Interactive application to protect pet containment systems from external surge damage

Information

  • Patent Grant
  • 11394196
  • Patent Number
    11,394,196
  • Date Filed
    Friday, November 10, 2017
    6 years ago
  • Date Issued
    Tuesday, July 19, 2022
    a year ago
Abstract
A system is described that includes a signal generator, a boundary loop wire, and a disconnect device, wherein the boundary loop wire is positionable at a location to define a boundary of a containment area, wherein the disconnect device is configured to communicatively couple over a network with one or more applications, wherein the one or more applications run on at least one processor. The system includes the signal generator for driving a current through the boundary loop wire. The disconnect device comprises a first component for disconnecting the boundary loop wire from the signal generator. The one or more applications are configured to send the disconnect device an instruction, wherein the instruction comprises disconnecting the boundary loop wire from the signal generator.
Description
CROSS REFERENCE TO RELATED APPLICATIONS

Not applicable.


STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not applicable.


THE NAMES OF THE PARTIES TO A JOINT RESEARCH AGREEMENT

Not applicable.


BACKGROUND OF THE INVENTION

This section is intended to introduce various aspects of the art, which may be associated with exemplary embodiments of the present disclosure. This discussion is believed to assist in providing a framework to facilitate a better understanding of particular aspects of the present disclosure. Accordingly, it should be understood that this section should be read in this light, and not necessarily as admissions of prior art.


Pet containment systems often include a boundary wire which determines a perimeter of a containment area. The boundary wire is generally buried beneath the surface of the ground and establishes a boundary in the form of an electrical field. A transceiver worn by an animal interacts with the electrical field to provide the animal a stimulus to encourage the animal to stay within the containment area. However, lightning may strike the boundary wire. There is a need to protect system components coupled to the boundary wire from lightning strike electrical surges.


FIELD OF THE INVENTION

The present disclosure relates to systems and methods for providing surge protection with respect to pet containment systems comprising a boundary loop wire.





BRIEF DESCRIPTION OF THE DRAWINGS

So that the manner in which the present application can be better understood, certain illustrations and figures are appended hereto. It is to be noted, however, that the drawings illustrate only selected embodiments and elements of systems and methods for providing surge protection with respect to pet containment systems and are therefore not to be considered limiting in scope for the systems and methods for providing surge protection with respect to pet containment systems as described herein may admit to other equally effective embodiments and applications.



FIG. 1 shows an animal containment system, under an embodiment.



FIG. 2 shows a signal generator in communication with a collar unit, under an embodiment.



FIG. 3 shows current flowing through a boundary loop wire, under an embodiment.



FIG. 4A shows components of a lightning strike surge protection system, under an embodiment.



FIG. 4B shows components of a lightning strike surge protection system, under an embodiment.



FIG. 5 shows components of a disconnect device, under an embodiment.





DETAILED DESCRIPTION

A number of systems have been developed to provide means for containing pets within a certain predefined area. An embodiment of an outdoor containment system as further described in U.S. Pat. No. 8,047,161 provides an animal containment system for containing an animal within a boundary, for maximizing the animal's usable area within the boundary, and for not discouraging the animal from returning to within the boundary in the event the animal moves beyond the boundary.


The animal containment system 100 of FIG. 1 includes a signal generator 120, a wire 140, and a collar unit 160. The signal generator 120 is in electrical communication with the wire 140 and in wireless communication with the collar unit 160. The wire 140 defines a boundary, which defines an area within the boundary 180 and an area beyond the boundary 190. In the illustrated embodiment, the wire 140 defines the perimeter of a residential yard such that the perimeter of the yard is the boundary, the yard is the area within the boundary 180, and the area outside the yard is the area beyond the boundary 190. Those skilled in the art will recognize that the wire 140 can define a boundary other than the perimeter of a residential yard without departing from the scope and spirit of the present disclosure. In one embodiment, the wire 140 is buried in the ground such that the wire 140 is not visible from the surface of the ground. The collar unit 160 is carried by the animal. In the illustrated embodiment, the collar unit 160 is mounted to an animal collar and the collar is secured to the animal such that the animal carries the collar unit 160. Those skilled in the art will recognize that the collar unit 160 can be carried by the animal by ways other than an animal collar without departing from the scope or spirit of the present disclosure.



FIG. 2 is a block diagram of one embodiment of the animal containment system 100 in accordance with the various features of the present embodiment. In the illustrated embodiment, the signal generator 120 includes a signal generator processor 232 and a modulator 234, whereby the signal generator processor 232 is in electrical communication with the modulator 234. The signal generator processor 232 generates a digital activation signal 222 which may be modulated by, modulator 234.


After modulating the activation signal 222, the signal generator 120 wirelessly transmits the activation signal 222 by way of the wire 140. More specifically, the signal generator 120 drives current through the wire 140 such that the activation signal 222 radiates from the wire 140 in the form of a magnetic field. In the illustrated embodiment of FIG. 1, the signal generator 120 drives current through the wire 140 in the direction indicated by the arrow at 130. FIG. 3 illustrates a cross-sectional view of the wire 140 whereby the direction of current in the wire is into the page. Because the direction of the current driven through the wire 140 is into the page, the resulting magnetic field rotates about the wire 140 in the direction indicated by the arrow at 310. Consequently, the polarity of the activation signal 222 within the boundary 180 is substantially opposite the polarity of the activation signal 222 beyond the boundary 190. It should be noted that an alternating circuit power source may drive periodic carrier cycles onto the line. However, the receiver may detect the polarity of a first carrier wave (with positive direction) of each modulated section. Therefore, FIG. 3 shows a single direction uniform field with a polarity within the boundary substantially opposite the polarity outside the boundary.


Under another embodiment of a containment system, a wire is laid out on the ground or buried a short distance beneath the surface of the ground along a perimeter of a boundary area. The boundary wire may then be connected to a transmitter system (signal generator). Under an embodiment, the transmitter system (signal generator) sets up an electrical field in the wire which determines the boundary of the unit. The pet wears a collar which includes a receiver and a stimulus system for providing a stimulus to the pet when the pet moves too close to the wire. Under an embodiment, the collar contains two stimuli applications, one to provide an audio warning to tell the pet that it is approaching the boundary and another to apply a stimulus to further warn the pet that it is too close to the boundary.


Another example of a pet containment system may be found in U.S. Pat. No. 3,753,421 issued on Aug. 21, 1973 to Peck. Each US patent or patent application publication referenced in this application is incorporated herein by reference as if set forth herein in its entirety.


Pet containment systems may be damaged due to incoming surges on the loop wire attributable to lightning strikes. These surges may cause failure of containment system components. Lightning strikes may also generate transient voltages on a home's electrical system causing damage to other electrical devices. In rare circumstances, electrical surges may cause a structure to catch fire.


Lightning discharge devices, or lightning arrestors, may be placed to mitigate surge damage to pet containment system components and in home electrical devices. These discharge devices work for a majority of surges entering the containment system transmitter via the loop wire. However, discharge devices require time to react and may only handle so much current. What is needed are systems, methods and/or devices that monitor the movement of electrical storms or electrical storm activity in a specific area in order to anticipate potential electrical strikes. These protective systems, methods and/or devices may disconnect the loop wire from the pet containment transmitter when an imminent strike is expected.


An electronic pet containment transmitter system comprises a signal generator (control panel), power supply and a boundary loop wire. The signal generator is under one embodiment connected to the boundary loop wire. The signal generator provides an encoded electrical current to the boundary loop wire that is buried along the perimeter of a boundary area. The signal generator that provides current to the boundary loop wire also receives current from the boundary loop wire generated by transient surges from nearby lightning strikes. The signal generator utilizes under an embodiment various components on-board to dissipate low current surges that reach the signal generator circuit. Additionally, an external lightning arrestor may be used to divert surge current entering the signal generator via the boundary loop wire. Although effective, the boundary loop wire remains physically connected to the signal generator leaving the possibility that high current surges may cause damage to all inline components.


In order to further mitigate damage to the signal generator and/or lightning arrestor, the boundary loop wire is under an embodiment electrically disconnected from all components in the containment system. This decoupling requires under one embodiment an additional disconnect device 412, 418 wired along the boundary loop 420 between the signal generator 408 and the lightning arrestor 416 or between the boundary loop 420 and the lightning arrestor 416 as shown in FIG. 4B. Note that FIG. 4B shows disconnect device 412, 418 in two location. Such disconnect device 412, 418 may be in location 412 or location 418 but not both. The remaining disclosure refers to both disconnect devices 412, 418 together as a matter of convenience.


The disconnect device functions under an embodiment to keep electrical surges away from the sensitive components of the signal generator.


A disconnect device may include some or all of the following components and/or features.

    • a communicative coupling via cabling or RE communication to a network that provides a signal triggering a disconnect;
    • a high voltage relay to disconnect the boundary loop wire from the signal generator;
    • a second relay to close the open boundary loop circuit to defeat the signal generator's wire break alert; a high voltage relay disconnects the boundary loop wire and a second small signal relay bridges the loop wires at the disconnect device to defeat the signal generator's break alert.
    • electrical coupling between the disconnect device and battery backup 410 in the event of a power loss situation;
    • onboard or tethered lightning sensor (similar to AS3935 Franklin Lightning Sensor by Austria Microsystems) as a backup lighting indicator in the event of power loss or ineffective control data provided by a custom software application (as further described below); and a
    • power source comprising a transmitter's battery backup (BBU) 410, i.e. the disconnect device is powered by the battery backup (BBU) in the event of power loss.



FIG. 4B shows a signal generator 408 that is coupled to a boundary loop wire 420 under one embodiment. The signal generator 408 of an embodiment is connected to a power supply 414. The power supply 414 may comprise a standard 120 volt 60 Hz supply. The signal generator 408 is connected to a battery backup 410 in the event of a power loss situation. The battery backup 410 may under one embodiment be recharged through the signal generator powered by primary power source 414. The signal generator 408 may be directly connected or coupled to a lightning arrestor 416 (depending on location of disconnect device). As already described above, a lightning arrestor 416 may mitigate surge damage to pet containment system components and in home electrical devices. These discharge devices work for a majority of surges entering the containment system transmitter via the loop wire. However, discharge devices require time to react and may only handle so much current.


A disconnect device 412, 418 provides an additional layer of protection. FIG. 4B shows a disconnect device 412, 418 placed either (i) between signal generator 408 and lightning arrestor 416 or (ii) between lightning arrestor 416 and boundary loop wire 420. In either case, the disconnect device operates to decouple the boundary loop wire and the signal generator. The disconnect device comprises a first high voltage relay to disconnect the boundary loop wire from the signal generator. The disconnect device comprises a second relay to close the open boundary loop circuit to defeat the signal generator's wire break alert. In other words, the first relay performs the disconnect while the second relay bridges the loop wires at the disconnect device. Under an embodiment, the second relay provides an electrical pathway between loop wire terminals of a disconnect device. In other words, the second relay “fools” the signal generator into believing that the boundary loop wire is operational thereby defeating the signal generator's wire break alert.



FIG. 5 shows the components of disconnect device 540 under an embodiment. FIG. 5 shows that current flows from signal generator 510 through disconnect device 540 and to boundary loop 516. A high voltage relay 512 of disconnect device 540 operates to disconnect the loop wire 516 from signal generator 510. Another small signal relay 514 of the disconnect device 540 then operates to close the open boundary loop circuit to defeat the signal generator's break alert.



FIGS. 4A and 4B show that a disconnect device 412, 418 is communicatively coupled with computer 404, hub 402, and router 406 via network 422. The network 422 may comprise one or more of a Wired Local Area Network (LAN), a Wireless Local Area Network (WLAN), or a Wireless Personal Area Network (\WAN). FIG. 4A shows a computer 404 communicatively coupled with router 406 and hub 402 through network 422. The local router 406 is further coupled to the internet providing internet connectivity to both the router 406, hub 402, computer 404, and disconnect device 412, 418.


The network 422 shown in FIGS. 4A and 4B may comprise a wired Local Area Network under one embodiment. A network is any collection of independent computers that exchange information with each other over a shared communication medium. Local Area Networks or LANs are usually confined to a limited geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but can often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.


Ethernet is the most popular physical layer LAN technology in use today. It defines the number of conductors that are required for a connection, the performance thresholds that can be expected, and provides the framework for data transmission. A standard Ethernet network can transmit data at a rate up to 10 Megabits per second (10 Mbps). Other LAN types include Token Ring, Fast Ethernet, Gigabit Ethernet, 10 Gigabit Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk.


Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today.


The Institute for Electrical and Electronic Engineers developed an Ethernet standard known as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network and also specifies how the elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.


The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet networks that need higher transmission speeds. This standard raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only minimal changes to the existing cable structure. Fast Ethernet provides faster throughput for video, multimedia, graphics, Internet surfing and stronger error detection and correction.


There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable; 100BASE-FX for use with fiber-optic cable; and 100BASE-T4 which utilizes an extra two wires for use with level 3 MP cable. The 100BASE-TX standard has become the most popular due to its close compatibility with the 10BASE-T Ethernet standard.


Gigabit Ethernet was developed to meet the need for faster communication networks with applications such as multimedia and Voice over IP (VoIP). Also known as “gigabit-Ethernet-over-copper” or 1000Base-T, GigE is a version of Ethernet that runs at speeds 10 times faster than 1009Base-T. It is defined in the IEEE 802.3 standard and is currently used as an enterprise backbone. Existing Ethernet LANs with 10 and 100 Mbps cards can feed into a Gigabit Ethernet backbone to interconnect high performance switches, routers and servers.


From the data link layer of the OSI model upward, the look and implementation of Gigabit Ethernet is identical to that of Ethernet. The most important differences between Gigabit Ethernet and Fast Ethernet include the additional support of full duplex operation in the MAC layer and the data rates.


An Ethernet system may use either a twisted copper-pair or coaxial-based transport system. The most commonly used cable for Ethernet is a category 5 unshielded twisted pair (UTP) cable. Alternatively, a wired network may simply uses existing phone wiring existing in most homes to connect multiple computers and devices. In addition coaxial cable may be used as the underlying network transport medium.


10 Gigabit Ethernet is the fastest and most recent of the Ethernet standards. IEEE 802.3ae defines a version of Ethernet with a nominal rate of 10 Gbits/s that makes it 10 times faster than Gigabit Ethernet. Unlike other Ethernet systems, 10 Gigabit Ethernet is based entirely on the use of optical fiber connections. This developing standard is moving away from a LAN design that broadcasts to all nodes, toward a system which includes some elements of wide area routing. As it is still very new, which of the standards will gain commercial acceptance has yet to be determined.


The network 422 shown in FIGS. 4A and 4B may comprise a wireless Local Area Network under one embodiment. The WLAN enables communications among networked components using Wi-Fi protocols. Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz Ultra High Frequency (UHF) and 5 gigahertz Super High Frequency (SHF) ISM radio bands.


The Wi-Fi Alliance defines Wi-Fi as any wireless local area network (WLAN) product based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards. However, the term “Wi-Fi” is used in general English as a synonym for “WLAN” since most modern WLANs are based on these standards. “Wi-Fi” is a trademark of the Wi-Fi Alliance. The “Wi-Fi Certified” trademark can only be used by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing.


Many devices can use Wi-Fi, e.g. personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. These can connect to a network resource such as the Internet via a wireless network access point (e.g. wireless router). Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometers achieved by using multiple overlapping access points.


Wi-Fi can be less secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical connection. Web pages that use Transport Layer Security (TLS) are secure, but unencrypted internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) were added later.


The network 422 shown in FIGS. 4A and 4B may comprise a personal area network or wireless personal area network under one embodiment. A personal area network (PAN) is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).


A wireless personal area network (WPAN) is a personal area network—a network for interconnecting devices centered on an individual person's workspace—in which the connections are wireless. Wireless PAN is based on the standard IEEE 802.15. One type of wireless technology used for WPAN is Bluetooth. Bluetooth uses short-range radio waves over distances up to approximately 10 meters. For example, Bluetooth devices such as a keyboards, pointing devices, audio head sets, printers, and embedded microcontrollers may connect to personal digital assistants (PDAs), smart phones, routers, or computers wirelessly. Further, a WPAN may also enable communications among networked components using Wireless USB, Zigbee or Z-Wave communication protocols.


As already indicated above, FIGS. 4A and 4B show that the disconnect device 412, 418 is communicatively coupled with computer 404, hub 402, and router 406 via network 422. The network 422 may comprise one or more of a Wired Local Area Network (LAN), a Wireless Local Area Network (WLAN), or a Wireless Personal Area Network (WPAN). FIG. 4A shows a computer 404 communicatively coupled with router 406 and hub 402 through network 422. The local router 406 is further coupled to the internet providing internet and/or general network connectivity to both the router 406, hub 402, computer 404, and disconnect device 412, 418.


Under one embodiment, the network may provide communicative pathways to the signal generator 408 and/or lightning sensor 416. Accordingly, the signal generator and/or lightning sensor may then communicatively couple with computer 404, hub 402, and router 406 via network 422. FIG. 4A shows a computer 404 communicatively coupled with router 406 and hub 402 through network 422. The local router 406 is further coupled to the internet providing internet and/or general network connectivity to the signal generator 408 and/or lightning sensor 416.


It should also be noted that any combination of the computer 404, router 406, hub 402, disconnect device 412, 418, signal generator 408, lightning arrestor 416, and/or remote servers (communicatively coupled with any of the aforementioned components) may communicatively couple through other networking pathways including global positioning systems and cellular networks.


The lightning strike surge protection systems and methods described herein comprise at least one application for monitoring local weather conditions. As one example, a weather monitoring application may run on at least one processor of the computer 404 shown in FIG. 4A. The weather monitoring application may be designed to monitor available internet weather services and use custom algorithms to track and predict electric storm activity in a specific area. A control application running on at least one processor of the hub 402 shown in FIG. 4A may under an embodiment receive information processed by the weather monitoring application. Further, the hub device 402 may communicate with a lightning disconnect device 412, 418 through one or more of the wired/wireless network technologies described above. The weather monitoring application may initiate a triggering of the lightning disconnect device when storm activity is within any specific radius from a property (two, three, four miles, etc.) comprising the protected pet containment system. Under an embodiment, the control application receives a disconnect command from the weather monitoring application and communicates a disconnect command to the disconnect device. The disconnect device then decouples the boundary loop wire from the transmitter.


It should be noted that the weather application and control application may run on any combination of computer 404, hub 402 and/or remote servers communicatively coupled to computer 404 and hub 402. Further, the weather application and control application may comprise a single or multiple application(s) running a computer 404, a hub 402 and/or a remote server(s) communicatively coupled to computer 404 and hub 402. In any such case, the weather application and/or control application may communicate with an application running on a customer's mobile computing device to send and receive information to and from a customer.


Occurrences of a disconnect may depend upon timeframes. One example of a specific timeframe disconnect might include a disconnect during summer months versus winter months when ice may form over bodies of water. A boundary loop wire may surround bodies of water to protect an animal from venturing out onto dangerous ice layers during the winter months.


The weather monitoring application described above may make use of weather APIs:


USPLN™ (United States Precision Lightning Network) and NAPLN™ (North American Precision Lightning Network) real-time data are delivered within 1 minute or less from lightning detection, with near real-time options such as 5-minute or 15-minute files. Internet delivery protocols include direct socket connection, HTTP, LDM and FTP. Coverage areas can be as small as 25-mile radius areas to complete regional coverage, such as the US, Canada and Gulf of Mexico. Data content generally consists of the following elements: Date and time (UTC); Latitude and longitude (decimal degrees); Peak amplitude current estimates with polarity for cloud-to-ground events (0 value for cloud lightning); Error ellipse information.


Vaisala Global Lightning Dataset GLD360 is a service that provides real-time lightning data for accurate and early detection and tracking of severe weather. The data provided is generated by a Vaisala owned and operated world wide network. The service detects and reports lightning as it happens. The services provides real-time global lightning coverage.


There are other services for monitoring weather in general that may be leveraged, like OpenWeatherMap and Weather Underground.


The weather monitoring application described above may also make use of other weather APIs such as BloomSky, CliMate, Metwit, Wezzoo, Weathermob, StormTag/WeatherSignal, etc. to monitor local weather and environmental conditions.


BloomSky—as the “world's first smart weather camera,” BloomSky is a weather probe that consumers can place in a yard or on a roof that captures hyperlocal weather conditions data. The goal of BloomSky is to build a crowdsourced meteorological network that provides real-time weather monitoring and weather data to consumers.


CliMate—CliMate comprises a Bluetooth-enabled environment tracker that measures humidity, temperature and UVI. The data is synced to a consumer's smartphone, and each piece of data is used to power WeatherBook, a crowdsourced, real-time weather map.


Metwit—Metwit comprises a crowdsourced API platform that provides local weather and environmental data to third-party applications. Metwit collects weather information from Twitter, Instagram, the National Oceanic and Atmospheric Administration and other sources.


Wezzoo—Wezzoo comprises a crowdsourced weather app available on Android and iOS. Users can share local weather observations and access real-time weather maps from around the world.


Weathermob—Weathermob comprises a large community-based weather service that captures real-time weather data via mobile, social and meteorological data sources. Weathermob is only available on iOS.


StormTag/WeatherSignal—StormTag and WeatherSignal are weather-based projects created by OpenSignal. StormTag is a Bluetooth weather station that attaches to a keychain. The weather data collected by the device is sent to the WeatherSignal app and OpenSignal servers.


As described above, the weather monitoring application may be designed to monitor available internet weather services and use custom algorithms to track and predict electrical storm activity in a specific area. The application may receive real time information from a real-time lighting data service and track whether a storm is approaching a containment system of a service customer. In that case the application may either send a signal to the disconnect device to disconnect the loop wire or notify the customer of the events and ask whether or not to disable the system. The application may receive information from real time weather services regarding electrical storms in the areas where service systems are installed and use this data to make a better decision on whether or not to disconnect a system. The algorithm comprises an adjustable threshold regarding the strike distance and path for disconnecting the system. The parameters that the algorithm may use would be location based with the ability to track the lightning strike movement towards and away from the system. Typically the storm activity would trigger a disconnect at 1.5 to 2 miles from the containment installation. If the peak amplitude measurements are above a predefined threshold the triggered disconnect could occur at increasingly greater distances since lightning ground currents can travel several miles from the lightning strike point. The greater the amplitude the farther the ground currents can travel.


An onboard or tethered lightning sensor incorporated into a disconnect device may detect electrical emissions from lightning activity and provide distance estimations. The lightning sensor may comprise a device similar to the AS3935 Franklin Lightning Sensor. An algorithm of the weather monitoring application may use such distance estimations in additional to local weather data to track an inbound electrical storm to, over and away from the protected property. Under an alternative embodiment, the lightning sensor operates independently of the weather monitoring application.


The AS3935 generates an assessment of the estimated distance to the head of an approaching storm. This assessment is done based on statistical calculation. The energy of the single event (lightning) provided by an Energy Calculation block is stored in an internal memory, together with timing information, in the AS3935. The events stored in the memory are then correlated with a look-up table by the statistical distance estimation block, which provides a final estimation of the distance to the head of the storm. The estimated distance is directly represented in km with a range of 10 to 40 km. The disconnect device would be pre-programmed to disconnect the boundary wire from the signal generator at a specific detection distance and reconnect after the AS3935 determined that the storm had passed. A reasonable disconnect/reconnect distance would be in the 2.5 to 3.5 km range.


An analog front end AFE of the sensor amplifies and demodulates signals picked up by the antenna. A lightning algorithm block is activated in the event any activities are detected at the antenna. As this happens the output signal of the AFE is evaluated by a Signal Validation block, which checks the pattern of the received signal. The signal validation checks the shape of the received signal. In particular, the AS3935 may reject impulse signals, like spikes, picked up by the antenna. If the received signal is classified as lightning, the energy is calculated. The result of the energy calculation is then stored.


As indicated above, the AS3935 generates an assessment of the estimated distance to the head of an approaching storm. This assessment is done based on statistical calculation. The energy of the single event (lightning) provided by the Energy Calculation block is stored in an internal memory, together with timing information, in the AS3935. The events stored in the memory are then correlated with a look-up table by the statistical distance estimation block, which provides a final estimation of the distance to the head of the storm.


A lightning disconnect device (as shown by FIG. 4B in either location 412 or 418) may be set to trigger as the storm is within a first set range and reset as the storm is sensed beyond a second set range. The second set range may be the same or different from the first set range. A timer, user selected, may also be set as each surge is sensed. This may under an embodiment allow the lightning disconnect device to reset in the event surges are not detected after the storm has passed, i.e. after a duration of time passes after the detected surge.


