Checkpoint-based location monitoring via a mobile device
First Claim
1. A non-transitory computer-readable medium having instructions stored thereon executable by a processor to:
- receive, via a mobile device associated with a user in a facility having a plurality of wireless beacons therein, an indication of a first checkpoint corresponding to a first location in the facility and a first time period in which the user is allowed to reach the first checkpoint;
provide to the user, via the mobile device, the indication of the first checkpoint and the first time period allowed to reach the first checkpoint;
determine that the mobile device reached the first checkpoint based on a communication between the mobile device and a wireless beacon associated with the first checkpoint;
responsive to the determination that the mobile device reached the first checkpoint, receive, via the mobile device, an indication of a second checkpoint corresponding to a second location in the facility and a second time period in which the user is allowed to reach the second checkpoint, wherein the second checkpoint is determined based on a determined risk of intrusion into the facility proximal to the second checkpoint; and
provide to the user, via the mobile device, the indication of the second checkpoint and the second time period in which the user is allowed to reach the second checkpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, devices, and methods for checkpoint-based location monitoring via a mobile device are described herein. One device includes instructions stored thereon executable by a processor to receive, via a mobile device associated with a user in a facility having a plurality of wireless beacons therein, an indication of a first checkpoint corresponding to a first location in the facility and a first time period in which the user is allowed to reach the first checkpoint, provide to the user, via the mobile device, the indication of the first checkpoint and the first time period allowed to reach the first checkpoint, determine that the mobile device reached the first checkpoint based on a communication between the mobile device and a wireless beacon associated with the first checkpoint, receive, via the mobile device subsequent to the determination, an indication of a second checkpoint corresponding to a second location in the facility and a second time period in which the user is allowed to reach the second checkpoint, and provide to the user, via the mobile device, the indication of the second checkpoint and the second time period in which the user is allowed to reach the second checkpoint.
14 Citations
18 Claims
-
1. A non-transitory computer-readable medium having instructions stored thereon executable by a processor to:
-
receive, via a mobile device associated with a user in a facility having a plurality of wireless beacons therein, an indication of a first checkpoint corresponding to a first location in the facility and a first time period in which the user is allowed to reach the first checkpoint; provide to the user, via the mobile device, the indication of the first checkpoint and the first time period allowed to reach the first checkpoint; determine that the mobile device reached the first checkpoint based on a communication between the mobile device and a wireless beacon associated with the first checkpoint; responsive to the determination that the mobile device reached the first checkpoint, receive, via the mobile device, an indication of a second checkpoint corresponding to a second location in the facility and a second time period in which the user is allowed to reach the second checkpoint, wherein the second checkpoint is determined based on a determined risk of intrusion into the facility proximal to the second checkpoint; and provide to the user, via the mobile device, the indication of the second checkpoint and the second time period in which the user is allowed to reach the second checkpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for checkpoint-based location monitoring via a mobile device, comprising:
-
a plurality of beacons in a facility, wherein each of the plurality of beacons corresponds to a respective security checkpoint of a plurality of security checkpoints of the facility; a mobile device associated with a user of the facility, wherein the mobile device is configured to communicate with each of the plurality of beacons; and a computing device, configured to; determine that the mobile device has reached a first checkpoint of the plurality of checkpoints of the facility based on a communication with a beacon of the plurality of beacons corresponding to the first checkpoint; determine, responsive to the determination that the mobile device has reached the first checkpoint, a second checkpoint of the plurality of checkpoints of the facility to send the user based on a random selection of a particular checkpoint from a subset of the plurality of checkpoints; and communicate an indication of the second checkpoint to the mobile device and an indication of a time period allowed for the user to reach the second checkpoint from the first checkpoint.
-
-
12. A method for checkpoint-based location monitoring via a mobile device, comprising:
-
determining a checkpoint for a user of a facility to reach and a time period allowed for the user to reach the checkpoint; communicating the determined checkpoint and the determined time period allowed to a mobile device associated with the user; receiving an indication that the user reached the checkpoint within the time period based on a communication between the mobile device and a wireless beacon associated with the checkpoint; responsive to receiving the indication, determining an additional checkpoint for the user to reach from the checkpoint and an additional time period allowed for the user to reach the additional checkpoint from the checkpoint, wherein the additional checkpoint is determined based on a determined risk of intrusion into the facility proximal to the second checkpoint; receiving a verification from the mobile device that the mobile device is possessed by the user; and communicating to the mobile device, upon receiving the verification, an identification of the additional checkpoint and the additional determined time period allowed for the user to reach the additional checkpoint from the checkpoint. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification