WO2017070376A1 - Verrous pour bracelets électroniques portés sur le corps - Google Patents
Verrous pour bracelets électroniques portés sur le corps Download PDFInfo
- Publication number
- WO2017070376A1 WO2017070376A1 PCT/US2016/057957 US2016057957W WO2017070376A1 WO 2017070376 A1 WO2017070376 A1 WO 2017070376A1 US 2016057957 W US2016057957 W US 2016057957W WO 2017070376 A1 WO2017070376 A1 WO 2017070376A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic lock
- wearable
- lock
- locking
- band
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0288—Attachment of child unit to child/article
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0286—Tampering or removal detection of the child unit from child or article
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- the present invention relates generally to monitoring systems and, more specifically, to systems and methods for locking a wearable monitor system.
- wearable electronics (whether for monitoring or other purposes) lack adequate ways of attaching the wearable device to a human limb, such as an arm or leg.
- the wearable device can be removed by a child or other wearer who is not trusted to make good decisions regarding whether the device should remain on or be removed.
- many locks used in the criminal justice system like on ankle monitors for criminals, are too difficult to remove for other use cases in which the wearable is frequently removed, like daily or between trips for a child.
- Some aspects include a locking mechanism for a wearable child-monitor system.
- the locking mechanism comprising: a button assembly; a spring assembly coupled to the button assembly, the spring assembly comprising: two bent arms configured to compress under a force applied to the button assembly; and an aperture configured to receive a stopping element when the locking mechanism is in a locked position; an actuator configured to electronically control movement of the stopping element in and out of the aperture; and a control circuit comprising: a tangible non-transitory machine readable media storing instructions that when executed by one or more processors of the control unit effectuate operations comprising: receiving a request to unlock the locking mechanism; sending a request for authentication; receiving authentication information; and controlling the actuator to move the stopping element from the locked position.
- Figure 1 illustrates an example computer architecture of a central device in accordance with embodiments of the present techniques
- Figure 2 illustrates an example computer architecture of a stationary peripheral device in accordance with embodiments of the present techniques
- Figure 3 illustrates an example computer architecture of a wearable peripheral device in accordance with embodiments of the present techniques
- Figure 4 illustrates an example data flow between a central device and a wearable peripheral device in accordance with embodiments of the present techniques
- Figure 5 illustrates an example data flow between a central device and multiple wearable peripheral devices in accordance with embodiments of the present techniques
- Figure 6 illustrates an example data flow between a central device, a stationary peripheral device, and a wearable peripheral device in accordance with embodiments of the present techniques
- Figure 7 illustrates an example data flow between a central device, multiple stationary peripheral devices, and a wearable peripheral device in accordance with embodiments of the present techniques
- Figure 8 illustrates an example electronic lock in accordance with embodiments of the present techniques
- Figures 9-10 illustrate views of an example electronic lock in accordance with embodiments of the present techniques
- Figures 1 1-12 illustrates an example electronic lock assembly in accordance with embodiments of the present techniques
- Figures 14A-C illustrate a top view and cross sections views respectively of an example of electronic lock in accordance with embodiments of the present techniques
- Figures 15 A-C illustrate cross sections views of examples of electronic locks in accordance with embodiments of the present techniques
- Figure 16 illustrates cross section views of example of electronic locks in accordance with embodiments of the present techniques
- Figures 17 A-D illustrate an example wearable device in accordance with embodiments of the present techniques
- Figures 18 A-B illustrate an example wearable device in accordance with embodiments of the present techniques
- Figure 18 C illustrates a cross section view of an example electronic lock assembly in accordance with embodiments of the present techniques
- Figures 19-21 illustrate a top, front and side view respectively of an example band interface in accordance with embodiments of the present techniques.
- Figure 22 is a diagram that illustrates an exemplary computing system 1000 in accordance with embodiments of the present techniques.
- An electronic lock for wearable electronics is described below with reference to figures 8-21. In some cases, this lock may mitigate some of the above-described issues with traditional systems for attaching wearable electronics to human limbs.
- the electronic lock has a variety of use cases, including for criminal monitoring, medical devices, wearable fitness monitors, and child monitoring bands.
- the lock may address a number of other problems with alternate traditional designs.
- the lock may be mechanically robust to being removed, while using relatively little electrical power when the lock is electronically unlocked (or in some cases, locked).
- the lock may combine manual locking with electronic, wirelessly controlled unlocking, such that the amount of battery power drawn by the lock is relatively low, facilitating longer charging times and battery life on wearable electronics, which are often designed with relatively small batteries to avoid impeding movement of the wearer.
- the lock is not limited to wearable monitoring devices (which is not to imply that any other feature is not amenable to variation), the lock may be used with a suite of other inventions that solve various issues with traditional monitoring devices. In some cases, the lock synergistically leverages certain interfaces afforded by these other inventions and, as such, embodiments are described below in the context of these other inventions. But this description should not be read to imply that all embodiments must include all of these inventions, as the various techniques are independently useful. [0032]
- Existing monitoring techniques are lacking. Many such systems consume excessive amounts of battery power, often requiring heavier batteries than can be borne by weaker individuals, like small children. Many such systems suffer from excessive false positive rates, which can render the system unusable. Finally, some existing techniques emit wireless signals that convey more information to third parties than is desirable for privacy reasons.
- Some embodiments provide mechanisms for efficiently monitoring one or more individuals.
- a system of two or more wireless devices in communications with each other can help a user (e.g., a supervisor or caregiver) monitor other individuals (e.g., children, and/or other dependents) by alerting the supervisor or caregiver when an event (like a a pre-defined event or an anomalous event) occurs.
- wireless devices associated with an individual being monitored may include smart bands, tags, smartphones, tablets, and/or other mobile devices.
- an alert may be generated when communication between the wireless devices is interrupted (communication between the devices may be a one way communication, and/or two way communication).
- wireless signals may include periodic beacons of a power, duration, and frequency selected to conserve battery power in a wearable monitoring device, like a Low Energy Bluetooth TM beacon.
- information in the beacon may be encoded in a way that protects privacy of individuals being monitored.
- various techniques, like sensor fusion, or integrating a signal from an accelerometer may augment measures of distance based on received beacon signal strength to reduce false-positive rates. That said, several inventions are described, and not all embodiments use all of the inventions, which are independently useful, or provide all of these benefits.
- An individual may be monitored for a variety of reasons. For example, individuals lacking cognitive skills to independently recognize potentially dangerous or harmful situations are monitored. The alert may be generated to indicate that the individual may be potentially in an inappropriate situation. Lack of cognitive skills can be due to an individual's age, an individual's physical disabilities, an individual's mental disabilities, etc.
- the use of the monitoring system is not limited to individuals lacking cognitive skills. Other examples of use may include monitoring one or more individuals in crowded environments. For example, a group of friends going out together (e.g., to a show, concert, amusement park, beach, hike, etc.) may decide to monitor each other for safety reasons, and/or so it's easy for them to find each other.
- a health sensor may be associated with the wireless device (or the health sensor may act as the wireless device), and an alert may be generated if a health parameter measured by the sensor (e.g., heart rate, breathing parameters, blood oxygen, etc.) is outside a range (e.g., a pre-defined range), and/or if the measured health parameter breaches a threshold (e.g., a pre-defined threshold).
- a health parameter measured by the sensor e.g., heart rate, breathing parameters, blood oxygen, etc.
- a threshold e.g., a pre-defined threshold
- a problem with functionality of the wireless device or in the case of a wearable device a breakage of the wearable device, loss of contact between the wearable device and the individual being monitored (e.g., breakage of band, unlocking of the device, failure of locking mechanism, mechanical integrity of the band using an electrical circuit continuity sensor; state of band locking mechanism using electrical circuit continuity sensor; bad contact with a tag, etc.)
- an alert may be generated based on a combination of parameters including one or more of the examples provided above, and/or other pre-defined parameters.
- a monitoring system may include a plurality of wirelessly communicating sensor devices, including a central device and a carryable or wearable peripheral device.
- the wireless connection may be a Bluetooth connection, e.g., Low Energy Bluetooth selected to conserve battery power, using 2Mhz wide channels in 2.4-2.4835 GHz band, and transmitting with Gaussian frequency shift modulation, as specified in the Bluetooth core specification version 4.0, the low-energy portion of which is hereby incorporated by reference.
- Various techniques may be used to further reduce power consumption.
- a beaconing rate may be modulated based on an estimated distance, e.g., the central device may send a signal indicative of the distance between the devices, and the peripheral device may lower the beaconing rate as distance to the next threshold distance increases.
- the central device may beacon, and the peripheral device may only respond with its own beacon or alarm when the signal strength from the central device beacon approaches or exceeds a threshold.
- the broadcast strength of beacons may be adjusted based on distance, e.g., the broadcast strength may be encoded in the beacon, and the strength may change as one device indicates to the other that the distance has changed, with stronger signals being used as devices move further apart.
- a monitoring system may include a central device, one or more stationary peripheral devices, and one or more carryable or wearable peripheral devices.
- the monitoring system may assist with the supervision of dependents to monitor and alert the supervisor/caregiver (or other users of the monitoring system) that a monitored individual is in a potentially dangerous situation based on distance, approximate location, motion, health information, and/or other information.
- wearable peripheral devices may be monitored for any reasons defined by the user of the monitoring system, in some use cases.
- the wireless connection between the control device and the carryable or wearable peripheral devices may be a Radio Frequency (RF) connection (e.g., Bluetooth, an Ultra-Low Frequency (ULF), a Wi-Fi, and/or other RF connections).
