Continuous data optimization of moved access points in positioning systems

Information

  • Patent Grant
  • 8478297
  • Patent Number
    8,478,297
  • Date Filed
    Monday, August 13, 2012
    12 years ago
  • Date Issued
    Tuesday, July 2, 2013
    11 years ago
Abstract
Methods and systems of continuously optimizing data in WiFi positioning systems. A location-based services system uses WiFi-enabled devices to monitor WiFi access points in a target area to indicate whether a WiFi access point has moved relative to its previously recorded location. A WiFi-enabled device communicates with WiFi access points within range of the WiFi-enabled device so that observed WiFi access points identify themselves. A reference database is accessed to obtain information specifying a recorded location for each observed WiFi access point in the target area. The recorded location information is used for each of the observed WiFi access points in conjunction with predefined rules to infer whether an observed WiFi access point has moved relative to its recorded location. The reference database is informed of the identity of any observed WiFi access point that is inferred to have moved.
Description
BACKGROUND

1. Field of the Invention


The invention is generally related to location-based services and, more specifically, to methods of continuously optimizing or improving the quality of WiFi location data in such systems.


2. Discussion of Related Art


In recent years the number of mobile computing devices has increased dramatically creating the need for more advanced mobile and wireless services. Mobile email, walkie-talkie services, multi-player gaming and call following are examples of how new applications are emerging on mobile devices. In addition, users are beginning to demand/seek applications that not only utilize their current location but also share that location information with others. Parents wish to keep track of their children, supervisors need to track the location of the company's delivery vehicles, and a business traveler looks to find the nearest pharmacy to pick up a prescription. All of these examples require the individual to know their own current location or that of someone else. To date, we all rely on asking for directions, calling someone to ask their whereabouts or having workers check-in from time to time with their position.


Location-based services are an emerging area of mobile applications that leverages the ability of new devices to calculate their current geographic position and report that to a user or to a service. Some examples of these services include local weather, traffic updates, driving directions, child trackers, buddy finders and urban concierge services. These new location sensitive devices rely on a variety of technologies that all use the same general concept. Using radio signals coming from known reference points, these devices can mathematically calculate the user's position relative to these reference points. Each of these approaches has its strengths and weaknesses based on the radio technology and the positioning algorithms they employ.


The Global Positioning System (GPS) operated by the US Government leverages dozens of orbiting satellites as reference points. These satellites broadcast radio signals that are picked up by GPS receivers. The receivers measure the time it took for that signal to reach to the receiver. After receiving signals from three or more GPS satellites the receiver can triangulate its position on the globe. For the system to work effectively, the radio signals must reach the received with little or no interference. Weather, buildings or structures and foliage can cause interference because the receivers require a clear line-of-sight to three or more satellites. Interference can also be caused by a phenomenon known as multi-path. The radio signals from the satellites bounce off physical structures causing multiple signals from the same satellite to reach a receiver at different times. Since the receiver's calculation is based on the time the signal took to reach the receiver, multi-path signals confuse the receiver and cause substantial errors.


Cell tower triangulation is another method used by wireless and cellular carriers to determine a user or device's location. The wireless network and the handheld device communicate with each other to share signal information that the network can use to calculate the location of the device. This approach was originally seen as a superior model to GPS since these signals do not require direct line of site and can penetrate buildings better. Unfortunately these approaches have proven to be suboptimal due to the heterogeneous nature of the cellular tower hardware along with the issues of multi-path signals and the lack of uniformity in the positioning of cellular towers.


Assisted GPS is a newer model that combines both GPS and cellular tower techniques to produce a more accurate and reliable location calculation for mobile users. In this model, the wireless network attempts to help GPS improve its signal reception by transmitting information about the clock offsets of the GPS satellites and the general location of the user based on the location of the connected cell tower. These techniques can help GPS receivers deal with weaker signals that one experiences indoors and helps the receiver obtain a ‘fix’ on the closest satellites quicker providing a faster “first reading”. These systems have been plagued by slow response times and poor accuracy—greater than 100 meters in downtown areas.


There have been some more recent alternative models developed to try and address the known issues with GPS, A-GPS and cell tower positioning. One of them, known as TV-GPS, utilizes signals from television broadcast towers. (See, e.g., Muthukrishnan, Maria Lijding, Paul Having a, Towards Smart Surroundings: Enabling Techniques and Technologies for Localization, Lecture Notes in Computer Science, Volume 3479, January 2Hazas, M., Scott, J., Krumm, J.: Location-Aware Computing Comes of Age. IEEE Computer, 37(2):95-97, February 2004 005, Pa005, Pages 350-362.) The concept relies on the fact that most metropolitan areas have 3 or more TV broadcast towers. A proprietary hardware chip receives TV signals from these various towers and uses the known positions of these towers as reference points. The challenges facing this model are the cost of the new hardware receiver and the limitations of using such a small set of reference points. For example, if a user is outside the perimeter of towers, the system has a difficult time providing reasonable accuracy. The classic example is a user along the shoreline. Since there are no TV towers out in the ocean, there is no way to provide reference symmetry among the reference points resulting in a calculated positioning well inland of the user.


Microsoft Corporation and Intel Corporation (via a research group known as PlaceLab) have deployed a Wi-Fi Location system using the access point locations acquired from amateur scanners (known as “wardrivers”) who submit their Wi-Fi scan data to public community web sites. (See, e.g., LaMarca, A., et. al., Place Lab: Device Positioning Using Radio Beacons in the Wild.) Examples include WiGLE, Wi-FiMaps.com, Netstumbler.com and NodeDB. Both Microsoft and Intel have developed their own client software that utilizes this public wardriving data as reference locations. Because individuals voluntarily supply the data the systems suffer a number of performance and reliability problems. First, the data across the databases are not contemporaneous; some of the data is new while other portions are 3-4 years old. The age of the access point location is important since over time access points can be moved or taken offline. Second, the data is acquired using a variety of hardware and software configurations. Every 802.11 radio and antenna has different signal reception characteristics affecting the representation of the strength of the signal. Each scanning software implementation scans for Wi-Fi signals in different ways during different time intervals. Third, the user-supplied data suffers from arterial bias. Because the data is self-reported by individuals who are not following designed scanning routes, the data tends to aggregate around heavily traffic areas. Arterial bias causes a resulting location pull towards main arteries regardless of where the user is currently located causing substantial accuracy errors. Fourth, these databases include the calculated position of scanned access points rather than the raw scanning data obtained by the 802.11 hardware. Each of these databases calculates the access point location differently and each with a rudimentary weighted average formula. The result is that many access points are indicated as being located far from their actual locations including some access points being incorrectly indicated as if they were located in bodies of water.


There have been a number of commercial offerings of Wi-Fi location systems targeted at indoor positioning. (See, e.g., Kavitha Muthukrishnan, Maria Lijding, Paul Having a, Towards Smart Surroundings: Enabling Techniques and Technologies for Localization, Lecture Notes in Computer Science, Volume 3479, January 2Hazas, M., Scott, J., Krumm, J.: Location-Aware Computing Comes of Age. IEEE Computer, 37(2):95-97, February 2004 005, Pa005, Pages 350-362.) These systems are designed to address asset and people tracking within a controlled environment like a corporate campus, a hospital facility or a shipping yard. The classic example is having a system that can monitor the exact location of the crash cart within the hospital so that when there is a cardiac arrest the hospital staff doesn't waste time locating the device. The accuracy requirements for these use cases are very demanding typically calling for 1-3 meter accuracy. These systems use a variety of techniques to fine tune their accuracy including conducting detailed site surveys of every square foot of the campus to measure radio signal propagation. They also require a constant network connection so that the access point and the client radio can exchange synchronization information similar to how A-GPS works. While these systems are becoming more reliable for these indoor use cases, they are ineffective in any wide-area deployment. It is impossible to conduct the kind of detailed site survey required across an entire city and there is no way to rely on a constant communication channel with 802.11 access points across an entire metropolitan area to the extent required by these systems. Most importantly outdoor radio propagation is fundamentally different than indoor radio propagation rendering these indoor positioning algorithms almost useless in a wide-area scenario.


There are numerous 802.11 location scanning clients available that record the presence of 802.11 signals along with a GPS location reading. These software applications are operated manually and produce a log file of the readings. Examples of these applications are Netstumber, Kismet and Wi-FiFoFum. Some hobbyists use these applications to mark the locations of 802.11 access point signals they detect and share them with each other. The management of this data and the sharing of the information is all done manually. These application do not perform any calculation as to the physical location of the access point, they merely mark the location from which the access point was detected.


Performance and reliability of the underlying positioning system are the key drivers to the successful deployment of any location based service. Performance refers to the accuracy levels that the system achieves for that given use case. Reliability refers to the percentage of time that the desired performance levels are achieved.
















Performance
Reliability



















Local Search/Advertising
<100
meters
85% of the time


E911
<150
meters
95% of the time


Turn-by-turn driving directions
10-20
meters
95% of the time


Gaming
<50
meters
90% of the time


Friend finders
<500
meters
80% of the time


Fleet management
<10
meters
95% of the time


Indoor asset tracking
<3
meters
95% of the time









SUMMARY

The invention provides methods and systems of continuously optimizing data in WiFi positioning systems. For example, data is monitored to infer whether a WiFi access point has moved or is new. In this fashion, data is continuously optimized. Likewise, suspect data may be avoided when determining the position of the WiFi-enabled device using such a system.


