Personal tracking device
First Claim
1. A method, comprising:
- receiving periodic, status signals with a portable device from a wearable device worn by a person, wherein the status signals indicate operational status of the wearable device, wherein the operational status includes an indication of whether the person has tampered with the wearable device;
determining periodically location of the portable device;
transmitting periodically encrypted messages from the portable device to a monitoring system via a wireless telephone network, wherein the encrypted messages include the location of the portable device and the operational status of the wearable device; and
adjusting transmission rate of the encrypted messages from the portable device to the monitoring system by reducing the transmission rate when the portable device is within a specified region and increasing the transmission rate when the portable device is outside the specified region.
16 Assignments
0 Petitions
Accused Products
Abstract
A system for monitoring the location of individuals, such as parolees, includes a wearable device worn by the individual and a portable device operatively coupled to the wearable device. The portable device is operatively coupled to a monitoring system through a wireless telephone network. The portable device transmits periodically encrypted location information as well as status information across the wireless network to the monitoring system. The monitoring system tracks the location of the individual and alerts the appropriate authorities when the individual violates a rule, such as a condition for parole. The portable device increases the time between transmissions when the individual is within a specified home location and reduces the time between transmissions when outside the specified location.
190 Citations
17 Claims
-
1. A method, comprising:
-
receiving periodic, status signals with a portable device from a wearable device worn by a person, wherein the status signals indicate operational status of the wearable device, wherein the operational status includes an indication of whether the person has tampered with the wearable device;
determining periodically location of the portable device;
transmitting periodically encrypted messages from the portable device to a monitoring system via a wireless telephone network, wherein the encrypted messages include the location of the portable device and the operational status of the wearable device; and
adjusting transmission rate of the encrypted messages from the portable device to the monitoring system by reducing the transmission rate when the portable device is within a specified region and increasing the transmission rate when the portable device is outside the specified region. - View Dependent Claims (2, 3, 4, 5, 6)
determining the portable device has remained in the specified region for a specified period of time before said adjusting; and
sending a signal to the monitoring system designating the specified region as permitting as a reduction in the transmission rate.
-
-
3. The method of claim 1, further comprising receiving a signal from the monitoring system designating the specified region before said adjusting.
-
4. The method of claim 1, wherein said determining periodically the location of the portable device includes triangulating position of the portable device in relation to the wireless telephone network.
-
5. The method of claim 4, said determining periodically the location of the portable device includes determining the position based on signals received from a global positioning system.
-
6. The method of claim 1, further comprising alerting the monitoring system when the status signals are not received from the portable device.
-
7. A method, comprising:
-
storing a specified region in a monitoring system and a portable device possessed by a monitored person;
receiving periodically messages at a monitoring system from the portable device via a wireless telephone network, wherein the messages include location of the portable device;
adjusting allowable time between the messages from the portable device by increasing the allowable time between the messages when the portable device is within the specified region and decreasing the allowable time between the messages when the portable device is outside the specified region; and
alerting a law enforcement official of a violation, wherein the violation includes when the allowable time between the messages is exceeded. - View Dependent Claims (8, 9, 10, 11)
determining the location of the portable device is in a restricted zone; and
alerting the law enforcement official in response to said determining.
-
-
9. The method of claim 7, further comprising:
-
determining the location of the portable device is violation of a restraining order for an individual; and
alerting the individual of the violation of the restraining order and the location of the portable device.
-
-
10. The method of claim 7, wherein said alerting includes sending an alert message via the wireless network to a law enforcement portable device that is possessed by the law enforcement official.
-
11. The method of claim 10, wherein:
-
the law enforcement portable device includes a cellular telephone operable to communicate directly with the portable device of the monitored person; and
communicating directly between the law enforcement portable device and the portable device of the monitored person.
-
-
12. A system, comprising:
-
a processor operable to receive and decrypt encrypted messages containing location of a portable device in possession of a monitored person via a wireless telephone network;
memory operatively coupled to said processor, said memory being operable to store rules pertaining to said monitored person, wherein the rules include an allowable time between the messages and a designated area in which the allowable time between the messages is increased;
wherein said processor is operable to increase the allowable time between the messages when the portable device is located in the designated area; and
wherein said processor is operable to alert an individual when the portable device violates at least one of the rules in said memory. - View Dependent Claims (13, 14, 15, 16, 17)
said memory is operable store a restricted area for the monitored person, wherein the rules include the restricted area; and
said processor is operable to alert the individual when the portable device is located inside the restricted area.
-
-
14. The system of claim 13, wherein the individual includes a law enforcement officer, the monitored person includes a parolee and the restricted area is based on parole requirement of the parolee.
-
15. The system of claim 13, further comprising:
-
the wireless telephone network operatively coupled to the processor;
the portable device operatively coupled to the wireless telephone network;
a device possessed by the individual and operatively coupled to the wireless telephone network; and
wherein said processor is operable to determine location of the individual based on messages received from said device possessed by the individual.
-
-
16. The system of claim 15, wherein the individual includes a person having a restraining order against the monitored person and the restricted area is based on the restraining order.
-
17. The system of claim 15, further comprising a publicly accessible computer network operatively coupled between the wireless telephone network and said processor, said computer network being operable to convey the encrypted messages.
Specification