The disclosure relates to a method of bidirectional linking, connecting, communicating, and tracking objects, and in particular to a method of tracking the position and status of objects using a wireless tag associated with the object and/or an RF-enabled object.
A wireless tag to be associated with the object to be linked, tracked, or both is disclosed along with an electronic device for communicating with the tag and updating the information to an external device, such as a computer, network, or the cloud. Information such as, but not limited to time, position (including latitude, longitude, and altitude), speed, direction, temperature, and identification can be transmitted for either real-time linking/tracking and analysis, or a historical view. In one embodiment, the electronic device for communicating with the tag is a cellular phone, a tablet computer, a laptop computer, a pair of electronic glasses, or a watch.
In a first exemplary embodiment, a wireless tag for determining the position of an attached physical object or status of an environment in which the tag is placed is disclosed. In one embodiment, the wireless tag includes a power source for providing electrical power to the wireless tag, a radio transmitter and receiver system for wirelessly exchanging data and command with an electronic device, and a user interface including at least one input and at least one output, wherein the electronic device determines the location or status of the electronic device and a status of whether the distance between the electronic device and wireless tag exceeds a predetermined distance and wirelessly communicates data including the time, the location of the electronic device (including latitude, longitude, and altitude), speed and the status. In another embodiment, the electronic device communicates data to the network at predetermined period intervals and/or upon the initiation of a predetermined event. In still another embodiment, the wireless tag has a thickness of about 10 mm or less, and in another embodiment about 6 mm or less. In yet another embodiment, the communication between the tag and electronic device is encrypted. In yet still another embodiment the wireless tag includes one or more sensors having an output reading. In another embodiment, a plurality of tags is provided.
In a second exemplary embodiment a system for tracking the position of an object is disclosed. In one embodiment, the system includes a wireless tag including a first radio transmitter and receiver system and a user interface including at least one input and at least one output; an electronic device includes a second radio transmitter and receiver system in communication with the first radio transmitter and receiver system, a user interface including at least one output, a module for determining the position of the electronic device, a module for determining the distance or proximity and/or direction of the tag from the device and also for determining a status of whether the distance between the electronic device and wireless tag exceeds a predetermined distance, and a data transmitter for transmitting commands and data including the position of the electronic device and status of the distance between the electronic device and wireless tag; and an external device receiving the data transmitted by the data transmitter and storing the data in a computer readable storage medium. In another embodiment, the system includes a second (3rd, 4th, . . . , nth) wireless tag secured to a second (3rd, 4th, . . . , nth) object to be linked or tracked, the second wireless tag including a third radio transmitter and receiver system; and a user interface including at least one input and one output; wherein the second radio transmitter and receiver system is in communication with the third radio transmitter and receiver system, the electronic device includes a module for determining the distance or proximity and/or direction of the tag from the phone and also for determining a second status of whether the distance between the electronic device and second wireless tag exceeds a second predetermined distance, and the data transmitter for transmits data including the second status.
In a third exemplary embodiment, a method for monitoring the location of an object is disclosed. In one embodiment, the method includes securing a wireless tag to the object, wherein the wireless tag includes a first radio transmitter and receiver system for transmitting and receiving a radio frequency signal; providing a first identification for the wireless tag; associating the wireless tag with an electronic device, wherein the electronic device includes a second radio transmitter and receiver system for transmitting and receiving a radio frequency signal and the electronic device is capable of determining the position of the electronic device; determining the position of the electronic device; providing a second identification for the electronic device; receiving with the second radio transmitter and receiver system the radio frequency signal from first radio transmitter and receiver system; determining with the electronic device the distance or proximity and/or direction of the tag from the phone and also a status of whether the distance between the wireless tag and the electronic device exceeds a predetermined distance based at least in part on the strength or absence of the radio frequency signal; and transmitting data including the first identification, the second identification, the time, the speed, the position of the electronic device, and the status to an external device. In another embodiment, the radio transmitter and receiver systems are Bluetooth transceivers and the tag has a thickness of about 10 mm or less or about 6 mm or less. In still another embodiment, the wireless tag includes an alarm and the second Bluetooth transceiver sends a signal to the first Bluetooth transceiver to activate the alarm or carry out any other predetermined action or command when the status changes because the predetermined distance was exceeded. Alarming or carrying out other actions or commands, could also be initiated by the user, by demand, from any part of the overall system (tag, phone, cloud).
In a fourth exemplary embodiment, a method of preventing the loss and/or theft of an object is disclosed. In one embodiment, the method includes attaching a wireless tag to the object, the wireless tag including a first radio transceiver for transmitting and receiving a radio frequency signal and a tag alarm; associating the wireless tag with an electronic device, the electronic device including a second radio transceiver for transmitting and receiving a radio frequency signal and a device alarm, wherein the electronic device is capable of determining the position of the electronic device; providing an allowable distance or range; monitoring the radio frequency signal from the first radio transceiver received by the second radio transceiver and activating the device alarm if the radio frequency signal is broken; monitoring the radio frequency signal from the second radio transceiver received by the first radio transceiver and activating the tag alarm as well as an alarm (or other outputs like light) on the electronic device if the radio frequency signal is broken; and determining with the electronic device a status of whether the distance between the wireless tag and the electronic device exceeds the allowable distance or range based at least in part on the strength or absence of the radio frequency signal; wherein the electronic device activates at least one of the tag alarm and device alarm, determines the position of the electronic device and saves them on the device and wirelessly transmits data including the time, the speed and the position of the electronic device to an external device if the distance exceeds the allowable distance or range. In another embodiment, the method includes wirelessly transmitting data and commands to the external device including the time and position of the electronic device each time the determining step is performed or by demand.
In a fifth exemplary embodiment, a method of initiating commands is disclosed. In one embodiment, the method includes providing a wireless tag including a first radio transceiver for transmitting and receiving a radio frequency signal and a tag alarm; associating the wireless tag with an electronic device, the electronic device including a second radio transceiver for transmitting and receiving a radio frequency signal and a device alarm, wherein the electronic device is capable of determining the position of the electronic device; providing a predetermined action(s) to be taken upon receiving a predetermined radio frequency signal (or a combination of signals); transmitting the predetermined radio frequency signal from one of the first radio transceiver and second radio transceiver; receiving the predetermined radio frequency signal with the other of the first radio transceiver and second radio transceiver; and taking the predetermined action. In another embodiment, the method is directed to locating an object by sounding an alarm attached to the object or similarly locating the electronic device by activating its alarm (or triggering other output methods).