Under one aspect of the invention, a location-based services system uses WiFi-enabled devices to monitor WiFi access points in a target area to indicate whether a WiFi access point has moved relative to its previously recorded location. A WiFi-enabled device communicates with WiFi access points within range of the WiFi-enabled device so that observed WiFi access points identify themselves; A reference database is accessed to obtain information specifying a recorded location for each observed WiFi access point in the target area. The recorded location information is used for each of the observed WiFi access points in conjunction with predefined rules to infer whether an observed WiFi access point has moved relative to its recorded location. The reference database is informed of the identity of any observed WiFi access point that is inferred to have moved.


Under another aspect of the invention, the predefined rules include (i) rules to identify clusters of observed WiFi access points, (ii) rules to determine the cluster with the largest number of WiFi access points, (iii) rules to calculate a reference point location from the average of the recorded locations for the observed WiFi access points within the largest cluster; and (iv) rules to infer as moved any observed WiFi access point whose recorded location stored in the reference database is more than a threshold distance from the reference point.


Under another aspect of the invention, the predefined rules include (i) rules to calculate a median location of the observed WiFi access points, and (ii) rules to identify as suspect any observed WiFi access point whose position stored in the reference database is more than a threshold distance from the median location.


Under another aspect of the invention, the predefined rules include (i) rules to store a recent position of the WiFi-enabled device as a reference point, and (ii) rules to identify as suspect any observed WiFi access point whose position stored in the reference database is more than a threshold distance from the median location.


Under another aspect of the invention, the further determines the velocity of WiFi-enabled device and wherein the threshold distance is selected based on the velocity of the WiFi-enabled device.


Under another aspect of the invention, the reference database is located remotely relative to the WiFi-enabled device.


Under another aspect of the invention, the Wi-Fi access points identified as suspect are marked in the reference database immediately.


Under another aspect of the invention, the WiFi access points identified as suspect in the WiFi-enabled device and marked in the reference database at a later time.


Under another aspect of the invention, the reference database is part of a location-based services system with a large plurality of subscribers each having WiFi-enabled devices with logic to determine the geographical position of the WiFi-enabled device of the respective user and wherein acts of identifying moved access points are repeatedly performed by the large plurality of WiFi-enabled devices using the system.





BRIEF DESCRIPTION OF DRAWINGS

In the drawing,



FIG. 1 depicts certain embodiments of a Wi-Fi positioning system;



FIG. 2 depicts an exemplary architecture of positioning software according to certain embodiments of the invention;



FIG. 3 depicts the data transfer process in certain client device centric embodiments;



FIG. 4 depicts the data transfer process in certain network centric embodiments;



FIG. 5 depicts the data flows for the quality filtering and feedback process; and



FIG. 6 depicts the operation of the Adaptive Filter in certain embodiments.





DETAILED DESCRIPTION

Preferred embodiments of the present invention provide a system and a methodology for continuously maintaining and updating location data in a WiFi positioning system (WPS) using public and private 802.11 access points. Preferably, clients using location data gathered by the system use techniques to avoid erroneous data in determining the Wi-Fi positions and use newly-discovered position information to improve the quality of previously gathered and determined position information. Certain embodiments communicate with the central location Access Point Reference Database to provide the location of newly discovered access points. Other embodiments notify the central location Access Point Reference Database of access points whose readings fall outside the bounds of what should be expected, based on previous readings of their location. Access points whose readings fall outside of what should be expected can be marked as suspect and filtered out of the triangulation formula so as not to introduce bad data into the location calculation.


Preferred embodiments of the invention build on techniques, systems and methods disclosed in earlier filed applications, including but not limited to U.S. patent application Ser. No. 11/261,988, filed on Oct. 28, 2005, entitled Location-Based Services that Choose Location Algorithms Based on Number of Detected Access Points Within Range of User Device, the contents of which are hereby incorporated by reference in its entirety. Those applications taught specific ways to gather high quality location data for WiFi access points so that such data may be used in location based services to determine the geographic position of a WiFi-enabled device utilizing such services. In the present case, new techniques are disclosed for continuously monitoring and improving such data, for example by users detecting new access points in a target area or inferring that access points have moved. The present techniques, however, are not limited to systems and methods disclosed in the incorporated patent applications. Instead those applications disclose but one framework or context in which the present techniques may be implemented. Thus, while reference to such systems and applications may be helpful, it is not believed necessary to understand the present embodiments or inventions.


Under one embodiment of the invention, a WPS client device scans for access points to determine the physical location of the WPS client device, then it calculates the quality of the current access point locations in the Access Point Reference Database by comparing the observed readings against the recorded readings in the database. If the client determines that the observed readings fall outside the bounds of what should be expected based on the recorded readings, then the access point is marked as suspect. That suspect reading is logged into a feedback system for reporting back to the central location Access Point Reference Database.


Under another embodiment of the invention, a WPS client device filters identified suspect access points out of the triangulation calculation of the WPS client device in real time so as not to introduce bad data into the location calculation.


Under another embodiment of the invention, a WPS client device scans for access points to determine the physical location of the device and identifies access points that do not exist in the current Access Point Reference Database. After the known access points are used to calculate the device's current location, those newly found access points are recorded back to the central location Access Point Reference Database using the calculated location of the known access points to help determine their position, along with the observed power reading.


Under another embodiment of the invention, a device centric WPS client device periodically connects to the central location Access Point Reference Database to download the latest access point data. The WPS client device also uploads all feedback data about newly observed access points and suspect access points. This data is then fed into the central location Access Point Reference Database processing to recalibrate the overall system.


Under another embodiment of the invention, a network centric WPS client device directly records feedback data about newly observed access points and suspect access points into the central location Access Point Reference Database in real time.


By enlisting the WPS client device to continuously update the Access Point Reference Database with information on new and suspect access points, the WiFi positioning system provides higher quality data than a system scanned solely by the provider. Over time, WiFi access points are continually added and moved. Embodiments of the described invention provide systems and methods to ensure that the Access Point Reference Database is self-healing and self-expanding, providing optimal positioning data that continually reflects additions and changes to available access points. As more user client devices are deployed, the quality of the Access Point Reference Database improves because information in the database is updated more frequently.



FIG. 1 depicts a portion of a preferred embodiment of a Wi-Fi positioning system (WPS). The positioning system includes positioning software [103] that resides on a user-computing device [101]. Throughout a particular coverage area there are fixed wireless access points [102] that broadcast information using control/common channel broadcast signals. The client device monitors the broadcast signal or requests its transmission via a probe request. Each access point contains a unique hardware identifier known as a MAC address. The client positioning software receives signal beacons or probe responses from the 802.11 access points in range and calculates the geographic location of the computing device using characteristics from the received signal beacons or probe responses.


The positioning software is described in greater detail with reference to FIG. 2, which depicts exemplary components of positioning software 103. Typically, in the user device embodiment of FIG. 1 there is an application or service [201] that utilizes location readings to provide some value to an end user (for example, driving directions). This location application makes a request of the positioning software for the location of the device at that particular moment. The location application can be initiated continuously every elapsed period of time (every 1 second for example) or one time on demand by another application or user.


In FIG. 2, the location application makes a request of the positioning software to interrogate all access points within range at a particular moment and to determine which access points are suspect because the observed data does not correspond to the calculated location in the Reference Database. The information on suspect access points collected by the location application is used to optimize the position information in the Access Point Reference Database either in real time or at some later time.


In the embodiment depicted in FIG. 2, the location application or service request initiates the scanner [202], which makes a “scan request” to the 802.11 radio [203] on the device. The 802.11 radio sends out a probe request to all 802.11 access points [204] within range. According to the 802.11 protocol, those access points in receipt of a probe request will transmit a broadcast beacon containing information about the access point. That beacon includes the MAC address of the device, the network name, the precise version of the protocol that it supports and its security configuration along with information about how to connect to the device. The 802.11 radio collects this information from each access point that responds, calculates the received signal strength (“RSS”) of each access point observed, and sends the identification and RSS information back to the scanner.


The scanner passes this array of access points to the Locator [206] which checks the MAC addresses of each observed access point against the Access Point Reference Database [205]. This database can either be located on the device or remotely over a network connection. The Access Point Reference Database contains the raw 802.11 scanning data plus the calculated location for each access point that is known to the system. FIG. 5 describes the access point evaluation process in more detail. The list of observed access points [501] is obtained from the Scanner and the Locator [206] searches for each access point in the Access Point Reference Database. For each access point found in the Access Point Reference Database the recorded location is retrieved [502]. The Locator passes this collection of location information for known access points [502] along with the signal characteristics returned from each access point to the Quality Filter [207]. This filter determines if any of the access points have moved since they were added to the Access Point Reference Database and works continually to improve the overall system. The Quality Filter marks access points that fail the quality algorithm as “suspect” [504]. After removing bad data records, the Filter sends the remaining access points to the Location Calculation component [208]. Using the set of validated reference data from the Access Point Reference Database and the signal strength readings from the Scanner, the Location Calculation component computes the location of the device at that moment. The Location Calculation component also calculates the position of any newly observed access points [503] not found in the Access Point Reference Database. The raw scanning data and the location of new access points are stored in the Feedback File [212] as can be seen in FIG. 2. This feedback is either saved locally on the device for later transmission to the server or sent to the server in real time. Before location data for known access points is sent back to the Locator, it is processed by the Smoothing engine [209] which averages a past series of location readings to remove any erratic readings from the previous calculation. The adjusted location data is then sent back to the Locator.


