's mobile phone is within a certain proximity of theevent detection system 100. For example, anevent detection system 100 may be embedded in apackage 100, whereby theevent detection system 100 triggers an event when theevent detection system 100 detects via the NFC that a device with a specified identifier is within a distance threshold of theevent detection system 100, and the event triggers interaction between theevent detection system 100 and the mobile device (e.g., communication of a message from theevent detection system 100 to the mobile device via the NFC, for display on the mobile device). - In some embodiments, a
package 101 includes two or more components that communicate via an NFC, whereby theevent detection system 100 is operative to detect from the NFC signals when such two or more components are physically moved relative to one another. For example, such components may be located on opposite pages of a magazine, such that an event may correspond to a page of the magazine being turned. Alternatively, one such component may be on a detachable part of the package and another component is on a non-detachable portion, whereby theevent detection system 100 is operative to detect that the applicable portion of the package has been detached. Other such implementations of multiple short-range radio components within a package will be apparent to those skilled in the art. - In embodiments of the present technology, the
event detection system 100 is utilized to conduct electronic commerce transactions via theevent detection system 100, i.e., thepackage 101 may constitute a bill or an invoice, e.g. a cable bill or a credit card bill. - For example, a package in the form of a bill for cable television can include an
event detection system 100 sent to a user's home, and can include theicons icons 602 604. Also, thepackage 101 may be a credit card bill, and theicons icon event detection system 100 incorporated therein may be used to indicate whether or not a credit card invoice should be deducted from a user's bank account. In other embodiments of the present technology, thepackage 101 may be an advertisement, for instance, in a publication such as a magazine, which enables the user to purchase advertised items by touching anicon article operating servers 206, and purchases are allowed via theicons event detection system 100 and thedevice operating servers 206 in connection with the transaction is conducted via encrypted protocols as described above. - As other examples, the
packages 101 may be printed take-out/carry-out menus, or containers for food delivery, such as pizza boxes. In some such embodiments, the user may purchase an item for delivery via touching acorresponding icon operating server 206, which receives an electronic message (e.g. an email, SMS, Twitter message, or other such electronic communication) from theevent detection system 100 via the Internet. In other embodiments, theevent detection system 100 places a telephone call to via thecommunications network 200 to the vendor. Some such embodiments may include miniature a microphone and/or speaker that attached to or part of theevent detection system 100, and is in communication with themicrocontroller 108; the microphone/speaker will be operable at the energies provided by theambient power source 102, and may be inconspicuous in or visually indistinguishable from thepackage 101. Also, the microphone or speaker is used for vocal communication with the vendor via thecommunications network 200. In some such embodiments, the transactions and fulfillment occur only after the postal address to which thepackage 101 was sent has been authenticated against one or more of the geo-location data from theevent detection system 100 and/or an identifier for the user orevent detection system 100 that has been authenticated in accordance with embodiments of the present technology. In some examples, the purchased item is delivered in response to event, to the authenticated/validated physical/postal address of thepackage 101. - Embodiments of the present technology support one-way, two-way, or multi-party vocal messages. In some embodiments of the present technology, the user may click on an
icon power source 102, a message is recorded from the user via the microphone on thepackage 101. In some embodiments, this message is stored at themicroprocessor 108 and/orcommunications processor 104 until there is sufficient power from thepower source 102 to send the message via thecommunications system 200. In some embodiments, the message is sent via thetelecommunications system 200 automatically after recording. - In some embodiments, the event establishes direct communication with the recipient via the
communications network 200 in real-time, without intermediate storage. In embodiments, the message from the user is forwarded to the recipient as an electronic message, such as an email, SMS, Twitter message, or other similar asynchronous electronic message. In some embodiments, the message is forwarded telephonically. In some embodiments, thecommunications system 104 in each ofseveral packages 101 sent to different recipients may be pre-loaded with a call-in number of other identifier for a conference call, so that the recipients may establish and/or join the conference call via thetelecommunications network 200 by clicking on theicon telecommunications network 200 by theevent detection system 100 have been pre-paid. - In embodiments of the present technology, an article or package is mailed to the user and the user is informed (via text on the package) that an event triggered by the user will indicate an assent by the user to a transaction. By way of illustrative example but not limitation, the text may state that the user will be charged for or will otherwise reimburse the postage or other delivery costs for the delivery of the