In a sixth exemplary embodiment, a method of providing a panic alert is disclosed. In one embodiment, the method includes providing a wireless tag including a first radio transceiver for transmitting and receiving a radio frequency signal and a tag alarm; associating the wireless tag with an electronic device, the electronic device including a second radio transceiver for transmitting and receiving a radio frequency signal, and a device alarm, wherein the electronic device is capable of determining the position of the electronic device; transmitting a predetermined radio frequency signal from one of the first and second radio transceivers; receiving the predetermined radio frequency signal with the other of the first and second radio transceivers; activating the tag alarm and device alarm; determining the position of the electronic device; transmitting data including the time, the speed and the position of the electronic device to an external device, carrying out commands/actions on the device and sending commands to the network/cloud; and transmitting data including the time and the position of the electronic device to a predetermined contact(s). In another embodiment, the predetermined contact selected from a list of contacts based at least in part on the position of the electronic device.
In a seventh exemplary embodiment, a method of utilizing a series of wireless tags in a promotion, advertising, education, training or gaming embodiment is disclosed. In one embodiment, the method includes providing a plurality of tags, each tag including a tag radio transceiver for transmitting and receiving a radio frequency signal; providing an allowable distance or range and unique identification for each of the plurality of tags; associating each of the plurality of tags with a first electronic device, the first electronic device including a radio transceiver for communicating with the tag radio transceiver; spacing apart the plurality of tags; approaching a first of the plurality of tags with a second electronic device, the second electronic device including a radio transceiver for communicating with the tag radio transceiver and a user interface; determining with the second electronic device a status of whether the distance between the wireless tag and the electronic device is less than the allowable distance or range based at least in part on the strength or absence of the radio frequency signal; providing an alert on the user interface and transmitting with the second electronic device data including the time and tag identification to an external device if the determining step determines that the distance between the wireless tag and the electronic device is less than the allowable distance or range. In another embodiment, the method includes providing a category for each of the plurality of tags and transmitting the category to the external device if the determining step determines that the distance between the wireless tag and the electronic device is less than the allowable distance or range.
In an eight exemplary embodiment, a method of monitoring a patient in a health care facility is disclosed. In one embodiment, the method includes attaching a wireless tag to the patient, the wireless tag including a first radio transceiver for transmitting and receiving a radio frequency signal and a tag alarm; associating the wireless tag with an electronic device, the electronic device including a second radio transceiver for transmitting and receiving a radio frequency signal and a device alarm, wherein the electronic device is capable of determining the position of the electronic device; providing an allowable distance or range; monitoring the radio frequency signal from the first radio transceiver received by the second radio transceiver and activating the device alarm if the radio frequency signal is broken; monitoring the radio frequency signal from the second radio transceiver received by the first radio transceiver and activating the tag alarm if the radio frequency signal is broken; and determining with the electronic device a status of whether the distance between the wireless tag and the electronic device exceeds the allowable distance or range based at least in part on the strength or absence of the radio frequency signal; wherein the electronic device activates at least one of the tag alarm and device alarm, determines the position of the electronic device and wirelessly transmits data including the time, the temperature, and the position of the electronic device to an external device if the distance exceeds the allowable distance or range. In another embodiment, the method includes saving locally (on the device) and wirelessly transmitting data to the external device including the time and position and speed of the electronic device each time the determining step is performed.
In a ninth exemplary embodiment, a method of monitoring the position of a participant in an athletic event is disclosed. In one embodiment, the method includes securing a wireless tag to the participant, wherein the wireless tag includes a first radio transceiver for transmitting and receiving a radio frequency signal; providing a first identification for the wireless tag; associating the wireless tag with a plurality of electronic devices, wherein each of the electronic devices includes a clock, and a device radio transceiver for transmitting and receiving a radio frequency signal; and providing an identification and a predetermined distance or range for each of the electronic devices; wherein, for each electronic device, determining with the electronic device a status of whether the distance between the wireless tag and the electronic device is less than the predetermined distance based at least in part on the strength or absence of the radio frequency signal and transmitting to an external device the electronic device identification, the time, and the status of whether the distance between the wireless tag and the electronic device is less or more than the predetermined distance In another embodiment, the wireless tag includes an alarm and the device radio transceiver sends a signal to the wireless tag to activate the alarm or carrying out other commands/actions on the device and sending commands to the external device if the distance between the wireless tag and the electronic device is less than the predetermined distance. In another embodiment, the speed of the participant between two points is communicated to an external device.
In a tenth exemplary embodiment, a system for providing an application programming interface (API) and/or software development kit (SDK) is disclosed. In one embodiment, the system includes a wireless tag having a unique identification and including a power source for providing electrical power to the wireless tag, a radio transceiver for wirelessly exchanging potentially encrypted data with an electronic device, and a user interface including at least one input and at least one output wherein the electronic device determines time, the speed and the position of the electronic device and a status of whether the distance between the electronic device and wireless tag exceeds a predetermined distance and wirelessly communicates data and/or commands including the position of the electronic device, time, speed and the status; an electronic device including a radio transceiver capable of communicating with the wireless tag radio transceiver, a user interface including at least one input and one output, a module for determining the position of the electronic device, a module for determining a status of whether the distance between the electronic device and wireless tag exceeds a predetermined distance, and a data transmitter for transmitting data including time, speed and the position of the electronic device and status of the distance between the electronic device and wireless tag to an external device for storage in a computer readable storage medium; an external device in communication with the electronic device and wireless tag and storing data in a computer readable storage medium transmitted by at least one of the wireless tag and electronic device; a computer system executing an application programming interface and/or software development kit in communication with the external device and electronic device, wherein the application programming interface and/or software development kit provides a user interface to one of the external device and electronic device including an input to execute one or more commands transmitted by radio frequency signal to the wireless tag.
In an eleventh exemplary embodiment, a method of providing a positioning service to a customer is disclosed. In one embodiment, the method includes providing a plurality of wireless tags to the customer for small or no charge, each tag having a unique identification and including a power source for providing electrical power to the wireless tag, a radio transceiver for wirelessly exchanging encrypted data with an electronic device, and a user interface including at least one input and at least one output wherein the electronic device determines the position of the electronic device and a status of whether the distance between the electronic device and wireless tag exceeds one or more predetermined distances and wirelessly communicates data including the position, with time and speed of the electronic device and the status; providing a computer-readable medium containing an application programming interface and/or software development kit to the customer and/or a developer, the application programming interface and/or software development kit being configured to support a software application on the tag and/or the electronic device and/or the cloud, wherein the electronic device includes a radio transceiver capable of communicating with the wireless tag radio transceiver, a user interface including at least one input and one output, a module for determining the position, the speed and time of the electronic device, a module for determining a status of whether the distance between the electronic device and wireless tag exceeds one or more predetermined distance, and a data transmitter for transmitting data including the position, with time and speed of the electronic device and status of the distance between the electronic device and wireless tag to an external device for storage in a computer readable storage medium and carrying out commands/actions; and associating the plurality of tags with the application programming interface and/or software development kit for a periodic fee or a consumption-based fee, such as based on how many tags being linked, how many times data or commands are communicated or how much data or commands are communicated in a given period. In another embodiment, the method includes developing programs utilizing the application programming interface and/or software development kit and allowing access to the programs for a free or for a fee.
The above mentioned and other features of the invention, and the manner of attaining them, will become more apparent and the invention itself will be better understood by reference to the following description of embodiments of the invention taken in conjunction with the accompanying drawings.
The disclosure is explained in greater detail below in reference to the figures. In the figures:
The embodiments disclosed below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather, the embodiments are chosen and described so that others skilled in the art may utilize their teachings. While the present disclosure is primarily directed to a wireless tag apparatus and methods of linking or tracking an object by an associated wireless tag, it should be understood that the features disclosed herein may have relevance to other linking, connecting, communicating, and tracking, mobile device and cloud applications.
Although a plurality of different embodiments are provided, one exemplary, non-limiting example is illustrated in
Also shown in the exemplary, non-limiting example illustrated in
Also as shown in the exemplary non-limiting example illustrated in
Referring next to
In the exemplary embodiment illustrated in
Memory is a computer readable medium and may be a single storage device or may include multiple storage devices, located either locally with controller 28 or accessible across a network, or partially locally with controller 28 and partially on external device 30 accessible across a network 31. Computer-readable media may be any available media that may be accessed by controller 28 and includes both volatile and non-volatile media. Further, computer readable-media may be one or both of removable and non-removable media. By way of example, computer-readable media may include, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, servers, Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to store the desired information and which may be accessed by controller 28. In one embodiment, controller 28 communicates data, status information, or a combination thereof to a remote device for storage, analysis, or carrying out a predetermined command. In another embodiment, memory may further include operating system software. Memory further includes communications software for communication with a network, such as a local area network, a public switched network, a CAN network, and any type of wired or wireless network. An exemplary public switched network is the Internet. Exemplary communications software includes e-mail software, SMS, Bluetooth communication software, radio frequency communication software, near field communication software and internet browser software. Other suitable software which permit controller 28 to communicate with other devices across a network may be used.
As illustrated in
In one embodiment, electronic device 10 includes absolute position data receiver 12 and absolute position module 14. Absolute position data receiver 12 receives location-based data from external sources. In one exemplary embodiment, absolute position data receiver 12 receives data from a combination of cellular towers, wireless networks including Wi-Fi networks, and global positioning systems (GPS). Absolute position module 14 determines the location of electronic device 10 from the location based data received by absolute position data receiver 12. In another embodiment, absolute position module 14 determines the speed of electronic device 10 from the location based data received by absolute position data receiver 12. In one exemplary embodiment, absolute position data receiver 12 and absolute position module 14 are provided as part of the operating software of electronic device 10. In another exemplary embodiment, absolute position data receiver 12 and/or absolute position module 14 are included on a card, hardware, device or software program in communication with the operating software of electronic device 10.
In another exemplary embodiment, absolute position module 14 determines the latitude and longitude of electronic device 10. In still another exemplary embodiment, absolute position module 14 determines the altitude of electronic device 10. In yet still another exemplary embodiment, absolute position module 14 determines the speed of electronic device 10.
In the exemplary embodiment illustrated in
In one embodiment, radio transceiver 24 is a Bluetooth® transceiver that operates on Bluetooth protocols. As used herein, Bluetooth includes Bluetooth, ULP Bluetooth (Ultra Low Power Bluetooth), BLE (Bluetooth Low Energy), and other standards sets by Bluetooth SIG, Inc. In another embodiment, radio transceiver operates on RF protocols. In still another embodiment, radio transceiver 24 operates on NFC protocols. Other suitable radio transceivers may also be used. In one embodiment, at least some of the data exchanged is encrypted.
Bluetooth connections are relatively power efficient, have relatively little interference issues, are supported by a variety of phone manufacturers and models, and allow bidirectional communication over relatively long ranges. RFID and NFC connections may require less expensive components and may use less power from power supply 60 of wireless tag 40 (see
In the exemplary embodiment illustrated in
In the exemplary embodiment illustrated in
In one embodiment, at least one of the following communications channels is encrypted: between radio transceiver 56 and controller 48, between wireless tag 40 and electronic device 10, between radio transceiver 24 and controller 28, between electronic device 10 and external device 30, within components of external device 30, between external device 30 and an external user interface, such as user interface 522 (as illustrated in
In one exemplary embodiment, data from data transmitter 18 and data receiver 20 is exchanged with data on external device 30. External device 30 may comprise a single device or a plurality of devices in communication with each other. In one embodiment, external device 30 is a machine capable of storing data, including, but not limited to a computer, a laptop computer, a tablet computer, a mobile electronic device, or a server. In another embodiment, external device 30 is a network capable of storing data, including but not limited to a local area network, a public switched network, a CAN network, and any type of wired or wireless network. In still another embodiment, external device 30 is a network or cloud data service. As used herein, a cloud service refers to remotely hosted data, remotely hosted servers, or both over the internet, web or a network which is accessible from multiple locations and devices or machines. As used herein, the term includes at least Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Hardware-as-a-Service, and Software-as-a-Service (SaaS) service, and other remote data computation, application, management, or storage resources. As used herein, network, refers to a local area network, a private network, a public switched network such as but not limited to the Internet, a CAN network, and any type of wired or wireless network.