The calculated location readings produced by the Locator are communicated to these location-based applications [201] through the Application Interface [210] which includes an application programming interface (API) or via a virtual GPS capability [211]. GPS receivers communicate their location readings using proprietary messages or using the location standard like the one developed by the National Marine Electronics Association (NMEA). Connecting into the device using a standard interface such as a COM port on the machine retrieves the messages. Certain embodiments of the invention include a virtual GPS capability that allows any GPS compatible application to communicate with this new positioning system without have to alter the communication model or messages.


The location calculations are produced using a series of positioning algorithms intended to turn noisy data flows into reliable and steady location readings. The client software compares the list of observed access points along with their calculated signal strengths to weight the location of user to determine precise location of the device user. A variety of techniques are employed including simple signal strength weighted average models, nearest neighbor models combined with triangulation techniques and adaptive smoothing based on device velocity. Different algorithms perform better under different scenarios and tend to be used together in hybrid deployments to product the most accurate final readings. Preferred embodiments of the invention can use a number of positioning algorithms. The decision of which algorithm to use is driven by the number of access points observed and the user case application using it. The filtering models differ from traditional positioning systems since traditional systems rely on known reference points that never move. In the model of preferred embodiments, this assumption of fixed locations of access points is not made; the access points are not owned by the positioning system so they may move or be taken offline. The filtering techniques assume that some access points may no longer be located in the same place and could cause a bad location calculation. So the filtering algorithms attempt to isolate the access points that have moved since their position was recorded. The filters are dynamic and change based on the number of access points observed at that moment. The smoothing algorithms include simple position averaging as well as advanced Bayesian logic including particle filters. The velocity algorithms calculate device speed by estimating the Doppler effect from the signal strength observations of each access point.


Optimizing the Quality of Current Access Point Data

The Quality Filter [207] component compares the data from the observed access points against the known access points in a local or remote Access Point Reference Database. For those observed access points whose MAC address is located in the Access Point Reference Database, the Quality Filter component then compares the information observed with the location of the access points stored in the database.


The Quality Filter's [207] high level functionality is to remove suspect access points from location calculation and as the result, increase the accuracy of location estimation. The Quality Filter uses only access points that are located in the Access Point Reference Database. In some cases the Quality Filter will have no current client device location history to utilize for quality determination. The process for identifying suspect access points for a no-history location estimation is based on the location of the biggest cluster of the access points stored in the database. The location of all the observed access points that are recorded in the Access Point Reference Database is considered and the average location of the biggest cluster of access points is used as the reference point. A cluster refers to distance-based clustering, which is a group of access points with the distance of each access point from at least one more access point in the cluster less than a threshold. The clustering algorithm is shown as follows and it is read as “Node n belongs to cluster K, if there is at least one element in cluster K like ni, which its distance from n is less than the threshold”:

∃niε(clusterK),|n−ni|<dthresholdcustom characternε(clusterK)

If no cluster can be found then the mathematical median of the access points serves as the best estimate of the distance average of a majority of the access points.


If the distance of any individual access point to the reference point is calculated to be more than a given distance, it is ruled as a suspect access point and recorded in the Feedback File to be sent back to the Access Point Reference Database. Those suspect access points are then removed from the list of access points used to calculate the location of the user device.


Identifying suspect access points for a client device when there is a history of user movement is based on the previous location of the client device. An exemplary implementation of this determination is shown in FIG. 6. In an embodiment where there is location history, the client device location calculation is calculated continuously every period of time, usually once every second. If the distance of any individual observed access point [602] to that historical reference point (the prior location calculation) is more than a given distance [603], then it is ruled as a suspect access point, added to the Feedback File and removed from calculation. The intent of this filter is to try and use the access points that are nearest to the user/device [601] to provide the highest potential accuracy. This filter is called an adaptive filter since the threshold distance to filter suspect access points is changed dynamically. The threshold distance, which is used to identify suspect access points, is changed dynamically based on the number of access points that are considered of good quality to calculate location of the client device. Therefore, the adaptive filter contains two factors, 1) the minimum number of required access points to locate a user device and 2) the minimum threshold of distance to identify suspect access points. The adaptive filter starts with the minimum threshold of distance. If number of access points within that distance is above the minimum number of access points necessary to calculate the client location, then location of the device is calculated. For example, if we find five access points which are within 20 meters of the prior reading, then we filter out all observed access points greater than 20 meters. If the filter criteria is not met then the adaptive filter threshold [603] of the distance is increased until the minimum number of access points is considered or the maximum acceptable distance is reached, and then the access points within the threshold distance are used to locate the user device. If no access point can be located within the maximum threshold of distance from the previous location, then no location is calculated.


The positioning software continues to attempt to locate the device based on its previous location up to a maximum given duration of time. During this timeout period, if no location can be determined, the maximum threshold of distance is adjusted using the calculated velocity of the device. If the vehicle is known to accelerate at a maximum of 6 m/s/s and it was previously calculated as traveling at 20 mph, then it would not possible be more than 42 meters away from the last location two seconds later. This 42 meter distance limit is used to adjust the outer boundary of the distance threshold if the earlier time period adapter filters did not work. If it is too difficult to calculate the actual velocity of client device, then a maximum velocity threshold is used. If any access point is calculated to be more than the maximum threshold of distance away from the reference point, it is marked as “suspect” and logged to the Feedback File. If no access point can be located within the maximum threshold of the distance during the timeout period, then the adaptive filter ignores the history and treats the next instance of location determination as a no-history case and returns back to the clustering filter described previously.


Real-Time Filtering of Suspect Access Points

Suspect access points are removed from the inputs into the triangulation calculation and only valid access point locations are used to triangulate the device position [502]. The inputs to the triangulation algorithm are the set of valid access points returned from the Quality Filter [207]. The triangulation component reads in the list of valid observed access point locations along with their respective signal strengths and calculates a latitude and longitude along with a Horizontal Position Error (an estimate of the accuracy error at that moment). The triangulation process also takes into consideration prior positions to add additional filters to the scanning in order to apply a smoothing process. By filtering out suspect access points we provide the triangulation algorithm a more reliable set of reference points to calculate against. Since access points can move at any time, Positioning Software must account for the dynamic nature of the reference points. Without conducting filtering, the calculated location could result in a position hundreds or thousands of miles away.


Suspect access points are not discarded completely. Rather their newly observed locations are added back to the database via the Feedback File [212] with different attributes indicating it as suspect, allowing the server to determine whether to move the official location of that access point or just keep it on hold until its new location can be verified. By keeping it on hold, this access point will not corrupt any other user's location calculation.


Adding New Access Point Data

Observed access points found in the Access Point Reference Database of known access points are used to calculate the location of the client device after the elimination of suspect access points. Observed access points whose MAC address are not found in the Access Point Reference Database represent new access points [302][503] added since the database was created or updated. Those observed access points not found in the known Access Point Reference Database are added to the Feedback File as new access points. Those newly found access points are marked with the location of the client device calculated by the positioning system itself along with the observed signal strengths. This situation can occur in a number of scenarios. In many cases a new access point is purchased and deployed in the vicinity since the last physical scanning by the scanning fleet. This is most often the case due to the rapid expansion of Wi-Fi. In other cases, an access point may be situated deep in the center of a building and the scanning fleet was unable to detect that access point from the street. Another example is that an access point may be located up on a high floor of a tall building. These access points may be difficult to detect from down on the street where the scanning fleet operates, but may be received by client devices that pass closer to the building by users on foot or that enter the building itself.


By having the system “self-expand” in this manner, the coverage area of the system slowly expands deep into buildings and upwards in tall buildings. It also leverages the large number of new access points that are deployed every day across the world.


Updating the Central Database Server

With reference to FIG. 3, in some embodiments the Access Point Reference Database of known access points will be located on a central network server remote from the client device. The provisioning of this connection could be done via any available network connection and is managed by the Data Exchange Component [303]. Once authenticated, the client device [103] identifies all the suspect and new access point data from the local storage Feedback Files [212] and uploads that data to the Access Point Reference Database [205].


In other embodiments the client device is connected to the Access Point Reference Database all the time using a network connection. FIG. 4 describes how the Network Centric embodiment works. Rather than store the reference data locally, the Locator [201] uses a set of Real-Time Network interfaces [401] to communicate with the Access Point Reference Database. The Locator sends the list of observed access points to the network interface which returns the list of observed access points and whether the database has recorded locations or whether the access points are newly found. The process continues as before with the Quality Filter marking suspect access points but the list of suspect access points is sent to the Access Point Reference Database in real-time. After the Calculation module determines the user device's location, the list of newly found access points is marked with the current location and sent back to the database in real-time. This allows the database to be up to date at all times and to remove the need for a Data Exchange Component.


After receiving feedback data, in either the device centric or the network centric model, the Access Point Reference Database determines whether to place suspect access points ‘on hold’ so as to prevent them from corrupting another user device's location request. There are a number of techniques being explored to optimize how this feedback data of suspect access points will be used to improve the overall quality of the database. There may be a voting scheme by which access points are moved to new positions if more than one user locates the access point in its new location. If only one user has marked the access point as suspect then the access point is marked as a low quality reading in its new position. Once its new position is validated by another user then the quality attribute of the access point is increased to reflect the higher level of confidence the system has in the new position. The more people who corroborate the access point's new position the higher the quality level. The system's client software then favors access points with high quality ratings over those that have lower quality ratings.