package 101 to the user in the event of the user opening of the package, touching acorresponding icon event detection system 100 to theoperating server 206, and the user is then charged separately. In other embodiments, upon the occurrence of the event, the user is automatically charged for the reimbursement, for example, by a charge to a credit/debit card or other on-line account that is previously stored for the user for access by the operatingserver 206. - In some embodiments of the present technology, an article or package is physically mailed with pre-paid postal or delivery charges for return of the article or package to the sender. In some such embodiments, an article identifier for the
event detection system 100 may be reutilized for the individual user to whom the article or package was sent, for use in subsequent deliveries to that user. Alternatively, following return of the original article or package, the article identifier can be decommissioned for the original user, and may be returned to a pool of available article identifiers. - In some embodiments, the user may indicate, via interaction with an
icon 602 604 or other event, that they are to receive a financial credit or reward on return of the article or package. - In some embodiments, the user can indicate, via the
icon 602 604 or other event at the package, that the package is to be collected, and a messenger may be dispatched to the user's location or postal address to collect thepackage 101 in response. Other variants for arranging return of an article or package via theevent detection system 100 will be apparent to those skilled in the art. - Embodiments of the present technology comprise a storage device that includes a high-speed wireless cellular connection, whereby the storage device is preloaded with user content, and the device is configured to release the user content by way of the cellular connection. Such embodiments are depicted schematically in
FIG. 7 . In embodiments of the present technology, thedevice 700 may be in a small form factor, such as a key fob or memory stick; other suitable form factors will be apparent to those skilled in the art. Thedevice 700 includes one or more highcapacity storage media 702, such as, by way of example but not limitation, flash memory. Some embodiments of the present technology include aport 704, which may be utilized for receiving power for thedevice 700, and/or for transfer of the content resident in thestorage media 702 to another device; by way of example but not limitation, the port may be a USB port. The device further includes acellular communications system 706. Thecellular communications system 706 may, by way of example but not limitation, be a 4G system, such as LTE or Mobile WiMax; other alternatives will be apparent to those skilled in the art. - In embodiments of the present technology, the
device 700 is configured to release content to an individual user, by virtue of one or more identifiers associated with the user. In embodiments of the present technology, a user may have content released from thedevice 700 by provisioning the applicable identifier to thedevice 700. An example of the provisioning and utilization of thedevice 700 in accordance with such embodiments is depicted inFIG. 8 . At the time of configuration, the device is loaded with one or more pieces ofcontent 800. Such content may be, by way of example but not limitation, movies or other video, songs, books, software, or other digital content that is generally streamed to an end user; other such content which can be delivered to a user by use of thedevice 700 will be readily apparent to those skilled in the art. As will be apparent to those skilled in the art, remote authentication steps described herein may alternatively be conducted locally on thedevice 700. - In some embodiments, each such piece of content is associated with an identifier that is unique to the user, the content, and/or the
device 802, i.e. public keys. The device, content, and user identifiers are stored in adatabase 804. The device is then physically shipped to theuser 806, associated with a user at the time of purchase or delivery of thedevice 700 to the user, etc. In some embodiments, the association, or binding, of the identifiers with the device may be conducted via an application running on a user's smartphone, whereby the instance of the application on the user has previously been authenticated. In alternative embodiments, such association/binding of the identifiers with thedevice 700 occurs at the point of sale, via a point of sale device in communication with thedatabase 204 via theInternet 208. - Following receipt of the device by the
user 808, the user may unlock the content on the device by providing the key for the applicable content to thedevice 810. In some embodiments of the present technology, the key is automatically provided to thedevice 700 by another device; by way of illustration but not limitation, the ID may be provided by a television in communication with the device via theport 704 or thetelecommunications system 706. The key is sent by the device to a central server via thetelecommunications system 812. The key is authenticated by acentral server 814, and upon authentication, the central server grants a permission to thedevice 700 to release the applicable content to theuser 816. In embodiments of the present technology, contents are continually updated to the device by the central servers via thecellular system 706, for potential later retrieval by a user. In alternative embodiments, thecommunications system 706 may be a low-bandwidth cellular communications system; in some such embodiments, the communications system is not utilized to update content to the device. - In certain embodiments, the devices are physically returned by the user to receive new content, whether loaded on the