Referring next to
In the exemplary embodiment illustrated in
In the exemplary embodiment illustrated in
In one embodiment, radio transceiver 56 is a Bluetooth® transceiver that operates on Bluetooth protocols. In another embodiment, radio transceiver 56 operates on RF protocols. In still another embodiment, radio transceiver 56 operates on NFC protocols. Other suitable radio transceivers may also be used. In one embodiment, at least some of the data exchanged is encrypted.
In the exemplary embodiment illustrated in
In the exemplary embodiment illustrated in
In another embodiment, wireless tag includes power supply 60. Exemplary power supplies 60 include rechargeable batteries, including but not limited to nickel-cadmium and lithium ion batteries, and non-rechargeable batteries. Other suitable power supplies 60 may also be used.
In still another embodiment, wireless tag 40 includes one or more sensors 42. Exemplary sensors 42 include, but are not limited to, temperature sensors, altimeters, barometers, pressure sensors, humidity sensors, chronometers, pedometers, accelerometers, level sensors, impact sensors, and compasses. Other suitable sensors may be used depending on the desired application.
In yet still another embodiment, wireless tag 40 may include a GPS or other suitable location detection technologies (not shown). In this embodiment, wireless tag 40 may communicate its position over at least one of data transmitter 50 and radio transceiver 56. Using the communicated position information, a direction to wireless tag 40 may be displayed or communicated on user interface 22 or a user interface associated with external device 30. In one embodiment, the direction may be saved locally in memory 49 associated with the electronic device 10. In another embodiment, the direction may be communicated to the external device 30 and saved in memory 29 associated with the electronic device 10. In still another embodiment, the position may be saved locally in memory 29 associated with the wireless tag data and later communicated to wireless device 10 or external network 30 over a wired or wireless connection, such as network 31.
Although shown separately the modules shown in
In yet another exemplary embodiment, wireless tag 40 includes securing element 72 to secure wireless tag to object 70. In one embodiment, object 70 is a person or animal. In another embodiment, object 70 is an inanimate physical object. In one embodiment, securing element 72 includes a mechanical or chemical fastener to secure wireless tag 40 to object 70. Other securing elements 72 may also be used. In another embodiment, wireless tag 40 is not secured to object 70, but is positioned near, in, or on object 70, or in an environment. Other positions of wireless tag 40 in relation to object 70 may also be used.
Referring next to
In the exemplary embodiment illustrated in
In one exemplary embodiment, the thickness d3 of wireless tags 40 is relatively thin. In one embodiment, d3 is about 10 mm or less. In another embodiment, d3 is about 6 mm or less. In still another embodiment, d3 is more than about 10 mm. The thinner wireless tag 40 is, the less intrusively it can be attached to an object 70 for tracking. In yet still another embodiment, d3 is about 5 mm or less. The thinner wireless tag 40 is, the easier it can be stored in a wallet or purse. Thicker tags may be easier to manufacture and may require lower component prices.
Referring next to
The exemplary data collected at points 1 and 2 in
An exemplary method of using the disclosed system in an anti-loss or anti-theft embodiment is illustrated in
If in block 210 the connection is not broken, in block 212 the distance between electronic device 10 and wireless tag 40 as determined by distance monitor 26 is monitored. As shown in block 214, if the distance is less than the distance or range selected in block 206, the system returns to block 208 to monitor the connection. If the distance is not less than the set distance or range, an alarm is activated in block 216 and data is saved locally to electronic device 10 and sent to external device 30 as described above. In another embodiment (not shown) an additional predetermined action is taken or command is activated in addition to the alarm and data communication.
In some embodiments of processes 200, 220, in block 206 a profile is selected, similar to
In block 236, controller 28 monitors the data from radio transceiver 56 for activation of a command. Exemplary commands include a panic alert, an exemplary illustration of which is given in
Similarly, in block 242, controller 48 monitors the data from radio transceiver 24 for activation of a command. Exemplary commands include the commands given for controller 28 above. Each command includes an associated predetermined action, as described for controller 28 above. In block 244, if no command has been initiated, the system returns to block 236 to monitor for a command. If a command has been initiated, in block 246 the predetermined action is taken.
In another embodiment, controller 48 may activate a command such as in
In block 286, a user with a second device approaches one of wireless tags 40. In one exemplary embodiment, second device is an electronic device 10. In another exemplary embodiment, user must search the area to find objects 70 attached to wireless tags 40. As the second device approaches a wireless tag 40, in block 288, the distance between wireless tag 40 and second device is monitored by distance monitor 26 on second device and/or distance monitor 58 on wireless tag 40. In block 290, if the distance determined by distance monitor 26 or distance monitor 58 is more than the set distance or range given in step 284, the system returns to step 288 to monitor the distance. If the distance is less than the set distance or range, then in step 292, data regarding the “find” is saved locally on the first device and sent to external device 30. In step 294, an alert is displayed on second device, alerting the user that she has “found” the tag 40, and a status relating to that tag 40 on external device 30 is updated. In one embodiment, blocks 286 through 294 are repeated for multiple wireless tags 40. In another embodiment, multiple users with multiple electronic devices 10 each perform blocks 286 through 294.
In step 296, the system determines whether all tags 40 have been found. In one exemplary embodiment, the determination is made based on whether the tags 40 have been found by any user. In another exemplary embodiment, the determination is made based on whether the second device has found all of the tags 40. In still another exemplary embodiment, the determination is made based on a predetermined number of tags 40 that must be found. In yet still another exemplary embodiment, the tags 40 may be found by one or more users. If all tags 40 have not been found, then the system returns to block 286 and the user holding the second device approaches a second tag 40. If the system determines in block 296 that all tags 40 have been found, then a promotion is displayed on a user interface of second device, such as user interface 22 of electronic device 10. In one exemplary embodiment, the promotion is a discount or coupon, or a reward or point credit in a rewards or point system. In another exemplary embodiment, the promotion is an advertisement. In still another exemplary embodiment, the promotion depends upon how many tags 40 were found by the user or how quickly tags 40 were found by the user. In yet still another exemplary embodiment, the promotion is an alert that all tags 40 have been found. Other suitable promotions may also be used.