In either the device centric or the network centric model, the Access Point Reference Database collects the access point identifying information, client device location and access point signal strength information of newly discovered access points from client devices. Once an acceptable number of readings of newly discovered access points is collected by the Access Point Reference Database, it can calculate a location for the new access points based on the systems and methods described in the related applications. The newly discovered access points can then be supplied to client devices for use in their location calculation.


It will be appreciated that the scope of the present invention is not limited to the above-described embodiments, but rather is defined by the appended claims; and that these claims will encompass modifications of and improvements to what has been described.

Claims
  • 1. A method of identifying a WiFi access point that is suspected to have moved relative to location information associated with the WiFi access point which is recorded in a reference database, the method comprising: at least one of a mobile WiFi-enabled device and a server system in communication with the mobile WiFi-enabled device receiving information identifying at least one WiFi access point in range of the mobile WiFi-enabled device;at least one of the mobile WiFi-enabled device and the server system in communication with the mobile WiFi-enabled device accessing a reference database to retrieve location information associated with the identified WiFi access point recorded in the reference database, the location information specifying a previously-determined approximate location of the identified WiFi access point;at least one of the mobile WiFi-enabled device and the server system in communication with the mobile WiFi-enabled device comparing the recorded location information associated with the identified WiFi access point to location information associated with WiFi access points observed by the mobile WiFi-enabled device during a period of time to infer whether the identified WiFi access point has moved from its previously-determined approximate location that is recorded in the reference database, the inferring including determining whether (a) the recorded location information associated with the identified WiFi access point is more than a threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time or (b) the recorded location information associated with the identified WiFi access point is within the threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time.
  • 2. The method of claim 1, further comprising at least one of the mobile WiFi-enabled device and the server system in communication with the mobile WiFi-enabled device indicating in the reference database as unreliable for position determination the identified WiFi access point inferred to have moved from its previously-determined approximate location upon the condition that the recorded location information associated with the identified WiFi access point is more than the threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time.
  • 3. The method of claim 2, wherein the indication in the reference database is made upon inferring the identified WiFi access point has moved from its previously-determined approximate location.
  • 4. The method of claim 1, wherein the reference database is located remotely relative to the mobile WiFi-enabled device.
  • 5. The method of claim 4, further comprising: the mobile WiFi-enabled device indicating in the mobile WiFi-enabled device as unreliable for position determination the identified WiFi access point inferred to have moved from its previously-determined approximate location upon the condition that the recorded location information associated with the identified WiFi access point is more than the threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time, the indicating in the mobile WiFi-enabled device occurring upon inferring the identified WiFi access point has moved from its previously-determined approximate location; andat least one of the mobile WiFi-enabled device and the server system in communication with the mobile WiFi-enabled device indicating in the reference database as unreliable for position determination the identified WiFi access point inferred to have moved from its previously-determined approximate location upon the condition that the recorded location information associated with the identified WiFi access point is more than the threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time, the indicating in the reference database occurring subsequent to the indicating in the mobile WiFi-enabled device.
  • 6. The method of claim 1, wherein the reference database is located on the mobile WiFi-enabled device.
  • 7. The method of claim 6, further comprising the mobile WiFi-enabled device indicating in the reference database as unreliable for position determination the identified WiFi access point inferred to have moved from its previously-determined approximate location upon the condition that the recorded location information associated with the identified WiFi access point is more than the threshold distance from the location information associated with WiFi access points observed by the mobile WiFi-enabled device during the period of time.
  • 8. The method of claim 1, wherein the comparing the recorded location information associated with the identified WiFi access point to location information associated with WiFi access points observed by the mobile WiFi-enabled device includes (i) calculating a median location of the WiFi access points observed by the mobile WiFi-enabled device, and (ii) comparing the recorded location information associated with the identified WiFi access point to the calculated median location.
  • 9. The method of claim 1, wherein the comparing the recorded location information associated with the identified WiFi access point to location information associated with WiFi access points observed by the mobile WiFi-enabled device includes (i) determining clusters of observed WiFi access points, (ii) determining the cluster with the largest numbers of WiFi access points, (iii) calculating a reference point location from the average of the location information associated with the WiFi access points within the largest cluster, and (iv) comparing the recorded location information associated with the identified WiFi access point to the reference point location.
  • 10. The method of claim 1, wherein the method further determines the velocity of the mobile WiFi-enabled device and wherein the threshold distance is based on the velocity of the mobile WiFi-enabled device.
  • 11. The method of claim 1, further comprising estimating a geographic position of the WiFi access point that is inferred to have moved from its previously-determined approximate location.
  • 12. The method of claim 11, further comprising updating in the reference database the recorded location information associated with the identified WiFi access point that is inferred to have moved from its previously-determined approximate location.
  • 13. The method of claim 11, wherein the estimating the geographic position of the WiFi access point that is inferred to have moved from its previously-determined approximate location is based at least in part on location information associated with WiFi access points other than WiFi access points that are inferred to have moved from their corresponding previously-determined approximate locations.
  • 14. The method of claim 13, further comprising updating in the reference database the recorded location information associated with the identified WiFi access point that is inferred to have moved from its previously-determined approximate location.
  • 15. The method of claim 1, further comprising estimating a geographic position of the mobile WiFi-enabled device based on location information associated with WiFi access points other than the identified WiFi access point inferred to have moved from its previously-determined approximate location.
  • 16. The method of claim 1, wherein the reference database is part of a location-based services system with a plurality of subscribers each having mobile WiFi-enabled devices with logic to determine the geographical position of the mobile WiFi-enabled device of the respective user and wherein the acts of identifying at least one WiFi access point, accessing the reference database, and comparing the recorded location information are repeatedly performed by the mobile WiFi-enabled devices of the plurality of subscribers using the location-based services system.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 11/359,154, filed Feb. 22, 2006, entitled Continuous Data Optimization of Moved Access Points in Positioning Systems, now U.S. Pat. No. 8,244,272, which claimed the benefit under 35 U.S.C. §119(e) to U.S. Provisional patent application Ser. No. 60/654,811, filed on Feb. 22, 2005, entitled Continuous Data Optimization in Positioning System, and which was also a continuation-in-part of and claimed the benefit under 35 U.S.C. §120 to U.S. patent application Ser. No. 11/261,988, filed on Oct. 28, 2005, entitled Location-Based Services that Choose Location Algorithms Based on Number of Detected Access Points Within Range of User Device, now U.S. Pat. No. 7,305,245, which claimed the benefit under 35 U.S.C. §119(e) to U.S. Provisional patent application Ser. No. 60/623,108, filed on Oct. 29, 2004, entitled Wireless Data Scanning Network for Building Location Beacon Database, the contents of each of which are incorporated herein.