- RF Radio Frequency
- Strength of a received wireless signal, as perceived at the central unit, from a signal broadcast by the peripheral device may indicate the approximate location (as a location indicator) of the carryable or wearable peripheral devices with respect to the central unit. (Location need not be expressed in absolute coordinates for these purposes, and location may be expressed as an estimated distance, without indicating a direction.)
- the user may set a range for communication data levels between the central device and the carryable or wearable peripheral devices.
- an alert may be presented at the control device and, in some embodiments, also at the carryable or wearable peripheral device.
- a location indicator threshold may be determined and if (e.g., in response to detecting that) the threshold is breached an alert is generated (the alert may be generated at the moment of the breach or before, or after the breach).
- an alert may be generated if (e.g., in response to detecting that) the location indicator approaches a threshold or an upper or lower range in pre-determined range.
- alerts may be a low level alert.
- Other types of alerts may be defined depending on the level of the breaching.
- a vibrating alert may be a low level alert
- an audible alert may be a high level alert.
- Embodiments may compare a signal strength or estimated distance to a plurality of thresholds, each corresponding to a different alert level, and select an alert to present base on the highest threshold exceeded.
- Examples of alerts may include: vibratory related output (e.g., used to alert the wearable device wearer that the threshold has not been maintained or exceeded) in some cases the vibratory output may include adjustable parameters for persons with tactile sensitivity (e.g., amplitude; frequency; duration, etc.).
- alerts may include: audible related output (e.g., high volume alarm to indicate approximate location of node; adjustable tone, volume, and sound pattern, voice commands for user to indicate actions to be taken to avoid danger, prerecorded, live, etc.); optical related output (e.g., light source used to alert any user of device alarm; adjustable intensity, color, and flashing pattern, etc.); and/or other types of alerts.
- audible related output e.g., high volume alarm to indicate approximate location of node; adjustable tone, volume, and sound pattern, voice commands for user to indicate actions to be taken to avoid danger, prerecorded, live, etc.
- optical related output e.g., light source used to alert any user of device alarm; adjustable intensity, color, and flashing pattern, etc.
- More informative alerts are expected to mitigate problems with false positives, as less intrusive alerts corresponding to smaller distances can be disregarded.
- the supervisor or caregiver can move to the physical location of the monitored individual to provide assistance, or take other action (try to reestablish contact with the monitored peripheral, call 911, etc.)
- the monitored individual may also take remedial action.
- Alerts can include one or more of: visual, audible, and tactile (e.g., vibrations) components.
- FIG. 1 illustrates an example computer architecture of a central device 101.
- Central device 101 is a control device configured to monitor one or more carryable or wearable (which is not to imply that wearable devices are not carryable) peripheral devices.
- central device 101 e.g., laptop computers, handheld computers, netbooks, tablets, smartphones, smartwatches, personal digital assistants (PDAs), cellular telephones, personal computers (PCs), and/or other computing platforms
- PDAs personal digital assistants
- PCs personal computers
- User interface 102 may allow a user (e.g., caregiver/supervisor) to connect to multiple carryable or wearable peripheral devices, stationary peripheral devices, and/or other components within or outside of the monitoring system.
- User interface 102 may be configured to set thresholds, acceptable ranges for sensory data and/or other alert parameters. In some embodiments, user interface 102 may be configured to produce the alerts (produce a visual, sound, tactile, and/or other alerts). In some cases, a wearable device on the caregiver may receive the alert from a smartphone via a personal area network and present the alert, e.g., via smartwatch or earpiece.
- a carryable or wearable peripheral device may be configured to remain in contact with (e.g., be attached to) a monitored individual.
- a carryable or wearable peripheral device may emit signals indicative of the location, motion, and/or (when associated with the appropriate sensors) health data of the individual.
- a carryable or wearable peripheral device may be used by caregivers and/or monitored individuals.
- carryable or wearable peripheral devices may include one or more processors, storage media, user interfaces, and or other components. Examples of carryable or wearable peripheral devices include wrist-born embedded systems having a radio, microprocessor, battery, and in some cases, a biometric sensor array.
- the embedded system may include an inertial measurement unit, and the microprocessor may integrate inertial measurement signals and embed results in beacons to augment signal-strength based range-finding.
- embodiments may be characterized as smart bands, tags, smartphones, watches, sensors (health sensors or other sensors) tablets, and other mobile devices.
- a smart band may be configured to fit on a wearer's body part (e.g., a wrist band, an ankle band, a chest band, a neck band, and/or other band that fits, and/or surrounds the wearer's body part).
- the smart band may be configured to include a locking mechanism that allows the user (monitor) to lock and unlock the band to prevent it from being removed.
- the smart band may include an electrical circuit continuity sensor for monitoring mechanical integrity of the locking mechanism and detecting failure of the locking mechanism or breakage of the band.
- sensory data may include any data that may be monitored by a sensor at a central device, a stationary peripheral device, or a carryable or wearable peripheral device.
- safety related sensory data including: approximate location, and/or proximity data; motional data; physical data (e.g., impact, mechanical integrity, etc.); environmental data (e.g., temperature, humidity, optical, internet data, health related sensory data (e.g., heart rate, blood glucose, oxygen, body temperature skin humidity, EMG (muscular electrical activity), etc.)
- a user may configure acceptable ranges and thresholds for sensory data by inputting user threshold input 111 to data combination algorithm and alarm determination 121.
- Threshold input 111 may indicate what conditions in sensory data cause what notifications, alerts, alarms, etc.
- sensory and internet data may be provided by the central device 101 's hardware, software, as well as via RF from peripheral stationary node(s) and peripheral wearable device(s).
- Received data is combined algorithmically to compare with user-defined thresholds. If the combined data is not within user defined thresholds (e.g., a carryable or wearable peripheral device is too far away from central device 101), different types of alarms (or other alerts or notifications) may be issued.
- Alarms (or other alerts or notifications) may be presented at central device 101 as one or more of: visual displays, sound, or vibrations having varied intensities based on the severity of the alarm.
- data combination algorithm and alarm determination 121 may receive input from one or more of accelerometer 103, gyroscope 104, Radio Frequency (RF) communication 106 from peripherals, Global Positioning System and Cellular communication 107 from peripherals, mobile data/Internet 108, custom audio input 114, and/or information from other sensors of components within or outside of the monitoring system.
- RF Radio Frequency
- data combination algorithm and alarm determination may receive information from accelerometer 103.
- Accelerometer 103 may be a single or multi-axis accelerometer. Such information may include measurement of the movement of the moveable peripherals (e.g., acceleration, number of steps taken by the individual associated with the peripheral, orientation, detect if the moveable peripherals fell or in the process of falling, etc.)
- information from the accelerometer 103 may indicate the height of the fall and/or potential impact.
- data combination algorithm and alarm determination 121 may receive information from gyroscope (or other type of inertial measurement unit, like a three or six axis accelerometer) 104 (e.g., microelectromechanical systems MEMS gyroscope, and /or other types of gyroscopes). Such information may include measurement of orientation and/or rotation of the moveable peripherals.
- information from accelerometer 103 and gyroscope 104 may be combined for more accurate motion and orientation sensing.
- a compass e.g., a magnetometer for measuring orientation may be used instead of the gyroscope 104 or in conjunction with it.
- data combination algorithm and alarm determination 121 may receive user audio input 114 may include sending audio to a wearable peripheral device in the form of a file or live broadcasting in order to alert/communicate with the person associated with (e.g., wearing) the wearable peripheral device.
- the user input may be in the form of text input.
- Data combination algorithm and alarm determination 121 may process received input to determine if thresholds for any of audible alert 131, vibratory alert 132, or visual alert 133 (or any other notifications or alarms) are satisfied.
- the alerts (or other notifications or alarms) may be output at central device 101 or at a peripheral wearable device, for example, on screen, through a speaker, or through vibration of central device 101.
- An alert (or other notification or alarm) may also be sent from central device 101 to a carryable or wearable peripheral device that caused the alert (or other notification or alarm).
- data combination algorithm and alarm determination may receive information from Global Positioning System (GPS), and/or Cellular triangulation (using GSM and/or CDMA technologies) indicating the approximate location of the monitored peripherals.
- GPS Global Positioning System
- Cellular triangulation using GSM and/or CDMA technologies
- approximate location of the monitored peripherals may be extracted from mobile Data /Internet 108 sent or received by the peripherals (e.g., using technologies such as 3G, 4G, 4G LTE, and/or 5G).
- communication between the central device 101 and peripheral devices may be a radio frequency (RF) communication 106.
- RF communications 106 may include one or more of Bluetooth, Wi-Fi, ultra-low frequency (ULF), and/or other RF communications.
- central unit 101 may establish a Bluetooth connection with a moveable peripheral, a wearable smart band for example.
- Central unit 101 may be the master Bluetooth device (initiates the connection) and may be able communicate with the smart band and additional moveable or stationary peripherals (forming a Bluetooth network).
- Central device 101 may switch roles with one of the peripherals and becomes a slave.
- central device 101 may be a master and a slave.
- central device 101 may communicate monitoring settings to the smart band (and/or moveable or stationary peripherals).
- the monitoring settings may be defined by the user of central device 101 and sent wirelessly to the smart band (the settings may be sent via the Bluetooth connection, other wireless connections, and/or wired connection). In some cases, the settings may be input directly into the smart band (and/or moveable or stationary peripherals) via a user interface.