In block 318, a user with device approaches one of wireless tags 40. In another exemplary embodiment, user must search the area to find objects 70 attached to wireless tags 40. As the device approaches a wireless tag 40, in block 320, the distance between wireless tag 40 and device is monitored by distance monitor 26 on device and/or distance monitor 58 on wireless tag 40. In block 324, if the distance determined by distance monitor 26 or distance monitor 58 is more than the distance or range set in step 314, the system returns to step 320 to monitor the distance. If the distance is less than the set distance or range, then in step 326 the system determines whether the object category status is “found” for device. In one exemplary embodiment, this determination is performed by controller 28 on electronic device 10. If the category is already “found,” then the system returns to block 318 to find another tag 40. If the category is not “found,” in block 328, data regarding the “find” is saved locally on the device and sent to external device 30. An alert is displayed on second device, alerting the user that she has “found” the category, and a status relating to that tag 40 on external device 30 is updated. In another embodiment, rewards or points are earned by a user or group of users based on predetermined game or event rules or regulations.
In step 332, the system determines whether all categories defined in block 316 have been found. In one exemplary embodiment, the determination is made based on whether the categories have been found by any user. In another exemplary embodiment, the determination is made based on whether the device has found all the categories. In still another exemplary embodiment, the determination is made based on a predetermined number of categories that must be found. If all categories have not been found, then the system returns to block 318 and the user holding the device approaches a second tag 40. If the system determines in block 332 that all categories have been found, then in block 334 an alert is displayed on a user interface of device, such as user interface 22 of electronic device 10. In one exemplary embodiment, the alert is a promotion such as a discount or coupon. In another exemplary embodiment, the alert is an advertisement. In still another exemplary embodiment, the alert depends upon how many categories were found by the user or how quickly categories were found by the user or by point values associated with each category found by the user. In yet still another exemplary embodiment, the alert gives the user a reward or points in a predetermined system. Other suitable alerts may also be used.
If in block 350 the connection is not broken, in block 352 the distance between electronic device 10 and wireless tag 40 as determined by distance monitor 26 is monitored. As shown in block 354, if the distance or range is less than the distance or range selected in block 346, the system returns to block 348 to monitor the connection. If the distance or range is more than the set distance or range, an alarm is activated in block 356 and data is saved locally to electronic device 10 and sent to external device 30 as described above.
An exemplary method of using the disclosed system in an athletic competition embodiment is illustrated in
Block 386 illustrates associating wireless tag 40 with a second electronic device 10 and setting a second distance or range, similar to block 374. In one embodiment, all associating steps are performed together. In another embodiment, the same set distance or range is used for all associating steps. In block 388, the distance between electronic device 10 and wireless tag 40 as determined by distance monitor 26 is monitored. As shown in block 390 if the distance is less than the distance selected in block 206, the system returns to block 376 to monitor the connection. In one embodiment, data is uploaded to external device 30 in block 392. If the distance is less than the set distance or range, in block 394, the participant is alerted by wireless tag 40. In one exemplary embodiment, the alert is through alarm 46. In another exemplary embodiment, the alert is through user interface 54. Other suitable alerts may also be used. In block 396, data is uploaded to external device 30 as in block 392.
In an alternative athletic competition embodiment, not shown, the athletic participants are provided with electronic device 10 and a wireless tag 40 is positioned at each of points 1, 2, and 3. In this embodiment, the data communicated to external device 30 for each point 1, 2, 3, may include the speed of the device 10 at each point. In another embodiment, each tag 40 periodically collects data from electronic devices 10 in range and uploads data to the external device 30. The data may include, but are not limited to, status of electronic devices 10 as in range or out of range, distance to the tag 40, signal strength, absolute position of the electronic device 10 (which may include latitude, longitude, and altitude), time, and speed of the electronic device 10. Other suitable arrangements may also be used.
In one embodiment, user interface 522 allows a user to view, query, organize, and categorize data stored on external device 30, 520 gathered through data sent by electronic devices 510 and wireless tags 502, 504. In another embodiment, user interface 522 can be used to initiate commands or activate alarms on wireless tags 502, 504, and electronic device 510. In still another embodiment, user interface 522 allows a user to lock, remotely backup or wipe reset electronic device 510 having a software program or application for communicating with wireless tags 502, 504.
In one exemplary embodiment, system architecture 500 includes an API 530. API 530 is in communication with machine/network/cloud 520 and electronic device 510. In one embodiment, API 530 provides access to one or more of developers 532 to data stored on machine/network/cloud 520 and/or electronic device 510. Using this access, developers 532 can create a plurality of applications 540. In another embodiment, developers 532 use API to integrate applications 540 as part of system 500 in presentation to users through user interfaces 512, 522.
In another exemplary embodiment, system architecture 500 includes a software development kit (SDK) 550. In one embodiment, SDK 550 includes tools that may be used by software developers in developing software applications 540. In another embodiment, SDK 550 is in communication with machine/network/cloud 520 and electronic device 510. As illustrated, SDK 550 may also be in communication with API 530. In one embodiment, SDK 550 provides access to a plurality of developers 552 to data stored on machine/network/cloud 520, electronic device 510, and/or API 530. Using this access, developers can create a plurality of applications 540.
Applications 540 may be downloaded by users to their electronic device such as that shown in 510, to a machine/network/cloud such as that shown in 520, or reside on a machine/network/cloud and accessed through a web browser or other suitable software and/or user interface from an electronic device, such as 510, or a server. In one exemplary embodiment, the electronic device could be connected to or integrated into another suitable object or device such as, but not limited to, clothing, sporting goods, food, medicine, medical devices, furniture, livestock, animals, cars, packaging, or luggage.
In still another exemplary embodiment, developers 532 can use system architecture 500 to distribute and monetize their applications 540 to users. A variety of monetization strategies are considered, including providing applications for free to increase awareness, providing a series of paid advertisements with a free application, providing a free basic version and a fee premium version of an application, providing only a fee version of an application, and providing a free version but provide opportunities to purchase additional features, subscriptions, goods, or services within the application. Other suitable strategies may also be used.