US Referenced Citations (241)
Number Name Date Kind
3881060 Connell et al. Apr 1975 A
4310726 Asmuth Jan 1982 A
4415771 Martinez Nov 1983 A
4757267 Riskin Jul 1988 A
4924491 Compton et al. May 1990 A
4991176 Dahbura et al. Feb 1991 A
5043736 Darnell et al. Aug 1991 A
5095505 Finucane et al. Mar 1992 A
5119504 Durboraw, III Jun 1992 A
5136636 Wegrzynowicz Aug 1992 A
5161180 Chavous Nov 1992 A
5235630 Moody et al. Aug 1993 A
5235633 Dennison et al. Aug 1993 A
5315636 Patel May 1994 A
5334974 Simms et al. Aug 1994 A
5353023 Mitsugi Oct 1994 A
5379337 Castillo et al. Jan 1995 A
5389935 Drouault et al. Feb 1995 A
5414432 Penny, Jr. et al. May 1995 A
5564121 Chow et al. Oct 1996 A
5940825 Castelli et al. Aug 1999 A
5946615 Holmes et al. Aug 1999 A
6134448 Shoji et al. Oct 2000 A
6192312 Hummelsheim Feb 2001 B1
6249252 Dupray Jun 2001 B1
6262741 Davies Jul 2001 B1
6272405 Kubota et al. Aug 2001 B1
6438491 Farmer Aug 2002 B1
6484034 Tsunehara et al. Nov 2002 B1
6625647 Barrick, Jr. et al. Sep 2003 B1
6664925 Moore et al. Dec 2003 B1
6665658 DaCosta et al. Dec 2003 B1
6674403 Gray et al. Jan 2004 B2
6678611 Khavakh et al. Jan 2004 B2
6741188 Miller et al. May 2004 B1
6754488 Won et al. Jun 2004 B1
6757518 Spratt et al. Jun 2004 B2
6789102 Gotou et al. Sep 2004 B2
6799049 Zellner et al. Sep 2004 B1
6862524 Nagda et al. Mar 2005 B1
6888811 Eaton et al. May 2005 B2
6915128 Oh Jul 2005 B1
6956527 Rogers et al. Oct 2005 B2
6978023 Dacosta Dec 2005 B2
6990351 Tsunehara et al. Jan 2006 B2
6990428 Kaiser et al. Jan 2006 B1
7042391 Meunier et al. May 2006 B2
7086089 Hrastar et al. Aug 2006 B2
7116988 Dietrich et al. Oct 2006 B2
7120449 Muhonen et al. Oct 2006 B1
7123928 Moeglein et al. Oct 2006 B2
7130642 Lin Oct 2006 B2
7130646 Wang Oct 2006 B2
7155239 Zeng et al. Dec 2006 B2
7167715 Stanforth Jan 2007 B2
7167716 Kim et al. Jan 2007 B2
7197556 Short et al. Mar 2007 B1
7206294 Garahi et al. Apr 2007 B2
7242950 Suryanarayana et al. Jul 2007 B2
7250907 Krumm et al. Jul 2007 B2
7254405 Lin et al. Aug 2007 B2
7257411 Gwon et al. Aug 2007 B2
7271765 Stilp et al. Sep 2007 B2
7277404 Tanzella et al. Oct 2007 B2
7299058 Ogino Nov 2007 B2
7305245 Alizadeh-Shabdiz et al. Dec 2007 B2
7317914 Adya et al. Jan 2008 B2
7319878 Sheynblat et al. Jan 2008 B2
7323991 Eckert et al. Jan 2008 B1
7373154 Sharony et al. May 2008 B2
7389114 Ju et al. Jun 2008 B2
7397424 Houri Jul 2008 B2
7403762 Morgan et al. Jul 2008 B2
7412246 Lewis et al. Aug 2008 B2
7414988 Jones et al. Aug 2008 B2
7417961 Lau Aug 2008 B2
7426197 Schotten et al. Sep 2008 B2
7433673 Everson et al. Oct 2008 B1
7433694 Morgan et al. Oct 2008 B2
7433696 Dietrich et al. Oct 2008 B2
7440755 Balachandran et al. Oct 2008 B2
7471954 Brachet et al. Dec 2008 B2
7474897 Morgan et al. Jan 2009 B2
7493127 Morgan et al. Feb 2009 B2
7502620 Morgan et al. Mar 2009 B2
7515578 Alizadeh-Shabdiz et al. Apr 2009 B2
7519372 MacDonald et al. Apr 2009 B2
7522908 Hrastar Apr 2009 B2
7525484 Dupray et al. Apr 2009 B2
7551579 Alizadeh-Shabdiz et al. Jun 2009 B2
7551929 Alizadeh-Shabdiz et al. Jun 2009 B2
7636576 Pfister et al. Dec 2009 B1
7672675 Pande et al. Mar 2010 B2
7764231 Karr et al. Jul 2010 B1
7768963 Alizadeh-Shabdiz Aug 2010 B2
7769396 Alizadeh-Shabdiz et al. Aug 2010 B2
7818017 Alizadeh-Shabdiz et al. Oct 2010 B2
7835754 Alizadeh-Shabdiz et al. Nov 2010 B2
7853250 Harvey et al. Dec 2010 B2
7856209 Rawat Dec 2010 B1
7856234 Alizadeh-Shabdiz et al. Dec 2010 B2
7916661 Alizadeh-Shabdiz et al. Mar 2011 B2
7999742 Alizadeh-Shabdiz Aug 2011 B2
8014788 Alizadeh-Shabdiz et al. Sep 2011 B2
8019357 Alizadeh-Shabdiz et al. Sep 2011 B2
8022877 Alizadeh-Shabdiz Sep 2011 B2
8054219 Alizadeh-Shabdiz Nov 2011 B2
8063820 Alizadeh-Shabdiz Nov 2011 B2
8090386 Alizadeh-Shabdiz et al. Jan 2012 B2
8103288 Alizadeh-Shabdiz et al. Jan 2012 B2
8130148 Alizadeh-Shabdiz Mar 2012 B2
8144673 Alizadeh-Shabdiz Mar 2012 B2
8154454 Alizadeh-Shabdiz Apr 2012 B2
8155666 Alizadeh-Shabdiz Apr 2012 B2
8155673 Alizadeh-Shabdiz et al. Apr 2012 B2
8185129 Alizadeh-Shabdiz May 2012 B2
8223074 Alizadeh-Shabdiz Jul 2012 B2
8242960 Alizadeh-Shabdiz Aug 2012 B2
8244272 Morgan et al. Aug 2012 B2
20010053999 Feinberg Dec 2001 A1
20020055956 Krasnoiarov et al. May 2002 A1
20020080063 Bloebaum et al. Jun 2002 A1
20020154056 Gaal et al. Oct 2002 A1
20020173317 Nykanen et al. Nov 2002 A1
20020184331 Blight et al. Dec 2002 A1
20030043073 Gray et al. Mar 2003 A1
20030069024 Kennedy Apr 2003 A1
20030087647 Hurst May 2003 A1
20030114206 Timothy et al. Jun 2003 A1
20030125045 Riley et al. Jul 2003 A1
20030146835 Carter Aug 2003 A1
20030186679 Challener et al. Oct 2003 A1
20030225893 Roese et al. Dec 2003 A1
20040019679 E et al. Jan 2004 A1
20040039520 Khavakh et al. Feb 2004 A1
20040048640 Bae Mar 2004 A1
20040058640 Root et al. Mar 2004 A1
20040068364 Zhao et al. Apr 2004 A1
20040072577 Myllymaki et al. Apr 2004 A1
20040081133 Smavatkul et al. Apr 2004 A1
20040087317 Caci May 2004 A1
20040124977 Biffar Jul 2004 A1
20040157624 Hrastar Aug 2004 A1
20040162896 Cen et al. Aug 2004 A1
20040193367 Cline Sep 2004 A1
20040203847 Knauerhase et al. Oct 2004 A1
20040203904 Gwon et al. Oct 2004 A1
20040204063 Van Erlach Oct 2004 A1
20040205234 Barrack et al. Oct 2004 A1
20040263388 Krumm et al. Dec 2004 A1
20050020266 Backes et al. Jan 2005 A1
20050021781 Sunder et al. Jan 2005 A1
20050037775 Moeglein et al. Feb 2005 A1
20050043040 Contractor Feb 2005 A1
20050055374 Sato Mar 2005 A1
20050105600 Culum et al. May 2005 A1
20050108306 Martizano Catalasan May 2005 A1
20050136845 Masuoka et al. Jun 2005 A1
20050164710 Beuck Jul 2005 A1
20050192024 Sheynblat Sep 2005 A1
20050227711 Orwant et al. Oct 2005 A1
20050232189 Loushine Oct 2005 A1
20050251326 Reeves Nov 2005 A1
20060002326 Vesuna Jan 2006 A1
20060009235 Sheynblat et al. Jan 2006 A1
20060040640 Thompson et al. Feb 2006 A1
20060046709 Krumm et al. Mar 2006 A1
20060058957 Hickenlooper et al. Mar 2006 A1
20060058958 Galbreath et al. Mar 2006 A1
20060061476 Patil et al. Mar 2006 A1
20060078122 Dacosta Apr 2006 A1
20060089157 Casey et al. Apr 2006 A1
20060089160 Othmer Apr 2006 A1
20060092015 Agrawal et al. May 2006 A1
20060128397 Choti et al. Jun 2006 A1
20060193258 Ballai Aug 2006 A1
20060194568 Sharony Aug 2006 A1
20060197704 Luzzatto et al. Sep 2006 A1
20060200843 Morgan et al. Sep 2006 A1
20060221918 Wang Oct 2006 A1
20060270421 Phillips et al. Nov 2006 A1
20060293064 Robertson et al. Dec 2006 A1
20070004428 Morgan et al. Jan 2007 A1
20070077945 Sheynblat Apr 2007 A1
20070097511 Das et al. May 2007 A1
20070100955 Bodner May 2007 A1
20070110053 Soni et al. May 2007 A1
20070121560 Edge May 2007 A1
20070126635 Houri Jun 2007 A1
20070150516 Morgan et al. Jun 2007 A1
20070178911 Baumeister et al. Aug 2007 A1
20070184846 Horton et al. Aug 2007 A1
20070210961 Romijn Sep 2007 A1
20080004888 Davis et al. Jan 2008 A1
20080008118 Alizadeh-Shabdiz Jan 2008 A1
20080008119 Alizadeh-Shabdiz Jan 2008 A1
20080033646 Morgan et al. Feb 2008 A1
20080045234 Reed Feb 2008 A1
20080108371 Alizadeh-Shabdiz et al. May 2008 A1
20080132170 Alizadeh-Shabdiz et al. Jun 2008 A1
20080133124 Sarkeshik Jun 2008 A1
20080133336 Altman et al. Jun 2008 A1
20080139219 Boeiro et al. Jun 2008 A1
20080176583 Brachet et al. Jul 2008 A1
20080188242 Carlson et al. Aug 2008 A1
20080248741 Alizadeh-Shabdiz Oct 2008 A1
20080248808 Alizadeh-Shabdiz Oct 2008 A1
20080261622 Lee et al. Oct 2008 A1
20090017841 Lewis et al. Jan 2009 A1
20090075672 Jones et al. Mar 2009 A1
20090149197 Morgan et al. Jun 2009 A1
20090175189 Alizadeh-Shabdiz et al. Jul 2009 A1
20090303112 Alizadeh-Shabdiz Dec 2009 A1
20090303113 Alizadeh-Shabdiz Dec 2009 A1
20090303114 Alizadeh-Shabdiz Dec 2009 A1
20090303115 Alizadeh-Shabdiz Dec 2009 A1
20090303119 Alizadeh-Shabdiz Dec 2009 A1
20090310585 Alizadeh-Shabdiz Dec 2009 A1
20090312036 Alizadeh-Shabdiz Dec 2009 A1