- An example of monitoring setting may be the Bluetooth connection, such that if the Bluetooth connection is interrupted an alert may be generated.
- Other examples of monitoring setting may include any pre-defined values for information exchanged between central device 101 and the smart band (and/or moveable or stationary peripherals) via the Bluetooth connection.
- monitoring settings may include communication data levels (e.g., a predetermined range, threshold levels, etc.)
- Data communication levels may include strength of received signal between the central device 101 and the smart band, and/or other indication of relative received signal strength in a wireless environment.
- Strength of received signal is usually referred to as received signal strength indicator (RSSI), and it represents a measurement of the power present in a received radio signal, the higher the RSSI the stronger the signal.
- RSSI received signal strength indicator
- the measurement of the RSSI may be done by wireless network cards in central device 101 and the smart band. RSSI values may be mapped to distance values through calibration
- distance calculations may be augmented with inertial measurement unit readings on both the central device and the peripheral device.
- IMU readings may be polled and integrated by the wearable device, and a distance and direction of travel vector may be encoded in a beacon transmitted by the device.
- the central device may similarly monitor its own IMU and integrate signals to form another vector. The two vectors, one being received via the beacon, may be subtracted to calculate an IMU-based distance.
- the IMU based distance may be combined with a beacon signal strength-based distance at the central unit to ascertain distance, e.g., a signal-strength based distance measurement over a threshold distance may be disregarded for a duration of time in response to the IMU measurements indicating a smaller change in distance between the two units (as might happen if a child walks behind a wall or other signal-attenuating object).
- the two devices may "zero" their EVIU integrals in response to the signal strength exceeding a threshold corresponding to the two units being within one meter or so of one another to prevent drift from interfering with the measurements.
- another type of signal may be used to trigger an IMU integral re-sent, e.g., an ultrasonic chirp by the peripheral device may be received by a microphone of the central device and trigger an IMU integral re-zeroing.
- connection between device 101 and the smart band (and/or moveable or stationary peripherals) may be an ultra-low frequency (ULF) communication.
- ULF communications may be used for secure communications between device 101 and the peripherals as the ultra-low frequencies are able to penetrate the ground.
- ULF frequency may range between 300 hertz and 3 kilohertz (other frequency ranges may be considered).
- a Wi-Fi communication may be used.
- central unit 101 may communicate, via a Wi-Fi connection, with a moveable peripheral, the smart band (and/or moveable or stationary peripherals).
- the communication may be a direct communication between Central unit 101 and the peripherals without going through the access point (e.g., Wi-Fi is Tunneled Direct Link Setup (TDLS), and/or Wi-Fi DIRECT).
- An example of monitoring setting may be the Wi-Fi connection, such that if the Wi-Fi connection is interrupted an alert may be generated.
- Other examples of monitoring setting may include any pre-defined values for information exchanged between central device 101 and the smart band (and/or moveable or stationary peripherals) via the Wi-Fi connection.
- a control device can be used to configure the alert settings of the system and change settings of other devices wirelessly.
- a control device may also act as a peripheral wearable node in the case of a smartphone or tablet to increase accuracy of motional data gathered between the peripherals.
- the control device can also have live-updating of known location. Live-updating can be facilitated by using Global Positioning System (GPS) on a control device and in connection with RSSI to determine an approximate location. Live-update can also be extended to using Wi-Fi access points to increase accuracy.
- GPS Global Positioning System
- Examples of control devices include smartphones, tablets, computers, or custom devices with a user interface.
- one or more stationary peripheral devices are used to communicate with carryable or wearable peripheral devices and monitor ranges.
- a stationary peripheral device may be used in tandem with other stationary peripheral devices and/or in tandem with carryable or wearable peripheral devices.
- a stationary peripheral device may have a further network connection to the control device.
- the stationary peripheral device may relay data for carryable or wearable peripheral devices back to the control device.
- stationary peripheral devices may extend the reach of the monitoring system by permitting a control device to monitor data for a carryable or wearable peripheral device that is otherwise outside of communication range with the control device.
- a stationary peripheral device may also be used to monitor the signal strength of a central device and/or other stationary peripheral devices.
- public Wi-Fi access points or mobile towers may be used as stationary devices.
- FIG. 2 illustrates an example computer architecture of a stationary peripheral device 201.
- Stationary peripheral device 201 includes data calculation algorithms 221.
- Data calculation algorithms 221 may determine what data is to be transferred to a central device and/or other peripheral devices and when and how to transfer data to a central device and/or other peripheral devices.
- Data calculation algorithms 221 may receive RF communication 202 from other peripherals (either stationary or carryable/wearable).
- RF communication 202 may include data transfers 203 and 206 and RSSI 204 and 207.
- Data Calculation algorithms 221 may determine from data transfers 203 and 206 and RSSI 204 and 207 that data transfer 208 is to be sent to a central deice and/or other peripheral devices.
- Stationary peripheral device 201 may send data transfer 208 to central device and/or other peripheral devices through RF communication 209.
- FIG. 3 illustrates an example computer architecture of a wearable peripheral device 301.
- sensory and internet data is provided by the wearable peripheral device 301 's hardware as well as via RF from other peripheral devices(s) and a central device Received data is combined algorithmically to compare with user-defined thresholds. (Wearable peripheral device 301 may also send data). If the combined data is not within user defined thresholds (e.g., wearable peripheral 301 is too far away from a central device), different types of alarms (or other alerts or notifications) may be issued. Alarms (or other alerts or notifications) may be presented at wearable peripheral device 301 as one of more of: visual displays, sound, or vibrations having varied intensities based on the severity of the alarm.
- data combination algorithm and alarm determination 321 may receive input from any of: location sensors 302, medical sensors 303, motion sensors 304, Radio Frequency (RF) communication 306 from a central unit, Global Positioning System and Cellular communication 307, mobile data/Internet 308, and environmental sensors 309.
- RF communication 306 from a central unit may include data transfer 312 and RSSI 313.
- Data combination algorithm and alarm determination 321 may process received input to determine if thresholds for any of audible alert 331, vibratory alert 332, or visual alert 333 (or any other notifications or alarms) are satisfied.
- the alerts may be output at wearable peripheral device 301, for example, on a screen or LED, through a speaker, or through vibration of wearable peripheral device 301.
- An alert may also be sent from wearable peripheral device 301 to a central device or to s stationary peripheral device (for subsequent relay to a central device).
- Sensors 303 may be configured to generate output signals conveying information related to the monitored individual.
- sensors 303 may include health sensors, and/or other sensors.
- sensors 303 may include one or more of a heart rate sensor, a blood pressure sensor/monitor, a weight scale, a blood glucose monitor, a blood oxygen saturation monitor (e.g., a pulse oximeter), a hydration monitor, a skin/body temperature thermometer, a respiration monitor, electroencephalogram (EEG) electrodes, and/or other medical sensors.
- Sensors may also include environmental sensors, like a water-immersion sensor.
- Information related to the monitored individual obtained from sensors 303 may include heart rate, blood pressure, weight, pulse rate, blood chemistry, blood oxygen saturation, blood glucose level, hydration information, respiration rate, breathing information, skin/body temperature, brain activity, etc.
- Sensors 303 are configured to generate any output signals conveying information related to the user that allows monitoring system 300 to function as described herein.
- sensors 303 may be disposed in a plurality of locations within or outside of monitoring system 300.
- sensors 303 may be located in wearable peripheral device 301, located in a medical device used by the user, and/or in other locations within or outside of monitoring system 300.
- FIG. 4 illustrates an example data flow between a central device 401 (e.g., a smart phone or mobile device) and a wearable peripheral device 402 (e.g., a smart band).
- Central device 401 may initialize 411 communications with wearable peripheral device 402 by establishing a wireless connection with wearable peripheral device 402.
- Central device 401 may send alarm (or other alert or notification) settings to wearable peripheral device 402 over the established wireless connection.
- the wireless connection may be any of Bluetooth, Wi-Fi, Global System for Mobile Communications (GSM), Code division multiple access (CDMA), Ultra Low Frequency (ULF), or other mobile data protocols.
- GSM Global System for Mobile Communications
- CDMA Code division multiple access
- UPF Ultra Low Frequency
- Wearable peripheral device 402 may perform data transfer 412 to central device 401.
- Data transfer 412 may include wearable peripheral device 402 transferring sensory data to central device 401 using the established wireless connection.
- Central device 401 may analyze the sensory data in order to monitor the status of wearable peripheral device 402.
- Central device 401 may perform data transfer 413 to wearable peripheral device 402.
- Data transfer 413 may include central device 401 transferring local sensory data from the central device's local sensors to wearable peripheral device 402 over the established wireless connection.
- Central device 401 may send ongoing configuration/commands 414 to wearable peripheral device 402.
- Ongoing configuration/commands 414 may include central device 401 updating alarm (or other alert or notification) settings of wearable peripheral device 402 over the established wireless connection.
- Ongoing configuration/commands 414 may also include central device 401 issuing alarms (or other alerts or notifications) over the established wireless connection in order to notify or locate the wearer of wearable peripheral device 402.
- a single link configuration includes a single control device and one or more carryable or wearable peripheral devices.
- the single control device monitors the one or more carryable or wearable peripheral devices.
- the single link configuration may be useful for a parent (with the control device) to monitor one or more children (each having an attached wearable peripheral device).
- communication may occur from the central device to any of the wearable peripheral devices, from any of the wearable peripheral devices to the central device, and from the Internet to the central unit and to any of the wearable peripheral devices.