In one exemplary embodiment, a method of distributing wireless tags 502, 504 is disclosed. In one embodiment, wireless tags 502, 504 are provided free of charge to clients for use with a free software program or application for an electronic device 510. The hardware of wireless tags 502, 504 and data communications of wireless tags 502, 504 may be encrypted. The wireless tags 502, 504 and electronic device 510 provide data to a machine/network/cloud 520 as described above. Clients are granted limited access to the data for a fee. In one exemplary embodiment, a fee, such as a periodic or monthly fee, is charged for access to data regarding a wireless tag 502 or 504. Other exemplary fees include one-time, subscription, and pay-as-you-go fees. In another exemplary embodiment, a periodic fee for each wireless tag 502, 504 allows the client access to the API 530 for creating applications 540 for data from the paid wireless tags 502, 504. In still another exemplary embodiment, applications 540 through API 530 allow commands to be executed from user interface 512 or user interface 522 accessible to the client through an internet webpage or a similar medium. In yet still another exemplary embodiment, different tiers of access to machine/network/cloud 520 and software on electronic device 510 are provided to different clients, where each tier has an associated periodic fee. Combination of all of the strategies disclosed may also be used.
An exemplary process for taking a predetermined action 620 is illustrated in
An exemplary process 630 for associating wireless tag 40 with a device, such as electronic device 10 or external device 30 is illustrated in
In another embodiment, an electronic device 10 may activate alarm 46 when a wireless tag 40 returns to within a predetermined distance or range of electronic device 10. This embodiment may be used with previously associated or unassociated tags. In one embodiment, a previously associated tag 40 is attached to a piece of luggage, which is then taken out of the predetermined distance or range from electronic device 10. When tag 40 and attached luggage re-enter the predetermined distance or range from electronic device 10, such as in a baggage claim area for example, either alarm 16 on electronic device 10 or alarm 46 on tag 40 or both are activated.
Referring next to
Similar to wireless tag 40, RF-enabled object 84 may include one or more of sensors 42′, a user interface 54′ comprising one or more I/O modules including alarm 46′ and button 44′, distance monitor 58′, data transmitter 50′, and data receiver 52′. In yet still another embodiment, RF-enabled object 84 may include a GPS or other suitable location detection technologies (not shown).
RF-enabled object 84 collects status and position data similar to the previously described ways wireless tag 40 collects status and position data. Exemplary data include data similar to that illustrated in
In
The exemplary processes illustrated in
The software program or application includes a user interface 512′. In one embodiment, user interface 512′ is user interface 22. Machine/network/cloud 520′ also includes a user interface 522′. In one embodiment, user interfaces 512′, 522′ provide access to data, programs, and applications stored locally on electronic device 510′ and machine/network/cloud 520′.
In one embodiment, user interface 522′ allows a user to view, query, organize, and categorize data stored on external device 520′ gathered through data sent by electronic devices 510′, RF-enabled objects 84, 86, and wireless tag 40. In another embodiment, user interface 522′ can be used to initiate commands or activate alarms on RF-enabled objects 84, 86, wireless tag 40, and electronic device 510′. In still another embodiment, user interface 522′ allows a user to lock, program the device, initiate an action, remotely backup or wipe reset electronic device 510′ having a software program or application for communicating with wireless tags 40.
In one exemplary embodiment, system architecture 560 includes an API 530′. API 530′ is similar to API 530 described in relation to
Applications 540′ may be downloaded by users to their electronic device such as that shown in 510′, to a machine/network/cloud such as that shown in 520′, or reside on a machine/network/cloud for access through a web browser or other suitable software and/or user interface from an electronic device, such as 510′, or a server.
In one exemplary embodiment, system architecture 560 allows for access to RF-enabled objects 84, 86 for use in application 540′. The machine/network/cloud 520′ can be configured to grant access or set permissions to allow certain users access to modules or allow different users different types or levels of access of RF-enabled objects 84, 86, including sensors 42′, alarms 46′, controllers 48′, data transmitters 50′, data receivers 52′, user interface 54′, radio transceiver 56′, distance monitor 58′, and power supply 60′, and other suitable modules. Additional suitable modules include, but are not limited to, cameras and microphones. Applications 540′ can be thus designed to use the modules of RF-enabled objects 84, 86.
In another exemplary embodiment, system architecture 560 allows for a user to set one or more sets of permissions based on the current status of one or more modules of wireless tags 40, 502, 504, and RF-enabled objects 84, 86, including sensors 4242′, alarms 4646′, controllers 4848′, data transmitters 5050′, data receivers 5252′, user interface 5454′, radio transceiver 5656′, distance monitor 5858′, and power supply 6060′.
In an exemplary embodiment, a first set of users is provided permissions to access the certain recorded data from wireless tag 40 or RF-enabled object 84 when under a first condition, and a second set of users is provided permissions to access the certain recorded data from wireless tag 40 or RF-enabled object 84 when under a second condition.
In a more particular embodiment, only the owner of electronic device 10 is granted access to view a history of locations and times recorded from electronic device 10, wireless tags 40, or RF-enabled objects 84 as long as wireless tags 40 or RF-enabled objects 84 do not exceed a predetermined distance from electronic device 10. If the predetermined distance from electronic device 10 has been exceeded, a larger group of users, for examples friends, authorities, co-workers, or other designated individuals or groups to whom the owner has selected, can then access the history of locations and times recorded from electronic device 10, wireless tags 40, or RF-enabled objects 84 from the alarm position forward in time. In this way, the friends can assist the owner in locating or recovering the wireless tag 40 or RF-enabled object 84 which was taken beyond the predetermined distance.
In another more particular embodiment, once a wireless tag 40 or active device 84 has exceeded a predetermined distance from electronic device 10, wireless tag 40 or active device 84 is configured to be detectable by multiple radio transceiver systems. Thus, an unassociated radio transceiver 24 or data receiver 20 associated with a second electronic device 10 in communication with external device 30 is able to detect a predetermined radio signal or type of signal from wireless tag 40 or active device 84 and upload and save the current location of the wireless tag 40 or active device 84 to the external device 30. In this way, the location of wireless tag 40 or active device 84 can be updated on the external device 30 or machine/network/cloud 520520′, allowing the owner of wireless tag 40 or active device 84 to monitor its location even when wireless tag 40 or active device 84 is not in contact with electronic device 10.
While this invention has been described as relative to exemplary designs, the present invention may be further modified within the spirit and scope of this disclosure. Further, this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains.