same device 700 or sent to the user in anew device 700. Embodiments of the present technology include additional security measures for accessing or releasing content from adevice 700. - In embodiments of the present technology, in addition to authentication of the user/device/content identifiers, the geo-location of the device is determined, and the content is only released if the geo-location is approved for such device/content. In embodiments of the present technology, such geolocation authentication is conducted at the
remote database 204; in alternative embodiments, the geo-location authentication is performed locally on thedevice 700. In some embodiments, the geo-location is performed using telecommunications system on thedevice 700. In alternative embodiments, the geo-location or alternative authentication utilizes short-range radio communications to a user's mobile device; examples of short-range radio protocols that may be used for such location include, by way of example but not limitation NFC, Bluetooth, RFIDs, beacons; etc. In other embodiments, the supplemental security measure may include biometric identification of the user by thedevice 700. - In embodiments of the present technology, one or
more devices 700 are utilized as a virtual local area network. In some such embodiments, each device constitutes a modem that can be attached to, or constitutes part of, hardware that would otherwise be connected to a local area network, such as a server, laptop computer, printer, router, desktop PC, etc. In some such embodiments, all communications amongst such machines, via a local networking protocol such asIEEE 802, or communications between such machines and the Internet, are conducted through the cellular system 708; in some such embodiments, the local communication packets are encapsulated in the communications via the cellular system 710. - In some such embodiments, the devices may also be coupled via a local mesh or other local network, where such local network is utilized solely for communications within the nodes on the network, and not for Internet communications. Embodiments of the present technology utilize the information collected from a user via an article or
package 101 to personalize on-line, Internet and mobile-based content to such user; such customization may be conducted off-line or in real-time with the data received via thepackage 101. For example an online identifier of the user which identifies the user's activities on the World Wide Web or elsewhere on the Internet (such as a persistent identifier stored in a cookie, login usernames for on-line services, mobile phone numbers, or other such on-line identifiers as will be apparent to those skilled in the art) may be correlated with identification of the package in thedevice identification database 204. Web-based content may be customized for the user based on the data recorded about such user from a triggering event and their other interaction with theevent detection system 100. By way of example but not limitation, advertisements or other web-based or mobile content may be selected or customized for the user based on magazine contents that have been viewed by the user, as detected by theevent detection system 100 and reported to theoperating server 206. - Alternatively, emails, texts, Twitter messages, or other such electronic messages may be sent to a user based on their interaction with the article or package, as detected and communicated by the
event detection system 100. By way of example but not limitation, a user may be sent a thank you note following interaction with theevent detection system 100. Thepackage 101 may also be used by the end user (actively or passively) to update other records and workflows. By way of example but not limitation, health or insurance records of a user could be updated by way of the user's interaction with theevent detection system 100. - In embodiments of the present technology, analytics may be conducted on data sets contained in the
database 204 which combine data from the users' on-line activities (e.g., their Web usage) with data regarding such users' interactions with article or packages. For example, the fees charged to advertisers may be based upon delivery or response to Web or mobile based ads served to users as well as response rates from such users to paper-based advertising, as the latter is detected and reported by theevent detection system 100. Other examples of integration of feedback of theevent detection system 100 with user interactions via separate electronic media will be apparent to those skilled in the art. - In embodiments of the present technology, the
actuator 110 may be coupled tomechanisms 116 such as a camera that is operable at the power provided by thesupply 102. In some such embodiments, theevent detection system 100 is operable to take a picture of the user via thecamera 116 when the user opens the package, and then transmit the picture over awireless network 200. In some such embodiments, the picture is at a low-resolution, transmittable over low-baud rate networks. In embodiments, the picture may be utilized to authenticate the user, or provide proof that the individual opened the package. For example, for confirmation of service of process. Other uses and variants of such a camera will be readily apparent to those skilled in the art. - Some embodiments of the present technology include mechanisms for wirelessly detecting the presence of an article in the vicinity of the detection mechanism, in order to detect the presence of such a mechanism. In some such embodiments, the wireless detector checks for signature wireless transmissions in the vicinity that confirm the presence of an article or package. Such detection may be used by an individual to elect to dispose or destroy an article or package, or to open a package in an area that cannot transmit wireless signals (e.g., a Faraday cage).