20100052983 Alizadeh-Shabdiz Mar 2010 A1
20110021207 Morgan et al. Jan 2011 A1
20110035420 Alizadeh-Shabdiz et al. Feb 2011 A1
20110045840 Alizadeh-Shabdiz et al. Feb 2011 A1
20110074626 Alizadeh-Shabdiz et al. Mar 2011 A1
20110080317 Alizadeh-Shabdiz et al. Apr 2011 A1
20110080318 Alizadeh-Shabdiz et al. Apr 2011 A1
20110235532 Alizadeh-Shabdiz et al. Sep 2011 A1
20110235623 Alizadeh-Shabdiz et al. Sep 2011 A1
20110287783 Alizadeh-Shabdiz et al. Nov 2011 A1
20110298660 Alizadeh-Shabdiz Dec 2011 A1
20110306357 Alizadeh-Shabdiz et al. Dec 2011 A1
20110306358 Alizadeh-Shabdiz et al. Dec 2011 A1
20110306359 Alizadeh-Shabdiz et al. Dec 2011 A1
20110306360 Alizadeh-Shabdiz et al. Dec 2011 A1
20110306361 Alizadeh-Shabdiz et al. Dec 2011 A1
20120100872 Alizadeh-Shabdiz et al. Apr 2012 A1
20120108260 Alizadeh-Shabdiz May 2012 A1
20120112958 Alizadeh-Shabdiz et al. May 2012 A1
20120178477 Morgan et al. Jul 2012 A1
20120196621 Alizadeh-Shabdiz et al. Aug 2012 A1
20120280866 Alizadeh-Shabdiz Nov 2012 A1
Foreign Referenced Citations (11)
Number Date Country
2056203 Jul 1992 CA
0493896 Jul 1992 EP
1359714 Nov 2003 EP
03-235562 Oct 1991 JP
04-035345 Feb 1992 JP
WO-03021851 Mar 2003 WO
WO-04002185 Dec 2003 WO
WO-2004036240 Apr 2004 WO
WO-2005004527 Jan 2005 WO
WO-2007101107 Sep 2007 WO
WO-2011119575 Sep 2011 WO
Non-Patent Literature Citations (135)
Entry
Author Unknown, “Calculate AP Physical Location,” NetStumbler.org Forums, Oct. 2012, 7 pages, available at http://www.netstumbler.org/netsstumbler/calculate-ap-Dhysical-location-t9813.html.
Author Unknown, “Indoor Radio Propagation,” Spread Spectrum Scene Nov. 2012, 7 pages, available at http://sss-mag.com/indoor.html.
Author Unknown, “LocalePoints,” Newbury Networks, available at least as early as Oct. 2004, at http://replay.waybackmachine.org/20041009170934/hhttp://www.newburynetworks.com/products/coretech.php?localepoints, last accessed Apr. 14, 2011, 1 page.
Author Unknown, Netstumbler Blog Posting, “Wardriving as a Proxy for Wi-Fi Location,” available at http://www.netstumbler.org/news/wardriving-as-a-proxy-for-wi-fi-gps-location-t10762.html, May 11-17, 2004, last accessed Apr. 13, 2004, 7 pages.
Brewin, “IBM Develops Tool to Detect Rogue Wireless LAN Access Points,” Nov. 2012, 5 pages, available at http://www.computerworld.com/s/article/72065/IBM—develops—toolto—detect—rogue—wi.
Ekahau Client 3.0 Build 136 Release Notes, Available at http://replay.waybackmachine.orq/20030929003821/http:/www.ekahau.com/products/client, Apr. 14, 2011, 4 pages.
Foust, “Identifying and Tracking Unauthorized 802.11 Cards and Access Points,” The Magazine of Usenix & Sage, Aug. 2002, vol. 27, No. 4, 3 pages.
Hightower et al., “A Survey and Taxonomy of Location Systems for Ubiquitous Computing,” Technical Report UW-CSE Jan. 8, 2003, Aug. 2001, 29 pages.
Hurley, et al., “WarDriving: Drive, Detect, Defend, A Guide to Wireless Security,” Syngress Publishing, Nov. 2012, 3 pages, available at http://net-security.org/review.php?id=144.
Lee, “Wireless Surveying on the Pocket PC, ” May 2004, 7 pages, available at http://www.oreillynet.com/lpt/a/4876.
Leslie, “Rogue Wireless Access Point Detection and Remediation, ” Global Information Assurance Certification Paper, Sep. 2004, 15 pages, retrieved from www.giac.org/paper/gsec/4060/rogue-wireless-access-point-detection-remediation/106460.
Letchner et al., “Large-Scale Localization from Wireless Signal Strength, ” In Proc. Of the National Conference on Artifical Intelligence (AAAI), 2005, 6 pages.
Lorincz, et al., “MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking, ” First International Workshop, LoCA 2005, LNCS 3479, Oberpfaffenhofen, Germany, May 12-13, 2005 Proceedings, 21 pages.
Milner, “NetStumbler v0.4.0 Release Notes, ” available at http://downloads.netstumbler.com/downloads/netstumbler—v0.4.0—release—notes.pdf, Apr. 18, 2007, 10 pages.
Myllymaki et al., “Location Aggregation from Multiple Sources, ” IBM Almaden Research Center, MDM '02 Proceedings of the Third International Conference on Mobile Data Management, pp. 131-138, IEEE Computer Society Washington, DC, 2002.
Papadimitriou, “On the Complexity of Edge Traversing, ” Journal of the Association for Computing Machinery, Vol. 23, No. 3, Jul. 1976, pp. 544-554.
Small et al., “Determining User Location for Context Aware Computing Through the Use of a Wireless LAN Infrastructure, ” Dec. 2000, retrieved from http://www.ices.cmu.edu/reports/040201/pdf 8 pages.
Texas Advisory Commission on Intergovernmental Relations, “Implementing 9-1-1 Systems in Texas: Legal and Institutional Backround, ” Jun. 1987, 61 pages.
Sterling, et al., The Iridium Systems—A Revoluntionary Satellite Communications System Developed with Innovative Applications of Technology, IEEE Communications Society, 1991, Milicom '91, pp. 0436-0440.
Stone, “Kismet & GPSdrive: Wireless Network Sniffling with Open Software, ”UKUUG Leeds, 2004, 32 pages.
Taheri et al., “Location Fingerprinting on Infrastructure 802.11 Wireless Local Area Networks, ” Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), Nov. 16-18, 2004, Tampa, Florida, 9 pages.
Torrone, “HOW-To Tuesday: War Kayaking, ”Nov. 2012, 5 pages, available at www.engadget.com/2004/06/22-how-to-Tuesday-war-kayaking.
Author Unknown, “A Practical Approach to Identifying and Tracking Unauthorized 802.11 Cards and Access Points,” Interlink Networks, 2002, 20 pages.
Author Unknown, “Best Practices for Hunting Down & Terminating Rogue Wireless LANs (WLANs),” AirDefense, Inc., available at www.airdefense.net, 2002-2005, 7 pages.
Author Unknown, “Calculate AP Physical Location,” NetStumbler.org Forums, Oct. 2012, 7 pages, available at http://www.netstumbler.org/netsstumbler/calculate-ap-physical-location-t9813.html.
Author Unknown, “Current Kismet Readme,” Kismet, Nov. 2012, 47 pages, available at http://kismetwireless.net/documentation.shtml.
Author Unknown, “Distributed Wireless Security Auditor,” IBM Research, Nov. 2012, 3 pages, available at http://www.research.ibm.com/gsal/dwsa.
Author Unknown, “Ekahau Positioning Engine 2.0: 802.11-based Wireless LAN Positioning System,” Ekahau Technology Document, Nov. 2002, 19 pages.
Author Unknown, “GPSDRIVE,” Nov. 2012, available at http://gpsdrive.sourceforge.net/gpsdrive—manual-en.html, 13 pages.
Author Unknown, “Huffman Coding”, Wikipedia, retrieved from <http://en.wikipedia.org/wiki/Huffman—coding> on Dec. 28, 2010, 10 pages.
Author Unknown, “Indoor Radio Propagation,” Spread Spectrum Scene, Nov. 2012, 7 pages, available at http://sss-mag.com/indoor.html.
Adelstein et al., “Physically Locating Wireless Intruders,” Journal of Universal Computer Science, vol. 11, No. 1, 2005, pp. 4-19.
Ambrosch et al., The Intelligent Network, a Joint Study by Bell Atlantic, IBM and Siemens, Springer-Verlag, IBSN 3-540-50897-X, 1989, Chapter 9, 18 pages.
Author Unknown, “LocalePoints,” Newbury Networks, available at least as early as Oct. 2004, at http://replay.waybackmachine.org/20041009170934/hhttp://www.newburynetworks.com/produ cts/coretech.php?localepoints, last accessed Apr. 14, 2011, 1 page.
Author Unknown, “LocaleServer,” Newbury Networks, available at least as early as Oct. 2004, at http://replay.waybackmachine.org/20041010054718/http://www.newburynetworks.com/products/coretech.php, last accessed Apr. 14, 2011, 1 page.
Author Unknown, “Mobile Applications Suite,” Pango, PanGo Mobile Applications Suite, available at leasst as early as Aug. 2003, at http://replay.waybackmachine.org/20030825161534/http://pangonetworks.com/mobile.htm and http://replay.waybackmachine.org/20031002103310/http://pangonetworks.com/products.htm, last accessed Apr. 14, 2011, 1 page.
Author Unknown, “Proximity Platform,” Pango, PanGo Mobile Applications Suite, available at leasst as early as Aug. 2003, at http://replay.waybackmachine.org/20031002102757/http://pangonetworks.com/proximity.htm and http://replay.waybackmachine.org/20031002103310/http://pangonetworks.com/products.htm, last accessed Apr. 14, 2011, 1 page.
