Wireless fencing system
First Claim
1. An apparatus comprising a programming fixture, wherein said programming fixture is physically adapted to actuate a programming button on a tetherless leash of a wireless fencing system, wherein the programming button is used to define a perimeter based on geo-coordinates, and wherein the programming button is not directly accessible to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless fencing system comprises a tetherless leash, a programming fixture, and, optionally, a terminal. The tetherless leash establishes a “virtual” (i.e., barrier-free) perimeter based on geo-coordinates, monitors the position and movement of an animal relative to the tetherless leash, and delivers warnings, corrections, and praise to the animal in accordance with its programming. The programming fixture serves as a user interface during programming operations, since there are no exposed buttons by which a user can directly program the device. The wireless fencing system does not expand the perimeter in response to perimeter breach of a monitored animal. Rather, a protocol that monitors the animal'"'"'s speed and location direction of movement relative to the perimeter and/or outbound way points is used.
-
Citations
2 Claims
-
1. An apparatus comprising a programming fixture, wherein said programming fixture is physically adapted to actuate a programming button on a tetherless leash of a wireless fencing system, wherein the programming button is used to define a perimeter based on geo-coordinates, and wherein the programming button is not directly accessible to a user.
-
2. A method for operating a wireless fencing system comprising:
-
establishing a perimeter based on geo-coordinates;
determining if a monitored animal has breached said perimeter;
following a first monitoring protocol when said monitored animal has not breached said perimeter, wherein said first monitoring protocol comprises determining a likelihood of perimeter breach; and
following a second monitoring protocol when said monitored animal has not breached said perimeter, wherein said second monitoring protocol comprises not expanding said perimeter.
-
Specification