- FIG. 5 illustrates an example data flow between a central device 501 (e.g., a smart phone or mobile device) and wearable peripheral devices 502 and 503 (e.g., smart bands).
- Central device 501 may initialize 511 communications with wearable peripheral devices 502 and 503 by establishing a wireless connection with wearable peripheral devices 502 and 503.
- Central device 501 may send alarm (or other alert or notification) settings to wearable peripheral devices 402 and 403 over the established wireless connection.
- the wireless connection may be any of Bluetooth, Wi-Fi, Global System for Mobile Communications (GSM), Code division multiple access (CDMA), Ultra Low Frequency (ULF), or other mobile data protocols.
- wearable peripheral devices 502 and 503 may also establish a wireless connection between one another forming a tethered network. Wearable peripheral devices 502 and 503 may monitor one another over the tethered network.
- Wearable peripheral device 503 may perform data transfer 512 to wearable peripheral device 502.
- Data transfer 512 may include wearable peripheral device 503 transferring sensory data to wearable peripheral device 502 over the tethered network.
- Wearable peripheral device 502 may analyze the sensory data in order to monitor the status of wearable peripheral device 503.
- Wearable peripheral device 502 may also trigger alarms, alerts, or other notifications on wearable peripheral device 503 and/or vice versa.
- wearable peripheral device 502 may perform data transfer 513 to wearable peripheral device 503.
- Data transfer 513 may include wearable peripheral device 502 transferring sensory data to wearable peripheral device 503 over the tethered network.
- Wearable peripheral device 503 may analyze the sensory data in order to monitor the status of wearable peripheral device 502.
- a tethered network configuration may include one or more central devices and a plurality of carryable or wearable peripheral devices.
- the one or control devices monitor the plurality of carryable or wearable peripheral devices.
- the tethered network configuration may be useful for providing a buddy system, for example, on a field trip.
- individuals may both monitor other individuals and be monitored by other individuals.
- communication may occur from a central device to a carryable or wearable peripheral device, from a carryable or wearable peripheral device to a central device, from the Internet to a central unit and to a carryable or wearable peripheral device, between central devices, and between carryable or wearable peripheral devices.
- a central node with remote control configuration includes a central device (remote), a stationary peripheral device, and one or more carryable or wearable peripheral devices.
- the stationary peripheral device monitors the one or more carryable or wearable peripheral devices and relays information to the central device.
- the central node with remote control configuration may be useful for remote supervision of individuals (e.g., children) within a home over the Internet.
- communication may occur between the central device and stationary peripheral device and between the stationary peripheral device (e.g., over the Internet) and the one or more carryable or wearable peripheral devices.
- FIG. 6 illustrates an example data flow between a central device 501 (e.g., a smart phone or mobile device that may be remotely connected via the Internet), a stationary peripheral device 602 (e.g., a custom wireless device), and wearable peripheral device 603 (e.g., a smart band). Additional wearable peripheral devices (not shown) may also be in communication with stationary peripheral device 602.
- a central device 501 e.g., a smart phone or mobile device that may be remotely connected via the Internet
- a stationary peripheral device 602 e.g., a custom wireless device
- wearable peripheral device 603 e.g., a smart band
- Additional wearable peripheral devices may also be in communication with stationary peripheral device 602.
- Central device 601 may initialize 611 communications with stationary peripheral device 602 and wearable peripheral device 603 by establishing a wireless connection with stationary peripheral device 602 and wearable peripheral device 603. Central device 601 may send alarm (or other alert or notification) settings to wearable peripheral device 603 over the established wireless connection. Stationary peripheral device 602 may relay alarm (or other alert or notification) settings to wearable peripheral device 603.
- the wireless connection may be any of Bluetooth, Wi-Fi, Global System for Mobile Communications (GSM), Code division multiple access (CDMA), Ultra Low Frequency (ULF), or other mobile data protocols.
- Wearable peripheral device 603 may perform data transfer 614 to stationary peripheral device 602.
- Data transfer 614 may include wearable peripheral device 603 transferring sensory data to stationary peripheral device 602 using the established wireless connection.
- Stationary peripheral device 602 may analyze the sensory data in order to monitor the status of wearable peripheral device 603.
- Stationary peripheral device 602 may perform data transfer 612 to central device 601.
- Data transfer 612 may include stationary peripheral device 602 relaying sensory data from data transfer 614 to central device 601.
- Central device 601 may analyze the sensory data in order to monitor the status of wearable peripheral device 603.
- Central device 601 may send ongoing configuration/commands 613 to stationary peripheral device 602.
- Ongoing configuration/commands 613 may include central device 601 updating alarm (or other alert or notification) settings of wearable peripheral device 603 over the established wireless connection.
- Ongoing configuration/commands 613 may also include central device 601 issuing alarms (or other alerts or notifications) over the established wireless connection in order to notify or locate the wearer of wearable peripheral device 603.
- Stationary peripheral device 602 may perform data transfer 616 to wearable peripheral device 603.
- Data transfer 616 may include stationary peripheral device 602 relaying ongoing configuration/commands 613 to wearable peripheral device 603.
- a localizing network configuration includes may include a central device, a plurality of stationary peripheral devices, and one or more carryable or wearable peripheral devices.
- the plurality of stationary peripheral devices monitor the one or more carryable or wearable peripheral devices and relay information to one another and/or to the central device.
- the localizing network configuration may be useful for tracking of individuals (e.g., children) within a home or other building over the Internet, for example, when the home or building is larger than the range of a single stationary peripheral device.
- communication may occur between the central device and peripheral devices, between stationary peripheral devices (to extend range of network communication), from stationary peripheral devices and carryable or wearable peripheral devices to (extend range of network communication), and from carryable or wearable peripheral devices to stationary peripheral devices.
- FIG. 7 illustrates an example data flow between central device 701 (e.g., a smart phone or mobile device that may be remotely connected via the Internet), stationary peripheral devices 702 and 703 (e.g., customer wireless devices), and wearable peripheral device 704 (e.g., a smart band).
- central device 701 e.g., a smart phone or mobile device that may be remotely connected via the Internet
- stationary peripheral devices 702 and 703 e.g., customer wireless devices
- wearable peripheral device 704 e.g., a smart band
- Stationary peripheral devices 702 and 703 may establish a wireless connection between one another (and any other stationary peripheral devices) forming a localizing network.
- the locations of stationary peripheral devices 702 and 703 (and any other stationary peripheral devices) may be known (and pre-programmed) such that stationary peripheral devices 702 and
- the wireless connection may be any of Bluetooth, Wi-Fi, Global System for Mobile Communications (GSM), Code division multiple access (CDMA), Ultra Low Frequency (ULF), or other mobile data protocols.
- GSM Global System for Mobile Communications
- CDMA Code division multiple access
- ULF Ultra Low Frequency
- Central device 701 may initialize 711 communications with stationary peripheral devices 702 and 703 (and any other stationary peripheral devices included in the localizing network) by establishing a wireless connection with the localizing network and wearable peripheral device 704. Central device 701 may send alarm (or other alert or notification) settings to wearable peripheral device 704 over the established wireless connection. A stationary peripheral device within the localizing network may relay alarm (or other alert or notification) settings to wearable peripheral device 704.
- Wearable peripheral device 704 may perform data transfer 714 to a stationary peripheral device in the localizing network.
- Data transfer 714 may include wearable peripheral device 703 transferring sensory data to the stationary peripheral device (e.g., 702 or 703) in the localizing network using the established wireless connection.
- the stationary peripheral device may transmit data and create a matrix of RSSI data on a central device in order to monitor the status of wearable peripheral device 704 (and may also perform some data analysis).
- the stationary peripheral device 702 may perform data transfer 712 to central device 701.
- Data transfer 712 may include the stationary peripheral device relaying sensory data from data transfer 714 to central device 701.
- Central device 701 may analyze the sensory data in order to monitor the status of wearable peripheral device 704.
- Central device 701 may send ongoing configuration/commands 713 to a stationary peripheral device (e.g., 702 or 703) in the localizing network.
- Ongoing configuration/commands 713 may include central device 701 updating alarm (or other alert or notification) settings of wearable peripheral device 704 over the established wireless connection.
- Ongoing configuration/commands 713 may also include central device 701 issuing alarms (or other alerts or notifications) over the established wireless connection in order to notify or locate the wearer of wearable peripheral device 704.
- the stationary peripheral device may perform data transfer 716 to wearable peripheral device 704.
- Data transfer 716 may include the stationary peripheral device relaying ongoing configuration/commands 713 to wearable peripheral device 704.
- the devices in the illustrated system may cryptographically authenticate themselves to one another.
- Some embodiments may use an asymmetric encryption scheme, like RSA or DAS, in which two keys (the key pair) are generated and linked to one another, such that a message encrypted with one key can be decrypted with another key (but with the first key remaining unknown to the holder of the second key, in some embodiments).
- each device may store in memory a shared, factory-set random string and the string may be "xor'ed" with messages to encrypt data.
- firmware of the peripheral device may store a unique, factory-set decryption key.
- the corresponding encryption key that matches the decryption key may be stored on a remote server, e.g., in a database, in association with a serial number of the peripheral device and a value indicating if the key has been used or is associated with an account yet. In some cases, the keys are set at the factory and do not change.
- the user may enter a serial number of the peripheral device, and the application may send the serial number to the remote server, which may retrieve the corresponding key from the database.