- In embodiments of the present technology include an application programming interface (API) that allow interactions with the
event detection system 100 to be programmed or re-programmed. By way of example but not limitation, the API may allow the interactions fromicons 602 604 to be programmed or reprogrammed, and result in different workflows. For example, the API may be utilized to program theevent detection system 100 such that differing sequences of interactions with theicons device operating servers 206. As another illustrative example, theicons servers 206; the API may subsequently utilized in an alternative program/instruction set that may be uploaded to theevent detection system 100 via thetelecommunications network 200, whereby the revised instructions allow the user to operate an alternative device via thetelecommunications network 200. Many other examples of work flows that may be programmed by use of the API in accordance with the present technology will be readily apparent to those skilled in the art. - Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
- The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.
Claims (27)
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/639,983 US20150254606A1 (en) | 2014-03-07 | 2015-03-05 | Long-distance, automated event detection |
PCT/US2015/019293 WO2015134935A1 (en) | 2014-03-07 | 2015-03-06 | Long distance, automated event detection |
US14/793,487 US20160019499A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US14/793,485 US20160019498A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US16/841,607 US11829930B2 (en) | 2014-03-07 | 2020-04-06 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US16/923,713 US11853954B2 (en) | 2014-03-07 | 2020-07-08 | Remote control of article based on article authentication |
US18/492,109 US20240273455A1 (en) | 2014-03-07 | 2023-10-23 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US18/504,938 US20240257033A1 (en) | 2014-03-07 | 2023-11-08 | Remote control of article based on article authentication |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461949935P | 2014-03-07 | 2014-03-07 | |
US201462040966P | 2014-08-22 | 2014-08-22 | |
US14/639,983 US20150254606A1 (en) | 2014-03-07 | 2015-03-05 | Long-distance, automated event detection |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/793,487 Continuation-In-Part US20160019499A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US14/793,485 Continuation-In-Part US20160019498A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US16/841,607 Continuation US11829930B2 (en) | 2014-03-07 | 2020-04-06 | Systems and methods for controlling operation of an article based on detection of an interaction event |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150254606A1 true US20150254606A1 (en) | 2015-09-10 |
Family
ID=54017719
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/639,983 Abandoned US20150254606A1 (en) | 2014-03-07 | 2015-03-05 | Long-distance, automated event detection |
US14/793,487 Abandoned US20160019499A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US14/793,485 Abandoned US20160019498A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US16/841,607 Active 2035-05-15 US11829930B2 (en) | 2014-03-07 | 2020-04-06 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US16/923,713 Active 2035-04-09 US11853954B2 (en) | 2014-03-07 | 2020-07-08 | Remote control of article based on article authentication |
US17/012,389 Active 2035-01-25 US11948123B2 (en) | 2014-03-07 | 2020-09-04 | Systems and methods for providing a third party access to interaction data for an article |
US18/492,109 Pending US20240273455A1 (en) | 2014-03-07 | 2023-10-23 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US18/504,938 Pending US20240257033A1 (en) | 2014-03-07 | 2023-11-08 | Remote control of article based on article authentication |