This application is a continuation of application Ser. No. 16/005,193, filed Jun. 11, 2018, which will issue on Dec. 24, 2018 as U.S. Pat. No. 10,163,318, which is a continuation of application Ser. No. 15/156,726, filed May 17, 2016, now U.S. Pat. No. 9,997,043, which is a continuation of application Ser. No. 14/617,240, filed Feb. 9, 2015, now U.S. Pat. No. 9,366,746, which is a continuation application of U.S. patent application Ser. No. 13/754,607, filed Jan. 30, 2013, now U.S. Pat. No. 8,981,938, which claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application Ser. No. 61/608,429 filed Mar. 8, 2012. The disclosures of each of these applications are hereby incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4682155 | Shirley | Jul 1987 | A |
5297737 | Davisson | Mar 1994 | A |
5731757 | Layson, Jr. | Mar 1998 | A |
5973599 | Nicholson et al. | Oct 1999 | A |
6058309 | Huang et al. | May 2000 | A |
6321095 | Gavette | Nov 2001 | B1 |
6594666 | Biswas et al. | Jul 2003 | B1 |
6717516 | Bridgelall | Apr 2004 | B2 |
6967576 | Hayes | Nov 2005 | B2 |
7034684 | Boman et al. | Apr 2006 | B2 |
7114175 | Lahteenmaki | Sep 2006 | B2 |
D555019 | Au Yeung | Nov 2007 | S |
7323991 | Eckert et al. | Jan 2008 | B1 |
7420465 | Ritter | Sep 2008 | B2 |
7502619 | Katz | Mar 2009 | B1 |
7516890 | Spremo et al. | Apr 2009 | B1 |
D611366 | Register et al. | Mar 2010 | S |
D615427 | Au Yeung | May 2010 | S |
D617667 | Penix et al. | Jun 2010 | S |
D618121 | Penix et al. | Jun 2010 | S |
D632984 | Register et al. | Feb 2011 | S |
D635874 | Tseng et al. | Apr 2011 | S |
D637097 | Tseng | May 2011 | S |
D644542 | Henne et al. | Sep 2011 | S |
8014789 | Breed | Sep 2011 | B2 |
8045954 | Barbeau et al. | Oct 2011 | B2 |
RE42996 | Hyun et al. | Dec 2011 | E |
8094012 | Tran et al. | Jan 2012 | B1 |
8094912 | Miyamoto et al. | Jan 2012 | B2 |
D659569 | Shadovitz | May 2012 | S |
D665679 | Shigeno et al. | Aug 2012 | S |
8280351 | Ahmed et al. | Oct 2012 | B1 |
D674715 | Dalton | Jan 2013 | S |
D677589 | Jung et al. | Mar 2013 | S |
D682126 | Tello | May 2013 | S |
D684071 | Greenwood et al. | Jun 2013 | S |
8506524 | Graskov et al. | Aug 2013 | B2 |
8551186 | Strand | Oct 2013 | B1 |
D693248 | Anderssen et al. | Nov 2013 | S |
D693249 | Anderssen et al. | Nov 2013 | S |
D693250 | Anderssen et al. | Nov 2013 | S |
8611321 | Herrala et al. | Dec 2013 | B2 |
D699131 | Marshall et al. | Feb 2014 | S |
D700084 | Hsu | Feb 2014 | S |
D702141 | Jung et al. | Apr 2014 | S |
8810392 | Teller | Aug 2014 | B1 |
8817712 | Shin et al. | Aug 2014 | B2 |
8839386 | Gilboy | Sep 2014 | B2 |
8869248 | Moosavi et al. | Oct 2014 | B2 |
8938775 | Roth et al. | Jan 2015 | B1 |
D723957 | Evans et al. | Mar 2015 | S |
8981938 | H. Kazerouni | Mar 2015 | B2 |
D728393 | Au Yeung | May 2015 | S |
D729655 | Bauer et al. | May 2015 | S |
D731334 | Fiedler et al. | Jun 2015 | S |
9069994 | Strand | Jun 2015 | B1 |
9245433 | Butler et al. | Jan 2016 | B1 |
D748507 | Evans et al. | Feb 2016 | S |
D750478 | Kiss | Mar 2016 | S |
9357348 | Evans et al. | May 2016 | B2 |
9366746 | Kazerouni | Jun 2016 | B2 |
9525970 | Farley et al. | Dec 2016 | B2 |
9615210 | Evans et al. | Apr 2017 | B2 |
9699612 | Evans et al. | Jul 2017 | B2 |
9997043 | H. Kazerouni | Jun 2018 | B2 |
10163318 | Kazerouni | Dec 2018 | B2 |
20020061748 | Nakakita et al. | May 2002 | A1 |
20020147650 | Kaufman et al. | Oct 2002 | A1 |
20030095032 | Hoshino et al. | May 2003 | A1 |
20030181215 | Cromer et al. | Sep 2003 | A1 |
20030207683 | Lempio et al. | Nov 2003 | A1 |
20030233458 | Kwon et al. | Dec 2003 | A1 |
20030235172 | Wood | Dec 2003 | A1 |
20040174264 | Reisman et al. | Sep 2004 | A1 |
20040192352 | Vallstrom et al. | Sep 2004 | A1 |
20040198389 | Alcock et al. | Oct 2004 | A1 |
20050200478 | Koch et al. | Sep 2005 | A1 |
20060046689 | Kim | Mar 2006 | A1 |
20060158310 | Klatsmanyi et al. | Jul 2006 | A1 |
20060182055 | Coffee et al. | Aug 2006 | A1 |
20060229896 | Rosen et al. | Oct 2006 | A1 |
20070009237 | Kunita | Jan 2007 | A1 |
20070113092 | Nishida et al. | May 2007 | A1 |
20070167175 | Wong et al. | Jul 2007 | A1 |
20070176771 | Doyle | Aug 2007 | A1 |
20070194926 | Bayley et al. | Aug 2007 | A1 |
20070229350 | Scalisi et al. | Oct 2007 | A1 |
20070257803 | Munro et al. | Nov 2007 | A1 |
20080062120 | Wheeler et al. | Mar 2008 | A1 |
20080086391 | Maynard et al. | Apr 2008 | A1 |
20080129485 | Tuttle | Jun 2008 | A1 |
20080143516 | Mock et al. | Jun 2008 | A1 |
20080172173 | Chang et al. | Jul 2008 | A1 |
20080182592 | Cha et al. | Jul 2008 | A1 |
20080186162 | Rajan et al. | Aug 2008 | A1 |
20080191846 | Chang | Aug 2008 | A1 |
20080211671 | Daily | Sep 2008 | A1 |
20080287143 | Banks et al. | Nov 2008 | A1 |
20080303901 | Variyath et al. | Dec 2008 | A1 |