- the server may maintain a record in the database indicative of whether the serial number is associated with a device that has already been claimed and block, or require additional authentication credentials, when a device has already been claimed to prevent third parties who later see the serial number from obtaining a key.
- the server may authenticate the peripheral device via the native application. To this end, the server may first encrypt a random string (e.g., a pseudo random string, or other difficult to predict string) with an encryption key paired to the decryption key on the peripheral device, e.g., such that only the peripheral device has access to a key to decrypt the string.
- the encrypted string may be sent to the native application, which may relay the encrypted string to the peripheral device.
- the peripheral device may decrypt the encrypted message and send the decrypted string (or a value based on the decrypted string sufficient to prove decryption) back to the server via the native application to confirm that the peripheral device has access to the corresponding key.
- the server may send the encryption key to the native application needed to communicate with the new peripheral device.
- the server may then update a record in memory indicating the device has been paired, and the native application may store the key in persistent memory, e.g., in association with a network address, like a MAC address of the peripheral device.
- the peripheral device and central device may then encrypt their data with their respective keys, and the other device may use its respective key to decrypt the data.
- the other device may use its respective key to decrypt the data.
- the above-described wearable device may include an electronic lock configured to lock and unlock the wearable device, such as a lock described below with reference to figures 8-22.
- the wearable device may be manually locked and electronically unlocked (For example, to prevent accidental or unauthorized unlocking), or vice versa.
- Manually locking (or unlocking) may store potential energy in the lock (e.g., by biasing a resilient member), and that stored energy may be released and harnessed to effectual the reverse operation.
- the reverse operation may be triggered electronically (e.g., via a remote wireless control or authorization signal sent form one of the devices described above associated with a caregiver).
- a remote wireless control or authorization signal sent form one of the devices described above associated with a caregiver may be triggered electronically (e.g., via a remote wireless control or authorization signal sent form one of the devices described above associated with a caregiver).
- at least one of locking or unlocking may release the stored potential energy imparted with the manual operation, and this stored energy may conserve electrical power used to effectuate the reverse operation, thereby extending battery life of the wearable device.
- the locking mechanism may be locked manually by pressing a lock button (as described herein), and cannot be unlocked manually to help prevent accidental or unauthorized unlocking of the wristband.
- the wearable device may be unlocked electronically via an actuator (as described in the example below).
- the locking mechanism described herein may be used in other applications.
- the locking mechanism may be used to lock/unlock other wearable devices (e.g., watches, bracelets bands, necklaces, and/or other wearable devices). It should be noted that use of the locking mechanism described herein is not to be limited to use in monitoring system (wearable or not) (which is not to imply that other features are limiting).
- the locking mechanism may be used to lock/unlock items that are not wearable.
- furniture e.g., dressers, lockers, cabinets, and/or other furniture items
- doors e.g., windows, cars, seat belts, car seats, or other items.
- the above-described wearable device may include a panic button or a touch screen to allow the user (person wearing the device) to communicate or interact with the device.
- this feature might add significantly to the cost of the device.
- Some embodiments provide these features at relatively low expense, in a battery friendly way, for example with sensors that serve dual purposes.
- Some embodiments may provide for communicating between a wearable or Internet-of-thing (IoT) device to a parent network or central device or other devices through a sensor rather than using a more expensive, power hungry interface to connect devices.
- IoT Internet-of-thing
- FIG. 8 illustrates a locking mechanism 800 that may mitigate some of the above- described issues, as well as, or in the alternative, provide other benefits described below.
- locking mechanism 800 is configured to lock/unlock a wearable device, such as the wearable device described above.
- Locking mechanism 800 controls closure of the wearable device in some cases.
- Locking mechanism 800 may be an integral part of the wearable device in some cases, or the locking mechanism may include separate parts assembled into the wearable device.
- locking mechanism 800 may be located in the same housing where the processors, sensors, storage media, user interfaces (described above) are located.
- locking mechanism may be connected to the wearable device via different connections (e.g., band, welds, rivets, clips, screws, bolts, etc.)
- locking mechanism may be located in a different housing that includes processors, sensors, storage media, user interfaces and that can be attached or detached from the wearable device (e.g., the locking mechanism may be part of a band to which a monitoring system, such as the one described above, can be added to, or locking mechanism 800 maybe an add-on to a wearable device having a monitoring system).
- locking mechanism 800 may be connected to the wearable device permanently of semi-permanently. For example, in some cases, once locking mechanism 800 is connected to the wearable device it cannot be detached from it. Or in other cases, once the locking mechanism is unlocked it can be detached from the wearable device.
- locking mechanism 800 may be locked manually using a lock button and unlocked electronically using an actuator, or vice versa.
- locking mechanism 800 includes a lock button 820 and an actuator 840.
- Manual locking of the locking mechanism may be done by pushing button 820, turning a nob, or securing a closure.
- Other manual or mechanical locks are consistent with the techniques described here.
- locking the locking mechanism may be done manually or electronically.
- a first step is manual (push a button, or turn a nob for example) and the second step is electronic via an electronic control of an actuator (e.g., actuator 840) to finish the locking action.
- an actuator e.g., actuator 840
- locking may consume more energy the unlocking, so to preserve power on a battery on the band, locking may be effectuated manually while unlocking is executed at least in party electronically (e.g., a release may be effectuated electronically, while further manual interaction removes the band)
- electronic unlocking of locking mechanism 800 may be done by electronic control of actuator 840 (wired or wireless) thereby controlling movement of a stopper 830 that keeps the locking mechanism in a locked position (e.g., control of a movement of a pin in and out of a hole).
- actuator 840 may be controlled mechanically, electronically, or through software.
- actuator 840 may be electronically controlled with a controller located in the wearable device via commands sent over a network (e.g., with monitoring device described above).
- actuator 840 may be controlled by authentication (e.g., a code, a security token, a password, or a biometric authentication entered into a user interface on the wearable device).
- Control by authentication may be done in two steps in some cases, first step being authentication and the second step being accessing control of the actuator.
- a control device e.g., a mobile phone
- a user is prompted to enter a password to access control of the actuator, and once authenticated, the user can access control of the actuator from the mobile phone.
- authentication results in control of the actuator (e.g., once a password is entered the wearable device is unlocked). This could be done from an interface on the wearable device or remotely from a control device over a network or via wired connection.
- the wearable device may be configured to access stored authentication information on a personal digital assistant (PDA), a computer, or smartphone by using wireless communication.
- PDA personal digital assistant
- wireless communication For example, by using infrared, Wi-Fi, Global System for Mobile Communications (GSM), Code division multiple access (CDMA), Ultra Low Frequency (ULF), Bluetooth, or Near-field communication (NFC) data transfer methods to control the actuator.
- GSM Global System for Mobile Communications
- CDMA Code division multiple access
- URF Ultra Low Frequency
- NFC Near-field communication
- RFID radio-frequency identification
- a tag reader may be placed in the wearable device. Once the tag reader detects the tag the actuator may be automatically controlled to unlock the locking mechanism.
- RFID radio-frequency identification
- actuator 840 translates energy received to movement (e.g., of stopper) in response to a control signal.
- actuator 840 may be powered by electric current (e.g., from a battery). Other sources of energy may be considered.
- Examples of actuators that may be suitable include one or more of a solenoid, a DC motor, an electromagnetic coil, a rotor, a harmonic drive, a micro linear pusher, or a piezo actuator.
- actuator 840 is configured to convert electrical energy or other forms of energy (e.g., from a battery, hydraulic fluid pressure, pneumatic pressure, or other sources of energy) into movement (linear translation, rotation, or combinations thereof). For example, pushing or pulling stopper 830.
- actuator 840 may operate with a direct current (DC) voltage and may be controlled using a transistor (e.g., a metal-oxide- semiconductor field-effect transistor MOSFET).
- DC direct current
- MOSFET metal-oxide- semiconductor field-effect transistor
- AC alternative current
- the actuator may be one or more of an electromagnetic coil, a rotating motor, a solenoid, a DC motor, a harmonic drive, a micro linear pusher, a piezo actuator, and/or other actuators. Dimensions of the actuator may vary between 2- 6mm in width and 10-24mm in length in some embodiments.
- actuator 840 may be a linear solenoid configured to control linear movement of stopper 830 (e.g., in and out of slot 888).
- the solenoid is a pull-type solenoid configured to pull stopper 830 towards itself when energized. This is may be advantageous since the solenoid needs to be energized only when the locking mechanism is being unlocked (though not all embodiments afford this advantage, which is not to suggest that other features may not also be varied).
- the solenoid may be a push-type solenoid configured to push the stopper away from itself when energized.
- circuit 1300 may include a direct current converter (DC-DC converter) for example to convert a 3.7V from a battery to a 2.5V.
- circuit 1300 may include a charge limiting resistor, a supercapacitor, a solenoid control resistor, and a flyback diode to prevent high back voltage when current is interrupted.
- lock button 820 is configured to mechanically lock/unlock the locking mechanism and thereby locking/unlocking the wearable device.
- lock button 820 includes a body 860 and a spring 880.
- body 860 of the lock button 820 e.g., lock button may be manually pushed down to lock the wearable device.
- the pressure may result in compressing spring 880 thereby moving the locking mechanism 800 into a locked position and engaging stopper 830 that prevents the locking mechanism from moving from the locked position.
- the wearable device may be unlocked by moving stopper 830 out of the way with actuator 840.
- Figures 9-10 illustrate views of an example of lock button 820 according to some embodiments.
- body 860 has "T" shape with a top portion 862 being approximately perpendicularly connected to element 864 of body 860.
- body 860 is connected to the upper portion of spring 880 such that top portion 862 sits on the upper portion of spring 880, and such that element 864 is parallel to support portion 886 of spring 880.
- top portion 862 may have a rectangular prism shape with one or more pegs 868 configured to connect body 860 to spring 880.
- top portion 862 may be considered (e.g., cubic, cylindrical, triangular shape, etc.)
- portion 862 may protrude from an aperture or a hole in the wearable device, such that the user may press the locking button 820 by pushing down portion 862.
- portion 862 may be located under a housing in the wearable device, and can only be accessible through an aperture or hole (e.g., using a small object to press button 820 down) to prevent accidental locking or unlocking of the wearable device.
- body 860 may be injected molded from a plastic material. This is expected to lower the cost of manufacturing.
- top portion 862 and element 864 are manufactured separately and connected together to form body 860 (e.g., with screws, glue, bolts, etc.).
- body 860 has one degree of freedom relative to a housing of the illustrated assembly of figure 8.
- a guide member may interface with a complementary member in the housing (e.g., with a slot and tab), and the body 860 may translate linearly into and out of the housing when pressed and released.
- this direction of movement may be orthogonal (e.g., within 15 degrees of exactly orthogonal) to a direction of movement of the actuator 840.
- the actuator 840 includes a compression spring disposed around a moving member that biases the moving member in an extended position. When unlocking, this spring may be further compressed. Thus, no energy is expended, in some embodiments, in locking or keeping the device in a locked state.
- a distal portion of spring 880 adjacent button 820 is configured to move with lock button 820 into a locked position, by resiliently deforming the spring 880 (e.g., placing an outer surface of the bend in tension and an inner surface in compression) under a pressure applied to the lock button 820.
- another distal portion of spring 880 is connected to body 860 such that when pressure is applied to body 860, spring 880 is compressed.
- Spring 880 and body 860 may be connected by screws, pegs, fasteners, glue, etc.
- spring 880 includes one or more holes configured to receive one or more pegs of body 860.
- spring 880 comprises an upper portion 882, arms 884, and a support portion 886.
- upper portion 882 and support portion 886 are perpendicularly connected to form an "L" shape (e.g., approximately perpendicular).
- Arms 884 may be connected to opposite sides of upper portion 882 horizontally.
- upper portion 882 and support portion 886 have relatively fixed dimension (do not compress under pressure) while arms 884 compress to provide upward and downward movement to lock button 820.
- arms 884 store mechanical energy resulting from the compression load and get shorter as the load is applied to the body 860. In some cases, when arms 884 are compressed down they may exert an opposing force approximately proportional to their change in length. In some embodiments, arms 884 may have a 1-4 mm change in distance between the ends of the arms under pressure. For example, in figure 10 arrow 892 shows compression movement and arrow 894 shows bending movement of arms 884 as a result of a pressure 896 applied to body 860.
- arms 884 In operation, when arms 884 are compressed stopper 830 is inserted into slot 888 of support portion 886 locking the button down, and when stopper 830 is moved out of the way (e.g., by electronic actuation) arms 884 return to their original state and original length thereby unlocking the lock button.
- arms 884 may be made out of a piece of metal bent into a bow shape. In other cases, arms 884 may be made out of two angled pieces of metal connected together.
- arms 884 may be flat springs, coil springs, or serpentine springs, torsion springs, V-springs, rubber bands, etc.
- spring 880 may be made from a flexible bendable material having an internal resistance such that the material may be deformed under force (e.g., pressure from pressing lock button 820) but restores to its original state when the force is no longer applied (e.g., spring steel, phosphor bronze, titanium, or beryllium copper).
- spring 880 may be made of a mix of materials having same or different elasticity properties.
- parts of spring 880 may be made out a rigid material (e.g., upper portion 882 and support portion 886) and other parts may be made out of an elastic material (e.g., arms 884).
- spring 880 may be bent or stamped from a single sheet of metal (for relatively inexpensive but reliable manufacturing).
- spring 880 may be made out of different parts that connected together (e.g., welded, glued, screwed, bolted, etc.)
- locking mechanism 800 described above may be housed in a carriage within a housing (e.g., the housing of the wearable device described above).
- Figures 11- 12 illustrate an example of locking mechanism assembly 1200 according to some embodiments.
- Figure 11 shows a top view of carriage 1220 and figure 12 shows a bottom view of the carriage.
- Carriage 1220 may be configured to house other element of the wearable device, such as controllers, sensors, electronics, user interfaces, memory, etc.
- Figures 14A-C illustrate a top view and cross sections views respectively of an example of locking mechanism.
- the locking mechanism includes a solenoid 1480 having a shaft 1430 that pins the manual lock button 1420 in a locked position.
- springs 1484 are compressed and shaft 1430 pins the button down into a locked position.
- Figures 15 A-B illustrate an example of a locking mechanism according to some embodiments.
- Figure 15 A illustrates a cross view of locking mechanisml500 in an unlocked position
- figure 15 B illustrates a cross view of locking mechanism 1500 in a locked position.
- Locking mechanism 1500 includes locking arms 1530 configured to hold locking button 1520 into a locked position when the button is pressed down (movement shown by the arrow in figures 15 A).
- Button 1520 includes grooves 1525 configured to receive arms 1530 when the locking mechanism is in a locked position.
- Springs 1528 are configured to facilitate movement of the arms into the grooves.
- Springs 1525 are de-compressed when the button is in the locked position and compressed when the button is in an unlocked position.
- locking mechanism 1500 includes linear actuators 1530 (figure 15C) configured to unlock the locking mechanism by applying a linear force (arrowsl532) on the arms to push them back (arrows 1534) from the grooves into the unlocked position.
- FIG. 16 illustrates a cross view of a locking mechanism in accordance with some embodiments.
- Locking mechanism 1600 includes button 1620 configured to be pressed down into a locked position. When the button in pushed down stoppers 1630 are inserted into slots 1635 and springs 1680 are compressed. The stoppers and the spring keep the button in a locked position. Locking mechanism 1600 may be unlocked by actuating stoppers 1630 back to allow the button to move up.
- some embodiments may allow a user of the wearable device to communicate or interact with the device, providing, for instance, a panic button or a touch screen. With traditional techniques, this feature might add significantly to the cost of the device. However, some embodiments provide these features at relatively low expense, in a battery friendly way, with sensors on the device that serve dual purposes. For instance, some embodiments may include an accelerometer that senses inputs from a child, who may send commands to the device by tapping the wristband, producing sensed accelerations. A variety of inputs may be sensed and acted upon. Some embodiments may allow the child to communicate with the parent device or any other device by allowing the child (user) to tap the device in certain patterns. Some embodiments may support a panic alarm with a tap que, for example.
- Some embodiments may allow the user to communicate using a "Morse code" style to a smart device, like the above-described wristband, and then the device may wirelessly send commands to a smartphone, for instance, from any wearable fitted with an accelerometer using tap commands or a tap pad interface.
- Applications are not limited to tracking individuals.
- a smart watch for example, may be told to send a call to voice mail or launch a certain app without looking at the screen simply by tapping a preset command pattern anywhere on the device, or even simply tapping your fingers on a table of the hand wearing the device. Tapping very quickly many times in a row may be programmed to call a certain person without touching anything else.
- Some embodiments may use tap patterns to connect Internet-of-thing (loT) devices, rather than using a more expensive, power hungry interface to connect to, for instance, protected wireless networks.
- a simple tap pattern may be translated to the wireless password and allow more devices to connect without expensive interfaces.
- some embodiments may provide for communicating between a wearable or IoT device to a parent network or device using a tap pattern through an accelerometer.
- the monitoring device and locking mechanism described may be used in a wrist band.
- Figures 17A-D illustrate an example of a wrist band 1700 according to some embodiments.
- the band includes embedded wires 1726 and plates 1724 for electrical connectivity with electronics of the wearable device. The plates and wire may be pressed into a substrate and over molded to make the band.
- a first end of the band 1720 includes a plurality of holes 1722 electrically connected to the wires 1726 via plates 1724. The holes are used to adjust the size of the band to fit different users. The holes are configured to receive screws (or bolts, or other fasteners) to connect the band to the housing of the monitoring system in some cases.
- the second end of the band 1740 is configured to be inserted in the housing to fasten the band around the wearer's wrist. Once fastened the locking mechanism is in a locked position.
- the size of the band may be adjusted from the second end of the band as shown in figures 18A-B.
- second end includes a plurality of grooves configured to receive a lock to lock the wearable device. It should be noted that other types of bands may be considered and are consistent with the techniques described here.
- FIG 18C illustrates a cross section view of an electronic lock assembly (e.g., electronic lock of figure 8) in accordance with some embodiments.
- Electronic lock 800 is housed in housing 1880.
- Band 1700 may be adjusted (to fit size of the wearer) from lock end 1740.
- end 1740 may be inserted in housing 1700 via opening 1886 and locked in a position where the band fits the wearer.
- end 1740 may include grooves configured to receive the electronic lock.
- end 1720 of the band does not adjust the size of the band (e.g., the band is coupled to the housing via screw 890 in a hole in the band).
- Figures 19-21 illustrate an example of a band interface 1920 configured to be used with the monitoring system and the locking mechanism described above.
- band interface includes a plurality of protrusions 1940 configured to fit in corresponding slots in the housing of wearable device, and slots 1960 are configured to allow size adjustment of the band.