Author Unknown, Bluesoft, Inc., Aeroscout, available at http://replay.waybackmachiine.org/20030802052607/http:/bluesoft-inc.com/wlan.asp, Accessed on Apr. 14, 2011, 1 page.
Author Unknown, Netstumbler Blog Posting, “Wardriving as a Proxy for Wi-Fi Location,” available at http://www.netstumbler.org/news/wardriving-as-a-proxy-for-wi-fi-gps-location- t10762.html, May 11-17, 2004, last accessed Apr. 13, 2004, 7 pages.
Bahl et al., “RADAR: An In-Building RF-based User Location and Tracking System,” Proceedings IEEE INFOCOM 2000, pp. 775-784.
Balachandran et al., “Wireless Hotspots: Current Challenges and Future Directions,” WMASH'03, Sep. 2003, 9 pages.
Battiti, et al., “Wireless LANs: From WarChalking to Open Access Networks,” Mobile Networks and Applications 10, pp. 275-287, 2005.
Bhasker et al., “Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing,” Proceeding PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04), IEEE Computer Society Washington, DC., USA, 2004, 10 pages.
Bjorndahl et al., “CME20—A Total Solution for GSM Networks,” Ericsson Review No. 3, 1991, 8 pages.
Bogue, “Using NetStumbler and MiniStumbler to Find Rogue Access Points on Wireless Networks,” TechRepublic, CIO Top 50 6th Annual Event, 2012, 5 pages.
Branch et al., “Autonomic 802.11 Wireless LAN Security Auditing,” IEEE Computer Society, 2004, pp. 56-65.
Brewin, “IBM Develops Tool to Detect Rogue Wireless LAN Access Points,” Nov. 2012, 5 pages, available at http://www.computerworld.com/s/article/72065/IBM—develops—tool—to—detect—rogue—wi.
Buccafurno, “The Philadelphia Story,” TE&M Special Report 911, Dec. 1987, pp. 68-72.
Byers et al., “802.11B Access Point Mapping,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 41-46.
California Legislature, Senate on Energy and Public Utilities, Joint Interim Hearing on the 911 Emergency Responsne System—An Overview of its Effectiveness, Nov. 21, 1990, 107 pages.
Capkun et al., “GPS-free Positioning in Mobile Ad Hoc Networks,” Cluster Computing, 5, pp. 157-167, 2002.
Chawathe et al., “A Case Study in Building Layered DHT Applications,” SIGCOMM '05 Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 97-108, Jan. 2005, 15 pages.
Cheng et al., “Accuracy Characterization for Metropolitan-scale Wi-Fi Localization,” MobiSys '05 Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 233-245, 13 pages.
Connelly et al., “A Toolkit for Automatically Constructing Outdoor Radio Maps,” Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC, Apr. 4-6, 2005, Las Vegas, Nevada, IEEE, 7 pages.
Crow, “Auditing for Rogue Wireless Access Points in a Large Corporate Campus,” Global Information Assurance Certification Paper, Sep. 18, 2003, 21 pages.
Dayharsh, et al., “Update on the National Emergency No. 911,” IEEE Transactions on Vehicular Technology, vol. VT-28, No. 4, Nov. 1979, pp. 292-297.
Delong, “Making 911 Even Better,” Telephony Integrating Voice and Data Communications, Telephoney, Dec. 1987, 6 pages.
DeNigris et al., “Ehanced 911: Emergency Calling With a Plus,” Bell Laboratories Record, Mar. 1980, 6 pages.
Eckerson, “Users Test Toll-Free Net Access Options,” Management Strategies, Network World, Dec. 1991/Jan. 1992, pp. 17-18.
Ekahau Client 3.0 Build 136 Release Notes, Available at http://replay.waybackmachine.org/20030929003821/http:/www.ekahau.com/products/client, Apr. 14, 2011, 4 pages.
Ekahau, “Why Ekahau Site Survey?,” Available at http://replay.waybackmachine.org/20030801080918/http:/www.ekahau.com/products/sites, Apr. 14, 2011, 1 page.
Ekahau, “Ekahau Site Survey 1.0, Maximize Coverage—Minimize Channel Interference,” Available at http://replay.waybackmachine.org/20030807204446/http:/www.ekahau.com/products/siites, Apr. 14, 2011, 2 pages.
Ekahau, “Technology Overview,” Available at http://replay.waybackmachine.org/2003/20031008125411/http:/www.ekahau.com/products, Apr. 14, 2011, 1 page.
Ekahau, “Technology Review,” Available at http://replay.waybackmachine.org/20031008125411/http:/www.ekahau.com/products, Apr. 14, 2011, 8 pages.
Ellison, “Exploiting and Protecting 802.11b Wireless Networks,” Nov. 2012, 8 pages, available at http://www.extremetech.com/computing/57646-exploiting-and-protecting-80211b-wireless.
Elnahrawy, et al., “Using Area-Based Presentations and Metrics for Localization Systems in Wireless LANs,” Proceedings of the 29th Conference on Local Computer Networks, IEEE, LCN 2004, Tampa, Florida, Nov. 16-18, 2004, 9 pages.
Etter, “A Guide to Wardriving and Detecting Wardrivers,” SANS Institute InfoSec Reading Room, 2002, 16 pages.
Foust, “Identifying and Tracking Unauthorized 802.11 Cards and Access Points,” The Magazine of Usenix & Sage, Aug. 2002, vol. 27, No. 4, 13 pages.
Griswold et al., “ActiveCampus—Sustaining Educational Communities through Mobile Technology.” UCSD CSE Technical Report #CS200-0714, 2002, 19 pages.
Griswold et al., “ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing,” IEEE, Oct. 2004, pp. 73-81.
Fredrickson, “Approximation Algorithms for Some Postman Problems,” Journal of the Association for Computing Machinery, vol. 26, No. 3, Jul. 1979, pp. 538-554.
Harvey et al., “Call Center Solutions,” AT&T Technical Journal, Sep./Oct. 1991, 11 pages.
Hatami et al., “A Comparative Performance Evaluation of RSS-Based Positioning Algorithms Used in WLAN Networks,” 2005 IEEE Wireless Communications and Networking Conference, Mar. 13-17, 2005, New Oreleans, LA, 8 pages.
Hazas, M., et al., “Location-Aware Computing Comes of Age,” IEEE, vol. 37, Feb. 2004, pp. 95-97.
Head, “Intelligent Network: A Distributed System,” IEEE Communications Magazine, Dec. 1988, 5 pages.
Hellebrandt, M., et al., “Estimating Position and Velocity of Mobile in a Cellular Radio Network,” IEEE Transactions on Vehicular Technology, vol. 46, No. 1, Feb. 1997, pp. 65-71.
Henderson et al., “The Changing Usage of a Mature Campus-Wide Wireless Network,” MobiCom '04, Sep. 26-Oct. 1, 2004, 15 pages.
Hightower et al., “A Survey and Taxonomy of Location Systems for Ubiquitous Computing,” Technical Report UW-CSE Jan. 8, 2013, Aug. 2001, 29 pages.
Hightower et al., “Location Sensing Techniques,” IEEE Computer Magazine, Aug. 2001, 8 pages.
Hightower et al., “The Location Stack,” Intel Research Seattle, Dieter Fox, University of Washington, IRS-TR-03-008, Jul. 2003, 13 pages.
Hong et al., “Privacy and Client-Based Discovery of Location,” 10 pages, retrieved at http://www.cs.cmu.edu/jasonh/publications/, Dec. 8, 2003.
Hong et al., “Privacy and Security in the Location-Enhanced World Wide Web,” in Proceedings of the Workshop on Privacy at Ubicomp 2003, Oct. 2003, 5 pages.
Honig, “The Realities of Service Creation on Switching Systems Through Attached Processors,” XIII International Switching Symposium, Session B9, Paper #4, Proceedings vol. VI, May 27-Jun. 1, 1990, 4 pages.
Hunter, “The Sources of Innovation in New Jersey Bell Switching Services,” Master of Science Thesis, Massachusetts Institute of Technology, Sloan School of Management, Jun. 1991, 105 pages.
Hurley, et al. “WarDriving: Drive, Detect, Defend, A Guide to Wireless Security,” Syngress Publishing, Nov. 2012, 3 pages, available at http://net-security.org/review.php?id=144.
International Search Report and Written Opinion of the International Searching Authority, The United States Patent and Trademark Office, for International Application No. PCT/US2011/039717, dated Dec. 20, 2011; 13 pages.
Jin et al., “802.11-based Positioning System for Context Aware Applications,” IEEE, 2003, pp. 929-933.
Kang et al., “Extracting Places from Traces of Locations,” WMASH '04 Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and ervices on WLAN Hotspots, Oct. 2004, pp. 110-118.
Kawabata, K. et al., “Estimating Velocity Using Diversity Reception,” IEEE, 1994, pp. 371-374.