In the event a loop disconnect occurs, the owner of the system may under one embodiment be automatically notified via email, text message or other electronic means. This is extremely important since the boundary loop wire will be disconnected and no signal field will be present at the boundary. This can result in an animal going beyond the set boundary and being injured.


The systems and methods discussed herein may operate in an automatic mode (i.e. the electrical storm is detected and the disconnect device engages) or manual mode (i.e. an alert is sent to the customer who then decides to manually disconnect the system through a mobile device application or text reply).


A system is described that comprises under one embodiment a signal generator, a boundary loop wire, and a disconnect device, wherein the boundary loop wire is positionable at a location to define a boundary of a containment area, wherein the disconnect device is configured to communicatively couple over a network with one or more applications, wherein the one or more applications run on at least one processor. The system includes the signal generator for driving a current through the boundary loop wire. The system includes the disconnect device comprising a first component for disconnecting the boundary loop wire from the signal generator. The system includes the one or more applications configured to send the disconnect device an instruction, wherein the instruction comprises disconnecting the boundary loop wire from the signal generator.


The network of an embodiment couples with at least one device that provides internet connectivity to the network.


The network of an embodiment comprises at least one of a Wired Local Area Network (LAN), a Wireless Local Area Network (WLAN), and a Wireless Personal Area Network (WPAN).


The first component of an embodiment comprises a high voltage relay.


The power source terminals of the signal generator are connected to the boundary loop wire, under an embodiment.


The disconnecting the boundary loop wire from the signal generator creates an open loop between the power source terminals, under an embodiment.


The disconnect device of an embodiment comprises a second component for closing the open loop between the power source terminals to prevent a disconnect alarm of the signal generator from reporting the open loop.


The second component of an embodiment comprises a small signal relay.


The sending the instruction including sending the instruction in response to an occurrence of an event, under an embodiment.


The one or more applications of an embodiment receive real time weather data over the network.


The real time weather data of an embodiment comprises information of weather activity in a geographic region, wherein the geographic region includes the location.


The information of an embodiment includes a strike location of at least one first lightning strike.


The information of an embodiment includes peak current amplitude of at the least one first lightning strike.


The occurrence of the event comprises under an embodiment the strike location occurring within a first distance.


The occurrence of the event comprises under an embodiment the peak current amplitude exceeding a first value.


The sending the instruction comprises under an embodiment the one or more applications automatically sending the instruction in response to the occurrence of the event.


The sending the instruction comprises under an embodiment the one or more applications automatically providing a notification over the network to a mobile application running on a processor of a mobile computing device, wherein the notification informs a user of the occurrence of the event.


The sending the instruction comprises under an embodiment the one or more applications receiving an indication from the mobile application to send the instruction.


The system comprises a battery backup, under an embodiment.


The signal generator of an embodiment is configured to connect to a battery backup for power supply in the event of a power outage.


The disconnect device of an embodiment is configured to connect to the battery backup for power supply in the event of a power outage.


The disconnect device of an embodiment includes a lightning sensor.


The lightning sensor of an embodiment is configured to connect to the battery backup, wherein the lightning sensor is configured to detect at least one second lightning strike in the event of a power outage.


The lightning sensor of an embodiment is configured to send the instruction, wherein the sending the instruction includes automatically sending the instruction in response to the detecting the at least one second lightning strike within a second distance from the location.


The detecting includes the lightning sensor receiving information of the at least one second lightning strike and using the information to confirm that the at least one second lightning strike comprises lightning strike activity, under an embodiment.


The detecting includes the lightning sensor estimating the distance of the at least one second lightning strike from the location, under an embodiment.


The estimating includes detecting energy of the at least one second lightning strike, under an embodiment


The estimating including correlating the detected energy with lookup table data, under an embodiment.


Computer networks suitable for use with the embodiments described herein include local area networks (LAN), wide area networks (WAN), Internet, or other connection services and network variations such as the world wide web, the public internet, a private internet, a private computer network, a public network, a mobile network, a cellular network, a value-added network, and the like. Computing devices coupled or connected to the network may be any microprocessor controlled device that permits access to the network, including terminal devices, such as personal computers, workstations, servers, mini computers, main-frame computers, laptop computers, mobile computers, palm top computers, hand held computers, mobile phones, TV set-top boxes, or combinations thereof. The computer network may include one of more LANs, WANs, Internets, and computers. The computers may serve as servers, clients, or a combination thereof.


The systems and methods for providing lightning strike surge protection can be a component of a single system, multiple systems, and/or geographically separate systems. The systems and methods for providing lightning strike surge protection can also be a subcomponent or subsystem of a single system, multiple systems, and/or geographically separate systems. The components of systems and methods for providing lightning strike surge protection can be coupled to one or more other components (not shown) of a host system or a system coupled to the host system.


One or more components of the systems and methods for providing lightning strike surge protection and/or a corresponding interface, system or application to which the systems and methods for providing lightning strike surge protection is coupled or connected includes and/or runs under and/or in association with a processing system. The processing system includes any collection of processor-based devices or computing devices operating together, or components of processing systems or devices, as is known in the art. For example, the processing system can include one or more of a portable computer, portable communication device operating in a communication network, and/or a network server. The portable computer can be any of a number and/or combination of devices selected from among personal computers, personal digital assistants, portable computing devices, and portable communication devices, but is not so limited. The processing system can include components within a larger computer system.


The processing system of an embodiment includes at least one processor and at least one memory device or subsystem. The processing system can also include or be coupled to at least one database. The term “processor” as generally used herein refers to any logic processing unit, such as one or more central processing units (CPUs), digital signal processors (DSPs), application-specific integrated circuits (ASIC), etc. The processor and memory can be monolithically integrated onto a single chip, distributed among a number of chips or components, and/or provided by some combination of algorithms. The methods described herein can be implemented in one or more of software algorithm(s), programs, firmware, hardware, components, circuitry, in any combination.


The components of any system that include the systems and methods for providing lightning strike surge protection can be located together or in separate locations. Communication paths couple the components and include any medium for communicating or transferring files among the components. The communication paths include wireless connections, wired connections, and hybrid wireless/wired connections. The communication paths also include couplings or connections to networks including local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), proprietary networks, interoffice or backend networks, and the Internet. Furthermore, the communication paths include removable fixed mediums like floppy disks, hard disk drives, and CD-ROM disks, as well as flash RAM, Universal Serial Bus (USB) connections, RS-232 connections, telephone lines, buses, and electronic mail messages.


Aspects of the systems and methods for providing lightning strike surge protection and corresponding systems and methods described herein may be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (PLDs), such as field programmable gate arrays (FPGAs), programmable array logic (PAL) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits (ASICs). Some other possibilities for implementing aspects of the systems and methods for providing lightning strike surge protection and corresponding systems and methods include: microcontrollers with memory (such as electronically erasable programmable read only memory (EEPROM)), embedded microprocessors, firmware, software, etc. Furthermore, aspects of the systems and methods for providing lightning strike surge protection and corresponding systems and methods may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. Of course the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (MOSFET) technologies like complementary metal-oxide semiconductor (CMOS), bipolar technologies like emitter-coupled logic (ECL), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, etc.


It should be noted that any system, method, and/or other components disclosed herein may be described using computer aided design tools and expressed (or represented), as data and/or instructions embodied in various computer-readable media, in terms of their behavioral, register transfer, logic component, transistor, layout geometries, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof. Examples of transfers of such formatted data and/or instructions by carrier waves include, but are not limited to, transfers (uploads, downloads, e-mail, etc.) over the Internet and/or other computer networks via one or more data transfer protocols (e.g., HTTP, FTP, SMTP, etc.). When received within a computer system via one or more computer-readable media, such data and/or instruction-based expressions of the above described components may be processed by a processing entity (e.g., one or more processors) within the computer system in conjunction with execution of one or more other computer programs.


Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.


The above description of embodiments of the systems and methods for providing lightning strike surge protection and corresponding systems and methods is not intended to be exhaustive or to limit the systems and methods to the precise forms disclosed. While specific embodiments of, and examples for, the systems and methods for providing lightning strike surge protection and corresponding systems and methods are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the systems and methods, as those skilled in the relevant art will recognize. The teachings of the systems and methods for providing lightning strike surge protection and corresponding systems and methods provided herein can be applied to other systems and methods, not only for the systems and methods described above.