20090002188 | Greenberg | Jan 2009 | A1 |
20090079544 | Noble | Mar 2009 | A1 |
20090224892 | Nicholls | Sep 2009 | A1 |
20090239502 | Dempo et al. | Sep 2009 | A1 |
20090322510 | Berger et al. | Dec 2009 | A1 |
20100080175 | Kang et al. | Apr 2010 | A1 |
20100141430 | Steer | Jun 2010 | A1 |
20100164714 | Buller et al. | Jul 2010 | A1 |
20100164715 | Buller et al. | Jul 2010 | A1 |
20100194531 | Sato | Aug 2010 | A1 |
20100199339 | Kageyama | Aug 2010 | A1 |
20100273452 | Rajann et al. | Oct 2010 | A1 |
20100283600 | Herbert et al. | Nov 2010 | A1 |
20100289646 | Raniere | Nov 2010 | A1 |
20110051665 | Huang | Mar 2011 | A1 |
20110068923 | Burket et al. | Mar 2011 | A1 |
20110087685 | Lin et al. | Apr 2011 | A1 |
20110140884 | Santiago | Jun 2011 | A1 |
20110195701 | Cook et al. | Aug 2011 | A1 |
20110231092 | Kuo et al. | Sep 2011 | A1 |
20110250875 | Huang et al. | Oct 2011 | A1 |
20110255454 | Hauser et al. | Oct 2011 | A1 |
20110263331 | Koski et al. | Oct 2011 | A1 |
20120154115 | Herrala | Jun 2012 | A1 |
20120161963 | Herrala | Jun 2012 | A1 |
20120218078 | Hill | Aug 2012 | A1 |
20120223834 | Hyatt | Sep 2012 | A1 |
20120309408 | Marti et al. | Dec 2012 | A1 |
20120309422 | Lewis-Evans et al. | Dec 2012 | A1 |
20130069782 | Duggal et al. | Mar 2013 | A1 |
20130152216 | Stevens | Jun 2013 | A1 |
20130159825 | Nishio et al. | Jun 2013 | A1 |
20130197859 | Albano et al. | Aug 2013 | A1 |
20140006129 | Heath | Jan 2014 | A1 |
20140062695 | Rosen et al. | Mar 2014 | A1 |
20140073262 | Gutierrez et al. | Mar 2014 | A1 |
20140085089 | Rasband et al. | Mar 2014 | A1 |
20140162693 | Wachter et al. | Jun 2014 | A1 |
20140213301 | Evans et al. | Jul 2014 | A1 |
20140274135 | Edge et al. | Sep 2014 | A1 |
20140274136 | Edge et al. | Sep 2014 | A1 |
20140369695 | D'Andrade et al. | Dec 2014 | A1 |
20150006666 | Backholm et al. | Jan 2015 | A1 |
20150057518 | Lebel et al. | Feb 2015 | A1 |
20150112264 | Kamen et al. | Apr 2015 | A1 |
20150160328 | Peinhardt et al. | Jun 2015 | A1 |
20150168173 | Lewis-Evans et al. | Jun 2015 | A1 |
20150296477 | Pan et al. | Oct 2015 | A1 |
20150356862 | Daoura et al. | Dec 2015 | A1 |
20160105764 | Evans et al. | Apr 2016 | A1 |
20160105765 | Farley et al. | Apr 2016 | A1 |
20170164156 | Evans et al. | Jun 2017 | A1 |
Number | Date | Country |
---|---|---|
101883259 | Nov 2010 | CN |
101930066 | Dec 2010 | CN |
102103786 | Jun 2011 | CN |
20100068850 | Jun 2010 | KR |
03060752 | Jul 2003 | WO |
2014042407 | Mar 2014 | WO |
Entry |
---|
Honig, Zack. StickNFind Bluetooth stickers let you tag and locate your goods with a smartphone (hands-on-video). Jan. 2, 2013. <https://www .engadget.com/2013/01/02/sticknfind-bluetooth-stickers-hands-on/>. |
Cao Gadgets LLC. “Monitor and Find Everything in Your Home or Office from the Internet”. <http://www.wirelesstag.net/index_ie.html>. |
Cao Gadgets LLC. “Monitor and Find Everything in Your Home or Office from the Internet”. <https://web.archive.org/web/20120827040630/http://www.wirelesstag.netindex_ie.html>. |
Office Action and translation dated Nov. 24, 2015 in Chinese Application No. 201380024290.7. 30 pages. |
Office Action and translation dated Aug. 15, 2017 in Chinese Application No. 201380024290.7. 37 pages. |
International Searching Authority, International Search Report and Written Opinion for PCT/IB2013/000489, dated Jul. 2013. 10 Pages. |
Notification of Second Office Action and Search Report. State Intellectual Property Office of People's Republic of China. Application No. 201380024290 in the name of Linquet Technologies, Inc. Jul. 14, 2016. 34 pages. |
Office Action and translation dated Dec. 20, 2016 in corresponding Chinese Application No. 201380024290.7. |
Lee et al. System Architecture Directions for Tangible Cloud Computing. 5 pages. |
RFID Channels, rfid ready, Modular RFID Systems, http://www.rfid-ready.com/200904082772/aruba-networks-rtls-lower-costs-by-leveraging . . . , Dec. 25, 2011. 3 pages. |
MSHA, MSHA Approves ActiveMine's RFID Wi-Fi Tags, Active Control Technology, Inc., http://www.morerfid.com/details.php?subdetail=Report&action=details&report_id=5009&display=RFID, Sep. 26, 2008. 5 pages. |
Screenshot of the “Linquet-Linking Everything” video previously available at http://www.youtube.com/watch?v=6NNGGLd3dQU, dated as uploaded Mar. 18, 2011. Video last accessed Dec. 21, 2011. |
Number | Date | Country | |
---|---|---|---|
20190122519 A1 | Apr 2019 | US |
Number | Date | Country | |
---|---|---|---|
61608429 | Mar 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15156726 | May 2016 | US |
Child | 16005193 | US | |
Parent | 14617240 | Feb 2015 | US |
Child | 15156726 | US | |
Parent | 13754607 | Jan 2013 | US |
Child | 14617240 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16005193 | Jun 2018 | US |
Child | 16227572 | US |