Family Applications After (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/793,487 Abandoned US20160019499A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US14/793,485 Abandoned US20160019498A1 (en) | 2014-03-07 | 2015-07-07 | Systems and methods for facilitating long-distance, automated interaction with consumables |
US16/841,607 Active 2035-05-15 US11829930B2 (en) | 2014-03-07 | 2020-04-06 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US16/923,713 Active 2035-04-09 US11853954B2 (en) | 2014-03-07 | 2020-07-08 | Remote control of article based on article authentication |
US17/012,389 Active 2035-01-25 US11948123B2 (en) | 2014-03-07 | 2020-09-04 | Systems and methods for providing a third party access to interaction data for an article |
US18/492,109 Pending US20240273455A1 (en) | 2014-03-07 | 2023-10-23 | Systems and methods for controlling operation of an article based on detection of an interaction event |
US18/504,938 Pending US20240257033A1 (en) | 2014-03-07 | 2023-11-08 | Remote control of article based on article authentication |
Country Status (2)
Country | Link |
---|---|
US (8) | US20150254606A1 (en) |
WO (1) | WO2015134935A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10373167B2 (en) | 2016-06-30 | 2019-08-06 | Square, Inc. | Logical validation of devices against fraud |
US10409984B1 (en) | 2012-06-15 | 2019-09-10 | Square, Inc. | Hierarchical data security measures for a mobile device |
US10496993B1 (en) | 2017-02-15 | 2019-12-03 | Square, Inc. | DNS-based device geolocation |
EP3594874A1 (en) * | 2018-07-11 | 2020-01-15 | Capital One Services, LLC | Automatically activating a transaction card by detecting a change associated with a package that carries the transaction card |
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10552308B1 (en) | 2017-06-23 | 2020-02-04 | Square, Inc. | Analyzing attributes of memory mappings to identify processes running on a device |
US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10733594B1 (en) * | 2015-05-11 | 2020-08-04 | Square, Inc. | Data security measures for mobile devices |
US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3325060B1 (en) | 2015-07-20 | 2019-07-03 | Pearl Therapeutics, Inc. | Aerosol delivery systems |
US10393856B2 (en) * | 2016-02-25 | 2019-08-27 | Honeywell International Inc. | Using bluetooth beacons to automatically update the location within a portable gas detector's logs |
US10484851B2 (en) * | 2016-12-22 | 2019-11-19 | Venuenext, Inc. | Communicating information between applications executing on a client device via authentication information generated by an application |
US9955351B1 (en) * | 2017-03-14 | 2018-04-24 | Herbert Rios | RFID phone-unlocking system |
US10932305B2 (en) | 2017-06-15 | 2021-02-23 | Koninklijke Philips N.V. | Dynamic provisioning of wireless devices with health gateways |
US10136408B1 (en) * | 2017-08-17 | 2018-11-20 | Colby Green | Determining high value geographic locations |
CN108391238A (en) * | 2018-02-01 | 2018-08-10 | 乐鑫信息科技(上海)有限公司 | Wireless MESH network matches network method |
US10536823B1 (en) * | 2019-01-30 | 2020-01-14 | Vamshi Guduguntla | Determining device quality score |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7212829B1 (en) | 2000-02-28 | 2007-05-01 | Chung Lau | Method and system for providing shipment tracking and notifications |
US7171331B2 (en) | 2001-12-17 | 2007-01-30 | Phatrat Technology, Llc | Shoes employing monitoring devices, and associated methods |
US20030212768A1 (en) * | 2002-05-09 | 2003-11-13 | Gateway, Inc. | System and method for centralizing and synchronizing network configuration data |