The elements and acts of the various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the systems and methods for providing lightning strike surge protection and corresponding systems and methods in light of the above detailed description.


It is understood that the systems and methods for providing lightning strike surge protection described herein are merely illustrative. Other arrangements may be employed in accordance the embodiments set forth below. Further, variations of the systems and methods for providing lightning strike surge protection described herein may comply with the spirit of the embodiments set forth herein.

Claims
  • 1. A system comprising, a signal generator, a boundary loop wire, and a disconnect device, wherein the boundary loop wire is positionable at a location to define a boundary of a containment area, wherein the disconnect device is configured to communicatively couple over a network with one or more applications, wherein the one or more applications run on at least one processor, wherein the one or more applications receive real time weather information from a remote source through the network;the signal generator for driving a current through the boundary loop wire;the disconnect device comprising a first component for disconnecting the boundary loop wire from the signal generator, wherein the disconnecting comprises operation of the first component in preventing flow of current through the boundary loop wire;the one or more applications configured to monitor the real time weather information and to send the disconnect device an instruction in response to an occurrence of a lightning strike within a first distance of the location, wherein the real time weather information indicates the occurrence of the lightning strike, wherein the one or more applications are configured to adjust the first distance based on an electrical characteristic of the lightning strike, wherein the instruction comprises a direction to disconnect the boundary loop wire from the signal generator.
  • 2. The system of claim 1, wherein the network couples with at least one device that provides internet connectivity to the network.
  • 3. The system of claim 2, wherein the network comprises at least one of a Wired Local Area Network (LAN), a Wireless Local Area Network (WLAN), and a Wireless Personal Area Network (WPAN).
  • 4. The system of claim 1, wherein the first component comprises a high voltage relay.
  • 5. The system of claim 1, wherein power source terminals of the signal generator are connected to the boundary loop wire.
  • 6. The system of claim 5, wherein the disconnecting the boundary loop wire from the signal generator creates an open loop between the power source terminals.
  • 7. The system of claim 6, wherein the disconnect device comprises a second component for closing the open loop between the power source terminals to prevent a disconnect alarm of the signal generator from reporting the open loop.
  • 8. The system of claim 7, wherein the second component comprises a small signal relay.
  • 9. The system of claim 1, wherein the real time weather information comprises information of weather activity in a geographic region, wherein the geographic region includes the location.
  • 10. The system of claim 9, wherein the real time weather information includes a strike location of a strike.
  • 11. The system of claim 10, the occurrence of the lightning strike within the first distance comprising the corresponding strike location located within the first distance.
  • 12. The system of claim 10, wherein the real time weather information includes peak current amplitude of the lightning strike, wherein the electrical characteristic comprises the peak current amplitude.
  • 13. The system of claim 12, the adjusting the first distance comprising increasing the first distance when the peak current amplitude exceeds a first value.
  • 14. The system of claim 1, the sending the instruction comprising the one or more applications automatically providing a notification over the network to a mobile application running on a processor of a mobile computing device, wherein the notification informs a user of the occurrence of the lightning strike.
  • 15. The system of claim 14, the sending the instruction comprising the one or more applications receiving an indication from the mobile application to send the instruction.
  • 16. The system of claim 1, comprising a battery backup.
  • 17. The system of claim 16, wherein the signal generator is configured to connect to a battery backup for power supply in the event of a power outage.
  • 18. The system of claim 16, wherein the disconnect device is configured to connect to the battery backup for power supply in the event of a power outage.
  • 19. The system of claim 16, wherein the disconnect device includes a lightning sensor.
  • 20. The system of claim 19, wherein the lightning sensor is configured to connect to the battery backup, wherein the lightning sensor is configured to detect the occurrence of a lightning strike in the event of a power outage.
  • 21. The system of claim 20, wherein the lightning sensor is configured to send the instruction, wherein the sending the instruction includes automatically sending the instruction in response to the detecting the lightning strike within the first distance from the location.
  • 22. The system of claim 21, the detecting including the lightning sensor receiving information of the lightning strike and using the information to confirm that the lightning strike comprises lightning strike activity.
  • 23. The system of claim 22, the detecting including the lightning sensor estimating the distance of the lightning strike from the location.
  • 24. The system of claim 23, the estimating including detecting energy of the lightning strike.
  • 25. The system of claim 24, the estimating including correlating the detected energy with lookup table data.
US Referenced Citations (430)
Number Name Date Kind
2364994 Moore Dec 1944 A
2741224 Putnam Apr 1956 A
3182211 Maratuech May 1965 A
3184730 Irish May 1965 A
3500373 Arthur Mar 1970 A
3735757 Mac Farland May 1973 A
4180013 Smith Dec 1979 A
4426884 Polchaninoff Jan 1984 A
4783646 Matsuzaki Nov 1988 A
4794402 Gonda et al. Dec 1988 A
4802482 Gonda et al. Feb 1989 A
4947795 Farkas Aug 1990 A
4969418 Jones Nov 1990 A
5054428 Farkus Oct 1991 A
5159580 Andersen et al. Oct 1992 A
5161485 Mcdade Nov 1992 A
5182032 Dickie et al. Jan 1993 A
5207178 Mcdade et al. May 1993 A
5207179 Arthur et al. May 1993 A
5471954 Gonda et al. Dec 1995 A
5526006 Akahane et al. Jun 1996 A
5559498 Westrick et al. Sep 1996 A
5576972 Harrison Nov 1996 A
5586521 Kelley Dec 1996 A
5601054 So Feb 1997 A
5642690 Calabrese et al. Jul 1997 A