- a band may be compressed, e.g., by a threaded bolt that passes through a threaded aperture orthogonal to the band.
- an electronic actuator like those described above may interface with a series of teeth around such a bolt to prevent unthreading and release of the lock, thereby pinching the band in a fixed position.
- Figure 22 is a diagram that illustrates an exemplary computing system 1000 in accordance with embodiments of the present technique.
- Various portions of systems and methods described herein may include or be executed on one or more computer systems similar to computing system 1000. Further, processes and modules described herein may be executed by one or more processing systems similar to that of computing system 1000.
- Computing system 1000 may include one or more processors (e.g., processors 1010a- 1010 ⁇ ) coupled to system memory 1020, an input/output I/O device interface 1030, and a network interface 1040 via an input/output (I/O) interface 1050.
- processors may include a single processor or a plurality of processors (e.g., distributed processors).
- a processor may be any suitable processor capable of executing or otherwise performing instructions.
- a processor may include a central processing unit (CPU) that carries out program instructions to perform the arithmetical, logical, and input/output operations of computing system 1000.
- CPU central processing unit
- a processor may execute code (e.g., processor firmware, a protocol stack, a database management system, an operating system, or a combination thereof) that creates an execution environment for program instructions.
- a processor may include a programmable processor.
- a processor may include general or special purpose microprocessors.
- a processor may receive instructions and data from a memory (e.g., system memory 1020).
- Computing system 1000 may be a uni -processor system including one processor (e.g., processor 1010a), or a multi -processor system including any number of suitable processors (e.g., lOlOa-lOlOn). Multiple processors may be employed to provide for parallel or sequential execution of one or more portions of the techniques described herein.
- Processes, such as logic flows, described herein may be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating corresponding output. Processes described herein may be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- Computing system 1000 may include a plurality of computing devices (e.g., distributed computer systems) to implement various processing functions.
- I/O device interface 1030 may provide an interface for connection of one or more I/O devices 1060 to computer system 1000.
- I/O devices may include devices that receive input (e.g., from a user) or output information (e.g., to a user).
- I/O devices 1060 may include, for example, graphical user interface presented on displays (e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor), pointing devices (e.g., a computer mouse or trackball), keyboards, keypads, touchpads, scanning devices, voice recognition devices, gesture recognition devices, printers, audio speakers, microphones, cameras, or the like.
- I/O devices 1060 may be connected to computer system 1000 through a wired or wireless connection.
- I/O devices 1060 may be connected to computer system 1000 from a remote location.
- I/O devices 1060 located on remote computer system for example, may be connected to computer system 1000 via a network and network interface 1040.
- Network interface 1040 may include a network adapter that provides for connection of computer system 1000 to a network.
- Network interface may 1040 may facilitate data exchange between computer system 1000 and other devices connected to the network.
- Network interface 1040 may support wired or wireless communication.
- the network may include an electronic communication network, such as the Internet, a local area network (LAN), a wide area network (WAN), a cellular communications network, or the like.
- System memory 1020 may be configured to store program instructions 1100 or data 1110.
- Program instructions 1100 may be executable by a processor (e.g., one or more of processors 1010a- 1010 ⁇ ) to implement one or more embodiments of the present techniques.
- Instructions 1100 may include modules of computer program instructions for implementing one or more techniques described herein with regard to various processing modules.
- Program instructions may include a computer program (which in certain forms is known as a program, software, software application, script, or code).
- a computer program may be written in a programming language, including compiled or interpreted languages, or declarative or procedural languages.
- a computer program may include a unit suitable for use in a computing environment, including as a stand-alone program, a module, a component, or a subroutine.
- a computer program may or may not correspond to a file in a file system.
- a program may be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
- a computer program may be deployed to be executed on one or more computer processors located locally at one site or distributed across multiple remote sites and interconnected by a communication network.
- System memory 1020 may include a tangible program carrier having program instructions stored thereon.
- a tangible program carrier may include a non-transitory computer readable storage medium.
- a non-transitory computer readable storage medium may include a machine readable storage device, a machine readable storage substrate, a memory device, or any combination thereof.
- Non-transitory computer readable storage medium may include nonvolatile memory (e.g., flash memory, ROM, PROM, EPROM, EEPROM memory), volatile memory (e.g., random access memory (RAM), static random access memory (SRAM), synchronous dynamic RAM (SDRAM)), bulk storage memory (e.g., CD-ROM and/or DVD- ROM, hard-drives), or the like.
- nonvolatile memory e.g., flash memory, ROM, PROM, EPROM, EEPROM memory
- volatile memory e.g., random access memory (RAM), static random access memory (SRAM), synchronous dynamic RAM (SDRAM)
- bulk storage memory e.g.,
- System memory 1020 may include a non-transitory computer readable storage medium that may have program instructions stored thereon that are executable by a computer processor (e.g., one or more of processors lOlOa- ⁇ ) to cause the subject matter and the functional operations described herein.
- a memory e.g., system memory 1020
- a memory may include a single memory device and/or a plurality of memory devices (e.g., distributed memory devices).
- I/O interface 1050 may be configured to coordinate I/O traffic between processors lOlOa- ⁇ , system memory 1020, network interface 1040, I/O devices 1060, and/or other peripheral devices.
- I/O interface 1050 may perform protocol, timing, or other data transformations to convert data signals from one component (e.g., system memory 1020) into a format suitable for use by another component (e.g., processors lOlOa-lOlOn).
- I/O interface 1050 may include support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard.
- PCI Peripheral Component Interconnect
- USB Universal Serial Bus
- Embodiments of the techniques described herein may be implemented using a single instance of computer system 1000 or multiple computer systems 1000 configured to host different portions or instances of embodiments. Multiple computer systems 1000 may provide for parallel or sequential processing/execution of one or more portions of the techniques described herein.
- Computer system 1000 is merely illustrative and is not intended to limit the scope of the techniques described herein.
- Computer system 1000 may include any combination of devices or software that may perform or otherwise provide for the performance of the techniques described herein.
- computer system 1000 may include or be a combination of a cloud-computing system, a data center, a server rack, a server, a virtual server, a desktop computer, a laptop computer, a tablet computer, a server device, a client device, a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a vehicle-mounted computer, or a Global Positioning System (GPS), or the like.
- PDA personal digital assistant
- GPS Global Positioning System
- Computer system 1000 may also be connected to other devices that are not illustrated, or may operate as a stand-alone system.
- the functionality provided by the illustrated components may in some embodiments be combined in fewer components or distributed in additional components.
- the functionality of some of the illustrated components may not be provided or other additional functionality may be available.
- instructions stored on a computer-accessible medium separate from computer system 1000 may be transmitted to computer system 1000 via transmission media or signals such as electrical, electromagnetic, or digital signals, conveyed via a communication medium such as a network or a wireless link.
- Various embodiments may further include receiving, sending, or storing instructions or data implemented in accordance with the foregoing description upon a computer-accessible medium. Accordingly, the present invention may be practiced with other computer system configurations.
- the illustrated components are depicted as discrete functional blocks, but embodiments are not limited to systems in which the functionality described herein is organized as illustrated.
- the functionality provided by each of the components may be provided by software or hardware modules that are differently organized than is presently depicted. For example, such software or hardware may be intermingled, conjoined, replicated, broken up, distributed (e.g., within a data center or geographically), or otherwise differently organized.
- the functionality described herein may be provided by one or more processors of one or more computers executing code stored on a tangible, non-transitory, machine-readable medium (which may be distributed among multiple computing devices, with different computing devices having different subsets of the medium, e.g., in a distributed application).
- an element or “an element” includes a combination of two or more elements, notwithstanding use of other terms and phrases for one or more elements, such as “one or more.”
- the term “or” is, unless indicated otherwise, non-exclusive, i.e., encompassing both “and” and “or.”
- Terms describing conditional relationships e.g., "in response to X, Y,” “upon X, Y,”, “if X, Y,” “when X, Y,” and the like, encompass causal relationships in which the antecedent is a necessary causal condition, the antecedent is a sufficient causal condition, or the antecedent is a contributory causal condition of the consequent, e.g., "state X occurs upon condition Y obtaining” is generic to "X occurs solely upon Y” and "X occurs upon Y and Z.”
- Such conditional relationships are not limited to consequences that instantly follow the antecedent obtaining, as some consequences may be delayed, and in conditional statements, antecedents are connected to
- Statements in which a plurality of attributes or functions are mapped to a plurality of objects encompasses both all such attributes or functions being mapped to all such objects and subsets of the attributes or functions being mapped to subsets of the attributes or functions (e.g., both all processors each performing steps A-D, and a case in which processor 1 performs step A, processor 2 performs step B and part of step C, and processor 3 performs part of step C and step D), unless otherwise indicated.
- information indicating the location of the moveable device with respect to a central unit does not require the information to include or be based on the location of the central unit when the information is a signal received by the central unit, as things like signal strength can indicate location. Also “the location of the peripheral device breaching the location indicator threshold” need not be detected at the moment of breach. It is enough to determine it is beyond the threshold.
- a locking mechanism for a wearable child-monitor system the locking mechanism
- a button assembly comprising: a button assembly; a spring assembly coupled to the button assembly, the spring assembly comprising: two bent arms configured to compress under a force applied to the button assembly; and an aperture configured to receive a stopping element when the locking mechanism is in a locked position; an actuator configured to electronically control movement of the stopping element in and out of the aperture; and a control circuit comprising: a tangible non-transitory machine readable media storing instructions that when executed by one or more processors of the control unit effectuate operations comprising: receiving a request to unlock the locking mechanism; sending a request for authentication; receiving authentication information; and controlling the actuator to move the stopping element from the locked position.