EP1745416B1 (en) | 2004-04-22 | 2017-07-05 | Sensitech Inc. | Recording of location event information in rfid tags |
US7183920B2 (en) * | 2004-08-31 | 2007-02-27 | Gtech Rhode Island Corporation | System and method for detecting access to an article or opening of a package |
US20060125642A1 (en) * | 2004-12-02 | 2006-06-15 | Chandaria Ashok V | Container with internal radio frequency identification tag |
US7737840B2 (en) * | 2006-04-10 | 2010-06-15 | The Boeing Company | Container security system |
US20080007398A1 (en) * | 2006-07-05 | 2008-01-10 | General Electric Company | System and method for tracking assets |
US20080186163A1 (en) * | 2006-08-10 | 2008-08-07 | Ian Michael Mills | Self contained container tracking device |
JP4585549B2 (en) | 2007-07-27 | 2010-11-24 | 株式会社エヌ・ティ・ティ・ドコモ | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND PROGRAM |
US20090096611A1 (en) * | 2007-10-16 | 2009-04-16 | Sensormatic Electronics Corporation | Mobile radio frequency identification antenna system and method |
US8412595B2 (en) * | 2008-03-07 | 2013-04-02 | American Express Travel Related Services Company, Inc. | Lifecycle tracking and management using RF |
US7982610B1 (en) * | 2008-06-16 | 2011-07-19 | Bank Of America Corporation | Content-based prioritizing of deposits |
TWI382744B (en) * | 2008-06-23 | 2013-01-11 | Wintecronics Ltd | A method of locating the position of the positioning device, a positioning device and a communication device |
US8797138B2 (en) * | 2009-01-13 | 2014-08-05 | Utc Fire & Security Americas Corporation, Inc. | One-time access for electronic locking devices |
US8334773B2 (en) * | 2009-08-28 | 2012-12-18 | Deal Magic, Inc. | Asset monitoring and tracking system |
US8239169B2 (en) * | 2009-09-25 | 2012-08-07 | Gregory Timothy L | Portable computing device and method for asset management in a logistics system |
EP2517436B1 (en) | 2009-12-22 | 2019-12-18 | Orange | Peer to peer communication dependent on transmission capabilities |
NL2004192C2 (en) * | 2010-02-04 | 2011-08-08 | Aciss Internat B V | Container, system and method for goods transport. |
US20110231236A1 (en) * | 2010-03-19 | 2011-09-22 | Felipe Gonzalez | Coupon System and Method |
US20120023555A1 (en) * | 2010-07-21 | 2012-01-26 | Danieli Gavriel Putterman | Wireless environmental monitoring of goods |
GB2483474A (en) | 2010-09-08 | 2012-03-14 | Parcelpal Ltd | Apparatus for delivery or exchange of a postal item |
US9443276B2 (en) * | 2011-01-19 | 2016-09-13 | Walter Richard Barry, III | Event-based asset tracking, order adherence, and rewards management with NFC-enabled electronic devices |
US20130151434A1 (en) * | 2011-06-08 | 2013-06-13 | Kitaru Innovations Inc. | Method and apparatus for tracking package deliveries |
US8577335B2 (en) * | 2011-06-08 | 2013-11-05 | Kitaru Innovations Inc. | Method and apparatus for tracking package deliveries |
US8714439B2 (en) * | 2011-08-22 | 2014-05-06 | American Express Travel Related Services Company, Inc. | Methods and systems for contactless payments at a merchant |
US20130110534A1 (en) * | 2011-10-28 | 2013-05-02 | Mobile Aspects, Inc. | Specimen Management System, Arrangement, and Method |
CN103136644A (en) * | 2011-11-28 | 2013-06-05 | 鸿富锦精密工业(深圳)有限公司 | System and method of tracking goods |
US20150012457A1 (en) | 2013-07-02 | 2015-01-08 | Hound Dog Llc | Method and system for tracking shipped units during movement of goods within supply chain channels |
US9094345B2 (en) | 2012-01-31 | 2015-07-28 | International Business Machines Corporation | Reservation system for an ethernet network |
US20130324148A1 (en) | 2012-05-31 | 2013-12-05 | United Technologies Corporation | Product position tracking system |
US9251314B2 (en) | 2012-08-21 | 2016-02-02 | Wellocity, Inc. | Methods and systems for cloud based usage monitoring and adaptive enforcement for medications |