5749324 Moore May 1998 A
5794569 Titus et al. Aug 1998 A
5810747 Brudny et al. Sep 1998 A
5815077 Christiansen Sep 1998 A
5844489 Yarnall, Jr. et al. Dec 1998 A
5857433 Files Jan 1999 A
5870029 Otto et al. Feb 1999 A
5872516 Bonge, Jr. Feb 1999 A
5886669 Kita Mar 1999 A
5913284 Van Curen et al. Jun 1999 A
5923254 Brune Jul 1999 A
5927233 Mainini et al. Jul 1999 A
5933079 Frink Aug 1999 A
5934225 Williams Aug 1999 A
5949350 Girard et al. Sep 1999 A
5957983 Tominaga Sep 1999 A
5982291 Williams et al. Nov 1999 A
6016100 Boyd et al. Jan 2000 A
6019066 Taylor Feb 2000 A
6028531 Wanderlich Feb 2000 A
6047664 Lyerly Apr 2000 A
6067018 Skelton et al. May 2000 A
6075443 Schepps et al. Jun 2000 A
6166643 Janning Dec 2000 A
6170439 Duncan et al. Jan 2001 B1
6184790 Gerig Feb 2001 B1
6196990 Zicherman Mar 2001 B1
6204762 Dering et al. Mar 2001 B1
6215314 Frankewich, Jr. Apr 2001 B1
6230031 Barber May 2001 B1
6230661 Yarnall, Jr. et al. May 2001 B1
6232880 Anderson et al. May 2001 B1
6271757 Touchton et al. Aug 2001 B1
6297766 Koeller Oct 2001 B1
6327999 Gerig Dec 2001 B1
6353390 Beri et al. Mar 2002 B1
6360697 Williams Mar 2002 B1
6360698 Stapelfeld et al. Mar 2002 B1
6404338 Koslar Jun 2002 B1
6415742 Lee et al. Jul 2002 B1
6426464 Spellman et al. Jul 2002 B1
6427079 Schneider et al. Jul 2002 B1
6431121 Mainini et al. Aug 2002 B1
6431122 Westrick et al. Aug 2002 B1
6441778 Durst et al. Aug 2002 B1
6459378 Gerig Oct 2002 B2
6487992 Hollis Dec 2002 B1
6561137 Oakman May 2003 B2
6581546 Dalland et al. Jun 2003 B1
6588376 Groh Jul 2003 B1
6598563 Kim et al. Jul 2003 B2
6600422 Barry et al. Jul 2003 B2
6637376 Lee et al. Oct 2003 B2
6657544 Barry et al. Dec 2003 B2
6668760 Groh et al. Dec 2003 B2
6700492 Touchton et al. Mar 2004 B2
6747555 Fellenstein et al. Jun 2004 B2
6798887 Andre Sep 2004 B1
6799537 Liao Oct 2004 B1
6807720 Brune et al. Oct 2004 B2
6820025 Bachmann et al. Nov 2004 B2
6825768 Stapelfeld et al. Nov 2004 B2
6830012 Swan Dec 2004 B1
6833790 Mejia et al. Dec 2004 B2
6874447 Kobett Apr 2005 B1
6888502 Beigel et al. May 2005 B2
6901883 Gillis et al. Jun 2005 B2
6903682 Maddox Jun 2005 B1
6907844 Crist et al. Jun 2005 B1
6907883 Lin Jun 2005 B2
6921089 Groh et al. Jul 2005 B2
6923146 Korbitz et al. Aug 2005 B2
6928958 Crist et al. Aug 2005 B2
6937647 Boyd et al. Aug 2005 B1
6956483 Schmitt et al. Oct 2005 B2
6970090 Sciarra Nov 2005 B1
7061385 Fong et al. Jun 2006 B2
7079024 Alarcon et al. Jul 2006 B2
7114466 Mayer Oct 2006 B1
7142167 Rochelle et al. Nov 2006 B2
7164354 Panzer Jan 2007 B1
7173535 Bach et al. Feb 2007 B2
7198009 Crist et al. Apr 2007 B2
7222589 Lee et al. May 2007 B2
7249572 Goetzl et al. Jul 2007 B2
7252051 Napolez et al. Aug 2007 B2
7259718 Patterson et al. Aug 2007 B2
7267081 Steinbacher Sep 2007 B2
7275502 Boyd et al. Oct 2007 B2
7296540 Boyd Nov 2007 B2
7319397 Chung et al. Jan 2008 B2
7328671 Kates Feb 2008 B2
7339474 Easley Mar 2008 B2
7382328 Lee, IV et al. Jun 2008 B2
7394390 Gerig Jul 2008 B2
7395966 Braiman Jul 2008 B2
7403744 Bridgelall Jul 2008 B2
7404379 Nottingham et al. Jul 2008 B2
7411492 Greenberg et al. Aug 2008 B2
7426906 Nottingham et al. Sep 2008 B2
7434541 Kates Oct 2008 B2
7443298 Cole et al. Oct 2008 B2
7477155 Bach et al. Jan 2009 B2
7503285 Mainini et al. Mar 2009 B2
7518275 Suzuki et al. Apr 2009 B2
7518522 So et al. Apr 2009 B2
7538679 Shanks May 2009 B2
7546817 Moore Jun 2009 B2
7552699 Moore Jun 2009 B2
7559291 Reinhart Jul 2009 B2
7562640 Lalor Jul 2009 B2
7565885 Moore Jul 2009 B2
7574979 Nottingham et al. Aug 2009 B2
7583931 Eu et al. Sep 2009 B2
7602302 Hokuf et al. Oct 2009 B2
7612668 Harvey Nov 2009 B2
7616124 Paessel et al. Nov 2009 B2
7656291 Rochelle et al. Feb 2010 B2
7658166 Rheinschmidt, Jr. et al. Feb 2010 B1
7667599 Mainini et al. Feb 2010 B2
7667607 Gerig et al. Feb 2010 B2
7680645 Li et al. Mar 2010 B2
7705736 Kedziora Apr 2010 B1
7710263 Boyd May 2010 B2
7760137 Martucci et al. Jul 2010 B2
7779788 Moore Aug 2010 B2
7786876 Troxler et al. Aug 2010 B2
7804724 Way Sep 2010 B2
7814865 Tracy et al. Oct 2010 B2
7828221 Kwon Nov 2010 B2
7830257 Hassell Nov 2010 B2
7834769 Hinkle et al. Nov 2010 B2
7841301 Mainini et al. Nov 2010 B2
7856947 Giunta Dec 2010 B2
7864057 Milnes et al. Jan 2011 B2
7868912 Venetianer et al. Jan 2011 B2
7900585 Lee et al. Mar 2011 B2
7918190 Belcher et al. Apr 2011 B2
7944359 Fong et al. May 2011 B2
7946252 Lee, IV et al. May 2011 B2
7978078 Copeland et al. Jul 2011 B2
7996983 Lee et al. Aug 2011 B2
8011327 Mainini et al. Sep 2011 B2
8047161 Moore et al. Nov 2011 B2
8049630 Chao et al. Nov 2011 B2
8065978 Duncan et al. Nov 2011 B2
8069823 Mainini et al. Dec 2011 B2
8098164 Gerig et al. Jan 2012 B2
8159355 Gerig et al. Apr 2012 B2
8161915 Kim Apr 2012 B2
8185345 Mainini May 2012 B2
8232909 Kroeger et al. Jul 2012 B2
8240085 Hill Aug 2012 B2
8269504 Gerig Sep 2012 B2
8274396 Gurley et al. Sep 2012 B2
8297233 Rich et al. Oct 2012 B2
8342134 Lee et al. Jan 2013 B2
8342135 Peinetti et al. Jan 2013 B2
8430064 Groh et al. Apr 2013 B2
8436735 Mainini et al. May 2013 B2
8447510 Fitzpatrick et al. May 2013 B2
8451130 Mainini May 2013 B2
8456296 Piltonen et al. Jun 2013 B2
8483262 Mainini et al. Jul 2013 B2
8714113 Lee, IV et al. May 2014 B2
8715824 Rawlings May 2014 B2
8736499 Goetzl et al. May 2014 B2
8779925 Rich et al. Jul 2014 B2
8803692 Goetzl et al. Aug 2014 B2
8807089 Brown et al. Aug 2014 B2
8823513 Jameson et al. Sep 2014 B2
8854215 Ellis et al. Oct 2014 B1
8866605 Gibson Oct 2014 B2
8908034 Bordonaro Dec 2014 B2
8917172 Charych Dec 2014 B2
8947240 Mainini Feb 2015 B2
8967085 Gillis et al. Mar 2015 B2
9035773 Petersen et al. May 2015 B2
9125380 Deutsch Sep 2015 B2
9131660 Womble Sep 2015 B2
9186091 Mainini et al. Nov 2015 B2
9204251 Mendelson et al. Dec 2015 B1
9307745 Mainini Apr 2016 B2
9516863 Gerig et al. Dec 2016 B2
9861076 Rochelle et al. Jan 2018 B2
10514439 Seltzer Dec 2019 B2
10757672 Knas et al. Aug 2020 B1
20020010390 Guice et al. Jan 2002 A1
20020015094 Kuwano et al. Feb 2002 A1
20020036569 Martin Mar 2002 A1
20020092481 Spooner Jul 2002 A1
20020103610 Bachmann et al. Aug 2002 A1
20020196151 Troxler Dec 2002 A1
20030034887 Crabtree et al. Feb 2003 A1
20030035051 Cho et al. Feb 2003 A1
20030116099 Kim et al. Jun 2003 A1
20030154928 Lee et al. Aug 2003 A1
20030169207 Beigel et al. Sep 2003 A1
20030179140 Patterson et al. Sep 2003 A1
20030218539 Hight Nov 2003 A1
20040108939 Giunta Jun 2004 A1
20040162875 Brown Aug 2004 A1
20040263322 Onaru et al. Dec 2004 A1
20050000469 Giunta et al. Jan 2005 A1
20050007251 Crabtree et al. Jan 2005 A1
20050020279 Markhovsky et al. Jan 2005 A1
20050035865 Brennan et al. Feb 2005 A1
20050059909 Burgess Mar 2005 A1
20050066912 Korbitz et al. Mar 2005 A1
20050081797 Laitinen et al. Apr 2005 A1
20050139169 So Jun 2005 A1
20050145196 Crist et al. Jul 2005 A1