Kent et al., “Position Estimation of Access Points in 802.11 Wireless Networks,” White Paper, Sep. 2003, Lawrence Livermore National Laboratory, Livermore, California, 10 pages.
Kim et al., “Risks of Using AP Locations Discovered through War Driving,” Lecture Notes in Computer Science, vol. 3968, 2006, 15 pages.
Kirsner, S., “One more way to find yourself,” The Boston Globe, May 23, 2005, Retrieved from www.boston.com, 2 pages.
Kirtner, et al., “The Application of Land Use/Land Cover Data to Wirleess Communication System Design,” Proceedings of the ESRI User Conference, 1998, 16 pages.
Komar et al., “Location Tracking and Location Based Service Using IEEE 802.11 WLAN Infrastructure,” European Wireless 2004, Feb. 24-27, 2004, 7 pages.
Krumm et al., “LOCADIO: Inferring Motion and Location from Wi-Fi Signal Strengths,” Mobiquitous 2004, First Annual International Conference on Mobile and Ubiquitous Sytems: Networking and Services, Aug. 22-26, 2004, 10 pages.
Krumm et al., “The NearMe Wireless Proximity Server,” UbiComp 2004, LNCS 3205, pp. 283-300.
Kwan, “Globalstar: Linking the World via Mobile Connections,” IEEE Intl. Symposium on Personal, Indoor & Mobile Radio Communications, pp. 318-223, Sep. 25, 1991.
Kwan, “Graphic Programming Using Odd or Even Points,” Chinese Mathematics, vol. 1, No. 3, 1962, Translation of ACTA Mathematica Sinica, 10, No. 3, 1960, 7 pages.
Lackey et al., “Wireless Intrusion Detection,” Apr. 2003, IBM Global Services, 16 pages, retrieved from www.forum-intrusion.com/wireless—intrusion—detection.pdf.
LaMarca et al., “Place Lab's First Step: A Location-Enhanced Conference Guide,” IEEE Spectrum at 51-54, Dec. 2004, 3 pages.
LaMarca et al., “Place Lab: Bootstrapping Where-ware,” Place Lab, Jul. 23, 2011, 19 pages, retrieved from www.placelab.org.
LaMarca, A., et al., “Place Lab: Device Positioning Using Radio Beacons in the Wild,”; Pervasive Computing, Oct. 2004, pp. 116-133.
LaMarca, A., et al., “Self-Mapping in 802.11 Location Systems,” Ubicomp 2005: Ubiquitous Computing, Aug. 23, 2005, pp. 87-104.
LaMarca, et al., “Finding Yourself,” IEEE Spectrum, Dec. 2004, 3 pages.
Lee, “Wireless Surveying on the Pocket PC,” May 2004, 7 pages, available at http://www.oreillynet.com/Ipt/a/4876.
Leslie, “Rogue Wireless Access Point Detection and Remediation,” Global Information Assurance Certification Paper, Sep. 2004, 15 pages, retrieved from www.giac.org/paper/gsec/4060/rogue-wireless-access-point-detection-remediation/106460.
Letchner et al., “Large-Scale Localization from Wireless Signal Strength,” in Proc. of the National Conference on Artificial Intelligence (AAAI), 2005, 6 pages.
Lorincz, et al., “MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking,” First International Workshop, LoCA 2005, LNCS 3479, Oberpfaffenhofen, Germany, May 12-13, 2005 Proceedings, 21 pages.
Mallinder, “The Final Count-Down to GSM, GSM System Aspects,” 1991 Pan European Digital Cellular Radio Conference, Feb. 5-6, 1991, Acropolis Conference Centre, Nice, France, 12 pages.
Milner, “NetStumbler v0.4.0 Release Notes,” available at http://downloads.netstumbler.com/downloads/netstumbler—v0.4.0—release—notes.pdf, Apr. 18, 2007, 10 pages.
Muthukrishnan, K., et al., “Towards Smart Surroundings: Enabling Techniques and Technologies for Localization,” Lecture Notes in Computer Science, vol. 3479, May 2005, 11 pages.
Myllymaki et al., “Location Aggregation from Multiple Sources,” IBM Almaden Research Center, MDM '02 Proceedings of the Third International Conference on Mobile Data Management, pp. 131-138, IEEE Computer Society Washington, DC, 2002.
Papadimitriou, “On the Complexity of Edge Traversing,” Journal of the Association for Computing Machinery, vol. 23, No. 3, Jul. 1976, pp. 544-554.
Raniwala, et al., “Deployment Issues in Enterprise Wireless LANs,” RPE Report, Sep. 2003, 36 pages.
Robinson et al., “Received Signal Strength Based Location Estimation of a Wireless LAN Client,” 2005 IEEE Wireless Communications and Networking Conference, vol. 4, Mar. 13-17, 2005, New Orleans, LA, 6 pages.
Saha et al., “Location Determination of a Mobile Device Using IEEE 802.11b Access Point Signals,” 2003 IEEE Wireless Communications and Networking, Mar. 16-20, 2003, New Orleans, Louisiana, Conference Record, 7 pages.
Schilit et al., “Challenge: Ubiquitous Location-Aware Computing and the “Place Lab” Initiative,” WMASH '03 Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, Sep. 2003, pp. 29-35.
Schilit, et al., “Bootstrapping the Location-enhanced World Wide Web,” Workshop on Location-Aware Computing (at UbiComp 2003), Seattle, WA, Oct. 2003, 4 pages.
Shih, “Wireless LAN Location System,” A Thesis Submitted for the Degree of Master of Engineering, Nov. 2003, School of Information Technology and Electrical Engineering, The University of Queensland, 98 pages.
Shipley, “802.11b War Driving and LAN Jacking,” DEFCON 9 Conference, Las Vegas, Nevada, USA, Jul. 13-15, 2001, available at http://www.defcon.org/html/links/dc-archives/dc-9-archive.html, last accessed Apr. 13, 2011, video and transcript, 49 pages.
Shipley, “Open WLANs the early results of war Driving,” DEFCON9 Conference 802.11b War Driving Presentation, 39 pages, 2001.
Small et al., “Determining User Location for Context Aware Computing Through the Use of a Wireless LAN Infrastructure,” Dec. 2000, retrieved from http://www.ices.cmu.edu/reports/040201/pdf 8 pages.
Spielman et al., Java and GIS, Part 1: Intro to GIS, Feb. 2004, available at http://today.java.net/pub/a/today/2004/02/16/gis.html, last accessed Apr. 14, 2011, 4 pages.
Spielman et al., Java and GIS, Part 2: Mobile LBS, Apr. 2004, available at http://today.java.net/pub/a/today/2004/04/01/gis.html, last accessed Apr. 14, 2011, 6 pages.
Texas Advisory Commission on Intergovernmental Relations, “Implementing 9-1-1 Systems in Texas: Legal and Institutional Background,” Jun. 1987, 61 pages.
Sterling, et al., The Iridium System—A Revoluntionary Satellite Communications System Developed with Innovative Applications of Technology, IEEE Communications Society, 1991, Milicom '91, pp. 0436-0440.
Stone, “Kismet & GPSdrive: Wireless Network Sniffling with Open Software,” UKUUG Leeds, 2004, 32 pages.
Supplementary European Search Report for European Application No. 07757413, dated Apr. 6, 2010, 10 pages.
Taheri et al., “Location Fingerprinting on Infrastructure 802.11 Wireless Local Area Networks,” Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), Nov. 16-18, 2004, Tampa, Florida, 9 pages.
Terminal Equipment and Protocols for Telematic Services, CCITT, The International Telegraph and Telephone Consultative Committee, International Telecommunication Union, Sep. 1992, 186 pages.
Torrone, “HOW-To Tuesday: War Kayaking,” Nov. 2012, 5 pages, available at www.engadget.com/2004/06/22-how-to-Tuesday-war-kayaking.
Wallace, “Domino's Delivers Using New Call Routing Service,” Network World, vol. 8, No. 32, Aug. 1991, 2 pages.
Wang et al., “Two New Algorithms for Indoor Wireless Positioning System (WPS),” Proceedings of the 17th International Technical Meeting of the Satellite Division of the Institute of Navigation, 2004, 8 pages.
Welch, et al., “A Survey of 802.11a Wireless Security Threats and Security Mechanisms,” A Technical Report to the Army G6, 20 pages, retrieved from www.itsec.gov.cn/docs/20090507161931121853.pdf. Date not available.
Wikipedia, “Delta Encoding,” 5 pages, retrieved from http://en.wikipedia.org/wiKi/Delta-encoding on Dec. 28, 2010.
Related Publications (1)
Number Date Country
20120309420 A1 Dec 2012 US
Provisional Applications (2)
Number Date Country
60654811 Feb 2005 US
60623108 Oct 2004 US
Continuations (1)
Number Date Country
Parent 11359154 Feb 2006 US
Child 13572952 US
Continuation in Parts (1)
Number Date Country
Parent 11261988 Oct 2005 US
Child 11359154 US