US10074247B1 (en) * | 2012-10-02 | 2018-09-11 | Amazon Technologies, Inc. | Package opening detection and control |
EP2907088B1 (en) * | 2012-10-12 | 2020-08-05 | Ander Gray Olaran | A system and method for monitoring the cold chain integrity of environmentally sensitive packaged goods |
US8533075B1 (en) * | 2013-02-13 | 2013-09-10 | AgileQR, Inc. | Systems and methods for biomedical track and trace |
US9721224B2 (en) * | 2013-03-14 | 2017-08-01 | Coreorient Oy | System and method for managing transportation and storage of goods |
US10271200B2 (en) * | 2013-03-15 | 2019-04-23 | Mars, Incorporated | Provisioning wireless device profiles |
US20140288868A1 (en) | 2013-03-19 | 2014-09-25 | Robert Stetson Gorham, JR. | Process for Monitoring Items that are Stored or in Transit |
US9098825B2 (en) * | 2013-03-26 | 2015-08-04 | Leonard Bashkin | Storage container with inventory control |
US10430750B2 (en) * | 2013-08-09 | 2019-10-01 | Klatu Networks, Inc. | System-independent data logging |
US20150055686A1 (en) | 2013-08-23 | 2015-02-26 | Times Three Wireless Inc. | Base station connectivity with a beacon having internal georgaphic location tracking that receives the location in a registration transmission |
US10664787B2 (en) | 2013-10-09 | 2020-05-26 | United Parcel Service Of America, Inc. | Customer controlled management of shipments |
US10181128B2 (en) * | 2013-10-17 | 2019-01-15 | Ebay Inc. | Initiating a promotional benefit by user-actionable link |
US20150189504A1 (en) | 2013-12-26 | 2015-07-02 | Yen Hsiang Chew | Method and apparatus for secure high-bandwidth ad-hoc networking |
WO2015126919A1 (en) * | 2014-02-18 | 2015-08-27 | Grasso Antonio A Jr | Personalized audio content device for gifting audio content |
US9564774B2 (en) | 2014-06-10 | 2017-02-07 | Pb Inc. | Reduced thickness tracking device |
-
2015
- 2015-03-05 US US14/639,983 patent/US20150254606A1/en not_active Abandoned
- 2015-03-06 WO PCT/US2015/019293 patent/WO2015134935A1/en active Application Filing
- 2015-07-07 US US14/793,487 patent/US20160019499A1/en not_active Abandoned
- 2015-07-07 US US14/793,485 patent/US20160019498A1/en not_active Abandoned
-
2020
- 2020-04-06 US US16/841,607 patent/US11829930B2/en active Active
- 2020-07-08 US US16/923,713 patent/US11853954B2/en active Active
- 2020-09-04 US US17/012,389 patent/US11948123B2/en active Active
-
2023
- 2023-10-23 US US18/492,109 patent/US20240273455A1/en active Pending
- 2023-11-08 US US18/504,938 patent/US20240257033A1/en active Pending
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10409984B1 (en) | 2012-06-15 | 2019-09-10 | Square, Inc. | Hierarchical data security measures for a mobile device |
US10733594B1 (en) * | 2015-05-11 | 2020-08-04 | Square, Inc. | Data security measures for mobile devices |
US10373167B2 (en) | 2016-06-30 | 2019-08-06 | Square, Inc. | Logical validation of devices against fraud |
US12067582B2 (en) | 2016-06-30 | 2024-08-20 | Block, Inc. | Logical validation of devices against fraud and tampering |
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
US11663612B2 (en) | 2016-06-30 | 2023-05-30 | Block, Inc. | Logical validation of devices against fraud and tampering |
US11373194B2 (en) | 2016-06-30 | 2022-06-28 | Block, Inc. | Logical validation of devices against fraud and tampering |
US10496993B1 (en) | 2017-02-15 | 2019-12-03 | Square, Inc. | DNS-based device geolocation |
US10552308B1 (en) | 2017-06-23 | 2020-02-04 | Square, Inc. | Analyzing attributes of memory mappings to identify processes running on a device |
US11374949B2 (en) | 2017-12-29 | 2022-06-28 | Block, Inc. | Logical validation of devices against fraud and tampering |
US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