- the locking mechanism of any of embodiments 1-7 further comprising: a wearable device associated with a user, the wearable device comprising one or more sensors configured to indicate location of the wearable device.
- An electronic lock for wearable electronics comprising: a band configured to wrap around a human limb and secure wearable electronics to the human limb; an electronic lock secured to a portion of the band and configured to receive a distal end of the band and lock the band in a loop, wherein the electronic lock comprises: a contact member configured to receive a force applied by a user and move in a first direction when locking the electronic lock; a first resilient member coupled to the contact member and a housing of the lock, the first resilient member being configured to be biased by the contact member as a result of the contact member moving in the first direction when locking the electronic lock; a first locking member coupled to the contact member and configured to move with the contact member from an unlocked position to a locked position; an electronically controlled actuator coupled to the housing; a second locking member coupled to the electronically controlled actuator and configured to be moved by the electronically controlled actuator from a locked position to an unlocked position by moving in a second direction; a second resilient member coupled to the second locking member and configured to bias the second locking member in the locked position
- the second locking member comprises a locking pin sized to be received by an aperture in the first locking member when in the locked position
- the second resilient member comprises a compression spring disposed at least partially around at least part of the locking pin
- control circuit comprises a diode disposed in series between a pair of electrical leads of a coil of the solenoid and a transistor disposed in series between one of the electrical leads and either a source or sink of the control circuit.
- the electronic lock of any of embodiments 11-16 comprising: a processor; an antenna; a receiver coupling the antenna to the processor; and memory storing instructions that when executed by the processor effectuate operations comprising: receiving a wireless signal via the antenna indicating that the lock is to be unlocked; and outputting an actuation signal that causes the electronically controlled actuator to be actuated.
- the operations comprise steps for authenticating a pair of computing devices to one another.
- the operations comprise: outputting the actuation signal to a control pin of a transistor disposed in series between the electronically controlled actuator and a power source or sink; and blocking current from shorting across electrical conductors of the electronically controlled actuator while actuating; and after actuating, permitting transient current to flow directly between the electrical conductors of the
- the first resilient member comprises: a U-shaped member having a first leg secured to the contact member and a second leg secured to a housing of the electronic lock.
- the first resilient member comprises: two or more legs secure to the housing of the electronic lock, wherein the first leg is disposed in a volume defined by a space between the two or more legs.
- the electronic lock of any of embodiments 11-29 comprising: a mobile computing device having a processor and memory storing instructions that when executed by the processor cause the mobile computing device to monitor a distance between the wearable electronics and the mobile computing device.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Emergency Management (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Child & Adolescent Psychology (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Theoretical Computer Science (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Human Resources & Organizations (AREA)
- Development Economics (AREA)
- Alarm Systems (AREA)
Abstract
L'invention concerne un verrou électronique pour dispositifs électroniques portés sur le corps, le verrou électronique incluant : un ensemble de boutons ; un ensemble de ressorts couplé à l'ensemble de boutons, l'ensemble de ressorts comprenant : deux bras courbés conçus pour se compresser sous une force appliquée à l'ensemble de boutons ; et un orifice conçu pour recevoir un élément d'arrêt lorsque le mécanisme de verrouillage se trouve dans une position verrouillée ; un actionneur conçu pour contrôler électroniquement le mouvement de l'élément d'arrêt à l'intérieur et à l'extérieur de l'orifice ; et un circuit de contrôle comprenant : un support lisible par une machine non transitoire tangible contenant des instructions qui, lorsqu'elles sont exécutées par un ou plusieurs processeurs de l'unité de contrôle, effectuent des opérations consistant : à recevoir une requête pour déverrouiller le mécanisme de verrouillage ; à envoyer une requête d'authentification ; à recevoir des informations d'authentification ; et à contrôler l'actionneur pour qu'il déplace l'élément d'arrêt depuis la position verrouillée.
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562244042P | 2015-10-20 | 2015-10-20 | |
US62/244,042 | 2015-10-20 | ||
US15/052,617 | 2016-02-24 | ||
US15/052,617 US10032353B2 (en) | 2015-02-24 | 2016-02-24 | Monitoring dependent individuals |
US201662384448P | 2016-09-07 | 2016-09-07 | |
US62/384,448 | 2016-09-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017070376A1 true WO2017070376A1 (fr) | 2017-04-27 |
Family
ID=58557871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/057957 WO2017070376A1 (fr) | 2015-10-20 | 2016-10-20 | Verrous pour bracelets électroniques portés sur le corps |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017070376A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3852447A1 (fr) * | 2017-06-01 | 2021-07-21 | Carrier Corporation | Système et procédé de communication par transfert de données bluetooth basse consommation |
AU2019201014B2 (en) * | 2018-11-09 | 2021-09-16 | Shanghai Qinqi Technology Co., Ltd. | IoT smart clip and usage method thereof |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6967562B2 (en) * | 2002-02-22 | 2005-11-22 | Royal Thoughts, Llc | Electronic lock control and sensor module for a wireless system |
KR20110052832A (ko) * | 2009-11-13 | 2011-05-19 | 주식회사 아이엔테크 | 도어록 해정장치 |
US8529553B2 (en) * | 2005-08-23 | 2013-09-10 | Medtronic Minimed, Inc. | Infusion medium delivery device and method with drive device for driving plunger in reservoir |
US8731156B1 (en) * | 2003-02-25 | 2014-05-20 | Open Invention Network, Llc | Activation of an electronic mechanism using a communications network |
US20140143785A1 (en) * | 2012-11-20 | 2014-05-22 | Samsung Electronics Companty, Ltd. | Delegating Processing from Wearable Electronic Device |
-
2016
- 2016-10-20 WO PCT/US2016/057957 patent/WO2017070376A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6967562B2 (en) * | 2002-02-22 | 2005-11-22 | Royal Thoughts, Llc | Electronic lock control and sensor module for a wireless system |
US8731156B1 (en) * | 2003-02-25 | 2014-05-20 | Open Invention Network, Llc | Activation of an electronic mechanism using a communications network |
US8529553B2 (en) * | 2005-08-23 | 2013-09-10 | Medtronic Minimed, Inc. | Infusion medium delivery device and method with drive device for driving plunger in reservoir |
KR20110052832A (ko) * | 2009-11-13 | 2011-05-19 | 주식회사 아이엔테크 | 도어록 해정장치 |
US20140143785A1 (en) * | 2012-11-20 | 2014-05-22 | Samsung Electronics Companty, Ltd. | Delegating Processing from Wearable Electronic Device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3852447A1 (fr) * | 2017-06-01 | 2021-07-21 | Carrier Corporation | Système et procédé de communication par transfert de données bluetooth basse consommation |
US11246176B2 (en) | 2017-06-01 | 2022-02-08 | Carrier Corporation | Bluetooth™ low energy data transfer communication system and method |
US11758599B2 (en) | 2017-06-01 | 2023-09-12 | Carrier Corporation | Bluetooth™ low energy data transfer communication system and method |
AU2019201014B2 (en) * | 2018-11-09 | 2021-09-16 | Shanghai Qinqi Technology Co., Ltd. | IoT smart clip and usage method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9928713B2 (en) | Locks for wearable electronic bands | |
US10032353B2 (en) | Monitoring dependent individuals | |
CN107690772B (zh) | 经由可穿戴设备无形指示胁迫 | |
US9460612B2 (en) | Tamper-alert and tamper-resistant band | |
AU2013284447B2 (en) | Tracking and control of personal effects | |
US10070248B2 (en) | Movement detection | |
KR101859021B1 (ko) | 생체 신호와 비콘 기술을 이용한 웨어러블 디바이스 기반의 아동 케어 시스템 | |
US12052816B1 (en) | Smart ring and methods for manufacturing | |
Bhowmik et al. | IoT based data aggregation method for E-health monitoring system | |
WO2017070376A1 (fr) | Verrous pour bracelets électroniques portés sur le corps | |
US10182761B2 (en) | Method and system of attachment and detection of attachment of a wearable sensor to clothing material | |
US20110148638A1 (en) | Security monitor method utilizing a rfid tag and the monitor apparatus for the same | |
EP3754553A1 (fr) | Dispositif portatif | |
KR20150056123A (ko) | 스마트폰을 이용한 자세 인식 장치 | |
WO2016138146A1 (fr) | Surveillance d'individus dépendants | |
TW201704610A (zh) | 智慧型門禁裝置 | |
KR20140075400A (ko) | 생체 정보에 기반한 사용자의 심리 인식 파악을 위한 스마트 에이전트 시스템 | |
KR101618678B1 (ko) | 오용, 도용 및 도난 방지 기능을 갖는 비콘 및 이의 관리 시스템 | |
KR101678902B1 (ko) | 신원 정보 확인 및 안전 확보 시스템 | |
KR102011485B1 (ko) | 무선센서신호 처리 시스템장치 및 그 무선센서신호 처리방법 | |
Goyal et al. | GESTURE BASED CALLING SYSTEM | |
CY1115364T1 (el) | Διαγνωστικοi αισθητhρες ραδιοσυχνικης αναγνωρισης και εφαρμογες αυτων | |
KR20150089101A (ko) | 안심귀가를 위한 보호메시지 송출 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16858237 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16858237 Country of ref document: EP Kind code of ref document: A1 |