20050145198 Crist et al. Jul 2005 A1
20050145199 Napolez et al. Jul 2005 A1
20050145200 Napolez et al. Jul 2005 A1
20050148346 Maloney et al. Jul 2005 A1
20050172912 Crist et al. Aug 2005 A1
20050217606 Lee et al. Oct 2005 A1
20050231353 Dipoala et al. Oct 2005 A1
20050235924 Lee et al. Oct 2005 A1
20050254663 Raptopoulos et al. Nov 2005 A1
20050258715 Schlabach et al. Nov 2005 A1
20050263106 Steinbacher Dec 2005 A1
20050280544 Mishelevich Dec 2005 A1
20050280546 Ganley et al. Dec 2005 A1
20050288007 Benco et al. Dec 2005 A1
20060000015 Duncan Jan 2006 A1
20060011145 Kates et al. Jan 2006 A1
20060027185 Troxler et al. Feb 2006 A1
20060037559 Belcher Feb 2006 A1
20060061469 Jaeger et al. Mar 2006 A1
20060092676 Liptak et al. May 2006 A1
20060102100 Becker et al. May 2006 A1
20060102101 Kim May 2006 A1
20060112901 Gomez Jun 2006 A1
20060191491 Nottingham et al. Aug 2006 A1
20060196445 Kates Sep 2006 A1
20060197672 Talamas, Jr. et al. Sep 2006 A1
20060202818 Greenberg et al. Sep 2006 A1
20070011339 Brown Jan 2007 A1
20070103296 Paessel et al. May 2007 A1
20070197878 Shklarski Aug 2007 A1
20070204803 Ramsay Sep 2007 A1
20070204804 Swanson et al. Sep 2007 A1
20070209604 Groh et al. Sep 2007 A1
20070221138 Mainini et al. Sep 2007 A1
20070249470 Niva et al. Oct 2007 A1
20070266959 Brooks et al. Nov 2007 A1
20080004539 Ross Jan 2008 A1
20080017133 Moore Jan 2008 A1
20080036610 Hokuf et al. Feb 2008 A1
20080055154 Martucci et al. Mar 2008 A1
20080055155 Hensley et al. Mar 2008 A1
20080058670 Mainini et al. Mar 2008 A1
20080061978 Huang Mar 2008 A1
20080061990 Milnes et al. Mar 2008 A1
20080119757 Winter May 2008 A1
20080129457 Ritter et al. Jun 2008 A1
20080141949 Taylor Jun 2008 A1
20080143516 Mock et al. Jun 2008 A1
20080156277 Mainini et al. Jul 2008 A1
20080163827 Goetzl Jul 2008 A1
20080163829 Lee et al. Jul 2008 A1
20080168949 Belcher et al. Jul 2008 A1
20080168950 Moore et al. Jul 2008 A1
20080186167 Ramachandra Aug 2008 A1
20080186197 Rochelle et al. Aug 2008 A1
20080204322 Oswald et al. Aug 2008 A1
20080216766 Martin et al. Sep 2008 A1
20080236514 Johnson et al. Oct 2008 A1
20080252527 Garcia Oct 2008 A1
20080272908 Boyd Nov 2008 A1
20090000566 Kim Jan 2009 A1
20090002188 Greenberg Jan 2009 A1
20090012355 Lin Jan 2009 A1
20090020002 Williams et al. Jan 2009 A1
20090025651 Lalor Jan 2009 A1
20090031966 Kates Feb 2009 A1
20090061772 Moon et al. Mar 2009 A1
20090082830 Folkerts et al. Mar 2009 A1
20090102668 Thompson et al. Apr 2009 A1
20090112284 Smith et al. Apr 2009 A1
20090129338 Horn et al. May 2009 A1
20090224909 Derrick et al. Sep 2009 A1
20090239586 Boeve et al. Sep 2009 A1
20090289785 Leonard Nov 2009 A1
20090289844 Palsgrove et al. Nov 2009 A1
20090299742 Toman et al. Dec 2009 A1
20100008011 Ogram Jan 2010 A1
20100019903 Sawaya Jan 2010 A1
20100033339 Gurley et al. Feb 2010 A1
20100047119 Cressy Feb 2010 A1
20100049364 Landry et al. Feb 2010 A1
20100050954 Lee, IV et al. Mar 2010 A1
20100107985 O'Hare May 2010 A1
20100139576 Kim et al. Jun 2010 A1
20100154721 Gerig et al. Jun 2010 A1
20100201525 Bahat et al. Aug 2010 A1
20100231391 Dror et al. Sep 2010 A1
20100238022 Au et al. Sep 2010 A1
20100315241 Jow Dec 2010 A1
20100321180 Dempsey et al. Dec 2010 A1
20110140967 Lopez Jun 2011 A1
20110182438 Koike et al. Jul 2011 A1
20110203529 Mainini et al. Aug 2011 A1
20120000431 Khoshkish et al. Jan 2012 A1
20120006282 Kates Jan 2012 A1
20120032855 Reede et al. Feb 2012 A1
20120037088 Altenhofen Feb 2012 A1
20120078139 Aldridge et al. Mar 2012 A1
20120087204 Urbano et al. Apr 2012 A1
20120132151 Touchton et al. May 2012 A1
20120165012 Fischer et al. Jun 2012 A1
20120188370 Bordonaro Jul 2012 A1
20120236688 Spencer Sep 2012 A1
20120312250 Jesurum Dec 2012 A1
20130099920 Song et al. Apr 2013 A1
20130099922 Lohbihler Apr 2013 A1
20130141237 Goetzl et al. Jun 2013 A1
20130157564 Curtis et al. Jun 2013 A1
20130169441 Wilson Jul 2013 A1
20130203027 De Villers-Sidani et al. Aug 2013 A1
20130298846 Mainini Nov 2013 A1
20130321159 Schofield et al. Dec 2013 A1
20130340305 Mobley Dec 2013 A1
20140020635 Sayers et al. Jan 2014 A1
20140053788 Riddell Feb 2014 A1
20140057232 Wetmore et al. Feb 2014 A1
20140062695 Rosen et al. Mar 2014 A1
20140069350 Riddell Mar 2014 A1
20140073939 Rodriguez-Llorente et al. Mar 2014 A1
20140120943 Shima May 2014 A1
20140123912 Menkes et al. May 2014 A1
20140132608 Mund et al. May 2014 A1
20140174376 Touchton et al. Jun 2014 A1
20140176305 Aljadeff Jun 2014 A1
20140228649 Rayner et al. Aug 2014 A1
20140228927 Ahmad et al. Aug 2014 A1
20140253368 Holder Sep 2014 A1
20140253389 Beauregard Sep 2014 A1
20140261234 Gillis et al. Sep 2014 A1
20140261235 Rich et al. Sep 2014 A1
20140265568 Crafts et al. Sep 2014 A1
20140267299 Couse Sep 2014 A1
20140275824 Couse et al. Sep 2014 A1
20140276278 Smith et al. Sep 2014 A1
20140307888 Alderson et al. Oct 2014 A1
20140320347 Rochelle Oct 2014 A1
20140343599 Smith et al. Nov 2014 A1
20140358592 Wedig et al. Dec 2014 A1
20150040840 Muetzel et al. Feb 2015 A1
20150043744 Lagodzinski et al. Feb 2015 A1
20150053144 Bianchi et al. Feb 2015 A1
20150075446 Hu Mar 2015 A1
20150080013 Venkatraman et al. Mar 2015 A1
20150107531 Golden Apr 2015 A1
20150149111 Kelly et al. May 2015 A1
20150163412 Holley et al. Jun 2015 A1
20150172872 Alsehly et al. Jun 2015 A1
20150173327 Gerig et al. Jun 2015 A1
20150199490 Iancu et al. Jul 2015 A1
20150223013 Park et al. Aug 2015 A1
20150289111 Ozkan et al. Oct 2015 A1
20150350848 Eramian Dec 2015 A1
20150358768 Luna et al. Dec 2015 A1
20160015005 Brown, Jr. et al. Jan 2016 A1
20160021506 Bonge, Jr. Jan 2016 A1
20160021850 Stapelfeld et al. Jan 2016 A1
20160029466 DeMao Jan 2016 A1
20160044444 Rattner et al. Feb 2016 A1
20160084801 Robinson et al. Mar 2016 A1
20160094419 Peacock et al. Mar 2016 A1
20160102879 Guest et al. Apr 2016 A1
20160125867 Jarvinen et al. May 2016 A1
20160150362 Shaprio et al. May 2016 A1
20160174099 Goldfain Jun 2016 A1
20160178392 Goldfain Jun 2016 A1
20160187454 Orman et al. Jun 2016 A1
20160234649 Finnerty et al. Aug 2016 A1
20160253987 Chattell Sep 2016 A1
20160292635 Todasco Oct 2016 A1
20160335917 Lydecker et al. Nov 2016 A1
20160363664 Mindell et al. Dec 2016 A1
20160366813 Haneda Dec 2016 A1
20170026798 Prevatt Jan 2017 A1
20170212205 Bialer et al. Jul 2017 A1
20170323630 Stickney et al. Nov 2017 A1
20180027772 Gordon Feb 2018 A1
20180077509 Jones et al. Mar 2018 A1
20180078735 Dalgleish et al. Mar 2018 A1
20180094451 Peter Apr 2018 A1
20180188351 Jones et al. Jul 2018 A1
20180190311 Kato et al. Jul 2018 A1
20180210704 Jones et al. Jul 2018 A1
20180234134 Tang et al. Aug 2018 A1
20180235182 Bocknek Aug 2018 A1
20180249680 Van Curen et al. Sep 2018 A1
20180303066 Bai et al. Oct 2018 A1
20180315262 Love et al. Nov 2018 A1
20190013003 Baughman et al. Jan 2019 A1