EP3594874A1 (en) * | 2018-07-11 | 2020-01-15 | Capital One Services, LLC | Automatically activating a transaction card by detecting a change associated with a package that carries the transaction card |
US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
US12002040B2 (en) | 2018-09-26 | 2024-06-04 | Block, Inc. | Device driver for contactless payments |
Also Published As
Publication number | Publication date |
---|---|
US20240273455A1 (en) | 2024-08-15 |
US20160019498A1 (en) | 2016-01-21 |
WO2015134935A1 (en) | 2015-09-11 |
US11948123B2 (en) | 2024-04-02 |
US20200401997A1 (en) | 2020-12-24 |
US20160019499A1 (en) | 2016-01-21 |
US11829930B2 (en) | 2023-11-28 |
US11853954B2 (en) | 2023-12-26 |
US20200302384A1 (en) | 2020-09-24 |
US20200389792A1 (en) | 2020-12-10 |
US20240257033A1 (en) | 2024-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11829930B2 (en) | Systems and methods for controlling operation of an article based on detection of an interaction event | |
US11968727B2 (en) | Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitate protocol mediated payment activities via cellular networks methods for use thereof | |
US9241265B2 (en) | Method and apparatus for handling incoming status messages | |
TWI452858B (en) | Interactive id system using mobile devices | |
US20200364817A1 (en) | Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network | |
US20200005295A1 (en) | Secure location based electronic financial transaction methods and systems | |
US20120029990A1 (en) | Social Media Marketing Based on Transactions Using a Mobile Device and Associated Secure Element | |
AU2016344608A1 (en) | Secure transaction interfaces | |
US20210374736A1 (en) | Wireless based methods and systems for federated key management, asset management, and financial transactions | |
WO2013036170A2 (en) | Third-party payments for electronic commerce | |
CN105556551A (en) | Online payments using a secure element of an electronic device | |
CN104106276A (en) | Multi-tiered secure mobile transactions enabling platform | |
WO2014146169A1 (en) | Systems and methods for managing sending of items | |
US9264297B2 (en) | Automatic initiation of a response action when an event associated with an item in transit is based on logistical node scan data | |
US20150227883A1 (en) | Systems and methods for creating and delivering digital assets | |
US20220237558A1 (en) | Package delivery with message management | |
US11968538B1 (en) | Access controlling network architectures and systems, having cellular network components and elements modified to host access controlling schemas designed to transform and/or facilitate cellular communication signals in accordance with novel cellular communications protocols with multi-part multi-functional address signaling, and methods for use thereof | |
WO2006115842A2 (en) | Rfid and magnetic swipe initiated mobile download | |
KR102214050B1 (en) | Device and method for managing integrated coupon based on coupon ownership | |
WO2023129691A1 (en) | Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions between member computing devices based on cellular communication signals in accordance with novel cellular communications protocols, and methods for use thereof | |
US20080274757A1 (en) | System and Method for Enhanced Item Tracking | |
KR20090039141A (en) | System and method of communication service using rfid and doll | |
Aljohani et al. | Transaction-centric mobile-payment classification model | |
WO2008136824A1 (en) | System and method for enhanced item tracking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: INSTRUMENTALMAIL, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHALODIA, VIMAL;WALTERS, ROBB;JACOBSON, STUART ALEXANDER;SIGNING DATES FROM 20190315 TO 20211105;REEL/FRAME:066151/0014 |