20190066651 Yang Feb 2019 A1
20190110430 Badiou Apr 2019 A1
20190165832 Khanduri et al. May 2019 A1
20200367810 Shouldice et al. Nov 2020 A1
Foreign Referenced Citations (22)
Number Date Country
101112181 Jan 2008 CN
101937015 Jan 2011 CN
101937015 Jan 2011 CN
101112181 Nov 2012 CN
102793568 Dec 2014 CN
H0974774 Mar 1997 JP
20130128704 Nov 2013 KR
20180029636 Mar 2018 KR
20180059684 Jun 2018 KR
101911312 Jan 2019 KR
WO-02060240 Feb 2003 WO
WO-2006000015 Jan 2006 WO
WO-2008085812 Jul 2008 WO
WO-2008140992 Nov 2008 WO
WO-2009105243 Aug 2009 WO
WO-2009106896 Sep 2009 WO
WO-2011055004 May 2011 WO
WO-2011136816 Nov 2011 WO
WO-2011160698 Dec 2011 WO
WO-2012122607 Sep 2012 WO
WO-2015015047 Feb 2015 WO
WO-2016204799 Dec 2016 WO
Non-Patent Literature Citations (50)
Entry
Extended European Search Report for Application No. EP17180645, dated May 9, 2018, 7 pages.
Baba A.I., et al., “Calibrating Time of Flight in Two Way Ranging,” IEEE Xplore Digital Library, Dec. 2011, pp. 393-397.
Extended European Search Report for European Application No. 11784149.4 dated Nov. 17, 2017, 7 pages.
Extended European Search Report for European Application No. 15735439.0 dated Oct. 18, 2017, 9 pages.
Extended European Search Report for European Application No. 15895839.7 dated Oct. 9, 2018, 5 pages.
Extended European Search Report for European Application No. 17162289.7 dated Aug. 31, 2017, 7 pages.
High Tech Products, Inc: “Human Contain Model X-10 Rechargeable Muti-function Electronic Dog Fence Ultra-system”, Internet citation, Retrieved from the Internet: URL:http://web.archive.org/web/20120112221915/http://hightechpet.com/user_Manuals/HC%20X-10_Press.pdf retrieved on Apr. 10, 2017], Apr. 28, 2012, pp. 1-32, XP008184171.
International Preliminary Report for Patentability Chapter II for International Application No. PCT/US2014/024875 dated Mar. 12, 2015, 17 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/043653 dated Dec. 19, 2017, 14 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/013737 dated Mar. 7, 2018, 8 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/013738 dated Mar. 20, 2018, 6 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/013740 dated Mar. 20, 2018, 6 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/019887 dated May 8, 2018, 10 pages.
International Search Report and Written Opinion for International Application No. PCT/US2014/024875 dated Jun. 27, 2014, 12 pages.
International Search Report for International Application No. PCT/US2014/020344 dated Jun. 5, 2014, 2 pages.
International Search Report for International Application No. PCT/US2014/066650 dated Feb. 19, 2015, 3 pages (Outgoing).
International Search Report for International Application No. PCT/US2015/010864, Form PCT/ISA/210 dated Apr. 13, 2015, 2 pages.
International Search Report for International Application No. PCT/US2015/043653, Form PCT/ISA/210 dated Oct. 23, 2015, 2 pages.
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority for International Application No. PCT/US2015/043653, Form PCT/ISA/220 dated Oct. 23, 2015, 1 page.
Notification of Transmittal of the International Search Report and Written Opinion for the International Application No. PCT/US2014/066650 dated Feb. 19, 2015, 1 page.
Welch et al., “An Introduction to the Kalman Filter,” Department of Computer Science, Jul. 24, 2006, pp. 1-16.
Written Opinion for International Application No. PCT/US2014/066650 dated Feb. 19, 2015, 15 pages(outgoing).
Written Opinion for International Application No. PCT/US2015/043653, Form PCT/ISA/237 dated Oct. 23, 2015, 13 pages.
Written Opinion of the International Application No. PCT/US2015/010864, Form PCT/ISA/237 dated Apr. 13, 2015, 6 pages.
Eileen—How To Protect Your Dog From Loud and Scary Sounds (Year: 2013).
Extended European Search Report for European Application No. 18738816 dated Sep. 29, 2020, 10 pages.
Extended European Search Report for European Application No. 18738547.1 dated Sep. 24, 2020, 9 pages.
Extended European Search Report for European Application No. 18738743.6 dated Sep. 24, 2020, 11 pages.
Info Unlimited “Canine 10RC-HP10 Instructions”; Instruction manual V.0420; Publication 12 & 15 [online]. Jun. 14, 2013 (retrieved Sep. 29, 2020]. Retrieved from the Internet: URL:https://www.amazing1.com/content/download/CANINE10_Instructions.pdf.
Info Unlimited “Canine 10RC-HP10 Instructions”; Instruction manual V.0420. [Retrieved on Jul. 8, 2017]. Retrieved from the Internet: URL:https://www.amazing1.com/content/download/CANINE10 _Instructions.pdf.
International Search Report and Written Opinion for Application No. PCT/US2020/042601 dated Nov. 9, 2020, 11 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/065122, dated Mar. 25, 2019, 7 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/065154 dated Apr. 23, 2019, 7 pages.
International Search Report and Written Opinion for Application No. PCT/US2018/065938, dated Mar. 8, 2019, 9 pages.
International Search Report and Written Opinion for Application No. PCT/US2020/016617, dated Apr. 27, 2020, 13 pages.
Jondhale et al., Issues and challenges in RSSI based target localization and tracking in wireless sensor networks (Year: 2016).
Joshi et al., GPS-less animal tracking system (Year: 2008).
Kuo et al., Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks (Year: 2007).
Kuo et al., The Beacon Movement Detection Problem in Wireless Sensor Networks for Localization Applications (Year: 2009).
Millner et al., Wireless 3D Localization of Animals for Trait and Behavior Analysis in Indoor & Outdoor Areas (Year: 2009).
Panicker et al., A LoRa Wireless Mesh Network for Wide-Area Animal Tracking (Year: 2019).
Ayele E., et al., “Highly Energy Efficient Animal Mobility Driven BLE Beacon Advertising Control for Wildlife Monitoring,” IEEE Xplore, 2020, 8 pages.
Crutchfield., “What You Need to Know About Sound Masking,” pp. 1-7.
Integrated Building System., “The What, Where, Why and How of Sound Masking,” 2016, 6 pages.
Nam M., et al., “Combined Scheduling of Sensing and Communication for Real-Time Indoor Tracking in Assisted Living,” IEEE Real Time System Symposium, 2007, 10 pages.
Radoi I.E., et al., “Tracking and Monitoring Horses in the Wild Using Wireless Sensor Networks,” IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2015, 8 pages.
Supplementary European Search Report for European Application No. 18887374.9, dated Aug. 10, 2021, 7 pages.
Supplementary European Search Report for European Application No. 18888089.2, dated Aug. 6, 2021, 6 pages.
Supplementary European Search Report for European Application No. 18889799.5, dated Aug. 13, 2021, 10 pages.
Wood D.J., “Speech Privacy & Sound Masking in Modern Architecture,” 2008, 51 pages.
Related Publications (1)
Number Date Country
20190148933 A1 May 2019 US